Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 8 |
Descriptor
Computer Security | 11 |
Decision Making | 11 |
Information Technology | 11 |
Internet | 4 |
Computer Networks | 3 |
Educational Technology | 3 |
Information Systems | 3 |
Risk | 3 |
Strategic Planning | 3 |
Technology Integration | 3 |
Telecommunications | 3 |
More ▼ |
Source
ProQuest LLC | 6 |
Association of Small Computer… | 1 |
EDUTECH Report | 1 |
International Association for… | 1 |
National Center for Research… | 1 |
Technology & Learning | 1 |
Author
Baker, Eva L. | 1 |
Caudle, Daryl L. | 1 |
Dark, Melissa | 1 |
Grossklags, Jens | 1 |
Lederer, Karen | 1 |
Poftak, Amy | 1 |
Ross, Virginia Watson | 1 |
Shim, Woohyun | 1 |
Smith, Peter, Ed. | 1 |
Wang, Ping An | 1 |
Publication Type
Dissertations/Theses -… | 6 |
Collected Works - Proceedings | 2 |
Collected Works - Serials | 1 |
Journal Articles | 1 |
Reports - Descriptive | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Elementary Secondary Education | 1 |
Audience
Location
Florida | 2 |
South Korea | 2 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
District of Columbia | 1 |
Egypt | 1 |
Estonia | 1 |
Germany | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Lederer, Karen – ProQuest LLC, 2012
The purpose of this quantitative study was to investigate six factors that may influence adoption of virtual private network (VPN) technologies in small businesses with fewer than 100 employees. Prior research indicated small businesses employing fewer than 100 workers do not adopt VPN technology at the same rate as larger competitors, and the…
Descriptors: Small Businesses, Technology Integration, Computer Networks, Information Technology
Wang, Ping An – ProQuest LLC, 2010
This dissertation research studied how different degrees of knowledge of online security risks affect B2C (business-to-consumer) e-commerce consumer decision making. Online information security risks, such as identity theft, have increasingly become a major factor inhibiting the potential growth of e-commerce. On the other hand, e-commerce…
Descriptors: Research Design, Risk, Computer Security, Decision Making
Shim, Woohyun – ProQuest LLC, 2010
An increasing number of firms rely on highly interconnected information networks. In such environments, defense against cyber attacks is complicated by residual risks caused by the interdependence of information security decisions of firms. IT security is affected not only by a firm's own management strategies but also by those of others. This…
Descriptors: Risk Management, Insurance, Risk, Computer Security
Caudle, Daryl L. – ProQuest LLC, 2010
The nation's critical infrastructure, information systems, and telecommunication networks are vulnerable and threatened by an ever-growing number of attacks in cyberspace. An essential element of the nation's comprehensive approach to cybersecurity is the ability for the Department of Defense to protect and defend its information enterprise.…
Descriptors: Information Systems, Organizational Change, Telecommunications, Information Technology
Grossklags, Jens – ProQuest LLC, 2009
Computer users express a strong desire to prevent attacks, and to reduce the losses from computer and information security breaches. However, despite the widespread availability of various technologies, actual investments in security remain highly variable across the Internet population. As a result, attacks such as distributed denial-of-service…
Descriptors: Economic Research, Probability, Internet, Computer Security
Ross, Virginia Watson – ProQuest LLC, 2010
Cloud computing is a growing field, addressing the market need for access to computing resources to meet organizational computing requirements. The purpose of this research is to evaluate the factors that influence an organization in their decision whether to adopt cloud computing as a part of their strategic information technology planning.…
Descriptors: Technology Planning, Information Technology, Internet, Strategic Planning
Improving Accountability Models by Using Technology-Enabled Knowledge Systems (TEKS). CSE Report 656
Baker, Eva L. – National Center for Research on Evaluation, Standards, and Student Testing (CRESST), 2005
This paper addresses accountability and the role emerging technologies can play in improving education. The connection between accountability and technology can be best summarized in one term: feedback. Technological supports provide ways of designing, collecting and sharing information in order to provide the basis for the improvement of systems…
Descriptors: Evaluation Criteria, Accountability, Information Technology, Models
Dark, Melissa; Poftak, Amy – Technology & Learning, 2004
In this article, the authors address the importance of taking a proactive approach to securing a school's network. To do this, it is first required to know the system's specific vulnerabilities and what steps to take to reduce them. The formal process for doing this is known as an information security risk assessment, or a security audit. What…
Descriptors: Computer Security, School Districts, Risk Management, Computer Networks
Smith, Peter, Ed. – Association of Small Computer Users in Education (ASCUE), 2009
The Association of Small Computer Users in Education (ASCUE) is a dynamic organization for people interested in small college technology issues. Its members include information technology professionals, instructional technologists, and faculty members from all over the world who use computers and technology to support teaching and learning. The…
Descriptors: Small Colleges, Information Technology, Educational Technology, Organizations (Groups)
EDUTECH Report, 1993
This newsletter examines education technology issues of concern to school faculty and administrators. Regular features in each issue include educational technology news, a book review, and a question and answer column. The cover articles during this volume year are: "Data Access Issues: Security Vs. Openness"; "Creation of an…
Descriptors: Access to Information, Computer Security, Computer Uses in Education, Decision Making
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers