Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 18 |
Descriptor
Information Technology | 20 |
Risk | 20 |
Risk Management | 20 |
Computer Security | 7 |
Information Security | 7 |
Internet | 7 |
Compliance (Legal) | 6 |
Foreign Countries | 6 |
Higher Education | 6 |
Information Systems | 5 |
Privacy | 5 |
More ▼ |
Source
Author
Publication Type
Journal Articles | 10 |
Dissertations/Theses -… | 7 |
Reports - Descriptive | 6 |
Reports - Research | 5 |
Books | 1 |
Collected Works - Proceedings | 1 |
Guides - Non-Classroom | 1 |
Numerical/Quantitative Data | 1 |
Education Level
Higher Education | 8 |
Postsecondary Education | 7 |
High Schools | 1 |
Junior High Schools | 1 |
Middle Schools | 1 |
Secondary Education | 1 |
Two Year Colleges | 1 |
Audience
Administrators | 1 |
Location
Saudi Arabia | 2 |
Australia | 1 |
China | 1 |
Costa Rica | 1 |
Croatia | 1 |
District of Columbia | 1 |
European Union | 1 |
India | 1 |
Maryland | 1 |
Poland | 1 |
Russia | 1 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Health Insurance Portability… | 1 |
Assessments and Surveys
NEO Five Factor Inventory | 1 |
Rosenberg Self Esteem Scale | 1 |
What Works Clearinghouse Rating
Association of Governing Boards of Universities and Colleges, 2021
Every year, more news outlets report cybersecurity?breaches--and higher education is not immune from these sinister trends. Cyberattacks on colleges, universities, and foundations have become more frequent, more sophisticated, and more dangerous. Successful cyberattacks can compromise an institution's reputation, result in substantial financial…
Descriptors: Information Security, Higher Education, Governing Boards, Risk
Malo-Cerrato, Sara; Martín-Perpiñá, Maria-de-las-Mercedes; Cornella-Font, Maria-Gracia – Comunicar: Media Education Research Journal, 2023
Many current investigations have analysed adolescents' risky ICT behaviours (such as excessive or addictive use), but few have explored the characteristics of low-risk behaviour in this regard. This study aimed to explore the psychosocial profile of a sample of 593 Spanish adolescents aged 13 to 18 who have been categorized as low-risk ICT users.…
Descriptors: Foreign Countries, Adolescents, Information Technology, Telecommunications
Vesper, James L.; Kartoglu, Ümit; Herrington, Jan; Reeves, Thomas C. – British Journal of Educational Technology, 2016
This paper describes the use of two different risk assessment strategies during the design and development of a complex authentic task-based e-learning program developed by the World Health Organization (WHO). The first strategy involved the use of expert reviewers and the second strategy employed the engagement of a risk assessment expert…
Descriptors: Formative Evaluation, Electronic Learning, Risk Assessment, Expertise
Fazlioglu, Muge – ProQuest LLC, 2017
This dissertation examines the risk-based approach to privacy and data protection and the role of information sensitivity within risk management. Determining what information carries the greatest risk is a multi-layered challenge that involves balancing the rights and interests of multiple actors, including data controllers, data processors, and…
Descriptors: Risk, Privacy, Information Security, Risk Management
Grama, Joanna Lyn; Petersen, Rodney – EDUCAUSE Review, 2013
Governance, risk, and compliance (GRC) issues are increasingly pervading the IT space, with these concepts transcending silos such as central and distributed IT units, information security, and service management. As campus investment in information technology and campus reliance on information systems have grown, so has the need for reliable…
Descriptors: Governance, Risk, Compliance (Legal), Information Technology
Bichsel, Jacqueline; Feehan, Patrick – EDUCAUSE, 2014
Higher education IT governance, risk, and compliance (GRC) programs are in the development stage. Few institutions have all three programs in place, and many institutions are unclear where they should start when instituting or maturing their IT GRC programs. In addition, they are often uncertain as to whether GRC programs should be developed in…
Descriptors: Governance, Program Administration, Information Technology, Risk
Knight, Gareth – Journal of Web Librarianship, 2012
This article provides a case study of work performed at King's College London to survey information management practices, policies, and procedures applied by data creators and managers within three research units and three business units, and to determine the risk factors that may limit access and use of their digital assets over time. The…
Descriptors: Information Management, Risk Management, Risk, College School Cooperation
Feehan, Patrick J. – EDUCAUSE Review, 2013
In 2013, compliance issues march, unceasingly, through every aspect of higher education. Yet the intricacies of privacy, information security, data governance, and IT policy as compliance and risk areas within the IT organization can reverberate and impact every other department within the higher education institution. The primary focus is always…
Descriptors: Higher Education, Information Technology, Compliance (Legal), Risk Management
Shim, Woohyun – ProQuest LLC, 2010
An increasing number of firms rely on highly interconnected information networks. In such environments, defense against cyber attacks is complicated by residual risks caused by the interdependence of information security decisions of firms. IT security is affected not only by a firm's own management strategies but also by those of others. This…
Descriptors: Risk Management, Insurance, Risk, Computer Security
Liu, Debin – ProQuest LLC, 2011
Insiders are one of the most serious threats to an organization's information assets. Generally speaking, there are two types of insider threats based on the insiders' intents. Malicious Insiders are individuals with varying degrees of harmful intentions. Inadvertent Insiders are individuals without malicious intent. In this dissertation, I…
Descriptors: Risk Management, Risk, Incentives, Game Theory
Lambert, H. David – EDUCAUSE Review, 2008
The role of the Chief Information Officer (CIO), one of the newer positions in higher education senior leadership, continues to transform and evolve, often heading in surprising directions. Not only are the technologies changing at a dizzying pace, but it often feels as if the role itself, as well as what institutions need and expect from the CIO,…
Descriptors: Information Technology, Higher Education, Leadership, Risk
Zeng, Yajun – ProQuest LLC, 2010
Enterprise Resource Planning (ERP) systems have been regarded as one of the most important information technology developments in the past decades. While ERP systems provide the potential to bring substantial benefits, their implementations are characterized with large capital outlay, long duration, and high risks of failure including…
Descriptors: Expenditures, Research Methodology, Risk Management, Risk
AL Faresi, Ahmed – ProQuest LLC, 2011
Current research in health care lacks a systematic investigation to identify and classify various sources of threats to information privacy when sharing health data. Identifying and classifying such threats would enable the development of effective information security risk monitoring and management policies. In this research I put the first step…
Descriptors: Identification, Information Security, Compliance (Legal), Patients
Pierce, Steven Russell – ProQuest LLC, 2009
Information technology (IT) certifiers evaluate risk and develop mitigations ensuring IT infrastructures remain protected within acceptable levels of operation, which if not properly maintained can potentially result in loss of life within Department of Defense (DoD) and federal environments. This qualitative phenomenological exploratory study…
Descriptors: Data Analysis, Certification, Internet, Information Technology
Gray, Terry – EDUCAUSE Quarterly, 2010
The University of Washington (UW) adopted a dual-provider cloud-computing strategy, focusing initially on software as a service. The original project--to replace an obsolete alumni e-mail system--resulted in a cloud solution that soon grew to encompass the entire campus community. The policies and contract terms UW developed, focusing on…
Descriptors: Barriers, Program Development, Program Implementation, Computer Software
Previous Page | Next Page »
Pages: 1 | 2