Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 5 |
Descriptor
Confidentiality | 5 |
Information Security | 5 |
Program Effectiveness | 5 |
Privacy | 3 |
Computer Security | 2 |
Foreign Countries | 2 |
Knowledge Level | 2 |
Asynchronous Communication | 1 |
Barriers | 1 |
Behavior | 1 |
Case Studies | 1 |
More ▼ |
Author
Ahmed Al Zaidy | 1 |
Bloomer, Fiona | 1 |
Ibrahim, Walid | 1 |
MacNamara, Noirin | 1 |
Mackle, Danielle | 1 |
Okolo, Nkiru Benjamin | 1 |
Pierson, Claire | 1 |
Rickman, Dana | 1 |
Trabelsi, Zouheir | 1 |
Trew, Johanne Devlin | 1 |
Publication Type
Journal Articles | 3 |
Dissertations/Theses -… | 2 |
Reports - Research | 2 |
Reports - Descriptive | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Georgia | 1 |
Ireland | 1 |
Nigeria | 1 |
United Kingdom (Northern… | 1 |
Laws, Policies, & Programs
Race to the Top | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Ahmed Al Zaidy – ProQuest LLC, 2020
Academic institutions hold important information about students, faculty, and staff members. Hackers target academic institutions to access this information for criminal activities such as identity theft. This study was conducted to examine information confidentiality and cybersecurity in academic institutions. It targeted employees' training…
Descriptors: Confidentiality, Information Security, Computer Security, Employees
MacNamara, Noirin; Mackle, Danielle; Trew, Johanne Devlin; Pierson, Claire; Bloomer, Fiona – International Journal of Social Research Methodology, 2021
Internet-mediated focus groups (FGs) have become a feature of qualitative research over the last decade; however, their use within social sciences has been adopted at a slower pace than other disciplines. This paper considers the advantages and disadvantages of internet-mediated FGs and reflects on their use for researching culturally sensitive…
Descriptors: Internet, Focus Groups, Program Effectiveness, Asynchronous Communication
Okolo, Nkiru Benjamin – ProQuest LLC, 2016
Information systems of today face more potential security infringement than ever before. The regular susceptibility of data to breaches is a function of systems users' disinclination to follow appropriate security measures. A well-secured system maintains integrity, confidentiality, and availability, while providing appropriate and consistent…
Descriptors: Information Security, Foreign Countries, Confidentiality, Information Systems
Rickman, Dana – State Education Standard, 2016
By combining an overall vision for the use of data, a commitment to protecting student privacy and data integrity, and supportive legislation, Georgia emerged as a leader in the effective use of student data. But it easily could have gone another way. None of the three elements could be taken for granted when Georgia set out to develop its state…
Descriptors: Student Records, Information Security, Privacy, Educational Legislation
Trabelsi, Zouheir; Ibrahim, Walid – Journal of Information Technology Education: Innovations in Practice, 2013
Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality,…
Descriptors: Ethics, Information Security, Computer Security, Confidentiality