NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Anand Prakash; Sudhir Ambekar – Higher Education, Skills and Work-based Learning, 2024
Purpose: This study aims to describe the fundamentals of teaching risk management in a classroom setting, with an emphasis on the learning interface between higher education and the workplace environment for business management students. Design/methodology/approach: The study reviews literature that uses spreadsheets to visualize and model risk…
Descriptors: Risk Management, Case Method (Teaching Technique), Teaching Methods, Higher Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Chou, Te-Shun; Hempenius, Nicholas – Journal of Cybersecurity Education, Research and Practice, 2020
With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect. These changes make securing a network more challenging than ever before. Hence, it is critical to prepare a comprehensive guide of network…
Descriptors: Computer Networks, Computer Security, Information Security, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Yamnitsky, Eugene – Innovations in Education and Teaching International, 2023
The doctoral journey is a complex endeavour, and like any complex project, deserves to be managed accordingly. Agile Project Management has been used successfully by practitioners in the Software industry for the last two decades and recently is being adopted in other industries, including in Higher Education. Based on the author's personal…
Descriptors: Doctoral Programs, Computer Software, Industry, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Petersen, Rodney – EDUCAUSE Review, 2011
The sourcing of IT systems and services takes many shapes in higher education. Campus central IT organizations are increasingly responsible for the administration of enterprise systems and for the consolidation of operations into a single data center. Specialized academic and administrative systems may be run by local IT departments. In addition,…
Descriptors: Higher Education, Information Technology, Risk Management, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Suess, Jack; Morooney, Kevin – EDUCAUSE Review, 2009
Increasingly, IT organizations will move from providing IT services locally to becoming an integrator of IT services--some provided locally and others provided outside the institution. As a result, institutions must immediately begin to plan for shared services and must understand the essential role that identity management and trust services play…
Descriptors: Higher Education, Internet, Computer Software, Computer Security
Panettieri, Joseph C. – Campus Technology, 2006
This article discusses what colleges and universities can learn from Uncle Sam and corporate America when it comes to designing secure networks and ensuring privacy. After all, schools face many of the same privacy and information security challenges seen in the business and government sectors. The fact of the matter is, in the age of cyber crime…
Descriptors: Higher Education, Computer Security, Educational Environment, Computer Software
Hoyt, Brian R. – 1996
The skills necessary to compete in a fast paced business environment--critical thinking, risk taking, team building, project management, and others--are not and cannot be addressed in the traditional delivery of an undergraduate business course. The Ohio University-Lancaster Management program uses a project based, just-in-time (JIT) approach to…
Descriptors: Business Administration Education, Computer Software, Critical Thinking, Decision Making