Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 9 |
Descriptor
| Computer Security | 10 |
| Information Technology | 10 |
| Interviews | 10 |
| Case Studies | 4 |
| Educational Technology | 3 |
| Internet | 3 |
| Qualitative Research | 3 |
| Questionnaires | 3 |
| Armed Forces | 2 |
| College Faculty | 2 |
| Computer Science Education | 2 |
| More ▼ | |
Source
| ProQuest LLC | 6 |
| EDUTECH Report | 1 |
| Journal of Information… | 1 |
| Journal of Information… | 1 |
| Online Submission | 1 |
Author
Publication Type
| Dissertations/Theses -… | 6 |
| Journal Articles | 3 |
| Reports - Research | 3 |
| Collected Works - Serials | 1 |
Education Level
| Higher Education | 4 |
| Postsecondary Education | 2 |
| Elementary Education | 1 |
| Elementary Secondary Education | 1 |
Audience
Laws, Policies, & Programs
| Equal Access | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Singletary, Tod J. – ProQuest LLC, 2017
The United States Military has become increasingly dependent upon technology to meet its mission objectives with a consequence being greater dependence on civilian defense contractors to provide specialized services in support of high-tech mission requirements. Modern military defense contractors have also become dependent upon reliable and secure…
Descriptors: Armed Forces, Information Security, Risk, Outsourcing
Stark, Adam – ProQuest LLC, 2017
This case study research explored the cybersecurity systems and training and education of IT professionals at a member college of the Florida College System. Thematic analysis was utilized to analyze interview transcripts of 6 respondents. A more descriptive analysis was completed using the survey responses from 15 respondents. From this analysis…
Descriptors: Case Studies, Information Security, Computer Security, Information Technology
Houghton, Robert F. – ProQuest LLC, 2013
A long standing problem in information technology security is how to help reduce the security footprint. Many specific proposals exist to address specific problems in information technology security. Most information technology solutions need to be repeatable throughout the course of an information systems lifecycle. The Chain-Link Fence Model is…
Descriptors: Information Technology, Computer Security, Models, Interviews
Commitment to Cybersecurity and Information Technology Governance: A Case Study and Leadership Model
Curtis, Scipiaruth Kendall – ProQuest LLC, 2012
The continual emergence of technologies has infiltrated government and industry business infrastructures, requiring reforming organizations and fragile network infrastructures. Emerging technologies necessitates countermeasures, commitment to cybersecurity and information technology governance for organization's survivability and sustainability.…
Descriptors: Computer Security, Information Technology, Governance, Case Studies
Belcher, Kenneth L., II – ProQuest LLC, 2012
The cost of the American healthcare system has escalated to the point that the United States spends more per patient than any other country. Based on the cost controls and increase in efficiency seen in other industries, many agree that information technology solutions should be adopted by the American healthcare industry. However, healthcare…
Descriptors: Qualitative Research, Barriers, Health Services, Information Technology
Pierce, Steven Russell – ProQuest LLC, 2009
Information technology (IT) certifiers evaluate risk and develop mitigations ensuring IT infrastructures remain protected within acceptable levels of operation, which if not properly maintained can potentially result in loss of life within Department of Defense (DoD) and federal environments. This qualitative phenomenological exploratory study…
Descriptors: Data Analysis, Certification, Internet, Information Technology
Woszczynski, Amy B.; Shade, Sherri – Journal of Information Systems Education, 2010
Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the perceptions of women in IT within the context of information security and assurance. This paper describes results from a study of a relatively new career path to see if there are female-friendly opportunities that have not existed…
Descriptors: Females, Computer Security, Gender Bias, Disproportionate Representation
Kuzu, Abdullah – Online Submission, 2009
Increasing use of information and communication technologies (ICTs) help individuals to solve several everyday problems, which used to be harder, more complicated and time consuming. Even though ICTs provide individuals with many advantages, they might also serve as grounds for several societal and ethical problems which vary in accordance with…
Descriptors: Copyrights, Content Analysis, Ethics, Interviews
Jokela, Paivi; Karlsudd, Peter – Journal of Information Technology Education, 2007
The current higher education, both distance education and traditional campus courses, relies more and more on modern information and communication technologies (ICT). The use of computer systems and networks results in a wide range of security issues that must be dealt with in order to create a safe learning environment. In this work, we study the…
Descriptors: Higher Education, Plagiarism, Distance Education, Confidentiality
EDUTECH Report, 1993
This newsletter examines education technology issues of concern to school faculty and administrators. Regular features in each issue include educational technology news, a book review, and a question and answer column. The cover articles during this volume year are: "Data Access Issues: Security Vs. Openness"; "Creation of an…
Descriptors: Access to Information, Computer Security, Computer Uses in Education, Decision Making

Direct link
Peer reviewed
