NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 2 results Save | Export
Miriam Patrick – ProQuest LLC, 2022
This qualitative case study discussed the security training and awareness for iMiTs Art's cloud and information systems due to the digital transition to cloud computing capabilities and usage. The study was based on the technology acceptance of the TAM (Technology Acceptance Model) model, security training concepts of SETA (Security Education and…
Descriptors: Information Security, Information Systems, Information Management, Information Storage
Peer reviewed Peer reviewed
Direct linkDirect link
Anderson, Alicia – EDUCAUSE Quarterly, 2006
No university seems immune to cyber attacks. For many universities, such events have served as wake-up calls to develop a comprehensive information security and privacy strategy. This is no simple task, however. It involves balancing a culture of openness with a need for security and privacy. Security and privacy are not the same, and the…
Descriptors: School Security, Colleges, Privacy, Computer Security