Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 15 |
Descriptor
Information Systems | 23 |
Information Technology | 23 |
Privacy | 23 |
Computer Security | 12 |
Federal Legislation | 7 |
Information Management | 6 |
Information Security | 6 |
Access to Information | 5 |
Higher Education | 5 |
Confidentiality | 4 |
Computer Networks | 3 |
More ▼ |
Source
Author
McConahay, Mark | 2 |
West, Ann | 2 |
Anderson, Alicia | 1 |
Anderson, Catherine L. | 1 |
Campbell, Robert | 1 |
Cellucci, Leigh W. | 1 |
Chartrand, Robert Lee | 1 |
Clapper, Danial L. | 1 |
Daugherty, Michael K. | 1 |
Di, Jia | 1 |
Firth, David | 1 |
More ▼ |
Publication Type
Journal Articles | 10 |
Reports - Descriptive | 9 |
Dissertations/Theses -… | 6 |
Legal/Legislative/Regulatory… | 4 |
Reports - Evaluative | 3 |
Reports - Research | 3 |
Guides - Non-Classroom | 2 |
Opinion Papers | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 6 |
Postsecondary Education | 3 |
Adult Education | 1 |
Audience
Policymakers | 2 |
Practitioners | 2 |
Laws, Policies, & Programs
Family Educational Rights and… | 4 |
Privacy Act 1974 | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Michael David McCormick – ProQuest LLC, 2022
Information security and information privacy, while related, encompass different details, especially for higher education institutions. Data security, focused on protecting data from malicious attacks, does not go as far as data privacy, focused on how data is shared, used, and communicated with others. Prior literature and research suggest higher…
Descriptors: Higher Education, Governance, Privacy, Information Systems
Sayler, Andy – ProQuest LLC, 2016
The amount of digital data generated and stored by users increases every day. In order to protect this data, modern computing systems employ numerous cryptographic and access control solutions. Almost all of such solutions, however, require the keeping of certain secrets as the basis of their security models. How best to securely store and control…
Descriptors: Information Security, Trust (Psychology), Information Systems, Models
Office of Inspector General, US Department of Education, 2021
The objective of this audit was to determine whether the U.S. Department of Education's (Department) overall information technology (IT) security programs and practices were effective as they relate to Federal information security requirements. In fiscal year (FY) 2020, the focus of the audit was solely on Departmental Systems. This year the focus…
Descriptors: Public Agencies, Federal Legislation, Educational Legislation, Information Security
Lawrence, Cameron; Firth, David; Khumalo, Floyd – Information Systems Education Journal, 2013
Information Technology has transformed almost all aspects of modern healthcare and is playing a vital role in the administration of hospitals around the world. This case study examines one hospital's struggle to solve crucial operational problems related to the efficient management of medical equipment inventory. This case study is the result of…
Descriptors: Outsourcing, Case Studies, Hospitals, Information Technology
Thompson, Dale R.; Di, Jia; Daugherty, Michael K. – IEEE Transactions on Education, 2014
The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…
Descriptors: Radio, Information Technology, Identification, Telecommunications
Willey, Lorrie; Ford, Janet C.; White, Barbara Jo; Clapper, Danial L. – Journal of Information Systems Education, 2011
The impact of intellectual property (IP) law on information systems (IS) professionals in business cannot be overstated. The IS 2010 model curriculum guidelines for undergraduate IS programs stress the importance of information security and knowledge about IP. While copyright and patents are the most well-known types of IP, another, trade secrets,…
Descriptors: Copyrights, Confidentiality, Computer Security, Information Systems
Kligiene, Stanislava Nerute – Informatics in Education, 2012
The paper surveys the risks and benefits which the user faces in the networked environment and how those challenges can be overcome. The question is how to measure the potential or benefits of such a complex phenomenon--the collaborative cross-domains in social media. As one of the solutions we propose to consider this in the context of digital…
Descriptors: Social Networks, Data Collection, Privacy, Computer Mediated Communication
McConahay, Mark; West, Ann – College and University, 2012
Successful administration of remote programs and services requires that information technology (IT) professionals and university administrators address two critical identity management factors: (1) linking the institutional electronic record representing an individual with the "real" person; and (2) establishing a mechanism/protocol…
Descriptors: Admissions Officers, Credentials, Information Technology, Distance Education
Cellucci, Leigh W.; Layman, Elizabeth J.; Campbell, Robert; Zeng, Xiaoming – Journal of Information Systems Education, 2011
Federal initiatives are encouraging the increase of IS graduates to work in the healthcare environment because they possess knowledge of datasets and dataset management that are key to effective management of electronic health records (EHRs) and health information technology (IT). IS graduates will be members of the healthcare team, and as such,…
Descriptors: Information Technology, Ethics, Information Science, Information Science Education
McConahay, Mark; Hanson, Karen; West, Ann; Woodbeck, Dean – College and University, 2009
On every college and university campus, common themes weave throughout identity and access management (IAM) and its relationship to Family Educational Rights and Privacy Act (FERPA). Institutions approach IAM differently as there is not a one-size-fits-all solution. Nevertheless, all face common elements. Over the past few years, a number of…
Descriptors: Student Records, Information Management, Privacy, Information Systems
Park, Insu – ProQuest LLC, 2010
The purpose of this study is to explore systems users' behavior on IS under the various circumstances (e.g., email usage and malware threats, online communication at the individual level, and IS usage in organizations). Specifically, the first essay develops a method for analyzing and predicting the impact category of malicious code, particularly…
Descriptors: Hospitals, Privacy, Prediction, Computer Security
Francisco, James R. – ProQuest LLC, 2010
Health care is one of the most highly regulated industries in the United States. The Health Insurance Portability and Accountability Act of 1996 (HIPAA) mandates the implementation of information systems security to protect the personal information of patients. Properly planned implementations ease the process of introducing new technologies like…
Descriptors: Nurses, Federal Legislation, Nursing, Information Systems
Anderson, Catherine L. – ProQuest LLC, 2010
Today's interconnected technical environment creates unprecedented opportunities while simultaneously introducing risks. With economic, social and personal interactions increasingly occurring in technology-mediated settings new vulnerabilities are continually being introduced. This dissertation seeks to improve extant understanding of how…
Descriptors: Cues, Health Education, Hospitals, Health Conditions
Congress of the U.S., Washington, DC. Senate Committee on Governmental Affairs. – 1986
Submitted to Congress by Senator William V. Roth, Jr., of the Committee on Governmental Affairs, this document reports favorably on Senate Bill 786 (the Information Age Commission Act of 1986), legislation designed to establish a commission to study the impact of computer and communications systems on American society. The report provides: (1) a…
Descriptors: Communications, Computers, Costs, Federal Legislation
Hare, Karen – ProQuest LLC, 2008
Implementation of information systems has lagged in many areas of clinical healthcare for a variety of reasons. Economics, data complexity and resistance are among the often quoted roadblocks. Research suggests that physicians play a major part in the adoption, use and diffusion of information technology (IT) in clinical settings. There are also…
Descriptors: Information Needs, Physicians, Information Systems, Information Technology
Previous Page | Next Page ยป
Pages: 1 | 2