Publication Date
| In 2026 | 0 |
| Since 2025 | 2 |
| Since 2022 (last 5 years) | 8 |
Descriptor
| Computer Security | 8 |
| Information Management | 8 |
| Information Security | 8 |
| Computer Networks | 3 |
| Computer Software | 3 |
| Information Storage | 3 |
| Information Systems | 3 |
| Data | 2 |
| Data Use | 2 |
| Foreign Countries | 2 |
| Information Technology | 2 |
| More ▼ | |
Source
| Journal of Cybersecurity… | 2 |
| ProQuest LLC | 2 |
| Advanced Distributed Learning… | 1 |
| British Journal of… | 1 |
| Journal of Research… | 1 |
| Teaching Education | 1 |
Author
| Carlos Novo | 1 |
| Donald F. Norris | 1 |
| Hayden, Trey | 1 |
| Hermida, Martin | 1 |
| Imlig-Iten, Nina | 1 |
| Isaac Atta Junior Ampofo | 1 |
| Isaac Atta Senior Ampofo | 1 |
| Javier Hoz-Ruiz | 1 |
| Jelena Jovanovic | 1 |
| Johnson, Andy | 1 |
| Laura K. Mateczun | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 5 |
| Reports - Research | 3 |
| Dissertations/Theses -… | 2 |
| Reports - Descriptive | 2 |
| Information Analyses | 1 |
Education Level
| Higher Education | 3 |
| Postsecondary Education | 3 |
Audience
Location
| Peru | 1 |
| Switzerland | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Donald F. Norris; Laura K. Mateczun – Journal of Cybersecurity Education, Research and Practice, 2025
This paper, based on data from our second nationwide survey of cybersecurity among local or grassroots governments in the U.S., examines how these governments manage this important function. As we have shown elsewhere, local government cybersecurity is increasingly important because these governments are under constant or nearly constant…
Descriptors: Computer Security, Local Government, Information Security, Computer Networks
Nancy Plumer – ProQuest LLC, 2024
The study helped investigate Peruvian Higher Education Institutions' (PHEI) security posture and how the adoption of modern technology enhanced the operational processes to reduce cyber threats. The purpose of the research was based on research questions to assess access controls effectiveness, infrastructure security gaps, emerging technology…
Descriptors: Computer Security, Universities, Foreign Countries, Computer Uses in Education
Qinyi Liu; Ronas Shakya; Jelena Jovanovic; Mohammad Khalil; Javier Hoz-Ruiz – British Journal of Educational Technology, 2025
High-volume, high-quality and diverse datasets are crucial for advancing research in the education field. However, such datasets often contain sensitive information that poses significant privacy challenges. Traditional anonymisation techniques fail to meet the privacy standards required by regulations like GDPR, prompting the need for more robust…
Descriptors: Privacy, Data, Information Security, Compliance (Legal)
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes
Miriam Patrick – ProQuest LLC, 2022
This qualitative case study discussed the security training and awareness for iMiTs Art's cloud and information systems due to the digital transition to cloud computing capabilities and usage. The study was based on the technology acceptance of the TAM (Technology Acceptance Model) model, security training concepts of SETA (Security Education and…
Descriptors: Information Security, Information Systems, Information Management, Information Storage
Hermida, Martin; Imlig-Iten, Nina; Schrackmann, Iwan; Marinus, Eva – Teaching Education, 2023
With the ubiquity of digital media, managing personal data has become part of our daily lives. Teachers have to manage not only their own data, they also manage students' sensitive data and furthermore have to teach data protection to students. In Switzerland, teacher education colleges have hence started to educate students about privacy and data…
Descriptors: Preservice Teachers, Student Attitudes, Social Networks, Data
Smith, Brent; Johnson, Andy; Hayden, Trey; Tolk, Florian – Advanced Distributed Learning Initiative, 2022
The human capital supply chain is a complex network of systems with inherent challenges to accommodating Total Learning Architecture (TLA) operability. This document covers the objective end-state for Department of Defense (DoD) learning organizations migrating to TLA compliant data and microservices. This document is organized into sections that…
Descriptors: Human Capital, Public Agencies, Armed Forces, Information Systems
Isaac Atta Senior Ampofo; Isaac Atta Junior Ampofo – Journal of Research Initiatives, 2023
The most efficient approach to giving large numbers of students' access to computational resources is through a data center. A contemporary method for building the data center's computer infrastructure is the software-defined model, which enables user tasks to be processed in a reasonable amount of time and at a reasonable cost. The researcher…
Descriptors: Educational Trends, Educational Facilities Design, Access to Computers, Computer Centers

Peer reviewed
Direct link
