Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 5 |
Descriptor
Information Technology | 6 |
Program Effectiveness | 6 |
Risk Management | 6 |
Program Administration | 3 |
Program Evaluation | 3 |
Training | 3 |
Audits (Verification) | 2 |
Computer Security | 2 |
Educational Legislation | 2 |
Federal Legislation | 2 |
Information Security | 2 |
More ▼ |
Author
Al Saif, Abdulkarim A. | 1 |
Baker, Ross A. | 1 |
Herrington, Jan | 1 |
Kartoglu, Ümit | 1 |
Reeves, Thomas C. | 1 |
Vesper, James L. | 1 |
Publication Type
Reports - Research | 4 |
Journal Articles | 2 |
Dissertations/Theses -… | 1 |
Reports - Evaluative | 1 |
Education Level
High Schools | 1 |
Junior High Schools | 1 |
Middle Schools | 1 |
Secondary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Office of Inspector General, US Department of Education, 2021
The objective of this audit was to determine whether the U.S. Department of Education's (Department) overall information technology (IT) security programs and practices were effective as they relate to Federal information security requirements. In fiscal year (FY) 2020, the focus of the audit was solely on Departmental Systems. This year the focus…
Descriptors: Public Agencies, Federal Legislation, Educational Legislation, Information Security
Office of Inspector General, US Department of Education, 2020
The objective of this audit was to determine whether the U.S. Department of Education's (Department) overall information technology (IT) security programs and practices were effective as they relate to Federal information security requirements. To answer this objective, the Department's performance was rated in accordance with Fiscal Year (FY)…
Descriptors: Public Agencies, Federal Legislation, Educational Legislation, Information Security
Vesper, James L.; Kartoglu, Ümit; Herrington, Jan; Reeves, Thomas C. – British Journal of Educational Technology, 2016
This paper describes the use of two different risk assessment strategies during the design and development of a complex authentic task-based e-learning program developed by the World Health Organization (WHO). The first strategy involved the use of expert reviewers and the second strategy employed the engagement of a risk assessment expert…
Descriptors: Formative Evaluation, Electronic Learning, Risk Assessment, Expertise
Baker, Ross A. – ProQuest LLC, 2012
The author investigated the existence of critical success factors for computer technology projects. Current research literature and a survey of experienced project managers indicate that there are 23 critical success factors (CSFs) that correlate with project success. The survey gathered an assessment of project success and the degree to which…
Descriptors: Computers, Information Technology, Risk Management, Stakeholders
Al Saif, Abdulkarim A. – Journal of Educational Technology, 2010
The current study attempts to develop a preventive program to fend off the risks of using the internet by trying to test the effectiveness of raising students' awareness on various new technology-related issues. In order to achieve this goal, descriptive, analytical, and experimental approaches have been utilized. The program has been applied to a…
Descriptors: Prevention, Internet, Risk Management, Foreign Countries
Human Interaction Research Inst., Los Angeles, CA. – 2000
The Youth Development Initiative (YDI) was a 5-year, $4.3 million dollar project to strengthen the management and organizational capacities of nonprofit youth-serving organizations so they could better meet expanding demands for service in their communities. Ten youth-serving organizations in Fresno, California, and 10 in Los Angeles participated…
Descriptors: Adolescents, Delivery Systems, Facility Planning, Financial Support