Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 8 |
Descriptor
Information Security | 8 |
Mixed Methods Research | 8 |
Privacy | 5 |
Surveys | 5 |
Access to Information | 4 |
Focus Groups | 4 |
Interviews | 4 |
Case Studies | 2 |
Classification | 2 |
Content Analysis | 2 |
Ethics | 2 |
More ▼ |
Source
ProQuest LLC | 4 |
Advances in Engineering… | 1 |
British Journal of… | 1 |
International Journal of… | 1 |
New Review of Academic… | 1 |
Author
Alexander, Shirley | 1 |
Gwyer, Roisin | 1 |
Harrison, Amanda | 1 |
Hipsky, Shellie | 1 |
Horspool, Agi | 1 |
Johnson, R. LeWayne | 1 |
Johri, Aditya | 1 |
Madhavan, Krishna | 1 |
Nerminathan, Arany | 1 |
Phelps, Megan | 1 |
Scott, Karen M. | 1 |
More ▼ |
Publication Type
Dissertations/Theses -… | 4 |
Journal Articles | 4 |
Reports - Research | 4 |
Information Analyses | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 2 |
Elementary Education | 1 |
Audience
Location
China | 1 |
India | 1 |
Pennsylvania | 1 |
United States | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Health Insurance Portability… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Johri, Aditya; Yang, Seungwon; Vorvoreanu, Mihaela; Madhavan, Krishna – Advances in Engineering Education, 2016
As part of our NSF funded collaborative project on Data Sharing within Engineering Education Community, we conducted an empirical study to better understand the current climate of data sharing and participants' future expectations of the field. We present findings of this mixed method study and discuss implications. Overall, we found strong…
Descriptors: Engineering Education, Data, Knowledge Management, Educational Practices
Hipsky, Shellie; Younes, Wiam – International Journal of Information and Communication Technology Education, 2015
In a time when discussions about information privacy dominate the media, research on Cybersafety education reveals that K-12 teachers and staff are concerned about information privacy in schools and they seek to learn more about the protection of their students' and own personal information online. Privacy topics are typically introduced to the…
Descriptors: Elementary School Teachers, Secondary School Teachers, Teacher Attitudes, Privacy
Gwyer, Roisin – New Review of Academic Librarianship, 2015
This article compares three sources of information about academic libraries to consider what the future could hold and the skills needed to deliver effective services within that future. The starting point is the contents of "New Review of Academic Librarianship" (formerly "British Journal of Academic Librarianship") from 1986,…
Descriptors: Academic Libraries, Mixed Methods Research, Trend Analysis, Content Analysis
Scott, Karen M.; Nerminathan, Arany; Alexander, Shirley; Phelps, Megan; Harrison, Amanda – British Journal of Educational Technology, 2017
This study was conducted with medical students, physicians, patients and carers in a paediatric and an adult hospital to determine use of mobile devices for learning, and beliefs and attitudes about others' use. Awareness of ethical, patient privacy and data security concerns was explored. The research was conducted using a mixed-methods…
Descriptors: Handheld Devices, Technology Uses in Education, Medical Education, Medical Students
Johnson, R. LeWayne – ProQuest LLC, 2012
Much of the governing process in the United States (U.S.) today depends on a reliable and well protected public information technology (IT) infrastructure. The Department of Homeland Security (DHS) is tasked with the responsibility of protecting the country's IT infrastructure. Critics contend that the DHS has failed to address planning and…
Descriptors: Information Technology, Governance, Federal Government, Information Security
Thaw, David Bernard – ProQuest LLC, 2011
Current scholarly understanding of information security regulation in the United States is limited. Several competing mechanisms exist, many of which are untested in the courts and before state regulators, and new mechanisms are being proposed on a regular basis. Perhaps of even greater concern, the pace at which technology and threats change far…
Descriptors: Information Security, Federal Legislation, State Legislation, Federal Regulation
Horspool, Agi – ProQuest LLC, 2013
Organizations have started using social media to support activities such as team collaboration and knowledge sharing, yet few researchers have systematically investigated the context and culture within which these implementations occur, nor the perceived impact according to organizational users. Additionally, researchers have not yet considered…
Descriptors: Social Media, Teamwork, Knowledge Management, Sharing Behavior
Totterdale, Robert L. – ProQuest LLC, 2009
Businesses have always maintained records pertinent to the enterprise. With over 90% of new business records now estimated to be available in electronic form, organizations struggle to manage these vast amounts of electronic content while at the same time meeting collaboration, knowledge management, regulatory, and compliance needs. This case…
Descriptors: Information Management, Classification, Information Technology, Employee Attitudes