Publication Date
| In 2026 | 0 |
| Since 2025 | 2 |
| Since 2022 (last 5 years) | 5 |
| Since 2017 (last 10 years) | 7 |
Descriptor
Source
| Journal of Cybersecurity… | 2 |
| Advanced Distributed Learning… | 1 |
| African Educational Research… | 1 |
| Information Systems Education… | 1 |
| National Forum on Education… | 1 |
| portal: Libraries and the… | 1 |
Author
| Carlos Novo | 1 |
| Donald F. Norris | 1 |
| Dunka D. Bakwa | 1 |
| Emmanuel C. Asogwa | 1 |
| Fustos, Janos | 1 |
| Grace Kamau | 1 |
| Haga, Wayne | 1 |
| Hayden, Trey | 1 |
| Joel Nakitare | 1 |
| Johnson, Andy | 1 |
| Jonathan Olelewe Chijioke | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 5 |
| Reports - Descriptive | 3 |
| Reports - Research | 3 |
| Guides - General | 1 |
| Information Analyses | 1 |
Education Level
| Higher Education | 3 |
| Postsecondary Education | 2 |
| Elementary Secondary Education | 1 |
Audience
| Administrators | 1 |
| Parents | 1 |
| Policymakers | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Donald F. Norris; Laura K. Mateczun – Journal of Cybersecurity Education, Research and Practice, 2025
This paper, based on data from our second nationwide survey of cybersecurity among local or grassroots governments in the U.S., examines how these governments manage this important function. As we have shown elsewhere, local government cybersecurity is increasingly important because these governments are under constant or nearly constant…
Descriptors: Computer Security, Local Government, Information Security, Computer Networks
Emmanuel C. Asogwa; Dunka D. Bakwa; Josephine O. Okpe; Jonathan Olelewe Chijioke – African Educational Research Journal, 2025
The integration of Information Technology (IT) in administrative settings has significantly enhanced management efficiency, minimized paperwork, and facilitated faster and more accurate service delivery. Despite these benefits, many administrative officers in higher education institutions still underutilize or neglect the adoption of networking…
Descriptors: College Administration, Administrator Effectiveness, Information Technology, Computer Networks
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes
Joel Nakitare; Salome Mathangani; Grace Kamau – portal: Libraries and the Academy, 2024
Effective research data management (RDM) is essential to modern scientific investigations. As the volume and complexity of research data increase, researchers, research institutions, and countries are pressured to improve data management practices to ensure transparency, reproducibility, sharing, and reuse of their findings. Researchers and…
Descriptors: Foreign Countries, Information Management, Research, Data
Smith, Brent; Johnson, Andy; Hayden, Trey; Tolk, Florian – Advanced Distributed Learning Initiative, 2022
The human capital supply chain is a complex network of systems with inherent challenges to accommodating Total Learning Architecture (TLA) operability. This document covers the objective end-state for Department of Defense (DoD) learning organizations migrating to TLA compliant data and microservices. This document is organized into sections that…
Descriptors: Human Capital, Public Agencies, Armed Forces, Information Systems
National Forum on Education Statistics, 2020
The purpose of this document is to provide timely and useful best practice information to help education agencies proactively prepare for, appropriately mitigate, and responsibly recover from a cybersecurity incident. This resource reflects lessons learned by the education community and provides recommendations that will help agencies protect…
Descriptors: Information Security, Computer Security, Confidential Records, Information Management
Morris, Gerard; Fustos, Janos; Haga, Wayne – Information Systems Education Journal, 2018
One definition of a network administrator describes a person who works with computer infrastructures with an emphasis on networking. To determine the specific skills required of a network administrator by employers, data was collected from 698 nationwide job advertisements on Dice.com. The data collection focused on technical skills rather than…
Descriptors: Skill Analysis, Job Skills, Database Management Systems, Information Networks

Peer reviewed
Direct link
