Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 9 |
Descriptor
Guidelines | 9 |
Information Security | 9 |
Information Systems | 9 |
Computer Security | 4 |
Confidentiality | 3 |
Foreign Countries | 3 |
Privacy | 3 |
Information Technology | 2 |
Management Systems | 2 |
Records (Forms) | 2 |
Universities | 2 |
More ▼ |
Source
ProQuest LLC | 2 |
Education for Information | 1 |
Information Systems Education… | 1 |
Institute for Higher… | 1 |
International Association for… | 1 |
Journal of Cybersecurity… | 1 |
Journal of Information… | 1 |
School Business Affairs | 1 |
Author
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 4 |
Dissertations/Theses -… | 2 |
Reports - Evaluative | 2 |
Reports - Research | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Postsecondary Education | 4 |
Higher Education | 3 |
Elementary Secondary Education | 1 |
Audience
Policymakers | 1 |
Laws, Policies, & Programs
Privacy Act 1974 | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Bernard Ngalim – Journal of Cybersecurity Education, Research and Practice, 2024
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity…
Descriptors: Laws, Audits (Verification), Risk, Risk Assessment
Maurel, Dominique; Zwarich, Natasha – Education for Information, 2021
Information governance provides a framework of accountability for the effective and efficient use of information to meet organizational objectives and compliance requirements. While information functions are often carried out by separate units that frequently work in silos, information governance is based on an interactive approach, taking into…
Descriptors: Governance, Accountability, Information Management, Power Structure
Grama, Joanna Lyn – Institute for Higher Education Policy, 2019
Our current federal postsecondary data system is incomplete and fails to provide today's students with the accurate, timely information that they need to inform their college choices and promote their success. As policymakers consider proposals to improve this federal data system, it is critical that they work in tandem to protect students'…
Descriptors: Privacy, Information Security, Postsecondary Education, Information Systems
Schwieger, Dana; Ladwig, Christine – Information Systems Education Journal, 2016
The demand for college graduates with skills in big data analysis is on the rise. Employers in all industry sectors have found significant value in analyzing both separate and combined data streams. However, news reports continue to script headlines drawing attention to data improprieties, privacy breaches and identity theft. While data privacy is…
Descriptors: Information Security, Information Systems, Data, Privacy
Nedyalkova, Anna; Bakardjieva, Teodora; Nedyalkov, Krasimir – International Association for Development of the Information Society, 2016
This paper suggests digital approaches in university management. Digital transformation requires leadership that can maintain and balance competing interests from faculty, administrators, students and others. The team of Varna Free University designed a flexible proper solution VFU SMART STUDENT aiming at lower operating costs and better…
Descriptors: Information Security, Information Systems, Computer Networks, Guidelines
Mutchler, Leigh Ann – ProQuest LLC, 2012
The purpose of the present study is to make contributions to the area of behavioral information security in the field of Information Systems and to assist in the improved development of Information Security Policy instructional programs to increase the policy compliance of individuals. The role of an individual's experience in the context of…
Descriptors: Role, Information Security, Online Surveys, Information Systems
Willey, Lorrie; Ford, Janet C.; White, Barbara Jo; Clapper, Danial L. – Journal of Information Systems Education, 2011
The impact of intellectual property (IP) law on information systems (IS) professionals in business cannot be overstated. The IS 2010 model curriculum guidelines for undergraduate IS programs stress the importance of information security and knowledge about IP. While copyright and patents are the most well-known types of IP, another, trade secrets,…
Descriptors: Copyrights, Confidentiality, Computer Security, Information Systems
Nazi, Kim M. – ProQuest LLC, 2012
Personal Health Records (PHRs) and PHR systems have been designed as consumer-oriented tools to empower patients and improve health care. Despite significant consumer interest and anticipated benefits, adoption remains low. Understanding the consumer perspective is necessary, but insufficient by itself. Consumer PHR use also has broad implications…
Descriptors: Medical Evaluation, Physicians, Nurses, Pharmacy
Sharp, Linda – School Business Affairs, 2011
School system leaders never know when disaster may strike. Having a plan in place to protect vital data and systems is crucial. School system leaders need to be actively involved in crisis preparedness, planned response, and recovery to ensure student and staff safety and to make certain that all important operations, services, processes, and…
Descriptors: School Security, Crisis Management, Emergency Programs, School Safety