Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 7 |
Descriptor
Information Management | 7 |
Information Security | 7 |
Training | 7 |
Computer Security | 3 |
Information Storage | 3 |
Access to Information | 2 |
Computer Software | 2 |
Data Collection | 2 |
Data Use | 2 |
Information Technology | 2 |
Internet | 2 |
More ▼ |
Source
ProQuest LLC | 3 |
Information Systems Education… | 1 |
Louisiana Department of… | 1 |
OCLC Online Computer Library… | 1 |
OECD Publishing | 1 |
Author
Ciampa, Mark | 1 |
Daniels, Daniel B., III | 1 |
Erway, Ricky | 1 |
Horton, Laurence | 1 |
James Edwin Tippey Jr. | 1 |
Miriam Patrick | 1 |
Nurnberger, Amy | 1 |
Otsuji, Reid | 1 |
Rushing, Amy | 1 |
Publication Type
Dissertations/Theses -… | 3 |
Guides - Non-Classroom | 2 |
Reports - Descriptive | 2 |
Journal Articles | 1 |
Reports - General | 1 |
Reports - Research | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Audience
Researchers | 1 |
Location
Australia | 1 |
Belgium | 1 |
Bermuda | 1 |
Canada | 1 |
Chile | 1 |
Czech Republic | 1 |
Denmark | 1 |
Finland | 1 |
France | 1 |
Germany | 1 |
Hungary | 1 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
International Adult Literacy… | 1 |
What Works Clearinghouse Rating
Miriam Patrick – ProQuest LLC, 2022
This qualitative case study discussed the security training and awareness for iMiTs Art's cloud and information systems due to the digital transition to cloud computing capabilities and usage. The study was based on the technology acceptance of the TAM (Technology Acceptance Model) model, security training concepts of SETA (Security Education and…
Descriptors: Information Security, Information Systems, Information Management, Information Storage
James Edwin Tippey Jr. – ProQuest LLC, 2021
This study explored the training needs of small colleges and universities to adopt cloud computing securely. The purpose of this qualitative phenomenological study was to determine what training would allow the small colleges and universities to deploy cloud computing solutions securely. The research interviewed 10 IT leaders from small colleges…
Descriptors: Small Colleges, Universities, Computer Security, Information Security
Louisiana Department of Education, 2018
Data is a crucial component in educational success. It gives educators the power to address student needs, study what strategies work, and make necessary changes so that every student has the greatest opportunity. Today, educators, parents, and students have access to more data than ever before and have access to more technology tools to…
Descriptors: Information Management, Privacy, Student Records, Standards
Erway, Ricky; Horton, Laurence; Nurnberger, Amy; Otsuji, Reid; Rushing, Amy – OCLC Online Computer Library Center, Inc., 2016
This report describes an extensive set of actions and resources that can be leveraged by libraries establishing basic research data management programs. Part 1, "Laying the Foundation," is intended to help institutions establish the underpinning for the next steps suggested in Part 2, "Building Up and Out." The order in which…
Descriptors: Research Administration, Information Management, Program Implementation, Library Services
Daniels, Daniel B., III – ProQuest LLC, 2014
There is a lack of literature linking end-user behavior to the availability of open-source intelligence (OSINT). Most OSINT literature has been focused on the use and assessment of open-source intelligence, not the proliferation of personally or organizationally identifiable information (PII/OII). Additionally, information security studies have…
Descriptors: Information Security, Open Source Technology, Information Management, Computer Security
Ciampa, Mark – Information Systems Education Journal, 2011
Passwords have the distinction of being the most widely-used form of authentication--and the most vulnerable. With the dramatic increase today in the number of accounts that require passwords, overwhelmed users usually resort to creating weak passwords or reusing the same password for multiple accounts, thus making passwords the weakest link in…
Descriptors: Information Security, Information Storage, Information Retrieval, Memorization
OECD Publishing, 2014
The Programme for International Assessment of Adult Competencies (PIAAC) will establish technical standards and guidelines to ensure that the survey design and implementation processes of PIAAC yield high-quality and internationally comparable data. This document provides a revised version of the technical standards and guidelines originally…
Descriptors: Adults, International Assessment, Adult Literacy, Competence