Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 8 |
Descriptor
Best Practices | 9 |
Computer Security | 9 |
Information Technology | 9 |
Computer Science Education | 4 |
Computer System Design | 3 |
Foreign Countries | 3 |
Higher Education | 3 |
Information Security | 3 |
Social Change | 3 |
College Graduates | 2 |
Crime | 2 |
More ▼ |
Source
ProQuest LLC | 4 |
EDUCAUSE Quarterly | 2 |
Association Supporting… | 1 |
Campus Technology | 1 |
New England Board of Higher… | 1 |
Author
Anderson, Greg | 1 |
Clebsch, William | 1 |
Dougherty, Jennifer Dowling | 1 |
Edwards, Gregory | 1 |
Emeka Ejikeme | 1 |
James Johnston | 1 |
Panettieri, Joseph C. | 1 |
Rene Ekoteson | 1 |
Smith, Peter, Ed. | 1 |
Trappler, Thomas J. | 1 |
Publication Type
Dissertations/Theses -… | 4 |
Reports - Descriptive | 4 |
Journal Articles | 3 |
Collected Works - Proceedings | 1 |
Education Level
Higher Education | 7 |
Postsecondary Education | 6 |
Adult Education | 2 |
Audience
Policymakers | 1 |
Practitioners | 1 |
Location
California | 2 |
Massachusetts | 2 |
Cameroon | 1 |
Connecticut | 1 |
Maine | 1 |
Minnesota | 1 |
New Hampshire | 1 |
Rhode Island | 1 |
Vermont | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Emeka Ejikeme – ProQuest LLC, 2023
The U.S. National Institute of Standards and Technology (NIST) identified that approximately 1.8 million cybersecurity positions were vacant in 2021 because of a lack of professionals with the required skill sets and who remained in their jobs long enough to contribute to their organizations' cybersecurity needs. Also shown was the rising global…
Descriptors: Best Practices, Computer Security, College Graduates, Computer Literacy
Rene Ekoteson – ProQuest LLC, 2024
Cyberattacks pose a significant threat to university institutions as universities increasingly rely on computer networks to conduct day-to-day business activities. University information technology (IT) leaders are concerned about the increasing level of cyberattacks because these attacks can result in the loss of sensitive data, identity theft,…
Descriptors: Prevention, Information Technology, Information Security, Computer Security
James Johnston – ProQuest LLC, 2024
The need in the public sector is to help people 60+ years of age in the safe, practical use of technology for business, personal use, and family interaction, as this group is targeted more than others for technology fraud. The practice-focused question centers around which topics need to be part of technology fraud pilot training to reduce the…
Descriptors: Older Adults, Learning Theories, Information Security, Pilot Projects
New England Board of Higher Education, 2018
Surveys of New England employers, college academic officers, and graduates find that many consider today's college graduates inadequately prepared for the world of work. In 2017, the New England Board of Higher Education convened the Commission on Higher Education & Employability, under the leadership of Rhode Island Governor Gina M. Raimondo.…
Descriptors: Education Work Relationship, Employment Potential, College Graduates, Career Readiness
Trappler, Thomas J. – EDUCAUSE Quarterly, 2010
Much recent discussion has focused on the pros and cons of cloud computing. Some institutions are attracted to cloud computing benefits such as rapid deployment, flexible scalability, and low initial start-up cost, while others are concerned about cloud computing risks such as those related to data location, level of service, and security…
Descriptors: Foreign Countries, Risk, Vendors, Best Practices
Edwards, Gregory – ProQuest LLC, 2011
Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…
Descriptors: Strategic Planning, National Security, Information Systems, Social Change
Panettieri, Joseph C. – Campus Technology, 2007
There's no silver bullet to information security; universities must continue to keep their antivirus, anti-spyware, firewall, and patch management systems in good working order. These days, the largest target for hackers appears to be university databases. Now, universities are searching for new solutions to safeguard those systems. This article…
Descriptors: Databases, Best Practices, Higher Education, Technology Planning
Smith, Peter, Ed. – Association Supporting Computer Users in Education, 2014
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. ASCUE has a strong tradition of bringing its members together to pool their…
Descriptors: Conferences (Gatherings), Conference Papers, Computer Uses in Education, Small Colleges
Dougherty, Jennifer Dowling; Clebsch, William; Anderson, Greg – EDUCAUSE Quarterly, 2004
Budget pressures compel everyone in higher education to demonstrate value in IT investments, using both quantitative and qualitative information. Like many institutions, however, both Stanford and Massachusetts Institute of Technology (MIT) have found themselves forced to rely more on anecdotes than on management information to guide decisions. In…
Descriptors: Higher Education, Benchmarking, Information Technology, Administration