Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 10 |
Since 2006 (last 20 years) | 19 |
Descriptor
Case Studies | 19 |
Computer Security | 19 |
Information Security | 9 |
Qualitative Research | 8 |
Information Technology | 7 |
Interviews | 7 |
Internet | 4 |
National Security | 4 |
Administrator Attitudes | 3 |
Computer Software | 3 |
Expertise | 3 |
More ▼ |
Source
ProQuest LLC | 19 |
Author
Publication Type
Dissertations/Theses -… | 19 |
Education Level
Higher Education | 4 |
Elementary Education | 2 |
Postsecondary Education | 2 |
Elementary Secondary Education | 1 |
Grade 4 | 1 |
Grade 5 | 1 |
Grade 6 | 1 |
Intermediate Grades | 1 |
Middle Schools | 1 |
Audience
Location
California | 1 |
District of Columbia | 1 |
Florida | 1 |
Illinois (Urbana) | 1 |
Jamaica | 1 |
Minnesota | 1 |
New York | 1 |
Nigeria | 1 |
Texas (San Antonio) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Singletary, Tod J. – ProQuest LLC, 2017
The United States Military has become increasingly dependent upon technology to meet its mission objectives with a consequence being greater dependence on civilian defense contractors to provide specialized services in support of high-tech mission requirements. Modern military defense contractors have also become dependent upon reliable and secure…
Descriptors: Armed Forces, Information Security, Risk, Outsourcing
Stark, Adam – ProQuest LLC, 2017
This case study research explored the cybersecurity systems and training and education of IT professionals at a member college of the Florida College System. Thematic analysis was utilized to analyze interview transcripts of 6 respondents. A more descriptive analysis was completed using the survey responses from 15 respondents. From this analysis…
Descriptors: Case Studies, Information Security, Computer Security, Information Technology
Liesen, Joseph J. – ProQuest LLC, 2017
The higher education industry uses the very latest technologies to effectively prepare students for their careers, but these technologies often contain vulnerabilities that can be exploited via their connection to the Internet. The complex task of securing information and computing systems is made more difficult at institutions of higher education…
Descriptors: Qualitative Research, Case Studies, Barriers, Small Colleges
Sadaghiani-Tabrizi, Avideh – ProQuest LLC, 2018
The educational system has been challenging children through competitive societal information-age education by promoting achievement among students, in preparing children for global excellence. This qualitative research case study of elementary school children's lack in cybersecurity knowledge and awareness served helpful with exploration into…
Descriptors: Computer Security, Computer Science Education, Internet, Elementary School Curriculum
Stevenson, Gregory V. – ProQuest LLC, 2017
Rationale: Former President Barack Obama's $3.9 trillion for the 2015 fiscal year budget request included a $2.9 billion investment in Science, Technology, Engineering and Math (STEM) education. Research then showed that the national spending for cybersecurity has exceeded $10.7 billion in the 2015 fiscal year. Nonetheless, the number of…
Descriptors: Computer Security, Qualitative Research, Case Studies, STEM Education
Ilci, Ahmet – ProQuest LLC, 2020
Privacy and surveillance are pervasive words not only in higher education but also in many areas in our life. We use and hear them often while shopping online, reading the news, or checking the policies and terms of websites. In this study, I highlight the challenges of data collection and surveillance in education, specifically, in online…
Descriptors: Privacy, Information Security, Case Studies, Undergraduate Students
Antony, Laljith – ProQuest LLC, 2016
Failing to prevent leaks of confidential and proprietary information to unauthorized users from software applications is a major challenge that companies face. Access control policies defined in software applications with access control mechanisms are unable to prevent information leaks from software applications to unauthorized users. Role-based…
Descriptors: Computer Software, Qualitative Research, Case Studies, Information Security
Okoye, Stella Ifeyinwa – ProQuest LLC, 2017
Business leaders in Nigeria are concerned about the high rates of business failure and economic loss from security incidents and may not understand strategies for reducing the effects of information security threats on business performance. Guided by general systems theory and transformational leadership theory, the focus of this exploratory…
Descriptors: Information Security, Foreign Countries, Business, Systems Approach
Beyer, Dawn M. – ProQuest LLC, 2014
The protection of sensitive data and technologies is critical in preserving United States (U.S.) national security and minimizing economic losses. However, during a cyber attack, the operational capability to constrain the exfiltrations of sensitive data and technologies may not be available. A cyber preparedness methodology (CPM) can improve…
Descriptors: Case Studies, Computer Security, National Security, Risk Management
Lamb, Christopher J. – ProQuest LLC, 2013
The Advanced Persistent Threat (APT) presents an ever present and more growing threat to organizations across the globe. Traditional Information Technology (IT) incident response falls short in effectively addressing this threat. This researcher investigated the use of single-loop and double-loop learning in two organizations with internal…
Descriptors: Learning, Case Studies, Information Technology, Computer Security
Houghton, Robert F. – ProQuest LLC, 2013
A long standing problem in information technology security is how to help reduce the security footprint. Many specific proposals exist to address specific problems in information technology security. Most information technology solutions need to be repeatable throughout the course of an information systems lifecycle. The Chain-Link Fence Model is…
Descriptors: Information Technology, Computer Security, Models, Interviews
O'Brien, Churairat – ProQuest LLC, 2019
As young children increasingly use the Internet, the children need to learn and apply cybersecurity fundamentals to protect personal data. Teaching young students the basics of strong passwords and data protection in a K-12 classroom setting is an obvious starting point. The literature shows an absence of approved cybersecurity curriculums for use…
Descriptors: Teacher Attitudes, Information Security, Computer Security, Teaching Methods
Walton, Marquetta – ProQuest LLC, 2016
The effectiveness of U.S. cyber-capabilities can have a serious effect on the cyber-security stance of the US and significantly impact how well U.S. critical infrastructures are protected. The problem is that the state of the U.S. cyber-security could be negatively impacted by the dependency that the US displays in its use of defensive…
Descriptors: Technological Literacy, Computer Security, Information Security, Qualitative Research
Islam, Muhammad Faysal – ProQuest LLC, 2013
Cloud computing offers the advantage of on-demand, reliable and cost efficient computing solutions without the capital investment and management resources to build and maintain in-house data centers and network infrastructures. Scalability of cloud solutions enable consumers to upgrade or downsize their services as needed. In a cloud environment,…
Descriptors: Risk Assessment, Statistical Analysis, Reliability, Computer Networks
Newmeyer, Kevin Patrick – ProQuest LLC, 2014
Developing nations have been slow to develop and implement cybersecurity strategies despite a growing threat to governance and public security arising from an increased dependency on Internet-connected systems in the developing world and rising cybercrime. Using a neorealist theoretical framework that draws from Gilpin and Waltz, this qualitative…
Descriptors: Foreign Countries, Developing Nations, Computer Security, Information Security
Previous Page | Next Page ยป
Pages: 1 | 2