NotesFAQContact Us
Collection
Advanced
Search Tips
Source
ProQuest LLC58
Publication Type
Dissertations/Theses -…58
Audience
Assessments and Surveys
Defining Issues Test1
What Works Clearinghouse Rating
Showing 1 to 15 of 58 results Save | Export
Samuel Mergendahl – ProQuest LLC, 2024
While the introduction of memory-safe programming languages into embedded, Cyber-Physical Systems (CPS) offers an opportunity to eliminate many system vulnerabilities, a pragmatic adoption of memory-safe programming languages often necessitates incremental deployment due to practical development constraints, such as the size of many legacy code…
Descriptors: Programming Languages, Information Systems, Information Security, Memory
Anna Elizabeth Jones – ProQuest LLC, 2023
Learning analytics is an emerging trend in American community colleges brought about by technological advancements, institutional accountability, and external pressure on institutions to substantiate and improve learning. Learning analytics can potentially improve student engagement, retention, and success but also possess inherent ethical and…
Descriptors: Community Colleges, Faculty Advisers, Ethics, Learning Analytics
Michael Christopher Waranowicz – ProQuest LLC, 2024
Public school districts are frequently targeted by cybercriminals to gain access to a wealth of under-protected sensitive data. As a result, information technology (IT) leaders in public school districts must implement measures to maintain the security and confidentiality of sensitive data collected and stored by their schools. This qualitative…
Descriptors: Computer Security, Program Implementation, Public Schools, School Districts
Washington, Mark Allen – ProQuest LLC, 2023
The need to protect confidential data stored in university enterprise information systems and to prevent infiltration through phishing cyber attacks by malicious individuals and organizations has emerged. The unfortunate target of phishing attacks is university employees and students with access to confidential information. This research specifies…
Descriptors: Systems Approach, Information Security, Computer Security, Confidentiality
Valdes, Edgar – ProQuest LLC, 2022
The aim of this study is to understand the Tor browser and its multiple applications as related to cybersecurity. The study also argues that most internet users are not aware of the danger they face when navigating the dark web. This research explores top executives' and specialized employees' awareness and understating of the hidden areas of…
Descriptors: Foreign Countries, Computer Security, Internet, Crime
Pagpatan, Vikram – ProQuest LLC, 2023
Occupational therapy students (OTSs) who misuse social media within academic and clinical learning environments may increase the instances of ethical health care violations and breaches of professional codes of conduct. The purpose of this quantitative, cross-sectional study was to assess the social media competency (SMC) scores of OTSs based on…
Descriptors: Gender Differences, Age Differences, Educational Attainment, Occupational Therapy
Michael L. Schliep – ProQuest LLC, 2021
Communication privacy is constantly under threat from Nation State Adversaries (NSA). This has led many platforms, such as Facebook and Apple, to implement secure conversation cryptographic protocols in their messaging applications. However, many of the protocols do not provide provable security and do not provide other security guarantees about…
Descriptors: Privacy, Interpersonal Communication, Computer Mediated Communication, Social Media
Fei Wang Roberts – ProQuest LLC, 2021
Discretion is ubiquitous in both public and business administration. Public programs, laws, regulations, and rules cannot be self-implemented, and their implementation usually involves the exercise of discretion. Research on discretion in public administration, to date, has focused predominantly on normative considerations, particularly, the…
Descriptors: Confidentiality, Disclosure, Elementary Secondary Education, Public Administration
Ahmed Al Zaidy – ProQuest LLC, 2020
Academic institutions hold important information about students, faculty, and staff members. Hackers target academic institutions to access this information for criminal activities such as identity theft. This study was conducted to examine information confidentiality and cybersecurity in academic institutions. It targeted employees' training…
Descriptors: Confidentiality, Information Security, Computer Security, Employees
Craig L. McPherson – ProQuest LLC, 2020
Usage rates of blogs, social media, and online courses have been exponentially increasing in the last decade, especially among the college student population (Knight-McCord, et al., 2016). While the benefits of these platforms, including connectivity, visibility, social feedback, persistence, and accessibility are attractive to students as an…
Descriptors: Online Courses, Privacy, Confidentiality, Student Attitudes
Jessica Michelle Schulz – ProQuest LLC, 2021
This critical discourse analysis focuses on the discourses of sexual violence and intimate partner violence on the websites of two institutions of higher education in the United States. Analyzing how institutions speak about sexual and intimate partner violence is an important step to learning about how they see victims, survivors, perpetrators,…
Descriptors: Sexual Abuse, Violence, Web Sites, Higher Education
Gibbs, Kyle D. – ProQuest LLC, 2018
The teacher evaluation process has undergone major reform in recent years. Teachers are scored on education standards and quality indicators. Other components of the reformed evaluation system are student growth measures, student learning objectives, student surveys, professional growth plans, and frequent feedback. The relationship between the…
Descriptors: Teacher Evaluation, Teacher Attitudes, Teacher Administrator Relationship, Principals
Royster, Leigh-Anne A. – ProQuest LLC, 2017
Gender based violence is experienced at higher rates on college campuses than in other communities. One in five women experience acquaintance rape during their academic career and less than 5% of college women who have experienced sexual assault report their victimization (Fisher, Cullen, & Turner, 2000). Recent federal guidance is meant to…
Descriptors: Sexuality, Violence, Prevention, Females
Kang, Ruogu – ProQuest LLC, 2015
The online communication landscape has changed significantly from the early days of the Internet. In most developed countries, people are constantly connected through the Internet to almost everyone else in their lives, everywhere they go. The Internet makes their lives more convenient, but unintentional exposure of personal information to…
Descriptors: Internet, Privacy, Information Management, Censorship
Okolo, Nkiru Benjamin – ProQuest LLC, 2016
Information systems of today face more potential security infringement than ever before. The regular susceptibility of data to breaches is a function of systems users' disinclination to follow appropriate security measures. A well-secured system maintains integrity, confidentiality, and availability, while providing appropriate and consistent…
Descriptors: Information Security, Foreign Countries, Confidentiality, Information Systems
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4