Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 6 |
Descriptor
Computer Security | 7 |
Foreign Countries | 7 |
Guidelines | 7 |
Information Security | 3 |
Internet | 3 |
Risk | 3 |
Standards | 3 |
Best Practices | 2 |
College Administration | 2 |
Compliance (Legal) | 2 |
Educational Policy | 2 |
More ▼ |
Source
EDUCAUSE Quarterly | 2 |
Higher Education, Skills and… | 1 |
International Association for… | 1 |
International Journal of… | 1 |
Journal of Cybersecurity… | 1 |
Technology, Pedagogy and… | 1 |
Author
Alshareef, Naser | 1 |
Bernard Ngalim | 1 |
Oxley, Alan | 1 |
Powell, Ken | 1 |
Russell, Terry | 1 |
Seng Thah, Soon | 1 |
Spruit, Marcel | 1 |
Trappler, Thomas J. | 1 |
Wickens, Cathy | 1 |
Woollard, John | 1 |
Publication Type
Journal Articles | 6 |
Reports - Descriptive | 3 |
Reports - Research | 3 |
Reports - Evaluative | 1 |
Speeches/Meeting Papers | 1 |
Audience
Location
California | 1 |
Cameroon | 1 |
Malaysia | 1 |
Minnesota | 1 |
Netherlands | 1 |
Saudi Arabia | 1 |
United Kingdom | 1 |
United Kingdom (England) | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Bernard Ngalim – Journal of Cybersecurity Education, Research and Practice, 2024
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity…
Descriptors: Laws, Audits (Verification), Risk, Risk Assessment
Spruit, Marcel – Higher Education, Skills and Work-based Learning, 2022
Purpose: The information security field requires standardised education. This could be based on generic job profiles and a standard competence framework. The question is whether this is possible and feasible. To find out, the author did a case study: developing an information security master curriculum based on a generic PVIB job profile and the…
Descriptors: Information Security, Computer Science Education, Profiles, Case Studies
A Model for an Information Security Risk Management (ISRM) Framework for Saudi Arabian Organisations
Alshareef, Naser – International Association for Development of the Information Society, 2016
Countries in the Gulf represent thriving, globally important commercial centres. They have embraced technology and modern management methods, often originating in the western countries. In adapting to quite different cultures these do not always operate as successfully. The adoption and practices of the Information Security Risk Management (ISRM)…
Descriptors: Information Security, Risk, Qualitative Research, Foreign Countries
Seng Thah, Soon – International Journal of Computer-Assisted Language Learning and Teaching, 2022
This study was conducted to determine the level of ICT competencies among Malaysian language teachers at both primary and secondary schools. The focus of this study was on four specific domains: 1) technological concepts and operational skills; 2) pedagogical skills; 3) professional skills; and 4) social, ethics, and security skills. These skills…
Descriptors: Language Teachers, Pedagogical Content Knowledge, Second Language Learning, Second Language Instruction
Trappler, Thomas J. – EDUCAUSE Quarterly, 2010
Much recent discussion has focused on the pros and cons of cloud computing. Some institutions are attracted to cloud computing benefits such as rapid deployment, flexible scalability, and low initial start-up cost, while others are concerned about cloud computing risks such as those related to data location, level of service, and security…
Descriptors: Foreign Countries, Risk, Vendors, Best Practices
Woollard, John; Wickens, Cathy; Powell, Ken; Russell, Terry – Technology, Pedagogy and Education, 2009
E-safety issues have come to the fore of thinking about young people's use of the internet because of their vulnerable position with regard to contact with people who may take advantage of them. The "Byron Review" in the UK makes explicit the steps that need to be taken to protect internet users. Based upon research across four United…
Descriptors: Safety, Foreign Countries, Internet, School Law
Oxley, Alan – EDUCAUSE Quarterly, 2005
It is difficult to estimate the costs of not writing thorough IT policy. Misuse of IT resources, whether through ignorance or malice, costs money, as do court cases that can result from abuse. Furthermore, a poor university accreditation report caused in part by poor policy documents will likely have an adverse impact on student enrollment. There…
Descriptors: Ethics, Privacy, Foreign Countries, Information Technology