NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Gilmore, Derrick C. – ProQuest LLC, 2022
Research administration is a matter of concern for institutions of higher education. While national trends reveal a lack of interest in investing in higher education institutions through federal and state allocations, such institutions have turned to sponsored research as a means of addressing critical issues of instruction, research, and public…
Descriptors: Research Administration, Small Colleges, Financial Support, Technology Integration
Connor David Nelson – ProQuest LLC, 2024
This dissertation introduces a comprehensive framework aimed at reshaping applied cybersecurity education to significantly ease the learning curve, at scale, through three synergistic innovations. These methods address the daunting educational barriers in cybersecurity, enabling learners at all levels to understand complex security concepts more…
Descriptors: Computer Security, Information Security, Computer Science Education, Models
Barta, Brian J. – ProQuest LLC, 2014
Despite the continued demand for open source security software, a gap in the identification of success factors related to the success of open source security software persists. There are no studies that accurately assess the extent of this persistent gap, particularly with respect to the strength of the relationships of open source software…
Descriptors: Open Source Technology, Computer Software, Computer Security, Information Retrieval
Britton, Todd Alan – ProQuest LLC, 2014
Purpose: The purpose of this study was to examine the key considerations of community, scalability, supportability, security, and functionality for selecting open-source software in California universities as perceived by technology leaders. Methods: After a review of the cogent literature, the key conceptual framework categories were identified…
Descriptors: Open Source Technology, Computer Software Selection, Scaling, Computer Security
Daniels, Daniel B., III – ProQuest LLC, 2014
There is a lack of literature linking end-user behavior to the availability of open-source intelligence (OSINT). Most OSINT literature has been focused on the use and assessment of open-source intelligence, not the proliferation of personally or organizationally identifiable information (PII/OII). Additionally, information security studies have…
Descriptors: Information Security, Open Source Technology, Information Management, Computer Security