Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 3 |
| Since 2007 (last 20 years) | 4 |
Descriptor
| Employees | 6 |
| Program Development | 6 |
| Work Environment | 6 |
| Computer Security | 2 |
| Employee Attitudes | 2 |
| Information Security | 2 |
| Models | 2 |
| Ability | 1 |
| Administration | 1 |
| Adults | 1 |
| Behavior Patterns | 1 |
| More ▼ | |
Author
Publication Type
| Reports - Research | 3 |
| Dissertations/Theses -… | 2 |
| Journal Articles | 2 |
| Tests/Questionnaires | 1 |
Education Level
| Higher Education | 2 |
| Postsecondary Education | 2 |
| Two Year Colleges | 1 |
Audience
Location
| Canada | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Yencer, Kristen – ProQuest LLC, 2023
Employee recognition is important for multiple reasons. Through an informal survey, it was determined that the employees of the workforce development and community education division at Delaware Technical and Community College did not feel recognized, resulting in low morale in the division. This study provided the opportunity to develop…
Descriptors: Community Colleges, Employees, Recognition (Achievement), Empowerment
Ramlo, Susan E.; Nicholas, John B. – Journal of Cybersecurity Education, Research and Practice, 2020
Cybersecurity is a worldwide issue and concern. Prior studies indicate that many people do not use cybersecurity best practices. Although these prior studies used large-scale surveys or interviews, this study used Q methodology [Q] because Q provides greater insight than Likert-format surveys. In fact, Q was created to scientifically study…
Descriptors: Student Attitudes, Information Security, Best Practices, Computer Security
Harrison, Brynne – ProQuest LLC, 2018
Phishing has become a preferred method among cyber criminals looking to gain access to confidential information. Although most businesses and governmental organizations provide employees with some sort of cyber security training, there is a lack of research examining whether such training methods work to actually reduce susceptibility to…
Descriptors: Training Methods, Information Security, Computer Security, Money Management
Caperchione, Cristina M.; Reid, R. Colin; Sharp, Paul G.; Stehmeier, Joshua – Health Education Journal, 2016
Objectives: The value of workplace wellness programmes (WWPs) has been established in the literature. Such programmes, however, have an increased likelihood for success when both management and non-management employees' perspectives and needs are incorporated into development and implementation. This study aimed to identify the perspectives of…
Descriptors: Work Environment, Wellness, Health Education, Health Promotion
Community Health Service (DHEW/PHS), Arlington, VA. Div. of Health Resources. – 1972
The purpose of this monograph is to discuss employee incentive plans with a potential for cost containment in order to assist hospitals in providing efficient and effective delivery of health care. Based on an examination of employee incentive systems both in and outside the health care field, the information is intended to aid the administrative…
Descriptors: Employee Attitudes, Employees, Health Personnel, Health Services
Peterson, Norman G.; Mumford, Michael D.; Borman, Walter C.; Jeanneret, P. Richard; Fleishman, Edwin A. – 1995
This document reports on the content model of the Occupational Information Network (O*NET), which is intended to replace the "Dictionary of Occupational Titles." The following chapters are included: "Introduction" (Michael D. Mumford and Norman G. Peterson); "Content Model" (Michael D. Mumford and Norman G. Peterson);…
Descriptors: Ability, Career Choice, Career Education, Career Exploration

Direct link
Peer reviewed
