NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Ahmed Al Zaidy – ProQuest LLC, 2020
Academic institutions hold important information about students, faculty, and staff members. Hackers target academic institutions to access this information for criminal activities such as identity theft. This study was conducted to examine information confidentiality and cybersecurity in academic institutions. It targeted employees' training…
Descriptors: Confidentiality, Information Security, Computer Security, Employees
Peer reviewed Peer reviewed
Direct linkDirect link
MacNamara, Noirin; Mackle, Danielle; Trew, Johanne Devlin; Pierson, Claire; Bloomer, Fiona – International Journal of Social Research Methodology, 2021
Internet-mediated focus groups (FGs) have become a feature of qualitative research over the last decade; however, their use within social sciences has been adopted at a slower pace than other disciplines. This paper considers the advantages and disadvantages of internet-mediated FGs and reflects on their use for researching culturally sensitive…
Descriptors: Internet, Focus Groups, Program Effectiveness, Asynchronous Communication
Okolo, Nkiru Benjamin – ProQuest LLC, 2016
Information systems of today face more potential security infringement than ever before. The regular susceptibility of data to breaches is a function of systems users' disinclination to follow appropriate security measures. A well-secured system maintains integrity, confidentiality, and availability, while providing appropriate and consistent…
Descriptors: Information Security, Foreign Countries, Confidentiality, Information Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Rickman, Dana – State Education Standard, 2016
By combining an overall vision for the use of data, a commitment to protecting student privacy and data integrity, and supportive legislation, Georgia emerged as a leader in the effective use of student data. But it easily could have gone another way. None of the three elements could be taken for granted when Georgia set out to develop its state…
Descriptors: Student Records, Information Security, Privacy, Educational Legislation
Peer reviewed Peer reviewed
Direct linkDirect link
Trabelsi, Zouheir; Ibrahim, Walid – Journal of Information Technology Education: Innovations in Practice, 2013
Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality,…
Descriptors: Ethics, Information Security, Computer Security, Confidentiality