Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Education

Analysis Effect Of Audit Information Technology : Green Technology, Smart System And Innovation Behavior Working For Improving Business Services University In Indonesia, Merlin Apriliyanti, Ilham M, Tanti Handriana, Indrianawati Usman Oct 2020

Analysis Effect Of Audit Information Technology : Green Technology, Smart System And Innovation Behavior Working For Improving Business Services University In Indonesia, Merlin Apriliyanti, Ilham M, Tanti Handriana, Indrianawati Usman

Library Philosophy and Practice (e-journal)

This study was conducted to determine the effectiveness and efficiency of the use of technology and integrated information systems and recommend the development of new systems at PTKIN (UIN Sunan Ampel Surabaya and UIN Maulana Malik Ibrahim Malang). The study of information technology management in tertiary institutions aims to measure the extent to which the application of information technology is able to support the activities of the Tri Dharma College in order to achieve world class universities. In measuring the results of the audit of information technology management the tertiary institution will conduct evaluation, monitoring and further development of information …


It Security Managers' Strategies For Mitigating Data Breaches In Texas School Districts, Mercy Ikhuoria Nwankwo Jan 2020

It Security Managers' Strategies For Mitigating Data Breaches In Texas School Districts, Mercy Ikhuoria Nwankwo

Walden Dissertations and Doctoral Studies

School districts are increasingly becoming a prime target for cybercriminals. As a result, information technology (IT) security managers in Texas school districts are concerned about hackers gaining access to network resources that could lead to data breaches on their network. Grounded in the technology threat avoidance theory, the purpose of this qualitative multiple case study was to explore strategies IT security managers use to mitigate data breaches in school district networks in Texas. The participants comprised 6 IT security managers in 3 Texas school districts whose roles involved managing and implementing data security strategies. Data collection involved conducting semistructured interviews …