Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 3 |
Descriptor
Information Security | 3 |
Computer Security | 2 |
Prevention | 2 |
Access to Information | 1 |
Artificial Intelligence | 1 |
Biology | 1 |
Business | 1 |
Colleges | 1 |
Computer Networks | 1 |
Crime | 1 |
Crime Prevention | 1 |
More ▼ |
Source
Association Supporting… | 3 |
Publication Type
Reports - Descriptive | 3 |
Speeches/Meeting Papers | 3 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Audience
Location
New York | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Tappert, Charles C.; Agerwala, Tilak – Association Supporting Computer Users in Education, 2019
This paper discusses our experiences teaching a doctoral-level course in emerging information technologies. The concept of emerging technologies is put into context by describing the technology life cycle. The emerging information technologies of current interest -- Artificial Intelligence and related areas, Collective Human-Computer Intelligence,…
Descriptors: Graduate Study, Information Technology, Artificial Intelligence, Quantum Mechanics
Lehrfeld, Michael R. – Association Supporting Computer Users in Education, 2018
Individuals whom have legitimate access to network resources, trade secrets, or otherwise sensitive data as part of their daily functions are categorized as an Insider Risk. Insider Risk has been pushed into the public eye in recent years with the Edward Snowden leaks of 2013. Snowden had a business need to access the data he retrieved but the…
Descriptors: Computer Security, Information Security, Information Storage, Risk
Rogers, Gary; Ashford, Tina – Association Supporting Computer Users in Education, 2015
In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…
Descriptors: Computer Security, Crime, Victims, Higher Education