Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 6 |
Descriptor
Computer Software | 7 |
Higher Education | 7 |
Risk Management | 7 |
Computer Security | 4 |
Business Administration… | 3 |
Information Technology | 3 |
Internet | 2 |
Models | 2 |
Teaching Methods | 2 |
Users (Information) | 2 |
Best Practices | 1 |
More ▼ |
Source
EDUCAUSE Review | 2 |
Campus Technology | 1 |
Higher Education, Skills and… | 1 |
Innovations in Education and… | 1 |
Journal of Cybersecurity… | 1 |
Author
Anand Prakash | 1 |
Chou, Te-Shun | 1 |
Hempenius, Nicholas | 1 |
Hoyt, Brian R. | 1 |
Morooney, Kevin | 1 |
Panettieri, Joseph C. | 1 |
Petersen, Rodney | 1 |
Sudhir Ambekar | 1 |
Suess, Jack | 1 |
Yamnitsky, Eugene | 1 |
Publication Type
Journal Articles | 6 |
Reports - Descriptive | 4 |
Reports - Research | 2 |
Reports - Evaluative | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 6 |
Postsecondary Education | 3 |
Audience
Location
United Kingdom (Edinburgh) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Anand Prakash; Sudhir Ambekar – Higher Education, Skills and Work-based Learning, 2024
Purpose: This study aims to describe the fundamentals of teaching risk management in a classroom setting, with an emphasis on the learning interface between higher education and the workplace environment for business management students. Design/methodology/approach: The study reviews literature that uses spreadsheets to visualize and model risk…
Descriptors: Risk Management, Case Method (Teaching Technique), Teaching Methods, Higher Education
Chou, Te-Shun; Hempenius, Nicholas – Journal of Cybersecurity Education, Research and Practice, 2020
With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect. These changes make securing a network more challenging than ever before. Hence, it is critical to prepare a comprehensive guide of network…
Descriptors: Computer Networks, Computer Security, Information Security, Computer Science Education
Yamnitsky, Eugene – Innovations in Education and Teaching International, 2023
The doctoral journey is a complex endeavour, and like any complex project, deserves to be managed accordingly. Agile Project Management has been used successfully by practitioners in the Software industry for the last two decades and recently is being adopted in other industries, including in Higher Education. Based on the author's personal…
Descriptors: Doctoral Programs, Computer Software, Industry, Higher Education
Petersen, Rodney – EDUCAUSE Review, 2011
The sourcing of IT systems and services takes many shapes in higher education. Campus central IT organizations are increasingly responsible for the administration of enterprise systems and for the consolidation of operations into a single data center. Specialized academic and administrative systems may be run by local IT departments. In addition,…
Descriptors: Higher Education, Information Technology, Risk Management, Computer Security
Suess, Jack; Morooney, Kevin – EDUCAUSE Review, 2009
Increasingly, IT organizations will move from providing IT services locally to becoming an integrator of IT services--some provided locally and others provided outside the institution. As a result, institutions must immediately begin to plan for shared services and must understand the essential role that identity management and trust services play…
Descriptors: Higher Education, Internet, Computer Software, Computer Security
Panettieri, Joseph C. – Campus Technology, 2006
This article discusses what colleges and universities can learn from Uncle Sam and corporate America when it comes to designing secure networks and ensuring privacy. After all, schools face many of the same privacy and information security challenges seen in the business and government sectors. The fact of the matter is, in the age of cyber crime…
Descriptors: Higher Education, Computer Security, Educational Environment, Computer Software
Hoyt, Brian R. – 1996
The skills necessary to compete in a fast paced business environment--critical thinking, risk taking, team building, project management, and others--are not and cannot be addressed in the traditional delivery of an undergraduate business course. The Ohio University-Lancaster Management program uses a project based, just-in-time (JIT) approach to…
Descriptors: Business Administration Education, Computer Software, Critical Thinking, Decision Making