NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Alqarni, Amani – ProQuest LLC, 2017
Cyber-attacks threaten the security of computer users' information, networks, machines, and privacy. Studies of computer security education, awareness, and training among ordinary computer users, college students, non-IT-oriented user groups, and non-technically trained citizens are limited. Most research has focused on computer security standards…
Descriptors: Computer Security, College Students, Student Behavior, Information Security
Smiley, Garrett – ProQuest LLC, 2013
E-learning has grown to such an extent that paper-based testing is being replaced by computer-based testing otherwise known as e-exams. Because these e-exams can be delivered outside of the traditional proctored environment, additional authentication measures must be employed in order to offer similar authentication assurance as found in…
Descriptors: Computer Assisted Testing, Licensing Examinations (Professions), Computer Security, Pretests Posttests
Rivera Vazquez, Juan C. – ProQuest LLC, 2012
Cyber crime is a term used to describe the abuse and misuse of a computer system where it is at a loss for someone across the world. It also refers to crimes committed by, or with computers via the Internet or only accessing a computer, is to steal or manipulate information of a company or a person and to use as a means for traditional such as…
Descriptors: Crime, Computer Security, Attitudes, Questionnaires
Suppo, Chris A. – ProQuest LLC, 2013
The purpose of this study was to investigate digital citizenship in Pennsylvania public schools based on the responses of school leaders including superintendents, curriculum coordinators, and technology coordinators. This study examined the relationship between Pennsylvania school leader's beliefs and the implementation of digital citizenship…
Descriptors: Public Schools, Administrator Attitudes, Correlation, Educational Technology
Francisco, James R. – ProQuest LLC, 2010
Health care is one of the most highly regulated industries in the United States. The Health Insurance Portability and Accountability Act of 1996 (HIPAA) mandates the implementation of information systems security to protect the personal information of patients. Properly planned implementations ease the process of introducing new technologies like…
Descriptors: Nurses, Federal Legislation, Nursing, Information Systems