Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Security | 3 |
Computers | 3 |
Training | 3 |
Computer Software | 2 |
Information Management | 2 |
Information Security | 2 |
Administration | 1 |
Budgets | 1 |
Change Strategies | 1 |
Compliance (Legal) | 1 |
Computer Oriented Programs | 1 |
More ▼ |
Publication Type
Dissertations/Theses -… | 2 |
Journal Articles | 1 |
Reports - Descriptive | 1 |
Education Level
Higher Education | 1 |
Kindergarten | 1 |
Postsecondary Education | 1 |
Audience
Location
California | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
James Edwin Tippey Jr. – ProQuest LLC, 2021
This study explored the training needs of small colleges and universities to adopt cloud computing securely. The purpose of this qualitative phenomenological study was to determine what training would allow the small colleges and universities to deploy cloud computing solutions securely. The research interviewed 10 IT leaders from small colleges…
Descriptors: Small Colleges, Universities, Computer Security, Information Security
Brown, Brandon R. – ProQuest LLC, 2016
Kindergartens through twelfth grade institutions (K-12) are susceptible to unauthorized breaches to the security of their networked systems. These systems house sensitive information for students and staff alike. K-12 organizations face a significant risk for loss of this information that can damage reputation and pose liability. Perpetrators have…
Descriptors: Kindergarten, Elementary Secondary Education, Information Security, Information Networks
Akins, M. L.; Griffin, J. R. – Computers in Libraries, 1999
Presents the main ingredients for successful computer-systems administration. Discusses training and ongoing support, change management for system upgrades, developing a problem-reporting form and keeping the documentation history, managing technical support, and having a disaster-recovery plan. (AEF)
Descriptors: Administration, Change Strategies, Computer Oriented Programs, Computer Security