Suche

Wo soll gesucht werden?
Erweiterte Literatursuche

Ariadne Pfad:

Inhalt

Literaturnachweis - Detailanzeige

 
Autor/inKamara, Kesselly Sheick
TitelExploring Strategies Analyst Used to Secure Personally Identifiable and Sensitive Data in Higher Education
Quelle(2019), (123 Seiten)
PDF als Volltext Verfügbarkeit 
D.C.S. Dissertation, Colorado Technical University
Spracheenglisch
Dokumenttypgedruckt; online; Monographie
ISBN978-1-0856-5421-0
SchlagwörterHochschulschrift; Dissertation; Higher Education; Information Security; Privacy; Ownership; Confidential Records; Student Records; Employees; Programming; Pennsylvania; Delaware; Maryland
AbstractThe problem addressed by this study is the strategies analysts need in higher education institutions to improve the protection of personally identifiable and sensitive data. The qualitative exploratory design was used to examine the strategies used by nine analysts. The combined experience of the nine analysts in data analytics, cyber security, system administration and research spread over 3-decades. These analysts have performed roles, in higher education institutions online or on campus, located on the East Coast of the United States of America, primarily Pennsylvania, Delaware and the Maryland areas. The conceptual framework is a visual representation of the contextual literature, problem under research, setting and research question. The study used eight interview questions, and several follow up questions to collect data. The interviews were conducted over the phone and recorded using a digital voice recorder. The audio recordings were transcribed by a professional transcription service. The transcripts were emailed to the participants for participant feedback. Each analyst's feedback was uploaded into NVivo 12 for mac version 12.3.0 for data analysis. The study then used thematic analysis by examining and coding patterns and themes associated with the research question. The patterns arranged by themes across the data were named as described by the analysts. Thematic analysis afforded the study the opportunity to identified and organized patterns into main themes and noticeable themes. Ad-hoc strategy, ad-hoc team and ad-hoc technology emerged as main themes. Privacy protection, data ownership concern, data retention concern data purging concern emerged as noticeable themes. The main themes answered the research question and noticeable themes significant to the finding were recommended for future research. [The dissertation citations contained here are published with the permission of ProQuest LLC. Further reproduction is prohibited without permission. Copies of dissertations may be obtained by Telephone (800) 1-800-521-0600. Web page: http://www.proquest.com/en-US/products/dissertations/individuals.shtml.] (As Provided).
AnmerkungenProQuest LLC. 789 East Eisenhower Parkway, P.O. Box 1346, Ann Arbor, MI 48106. Tel: 800-521-0600; Web site: http://www.proquest.com/en-US/products/dissertations/individuals.shtml
Erfasst vonERIC (Education Resources Information Center), Washington, DC
Update2024/1/01
Literaturbeschaffung und Bestandsnachweise in Bibliotheken prüfen
 

Standortunabhängige Dienste
Die Wikipedia-ISBN-Suche verweist direkt auf eine Bezugsquelle Ihrer Wahl.
Tipps zum Auffinden elektronischer Volltexte im Video-Tutorial

Trefferlisten Einstellungen

Permalink als QR-Code

Permalink als QR-Code

Inhalt auf sozialen Plattformen teilen (nur vorhanden, wenn Javascript eingeschaltet ist)

Teile diese Seite: