Publication Date
| In 2026 | 0 |
| Since 2025 | 2 |
| Since 2022 (last 5 years) | 5 |
Descriptor
Source
| Journal of Cybersecurity… | 2 |
| Advanced Distributed Learning… | 1 |
| African Educational Research… | 1 |
| portal: Libraries and the… | 1 |
Author
| Carlos Novo | 1 |
| Donald F. Norris | 1 |
| Dunka D. Bakwa | 1 |
| Emmanuel C. Asogwa | 1 |
| Grace Kamau | 1 |
| Hayden, Trey | 1 |
| Joel Nakitare | 1 |
| Johnson, Andy | 1 |
| Jonathan Olelewe Chijioke | 1 |
| Josephine O. Okpe | 1 |
| Laura K. Mateczun | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 4 |
| Reports - Descriptive | 2 |
| Reports - Research | 2 |
| Information Analyses | 1 |
Education Level
| Higher Education | 2 |
| Postsecondary Education | 2 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Donald F. Norris; Laura K. Mateczun – Journal of Cybersecurity Education, Research and Practice, 2025
This paper, based on data from our second nationwide survey of cybersecurity among local or grassroots governments in the U.S., examines how these governments manage this important function. As we have shown elsewhere, local government cybersecurity is increasingly important because these governments are under constant or nearly constant…
Descriptors: Computer Security, Local Government, Information Security, Computer Networks
Emmanuel C. Asogwa; Dunka D. Bakwa; Josephine O. Okpe; Jonathan Olelewe Chijioke – African Educational Research Journal, 2025
The integration of Information Technology (IT) in administrative settings has significantly enhanced management efficiency, minimized paperwork, and facilitated faster and more accurate service delivery. Despite these benefits, many administrative officers in higher education institutions still underutilize or neglect the adoption of networking…
Descriptors: College Administration, Administrator Effectiveness, Information Technology, Computer Networks
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes
Joel Nakitare; Salome Mathangani; Grace Kamau – portal: Libraries and the Academy, 2024
Effective research data management (RDM) is essential to modern scientific investigations. As the volume and complexity of research data increase, researchers, research institutions, and countries are pressured to improve data management practices to ensure transparency, reproducibility, sharing, and reuse of their findings. Researchers and…
Descriptors: Foreign Countries, Information Management, Research, Data
Smith, Brent; Johnson, Andy; Hayden, Trey; Tolk, Florian – Advanced Distributed Learning Initiative, 2022
The human capital supply chain is a complex network of systems with inherent challenges to accommodating Total Learning Architecture (TLA) operability. This document covers the objective end-state for Department of Defense (DoD) learning organizations migrating to TLA compliant data and microservices. This document is organized into sections that…
Descriptors: Human Capital, Public Agencies, Armed Forces, Information Systems

Peer reviewed
Direct link
