Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 3 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Systems Approach | 3 |
| Training | 3 |
| Administrator Attitudes | 2 |
| Computer Security | 2 |
| Foreign Countries | 2 |
| Information Security | 2 |
| Prevention | 2 |
| Administrators | 1 |
| Best Practices | 1 |
| Business | 1 |
| Case Studies | 1 |
| More ▼ | |
Source
| ProQuest LLC | 3 |
Publication Type
| Dissertations/Theses -… | 3 |
Education Level
| Higher Education | 2 |
| Postsecondary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Rene Ekoteson – ProQuest LLC, 2024
Cyberattacks pose a significant threat to university institutions as universities increasingly rely on computer networks to conduct day-to-day business activities. University information technology (IT) leaders are concerned about the increasing level of cyberattacks because these attacks can result in the loss of sensitive data, identity theft,…
Descriptors: Prevention, Information Technology, Information Security, Computer Security
Studenberg, Heather Nicole Lancin – ProQuest LLC, 2017
This dissertation examined chief student affairs officers' perceptions of institutional crisis management, preparedness, and response. A goal of this study was to uncover findings that can benefit crisis management protocols or best practices regarding crisis management team training, plan communications, and emergency management personnel on…
Descriptors: Student Personnel Workers, Administrators, Crisis Management, Emergency Programs
Okoye, Stella Ifeyinwa – ProQuest LLC, 2017
Business leaders in Nigeria are concerned about the high rates of business failure and economic loss from security incidents and may not understand strategies for reducing the effects of information security threats on business performance. Guided by general systems theory and transformational leadership theory, the focus of this exploratory…
Descriptors: Information Security, Foreign Countries, Business, Systems Approach

Direct link
