NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Researchers1
Laws, Policies, & Programs
Assessments and Surveys
International Adult Literacy…1
What Works Clearinghouse Rating
Showing all 10 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Maurel, Dominique; Zwarich, Natasha – Education for Information, 2021
Information governance provides a framework of accountability for the effective and efficient use of information to meet organizational objectives and compliance requirements. While information functions are often carried out by separate units that frequently work in silos, information governance is based on an interactive approach, taking into…
Descriptors: Governance, Accountability, Information Management, Power Structure
Peer reviewed Peer reviewed
Direct linkDirect link
Moyo, Abel; Tsokota, Theo; Ruvinga, Caroline; Chipfumbu Kangara, Colletor T. – Technology, Knowledge and Learning, 2022
Use of Information and Communication Technologies (ICTs) offers extraordinary opportunities for society, particularly in the education sector. Many schools in Zimbabwe are now allowing the use of ICTs devices by learners in order to access the Internet and share educational material. However, there is considerable evidence that through use of…
Descriptors: Secondary School Students, Risk, Case Studies, School Districts
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Grover, Mark; Reinicke, Bryan; Cummings, Jeff – Information Systems Education Journal, 2016
As the popularity of Information Technology programs has expanded at many universities, there are a number of questions to be answered from a curriculum standpoint. As many of these programs are either interdisciplinary, or at least exist outside of the usual Computer Science and Information Systems programs, questions of what is appropriate for…
Descriptors: Information Technology, Information Security, Evaluation Methods, Program Evaluation
Ilci, Ahmet – ProQuest LLC, 2020
Privacy and surveillance are pervasive words not only in higher education but also in many areas in our life. We use and hear them often while shopping online, reading the news, or checking the policies and terms of websites. In this study, I highlight the challenges of data collection and surveillance in education, specifically, in online…
Descriptors: Privacy, Information Security, Case Studies, Undergraduate Students
Li, Weifeng – ProQuest LLC, 2017
Social media analytics is a critical research area spawned by the increasing availability of rich and abundant online user-generated content. So far, social media analytics has had a profound impact on organizational decision making in many aspects, including product and service design, market segmentation, customer relationship management, and…
Descriptors: Social Media, Information Security, Role, Crime
Fazlioglu, Muge – ProQuest LLC, 2017
This dissertation examines the risk-based approach to privacy and data protection and the role of information sensitivity within risk management. Determining what information carries the greatest risk is a multi-layered challenge that involves balancing the rights and interests of multiple actors, including data controllers, data processors, and…
Descriptors: Risk, Privacy, Information Security, Risk Management
Smith, Marcus L., Jr. – ProQuest LLC, 2016
During its infancy, the cloud computing industry was the province largely of small and medium-sized business customers. Despite their size, these companies required a professionally run, yet economical information technology (IT) operation. These customers used a total value strategy whereby they avoided paying for essential, yet underutilized,…
Descriptors: Decision Making, Administrator Attitudes, Information Technology, Computer Software
Johnson, Kenneth T. – ProQuest LLC, 2017
Increased internal and external training approaches are elements senior leaders need to know before creating a training plan for security professionals to protect sensitive information. The purpose of this qualitative case study was to explore training strategies telecommunication industry leaders use to ensure security professionals can protect…
Descriptors: Information Security, Corporations, Telecommunications, Industry
Peer reviewed Peer reviewed
Direct linkDirect link
Willey, Lorrie; Ford, Janet C.; White, Barbara Jo; Clapper, Danial L. – Journal of Information Systems Education, 2011
The impact of intellectual property (IP) law on information systems (IS) professionals in business cannot be overstated. The IS 2010 model curriculum guidelines for undergraduate IS programs stress the importance of information security and knowledge about IP. While copyright and patents are the most well-known types of IP, another, trade secrets,…
Descriptors: Copyrights, Confidentiality, Computer Security, Information Systems
OECD Publishing, 2014
The Programme for International Assessment of Adult Competencies (PIAAC) will establish technical standards and guidelines to ensure that the survey design and implementation processes of PIAAC yield high-quality and internationally comparable data. This document provides a revised version of the technical standards and guidelines originally…
Descriptors: Adults, International Assessment, Adult Literacy, Competence