NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 961 to 975 of 1,635 results Save | Export
Cherry, John D. – ProQuest LLC, 2010
According to the Department of Defense (DoD), a review of information assurance (IA) in the United States Air Force (USAF) in 2009, cyber security is jeopardized because of information loss. This situation has occurred in large part because of less than optimal training practices or adherence to training protocols. The purpose of this study was…
Descriptors: Quasiexperimental Design, Social Behavior, Program Effectiveness, Social Change
Peer reviewed Peer reviewed
PDF on ERIC Download full text
McNabb, Lori – Continuing Higher Education Review, 2010
This article discusses the implementation this year of the Department of Education's Higher Education Opportunity Act of 2008 (HEOA), which requires accreditors to ensure that an institution that offers distance or correspondence education has a process in place to establish that a student who registers in a course or program is also the same…
Descriptors: Distance Education, Higher Education, College Students, Identification
Peer reviewed Peer reviewed
Direct linkDirect link
Custer, William L. – New Directions for Institutional Research, 2010
Information security threats to educational institutions and their data assets have worsened significantly over the past few years. The rich data stores of institutional research are especially vulnerable, and threats from security breaches represent no small risk. New genres of threat require new kinds of controls if the institution is to prevent…
Descriptors: Institutional Research, Databases, School Security, Computer Security
Education Digest: Essential Readings Condensed for Quick Review, 2009
This article presents findings from a study that explores the nature of the Cyberethics, Cybersafety, and Cybersecurity (C3) educational awareness policies, initiatives, curriculum, and practices currently taking place in the U.S. public and private K-12 educational settings. The study establishes baseline data on C3 awareness, which can be used…
Descriptors: Program Design, Information Technology, Computer Security, Ethics
Business Roundtable, 2012
America faces many challenges in working together to restore the promise of economic growth and security for the country, U.S. families and the American worker. The challenges are both real and serious. Despite hopeful signs of economic recovery, America remains mired in the deepest jobs crisis since the 1930s. One out of every 12 Americans who…
Descriptors: Economic Climate, Labor Market, Unemployment, Economic Progress
Cheng, Diane – Institute for College Access & Success, 2011
For students and their families, deciding whether and where to go to college is one of the most important financial decisions they will ever make. However, unlike buying a computer, house, or car, most prospective students do not know how much it will cost them to attend a particular school until many of their choices about college have already…
Descriptors: College Bound Students, College Choice, Decision Making, Student Costs
Cleveland, Lara L. – ProQuest LLC, 2011
This project explores the way information about law is transformed into organizational policies and practices. Existing literature emphasizes the state and organized professional groups as primary interpreters of the law and as creators of legal implementation strategies in the organizational setting. This case study of university responses to…
Descriptors: Laws, College Environment, Work Environment, Computers
Peer reviewed Peer reviewed
Direct linkDirect link
Levy, Yair; Ramim, Michelle M.; Furnell, Steven M.; Clarke, Nathan L. – Campus-Wide Information Systems, 2011
Purpose: Concerns for information security in e-learning systems have been raised previously. In the pursuit for better authentication approaches, few schools have implemented students' authentication during online exams beyond passwords. This paper aims to assess e-learners' intention to provide multibiometric data and use of multibiometrics…
Descriptors: Computer Assisted Testing, Computer Security, Human Body, Identification
Chow, Chi Yin – ProQuest LLC, 2010
Location-based services (LBS for short) providers require users' current locations to answer their location-based queries, e.g., range and nearest-neighbor queries. Revealing personal location information to potentially untrusted service providers could create privacy risks for users. To this end, our objective is to design a privacy-preserving…
Descriptors: Reaction Time, Privacy, Geographic Information Systems, Geographic Location
Elhindi, Mohamed A. – ProQuest LLC, 2010
Historically, managing access to information systems (ISs) required direct interaction with a limited number of users. Increasingly, managing access involves handling an increased numbers of internal and external students, faculty, and staff as well as partners such as workforce development centers, the U.S. Department of Education, and the…
Descriptors: Credentials, State Colleges, Models, Information Systems
Hart, Kevin – CURRENTS, 2010
According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…
Descriptors: Higher Education, Computer Security, Barriers, Confidentiality
Peer reviewed Peer reviewed
Direct linkDirect link
Wang, Shudong; Heffernan, Neil – British Journal of Educational Technology, 2010
Pedagogical theories and the applications of information technology for language learning have been widely researched in various dimensions. However, ethical issues, such as online privacy and security, and learners' personal data disclosure, are not receiving enough research attention. The perceptions and attitudes from those who participate in…
Descriptors: Information Technology, Educational Technology, Ethics, Second Language Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Yoon, Cheolho; Hwang, Jae-Won; Kim, Rosemary – Journal of Information Systems Education, 2012
Due to the ever-increasing use of the Internet, information security has become a critical issue in society. This is especially the case for young adults who have different attitudes towards information security practices. In this research, we examine factors that motivate college students' information security behaviors. Based on the concept of…
Descriptors: Internet, Privacy, Computer Security, Information Security
Young, Jeffrey R. – Education Digest: Essential Readings Condensed for Quick Review, 2009
In this article, the author presents the top-10 list of campus computer-security risks he compiled based on several recent computing surveys and interviews with more than a dozen college-technology leaders. The list, ordered from least to most serious, is by no means scientific, but it gives a sense of where today's battle lines are--and why…
Descriptors: Computer Security, Computers, Social Networks, Evaluation Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Descy, Don E. – TechTrends: Linking Research and Practice to Improve Learning, 2009
Privacy is a thing of the past. Monitoring is everywhere. If one is looking at this online, the author is sure that lots of information has been stored and linked to anyone about that action. Nevertheless, at least people can try to play with "their" minds and surf the web anonymously. In this article, the author discusses ways to try to hide…
Descriptors: Internet, Computer Mediated Communication, Privacy, Computer Security
Pages: 1  |  ...  |  61  |  62  |  63  |  64  |  65  |  66  |  67  |  68  |  69  |  ...  |  109