Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 5 |
Descriptor
Information Management | 5 |
Information Security | 5 |
Knowledge Level | 5 |
Data Analysis | 3 |
Foreign Countries | 3 |
21st Century Skills | 2 |
Computer Security | 2 |
Data Collection | 2 |
Elementary Secondary Education | 2 |
Higher Education | 2 |
Technology Uses in Education | 2 |
More ▼ |
Author
Carliner, Saul, Ed. | 1 |
Daniels, Daniel B., III | 1 |
Eyadat, Mohammad S. | 1 |
Judith H. Van Alstyne | 1 |
Ostashewski, Nathaniel, Ed. | 1 |
Wu, Yejun | 1 |
Publication Type
Dissertations/Theses -… | 2 |
Journal Articles | 2 |
Reports - Research | 2 |
Collected Works - Proceedings | 1 |
Education Level
Elementary Secondary Education | 2 |
Higher Education | 2 |
Postsecondary Education | 2 |
Secondary Education | 1 |
Audience
Location
Canada | 1 |
Saudi Arabia | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Judith H. Van Alstyne – ProQuest LLC, 2023
Technological advances in the 21st century have led to a powerful information landscape where successfully managing one's personal information grows ever more complex. Personal Information Management (PIM) is the field of study dedicated to the activities people engage in to organize their information so that they can find an item again when they…
Descriptors: Secondary School Students, Self Concept, Identification (Psychology), Information Security
Eyadat, Mohammad S. – Journal of Academic Administration in Higher Education, 2015
Information systems produce significant benefits to organizations. Therefore, organizations invest tremendous amount of money and time to obtain and manage information in order to maintain a high level of performance and to remain competitive. There are many factors that can impact the organizational information management and performance. One of…
Descriptors: Higher Education, Educational Administration, Administrator Role, Information Security
Daniels, Daniel B., III – ProQuest LLC, 2014
There is a lack of literature linking end-user behavior to the availability of open-source intelligence (OSINT). Most OSINT literature has been focused on the use and assessment of open-source intelligence, not the proliferation of personally or organizationally identifiable information (PII/OII). Additionally, information security studies have…
Descriptors: Information Security, Open Source Technology, Information Management, Computer Security
Wu, Yejun – Journal of Education for Library and Information Science, 2013
This paper addresses the curriculum overlap and gap between LIS education and intelligence education by analyzing the content of the websites of the intelligence education programs and courses in 27 representative intelligence education universities in the United States, and the intelligence-related programs and courses in the 56 LIS programs in…
Descriptors: Library Science, Library Education, Web Sites, Computer Literacy
Carliner, Saul, Ed.; Ostashewski, Nathaniel, Ed. – Association for the Advancement of Computing in Education, 2015
The Association for the Advancement of Computing in Education (AACE) is an international, non-profit educational organization. The Association's purpose is to advance the knowledge, theory, and quality of teaching and learning at all levels with information technology. "EdMedia 2015: World Conference on Educational Media &…
Descriptors: Educational Technology, Technology Uses in Education, Action Research, Instructional Design