Efficacy Of School Database Security

Read Complete Research Material

Running Head:EFFICACY OF SCHOOL DATABASE SECURITY

Examining and Challenges to and the Efficacy of School Database Security

by

Table of Contents

CHAPTER 4: RESULTS1

PLS structural model15

What is Research?18

What are Data, Information, information and Risk Management?19

What are Decisions and What is the Model?20

What are Information Systems?21

What is the Method and the Methodology?23

Business Processes and interior Controls in IS Risk Management.24

What are Internal Controls?24

Business Processes25

CHAPTER 05: CONCLUSIONS AND DIRECTIONS FOR FUTURE RESEARCH36

CHAPTER 4: RESULTS

The general aim of the research is to explore the levels of IS security awareness of higher education institutions in the USA. The study locations the following two major study questions:

•What are the present IS “security” challenges and risks facing universities inside the context of a evolving country?

•What are the grades of IS security awareness of higher learning data schemes conclusion manufacturers and employees in relative to these trials and threats?

An interpretive case-study approach is engaged to conduct the research. The case-study is represented through Baker College in the USA. Baker College was established in 2008 by the federal government of the USA to educate the people of Michigan. The College receives its operation funds from the federal government, and it does require students to pay tuition fees. It also has Twelve sub-unit education centres which offer a variety of educational courses and degrees. The College focuses on education and learning, while paying less focus to research. The number of currently enrolled students is approximately 4000 students in 2009. The College is based on an international model of higher education with the primary instruction language being English. The College is organized academically into twelve colleges. Baker College is IT orientated and it offers several online services to students and staff (Baker College Web Site, 2007).

Data collection has taken place during different time intervals to capture different phases of College operations. The study used the Computer Service Department (CSD) as the main unit of analysis as it is the main custodian of IS assets and IS security within the College. According to Denzin and Lincoln (2000), investigators “emphasize, describe, judge, contrast, depict, evoke images, and conceive for the reader or listener, the sense of having been there”. To achieve this, the quantitative approach is focus.Basically, the quantitative approach pursues facts and is employed when researchers desire to acquire statistical truth. According to Gall, Gall and Borg (2003), quantitative research assumes that the social environment has objective reality that is relatively constant across time and settings, while qualitative research assumes that individuals construct reality in the form of meanings and interpretations, and that these constructions tend to be transitory and situational.

The overall data collection period extended from July 2009 through September 2010, during which time (a) observation took place, (b) documents were collected, (c) questionnaires distributed. The questionnaire data gathering instruments took place during the academic year, while the documentation and observation instruments were conducted on a continuous basis, including during summer holidays. All ethical acceptances to perform the study were obtained in advance. All participants were acquainted of their right to down turn to ...
Related Ads