NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 14 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Payne, Brian K.; Vandecar-Burdin, Tancy; Cigularova, Daniela – NACADA Journal, 2022
In this study, cybersecurity faculty and academic advisors from community colleges and 4-year universities in the southeast region of the United States completed a survey assessing attitudes about and support for articulation agreements and related transfer policies. Hypothesizing that professional structures shape attitudes and experiences, the…
Descriptors: Information Security, Information Technology, Community Colleges, College Faculty
Vyas, Avinash – ProQuest LLC, 2011
Sender anonymity in Location-based services (LBS) refers to hiding the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. "find the nearest gas station etc."). The goal is to keep the requester's interest private even from attackers who (via hacking or subpoenas) gain access to the LBS…
Descriptors: Computers, Navigation, Experiments, Comparative Analysis
Li, Xin – ProQuest LLC, 2011
In recent years, new bioinformatics technologies, such as gene expression microarray, genome-wide association study, proteomics, and metabolomics, have been widely used to simultaneously identify a huge number of human genomic/genetic biomarkers, generate a tremendously large amount of data, and dramatically increase the knowledge on human…
Descriptors: Privacy, Genetics, Biomedicine, Biology
Shim, Woohyun – ProQuest LLC, 2010
An increasing number of firms rely on highly interconnected information networks. In such environments, defense against cyber attacks is complicated by residual risks caused by the interdependence of information security decisions of firms. IT security is affected not only by a firm's own management strategies but also by those of others. This…
Descriptors: Risk Management, Insurance, Risk, Computer Security
Cherry, John D. – ProQuest LLC, 2010
According to the Department of Defense (DoD), a review of information assurance (IA) in the United States Air Force (USAF) in 2009, cyber security is jeopardized because of information loss. This situation has occurred in large part because of less than optimal training practices or adherence to training protocols. The purpose of this study was…
Descriptors: Quasiexperimental Design, Social Behavior, Program Effectiveness, Social Change
Peer reviewed Peer reviewed
Direct linkDirect link
Levy, Yair; Ramim, Michelle M.; Furnell, Steven M.; Clarke, Nathan L. – Campus-Wide Information Systems, 2011
Purpose: Concerns for information security in e-learning systems have been raised previously. In the pursuit for better authentication approaches, few schools have implemented students' authentication during online exams beyond passwords. This paper aims to assess e-learners' intention to provide multibiometric data and use of multibiometrics…
Descriptors: Computer Assisted Testing, Computer Security, Human Body, Identification
Grier, Christopher L. – ProQuest LLC, 2009
Web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems using browser-based attacks. Efforts that retrofit existing browsers have had limited success since modern browsers are not designed to withstand attack. To enable more secure web browsing, we design and implement new web browsers from the ground…
Descriptors: Expertise, Metric System, Internet, Web Browsers
Kim, Philip – ProQuest LLC, 2010
Financial institutions are increasingly finding difficulty defending against information security risks and threats, as they are often the number one target for information thieves. An effective information security training and awareness program can be a critical component of protecting an organization's information assets. Many financial…
Descriptors: Financial Services, Knowledge Level, Transfer of Training, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Burd, Stephen D.; Seazzu, Alessandro F.; Conway, Christopher – Journal of Information Technology Education, 2009
Current technology enables schools to provide remote or virtual computing labs that can be implemented in multiple ways ranging from remote access to banks of dedicated workstations to sophisticated access to large-scale servers hosting virtualized workstations. This paper reports on the implementation of a specific lab using remote access to…
Descriptors: Workstations, Educational Technology, Computer System Design, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Rawlinson, David R.; Lupton, Robert A. – Journal of Education for Business, 2007
Students' attitudes and perceptions regarding the use of unlicensed software are important to educators and businesses. Students have a proven propensity to pirate software and other intellectual property. By understanding how attitudes and perceptions toward software piracy differ among university students in a cross-national context, educators…
Descriptors: Student Attitudes, Computer Software, Information Technology, Foreign Countries
Ng, Eugenia M. W., Ed. – Information Science Reference, 2010
With the advent of new technologies, more convenient and effective ways of learning are being adopted. However, despite the growing advancements there remains a lack of literature in applications of using these technology teaching approaches. This book offers in-depth analysis of new technologies in blended learning that promote creativity,…
Descriptors: Foreign Countries, Cross Cultural Studies, Action Research, Distance Education
Peer reviewed Peer reviewed
Direct linkDirect link
Gil-Garcia, J. Ramon – Journal of Government Information, 2004
Drawing on a review of government information management and information technology (IT) success factors, this paper compares the availability of IT policies and standards in the states. Two main objectives guide the comparative review effort. The first is to show what kinds of information policies the different states make available to citizens…
Descriptors: State Government, Information Management, Information Technology, Policy
Peer reviewed Peer reviewed
Direct linkDirect link
Hentea, Mariana; Dhillon, Harpal S.; Dhillon, Manpreet – Journal of Information Technology Education, 2006
Despite a variety of Information Security Assurance (ISA) curricula and diverse educational models, universities often fail to provide their graduates with skills demanded by employers. There is a big discrepancy between the levels of skills expected by employers and those the graduates have after completing their studies. The authors compare the…
Descriptors: Models, Job Skills, Educational Objectives, Relevance (Education)
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers