Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 6 |
Since 2006 (last 20 years) | 12 |
Descriptor
Data Analysis | 12 |
Information Security | 12 |
Information Technology | 8 |
Computer Security | 4 |
Models | 4 |
Privacy | 4 |
Data Collection | 3 |
Access to Information | 2 |
Accuracy | 2 |
Administrator Attitudes | 2 |
Computation | 2 |
More ▼ |
Source
ProQuest LLC | 12 |
Author
Bonomi, Luca | 1 |
Chowdhury, Naser | 1 |
Gardner, Brian | 1 |
Handorf, C. Russell | 1 |
Ilci, Ahmet | 1 |
Koh, Byungwan | 1 |
Li, Weifeng | 1 |
Pervaiz, Zahid | 1 |
Reddy, Dinesh Sampangirama | 1 |
Sims, J. Eric | 1 |
Thompson, Eleanor Elizabeth | 1 |
More ▼ |
Publication Type
Dissertations/Theses -… | 12 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Illinois (Urbana) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Bonomi, Luca – ProQuest LLC, 2015
The Big Data phenomenon is posing new challenges in our modern society. In addition to requiring information systems to effectively manage high-dimensional and complex data, the privacy and social implications associated with the data collection, data analytics, and service requirements create new important research problems. First, the high…
Descriptors: Data, Privacy, Information Security, Data Analysis
Chowdhury, Naser – ProQuest LLC, 2018
A renewed interest in cloud computing adoption has occurred in academic and industry settings because emerging technologies have strong links to cloud computing and Big Data technology. Big Data technology is driving cloud computing adoption in large business organizations. For cloud computing adoption to increase, cloud computing must transition…
Descriptors: Computer Software, Information Technology, Prediction, Models
Handorf, C. Russell – ProQuest LLC, 2016
This study analyzed the meta-data collected from a honeypot that was run by the Federal Bureau of Investigation for a period of 5 years. This analysis compared the use of existing industry methods and tools, such as Intrusion Detection System alerts, network traffic flow and system log traffic, within the Open Source Security Information Manager…
Descriptors: Information Technology, Computer Security, Information Security, Program Effectiveness
Gardner, Brian – ProQuest LLC, 2016
Disaster recovery planning is a crucial component to maintaining a business's economic stability. However, it is unclear how key performance indicators (KPIs) are perceived in the emergency medical service (EMS) industry during the disaster recover planning process. The problem addressed in this study was to understand KPIs and their components.…
Descriptors: Information Technology, Information Security, Emergency Programs, Planning
Ilci, Ahmet – ProQuest LLC, 2020
Privacy and surveillance are pervasive words not only in higher education but also in many areas in our life. We use and hear them often while shopping online, reading the news, or checking the policies and terms of websites. In this study, I highlight the challenges of data collection and surveillance in education, specifically, in online…
Descriptors: Privacy, Information Security, Case Studies, Undergraduate Students
Li, Weifeng – ProQuest LLC, 2017
Social media analytics is a critical research area spawned by the increasing availability of rich and abundant online user-generated content. So far, social media analytics has had a profound impact on organizational decision making in many aspects, including product and service design, market segmentation, customer relationship management, and…
Descriptors: Social Media, Information Security, Role, Crime
Reddy, Dinesh Sampangirama – ProQuest LLC, 2017
Cybersecurity threats confront the United States on a daily basis, making them one of the major national security challenges. One approach to meeting these challenges is to improve user cybersecurity behavior. End user security behavior hinges on end user acceptance and use of the protective information technologies such as anti-virus and…
Descriptors: Computer Security, Information Security, Information Technology, Self Efficacy
Thompson, Eleanor Elizabeth – ProQuest LLC, 2014
That organizations face threats to the security of their computer systems from external hackers is well documented. Intentional or unintentional behaviors by organizational insiders can severely compromise computer security as well. Less is known, however, about the nature of this threat from insiders. The purpose of this study was to bridge this…
Descriptors: Information Technology, Information Security, Risk Management, Computers
Tyagi, Himanshu – ProQuest LLC, 2013
This dissertation concerns the secure processing of distributed data by multiple terminals, using interactive public communication among themselves, in order to accomplish a given computational task. In the setting of a probabilistic multiterminal source model in which several terminals observe correlated random signals, we analyze secure…
Descriptors: Computation, Correlation, Computers, Data Processing
Pervaiz, Zahid – ProQuest LLC, 2013
Access control mechanisms protect sensitive information from unauthorized users. However, when sensitive information is shared and a Privacy Protection Mechanism (PPM) is not in place, an authorized insider can still compromise the privacy of a person leading to identity disclosure. A PPM can use suppression and generalization to anonymize and…
Descriptors: Data Analysis, Privacy, Accuracy, Information Security
Koh, Byungwan – ProQuest LLC, 2011
The advent of information technology has enabled firms to collect significant amounts of data about individuals and mine the data for developing their strategies. Profiling of individuals is one common use of data collected about them. It refers to using known or inferred information to categorize the type of an individual and to tailor specific…
Descriptors: Screening Tests, Program Effectiveness, Information Technology, Data Collection
Sims, J. Eric – ProQuest LLC, 2012
Information security has been a particularly hot topic since the enhanced internal control requirements of Sarbanes-Oxley (SOX) were introduced in 2002. At about this same time, cloud computing started its explosive growth. Outsourcing of mission-critical functions has always been a gamble for managers, but the advantages of cloud computing are…
Descriptors: Information Security, Computer Science Education, Clearinghouses, Data Analysis