Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 7 |
Descriptor
Computer Networks | 7 |
Crime | 7 |
Computer Security | 4 |
Information Technology | 4 |
Information Security | 3 |
Prevention | 3 |
Correlation | 2 |
Costs | 2 |
Foreign Countries | 2 |
Specialists | 2 |
Accountability | 1 |
More ▼ |
Source
ProQuest LLC | 7 |
Author
Blakely, Benjamin A. | 1 |
Chris Sanders | 1 |
Jackie Christopher Scott | 1 |
Kpaduwa, Fidelis Iheanyi | 1 |
Nguyen, Lilly Uyen | 1 |
Rene Ekoteson | 1 |
White, Jautau Kelton | 1 |
Publication Type
Dissertations/Theses -… | 7 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Rene Ekoteson – ProQuest LLC, 2024
Cyberattacks pose a significant threat to university institutions as universities increasingly rely on computer networks to conduct day-to-day business activities. University information technology (IT) leaders are concerned about the increasing level of cyberattacks because these attacks can result in the loss of sensitive data, identity theft,…
Descriptors: Prevention, Information Technology, Information Security, Computer Security
Chris Sanders – ProQuest LLC, 2021
Despite significant investment in cyber security, the industry is unable to stem the tide of damaging attacks against computer networks. This unfortunate situation is, in part, because cyber security exists in a state of cognitive crisis defined by tacit knowledge and poorly understood processes. At the heart of the crisis are digital forensic…
Descriptors: Cognitive Ability, Thinking Skills, Crime, Computer Security
Jackie Christopher Scott – ProQuest LLC, 2023
Although there have been numerous technological advancements in the last several years, there continues to be a real threat as it pertains to social engineering, especially phishing, spear-phishing, and Business Email Compromise (BEC). While the technologies to protect corporate employees and network borders have gotten better, there are still…
Descriptors: Information Security, Computer Mediated Communication, Electronic Mail, Computer Science Education
White, Jautau Kelton – ProQuest LLC, 2017
Current cybersecurity measures have become a major concern for commercial organizations in the United States. As the cyber-attack landscape expands and the skills and knowledge of the cyber-attacker become broader, the current measures that are taken and the laws structured around them are making it increasingly difficult for commercial…
Descriptors: Information Security, Computer Security, Computer Networks, Crime
Blakely, Benjamin A. – ProQuest LLC, 2012
The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…
Descriptors: Computer Security, Information Technology, Crime, Crime Prevention
Nguyen, Lilly Uyen – ProQuest LLC, 2013
This dissertation explores the social worlds of pirated software discs and free/open source software in Vietnam to describe the practices of copying, evangelizing, and translation. This dissertation also reveals the cultural logics of similarity and continuity that sustain these social worlds. Taken together, this dissertation argues that the…
Descriptors: Foreign Countries, Computer Networks, Computer Software, Copyrights
Kpaduwa, Fidelis Iheanyi – ProQuest LLC, 2010
This current quantitative correlational research study evaluated the residential consumers' knowledge of wireless network security and its relationship with identity theft. Data analysis was based on a sample of 254 randomly selected students. All the study participants completed a survey questionnaire designed to measure their knowledge of…
Descriptors: Manufacturing Industry, Correlation, Telecommunications, Data Analysis