NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)2
Since 2006 (last 20 years)7
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 9 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Vesper, James L.; Kartoglu, Ümit; Herrington, Jan; Reeves, Thomas C. – British Journal of Educational Technology, 2016
This paper describes the use of two different risk assessment strategies during the design and development of a complex authentic task-based e-learning program developed by the World Health Organization (WHO). The first strategy involved the use of expert reviewers and the second strategy employed the engagement of a risk assessment expert…
Descriptors: Formative Evaluation, Electronic Learning, Risk Assessment, Expertise
Jones, Jeff; Barnett, Claire; Naidoo, Alex; Witherspoon, Nsedu Obot; Trousdale, Kristie; Swanson, Maureen; Gregoire, Tracy – Healthy Schools Network, Inc., 2018
Eliminating lead risks in PK-12 public and private schools was the focus of a facilitated workshop co-sponsored and organized by Healthy Schools Network, the Children's Environmental Health Network, and the Learning Disabilities Association of America. Held December 6-7, 2017, in Washington, DC, it included some 40 participants. They were experts…
Descriptors: Hazardous Materials, Poisoning, Risk, Risk Assessment
Van Dreal, John – Rowman & Littlefield Education, 2011
"Assessing Student Threats: A Handbook for Implementing the Salem-Keizer System" is a manual for the implementation of a threat assessment system that follows the recommendations of the Safe Schools Initiative and the prescriptive outline provided by the FBI. Written from an educator's perspective with contributing authors from law…
Descriptors: Higher Education, Safety, Law Enforcement, Guides
Zeng, Yajun – ProQuest LLC, 2010
Enterprise Resource Planning (ERP) systems have been regarded as one of the most important information technology developments in the past decades. While ERP systems provide the potential to bring substantial benefits, their implementations are characterized with large capital outlay, long duration, and high risks of failure including…
Descriptors: Expenditures, Research Methodology, Risk Management, Risk
Peer reviewed Peer reviewed
Direct linkDirect link
Gray, Terry – EDUCAUSE Quarterly, 2010
The University of Washington (UW) adopted a dual-provider cloud-computing strategy, focusing initially on software as a service. The original project--to replace an obsolete alumni e-mail system--resulted in a cloud solution that soon grew to encompass the entire campus community. The policies and contract terms UW developed, focusing on…
Descriptors: Barriers, Program Development, Program Implementation, Computer Software
US Department of Homeland Security, 2010
Critical infrastructure and key resources (CIKR) provide the essential services that support basic elements of American society. Compromise of these CIKR could disrupt key government and industry activities, facilities, and systems, producing cascading effects throughout the Nation's economy and society and profoundly affecting the national…
Descriptors: Higher Education, Research and Development, National Security, Information Management
Chaffin, Charles G.; Ginsburg, Sigmund G. – Business Officer, 2003
Describes the program implemented at the University of Texas system that provides real-time compliance status related to all applicable laws, rules, regulations, policies, and procedures unique to higher education so that compliance risk management becomes an integral part of the everyday activities of all employees. (SLD)
Descriptors: College Administration, Compliance (Legal), Higher Education, Program Descriptions
Peer reviewed Peer reviewed
Direct linkDirect link
McWilliam, Erica; Sanderson, Don; Evans, Terry; Lawson, Alan; Taylor, Peter G. – Asia Pacific Journal of Education, 2006
Universities are under no less pressure to adopt risk management strategies than other public and private organisations. The risk management of doctoral education is a particularly important issue given that a doctorate is the highest academic qualification a university offers and stakes are high in terms of assuring its quality. However, intense…
Descriptors: Risk Management, Educational Anthropology, Educational Sociology, Educational Psychology
Peer reviewed Peer reviewed
Direct linkDirect link
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy