Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 8 |
Descriptor
| Computer Security | 8 |
| Information Science | 6 |
| Information Technology | 4 |
| Computer Science | 3 |
| Models | 3 |
| Biology | 2 |
| Computers | 2 |
| Confidentiality | 2 |
| Data | 2 |
| Identification | 2 |
| Information Science Education | 2 |
| More ▼ | |
Source
| ProQuest LLC | 8 |
Author
| Burns, Mary B. | 1 |
| Kim, Jungsun | 1 |
| Letitia Griffin | 1 |
| Li, Xin | 1 |
| Nitipaichit, Yuttasart | 1 |
| Qleibo, Haider W. | 1 |
| San Nicolas-Rocca, Tonia | 1 |
| Shaw, Bilal A. | 1 |
Publication Type
| Dissertations/Theses -… | 8 |
Education Level
| Adult Education | 1 |
| Higher Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Letitia Griffin – ProQuest LLC, 2021
The purpose of this study is to add to the body of knowledge regarding the impact of cybersecurity awareness training programs and how effective and efficient the program is in DoD affiliated organizations. The general problem addressed in the present study was that there has been an increase in security breaches within Department of Defense (DoD)…
Descriptors: Computer Security, Information Security, Government Employees, Information Science Education
Burns, Mary B. – ProQuest LLC, 2012
The adage, "old habits die hard", is especially relevant when humans learn new protective behaviors (i.e., dental flossing, IS security behaviors). The foundation that underlies many social-cognitive theories used in IS research is that intention to change predicts actual behavior change. Despite intentions to change, humans do not…
Descriptors: Risk, Computer Security, Computers, Surveys
Li, Xin – ProQuest LLC, 2011
In recent years, new bioinformatics technologies, such as gene expression microarray, genome-wide association study, proteomics, and metabolomics, have been widely used to simultaneously identify a huge number of human genomic/genetic biomarkers, generate a tremendously large amount of data, and dramatically increase the knowledge on human…
Descriptors: Privacy, Genetics, Biomedicine, Biology
Nitipaichit, Yuttasart – ProQuest LLC, 2010
Wireless Sensor Networks (WSNs) have unique characteristics which constrain them; including small energy stores, limited computation, and short range communication capability. Most traditional security algorithms use cryptographic primitives such as Public-key cryptography and are not optimized for energy usage. Employing these algorithms for the…
Descriptors: Networks, Computer Security, Data, Confidentiality
Shaw, Bilal A. – ProQuest LLC, 2010
Quantum error-correcting codes have been the cornerstone of research in quantum information science (QIS) for more than a decade. Without their conception, quantum computers would be a footnote in the history of science. When researchers embraced the idea that we live in a world where the effects of a noisy environment cannot completely be…
Descriptors: Information Science, Programming, Information Theory, Computer Science
Qleibo, Haider W. – ProQuest LLC, 2009
WSNs are susceptible to a variety of attacks. These attacks vary in the way they are performed and executed; they include but not limited to node capture, physical tampering, denial of service, and message alteration. It is of paramount importance to protect gathered data by WSNs and defend the network against illegal access and malicious…
Descriptors: Confidentiality, Integrity, Computer Security, Internet
San Nicolas-Rocca, Tonia – ProQuest LLC, 2010
Identification and access management has been among the top security issues facing institutions of higher education. Most institutions of higher education require end users to provide usernames and passwords to gain access to personally identifiable information (PII). This leaves universities vulnerable to unauthorized access and unauthorized…
Descriptors: Higher Education, Action Research, Observation, Identification
Kim, Jungsun – ProQuest LLC, 2009
Hoteliers have installed new technology, such as self-service and wireless technology, to improve customer service or to increase revenue. However, it seems that they tend to either be unaware of or ignore potential vulnerability of their systems when they add more technologies. The underestimated risks can possibly result in massive losses for…
Descriptors: Hospitality Occupations, Intention, Risk, Program Effectiveness

Direct link
