Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 5 |
Descriptor
Guidelines | 7 |
Information Technology | 7 |
Risk Management | 7 |
Computer System Design | 3 |
College Administration | 2 |
Computer Mediated… | 2 |
Computer Security | 2 |
Crisis Management | 2 |
Emergency Programs | 2 |
Foreign Countries | 2 |
Information Systems | 2 |
More ▼ |
Source
Asia-Pacific Journal of… | 1 |
Campus Technology | 1 |
EDUCAUSE Quarterly | 1 |
Journal of Information… | 1 |
ProQuest LLC | 1 |
School Business Affairs | 1 |
Author
Fazlioglu, Muge | 1 |
Li, Lei | 1 |
Merga, Margaret K. | 1 |
Qayoumi, Mohammad H. | 1 |
Schaffhauser, Dian | 1 |
Smith, Gary | 1 |
Williams, Ross | 1 |
Woody, Carol | 1 |
Zhang, Chi | 1 |
Zheng, Guangzhi | 1 |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 4 |
Dissertations/Theses -… | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Elementary Secondary Education | 1 |
Audience
Location
Australia | 1 |
California (Fresno) | 1 |
California (Los Angeles) | 1 |
District of Columbia | 1 |
European Union | 1 |
Mississippi | 1 |
New Mexico | 1 |
Pennsylvania | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Fazlioglu, Muge – ProQuest LLC, 2017
This dissertation examines the risk-based approach to privacy and data protection and the role of information sensitivity within risk management. Determining what information carries the greatest risk is a multi-layered challenge that involves balancing the rights and interests of multiple actors, including data controllers, data processors, and…
Descriptors: Risk, Privacy, Information Security, Risk Management
Zheng, Guangzhi; Zhang, Chi; Li, Lei – Journal of Information Systems Education, 2015
Business intelligence (BI) and healthcare analytics are the emerging technologies that provide analytical capability to help healthcare industry improve service quality, reduce cost, and manage risks. However, such component on analytical healthcare data processing is largely missed from current healthcare information technology (HIT) or health…
Descriptors: Business, Intelligence, Information Technology, Curriculum
Merga, Margaret K.; Williams, Ross – Asia-Pacific Journal of Health, Sport and Physical Education, 2016
Contemporary health educators in schools are responsible for promoting the health of individual students, as well as a healthy school environment. The ongoing push for increasing device use in schools, which is underpinned by the information and communications technology (ICT) capability requirements of the new Australian Curriculum, can…
Descriptors: Health Education, Teacher Role, Risk Management, Health Promotion
Smith, Gary – School Business Affairs, 2011
School business administrators have long recognized the need for a workable data recovery plan regardless of cause. Yet many have not reassessed their current data backup and recovery capabilities, perhaps because they have not experienced a catastrophic failure. There are three reasons school business administrators may not realize or recognize…
Descriptors: Information Technology, Computer Security, Technology Planning, School Business Officials
Schaffhauser, Dian – Campus Technology, 2010
As influenza activity throughout the United States continues its gradual rise, H1N1 in particular has been the risk-management topic of the season for most colleges and universities. Among the questions being asked: Can one continue operations in the event of a campus closure? What if a faculty member is too sick to teach? What if students refuse…
Descriptors: Risk Management, College Administration, Information Technology, Computer Uses in Education
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy
Human Interaction Research Inst., Los Angeles, CA. – 2000
The Youth Development Initiative (YDI) was a 5-year, $4.3 million dollar project to strengthen the management and organizational capacities of nonprofit youth-serving organizations so they could better meet expanding demands for service in their communities. Ten youth-serving organizations in Fresno, California, and 10 in Los Angeles participated…
Descriptors: Adolescents, Delivery Systems, Facility Planning, Financial Support