NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 631 to 645 of 1,825 results Save | Export
Fazlioglu, Muge – ProQuest LLC, 2017
This dissertation examines the risk-based approach to privacy and data protection and the role of information sensitivity within risk management. Determining what information carries the greatest risk is a multi-layered challenge that involves balancing the rights and interests of multiple actors, including data controllers, data processors, and…
Descriptors: Risk, Privacy, Information Security, Risk Management
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Frost, Gail; Connolly, Maureen – Collected Essays on Learning and Teaching, 2019
Concussion is a functional brain injury that can produce physical, cognitive, emotional and sleep-related symptoms. Return to learn protocols designed to help students recovering from concussion recommend a gradual, symptom-governed, increase in cognitive activity before a return to full-time school attendance and participation. Return to learn in…
Descriptors: Head Injuries, Educational Strategies, Symptoms (Individual Disorders), Cognitive Processes
Morton, M. H.; Horwitz, B. – Chapin Hall at the University of Chicago, 2019
Youth homelessness in the United States is a serious challenge. Recent national research by Chapin Hall at the University of Chicago found concerning rates of homelessness among adolescents and young adults ages 13-25. An estimated one in 30 adolescents (ages 13-17) and nearly one in 10 young adults (ages 18-25) experienced some form of…
Descriptors: Homeless People, Youth, Adolescents, Young Adults
Peer reviewed Peer reviewed
Direct linkDirect link
Plachkinova, Miloslava; Maurer, Chris – Journal of Information Systems Education, 2018
This case study follows the security breach that affected Target at the end of 2013 and resulted in the loss of financial data for over 70 million customers. The case provides an overview of the company and describes the reasons that led to one of the biggest security breaches in history. It offers a discussion on Target's vendor management…
Descriptors: Information Security, Information Systems, Case Method (Teaching Technique), Online Vendors
Lee Collyer – Washington Office of Superintendent of Public Instruction, 2022
The 2022 Legislature directed the Office of Superintendent of Public Instruction (OSPI) to create an advisory workgroup with specific participants to report back on topics related to student isolation and seclusion. This legislative report provides a background on the workgroup, history of isolation and restraint, current practices in the state of…
Descriptors: Discipline, Punishment, Behavior Modification, Timeout
Peer reviewed Peer reviewed
Direct linkDirect link
Wright, Caradee Y.; Reeder, Anthony I.; Albers, Patricia N. – Health Education Research, 2016
Interventions in primary schools that increase sun-protective behaviours and decrease ultraviolet radiation exposure, sunburn incidence and skin cancer risk can be effective. SunSmart School Accreditation Programmes (SSAP) are recommended. Prior to SSAP implementation in South Africa, we explored the feasibility of obtaining national baseline…
Descriptors: Foreign Countries, Health Promotion, Health Behavior, Risk Management
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Lyons, Michael – Australian Universities' Review, 2016
Safety management systems in Australian higher education organisations are under-researched. Limited workplace safety information can be found in the various reports on university human resources benchmarking programs, and typically they show only descriptive statistics. With the commencement of new consultation-focused regulations applying to…
Descriptors: Universities, School Safety, Risk Management, Emergency Programs
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Lubyanaya, Alexandra V.; Izmailov, Airat M.; Nikulina, Ekaterina Y.; Shaposhnikov, Vladislav A. – International Journal of Environmental and Science Education, 2016
The purpose of this article is to investigate the problem, which stems from non-current fixed assets affecting profitability and asset management efficiency. Tangible assets, intangible assets and financial assets are all included in non-current fixed assets. The aim of the research is to identify the impact of estimates and valuation in…
Descriptors: Accounting, Facility Inventory, Costs, Efficiency
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, Chong – EURASIA Journal of Mathematics, Science & Technology Education, 2016
This study examines the international risks faced by multinational enterprises to understand their impact on the evaluation of investment projects. Moreover, it establishes a 'three-dimensional' theoretical framework of risk identification to analyse the composition of international risk indicators of multinational enterprises based on the theory…
Descriptors: Foreign Countries, Entrepreneurship, Investment, Risk
Alshareef, Naser – International Association for Development of the Information Society, 2016
Countries in the Gulf represent thriving, globally important commercial centres. They have embraced technology and modern management methods, often originating in the western countries. In adapting to quite different cultures these do not always operate as successfully. The adoption and practices of the Information Security Risk Management (ISRM)…
Descriptors: Information Security, Risk, Qualitative Research, Foreign Countries
Beyer, Dawn M. – ProQuest LLC, 2014
The protection of sensitive data and technologies is critical in preserving United States (U.S.) national security and minimizing economic losses. However, during a cyber attack, the operational capability to constrain the exfiltrations of sensitive data and technologies may not be available. A cyber preparedness methodology (CPM) can improve…
Descriptors: Case Studies, Computer Security, National Security, Risk Management
Shah, Akhtar H. – ProQuest LLC, 2014
Many projects fail despite the use of evidence-based project management practices such as Performance Measurement Baseline (PMB), Earned Value Management (EVM) and Risk Management (RM). Although previous researchers have found that integrated project management techniques could be more valuable than the same techniques used by themselves, these…
Descriptors: Risk Management, Program Administration, Statistical Analysis, Evidence Based Practice
Peer reviewed Peer reviewed
Direct linkDirect link
Jonathan Talbot; David Perrin; Denise Meakin – Quality Assurance in Education: An International Perspective, 2014
Purpose: The purpose of the paper is to contribute to the debate on the maintenance and enhancement of quality in the emerging landscape of higher education practice and delivery where new kinds of institutional relationships are emerging. Much of the literature describes situations where the risk to quality assurance is relatively low. The…
Descriptors: Higher Education, Educational Quality, Quality Assurance, Risk Management
Peer reviewed Peer reviewed
Direct linkDirect link
Toscano, Lisa; Carroll, Brianne – Journal of Physical Education, Recreation & Dance, 2015
Anterior cruciate ligament (ACL) injuries happen at a frequent rate, especially in girls and women. While there are many factors that contribute to ACL tears, teaching proper landing techniques and strengthening certain muscles can decrease the incidence of ACL tears, especially in women. This article reviews some of the high-risk factors that…
Descriptors: Physical Education, Injuries, Accident Prevention, Females
Perez, Dolores – ProQuest LLC, 2015
Evidence-based guidelines for recognizing and treating sepsis have been available for decades, yet healthcare providers do not adhere to the recommendations. Sepsis can progress rapidly if not recognized early. Literature reports reveal that sepsis is the leading cause of death in non-cardiac intensive care units (ICUs), and it is one of the most…
Descriptors: Diseases, Health Education, Guidelines, Hospitals
Pages: 1  |  ...  |  39  |  40  |  41  |  42  |  43  |  44  |  45  |  46  |  47  |  ...  |  122