NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 2 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Muhammad Al-Abdullah; Alper Yayla; Mohammed Salem Al-Atoum – Journal of Information Systems Education, 2024
In today's cybersecurity landscape, organizations need frameworks that provide a holistic approach to risk assessment as part of the risk management process. This case introduces SecureEnd Solutions, a rapidly growing cybersecurity company, and its core team, including Alan Touring, Ada Lovecode, Bob Jobs, and Suzan, the head of development. The…
Descriptors: Risk Assessment, Risk Management, Computer Security, Holistic Approach
Peer reviewed Peer reviewed
Tiefel, Virginia – Library Hi Tech, 1993
Describes a microcomputer program that serves as a front-end to an online library catalog and other information sources and provides guidance to students on searching for and evaluating information. Funding, technology, evaluation, impact on other libraries, and future plans are discussed. Sample screens are included. (Contains 75 references.)…
Descriptors: College Libraries, Computer Software, Computer Software Evaluation, Consultants