Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Information Systems | 2 |
| Methods | 2 |
| Models | 2 |
| Training | 2 |
| Training Methods | 2 |
| Access to Computers | 1 |
| Action Research | 1 |
| Career Development | 1 |
| Case Studies | 1 |
| Computer Science | 1 |
| Computer Security | 1 |
| More ▼ | |
Publication Type
| Dissertations/Theses -… | 1 |
| Journal Articles | 1 |
| Reports - Research | 1 |
Education Level
| Adult Education | 1 |
| Higher Education | 1 |
Audience
| Practitioners | 1 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
San Nicolas-Rocca, Tonia – ProQuest LLC, 2010
Identification and access management has been among the top security issues facing institutions of higher education. Most institutions of higher education require end users to provide usernames and passwords to gain access to personally identifiable information (PII). This leaves universities vulnerable to unauthorized access and unauthorized…
Descriptors: Higher Education, Action Research, Observation, Identification
Small, Adrian; Sice, Petia; Venus, Tony – Learning Organization, 2008
Purpose: The purpose of this paper is to set out an argument for a way to design, implement and manage IS with an emphasis on first, the learning that can be created through undertaking the approach, and second, the learning that may be created through using the IS that was implemented. The paper proposes joining two areas of research namely,…
Descriptors: Systems Approach, Information Systems, Methods, Manufacturing

Direct link
Peer reviewed
