Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 2 |
Descriptor
Delphi Technique | 2 |
Evaluation Methods | 2 |
Information Systems | 2 |
Accreditation (Institutions) | 1 |
Age | 1 |
Business Administration… | 1 |
Certification | 1 |
Cluster Grouping | 1 |
Competence | 1 |
Computer Security | 1 |
Course Evaluation | 1 |
More ▼ |
Author
Jiang, Yong | 1 |
Nilsen, Richard K. | 1 |
Publication Type
Dissertations/Theses -… | 1 |
Journal Articles | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 1 |
Audience
Location
China | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Jiang, Yong – Higher Education Studies, 2017
Traditional mathematical methods built around exactitude have limitations when applied to the processing of educational information, due to their uncertainty and imperfection. Alternative mathematical methods, such as grey system theory, have been widely applied in processing incomplete information systems and have proven effective in a number of…
Descriptors: Accreditation (Institutions), Business Administration Education, Information Systems, Evaluation Methods
Nilsen, Richard K. – ProQuest LLC, 2017
Organizational information system users (OISU) that are victimized by cyber threats are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, it has been argued that cybersecurity competency is critical for advancing economic prosperity and maintaining national security. The fact remains…
Descriptors: Computer Security, Information Security, Knowledge Level, Competence