NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 1 to 15 of 16 results Save | Export
Ali Nusair – ProQuest LLC, 2023
As the digital revolution unfolds, individuals are increasingly transforming their traditional homes into smart homes, adopting semi- and fully automated smart devices. This transformative shift, fueled by advancements in information technology, presents vast social and economic opportunities. Despite the burgeoning number of smart devices in the…
Descriptors: Internet, Information Technology, Information Security, Training Methods
Rene David Chacon – ProQuest LLC, 2021
With the increasing data security awareness of mobile crowdsensing (MCS) participants, smartphone app developers are continually developing technical security protections, but with little consideration on human behaviors. Information technology (IT) advancements seen in the introduction of homomorphic encryption and privacy preserving…
Descriptors: Graduate Students, Student Participation, Handheld Devices, Computer Oriented Programs
Laurel Lynn Schneider – ProQuest LLC, 2023
As the digital world evolves, so does the risk of cyberattacks. Despite technology playing a vital role in nullifying these threats, the human factor is still regarded as one of the greatest weaknesses. End-user behavior is a major cause of information security breaches. This quantitative empirical study used a single-group, pre-post-test,…
Descriptors: Computer Security, Information Security, Correlation, Knowledge Level
Wright, Brian S. – ProQuest LLC, 2017
Through the Internet of Things (IoT) people and devices are communicating and interacting with one another continuously. This includes devices such as thermostats, televisions, voice activated speakers (Amazon Echo), smartphones, tablets, and wearables (Fitbit). This is accomplished through the IoT using uniquely identifiable radio tags, sensors,…
Descriptors: Internet, Equipment, Telecommunications, Handheld Devices
Marvin Schneider – ProQuest LLC, 2020
The purpose of this quantitative study was to explore the influence of protection motivation theory (PMT) constructs on security behaviors of undergraduate students. More specifically, the primary focus of this study is to answer our primary research question: to what extent do the independent variables (perceived threat severity, perceived threat…
Descriptors: Undergraduate Students, Self Efficacy, Student Attitudes, Telecommunications
Sletten, Michael Alton – ProQuest LLC, 2020
Mobile devices are rapidly becoming a very popular and convenient means of delivering and consuming learning content worldwide. The rise in popularity is due in part to the technological advancements that mobile devices have made in recent years, along with developments in the online learning platforms and spaces that support mobile learning.…
Descriptors: Educational Technology, Technology Uses in Education, Handheld Devices, Telecommunications
Sanga, Sushma – ProQuest LLC, 2016
Identity-theft means stealing someone's personal information and using it without his or her permission. Each year, millions of Americans are becoming the victims of identity-theft, and this is one of the seriously growing and widespread issues in the U.S. This study examines the effect of electronic devices self-efficacy, electronic devices…
Descriptors: Information Security, Self Efficacy, Anxiety, Students
Fulton, Joel – ProQuest LLC, 2017
Bring your own device (BYOD) is the use of uncontrolled devices, which increases risks to business data and intellectual property. Like centralized and distributed computing adoption before it, the rapid proliferation of BYOD has outstripped security advances. The trend is growing due to the expectations of the Millennial workforce and its high…
Descriptors: Generational Differences, Ownership, Technological Literacy, Handheld Devices
Feliciano-Torres, Hector L. – ProQuest LLC, 2017
The purpose of this quantitative, descriptive non experimental study was to investigate the use of wireless mobile network devices at a post-secondary institution using the innovation diffusion theory (IDT) and technology acceptance model (TAM) as background theories. The researcher intended to explore how students and personnel of the institution…
Descriptors: Innovation, Technology Uses in Education, Adoption (Ideas), Models
DeShield, Leslie A. – ProQuest LLC, 2017
Research conducted by Tech Pro (2014) indicated that the Bring Your Own Device (BYOD) concept is gaining momentum with 74% of organizations already having some BYOD program or planning to implement one. While BYOD offers several benefits, it also presents challenges that concern information technology leaders and information security managers.…
Descriptors: Program Implementation, Technology Uses in Education, Handheld Devices, Telecommunications
Hines, Natasha – ProQuest LLC, 2015
Company data on mobile devices is vulnerable and subject to unauthorized access. The general problem is that information security incidents compromise the integrity and authenticity of electronic data. The specific problem is that organizational security policies, procedures, and training do not adequately address the vulnerabilities associated…
Descriptors: Barriers, Telecommunications, Information Security, Phenomenology
Karamanian, Andre – ProQuest LLC, 2013
This qualitative, exploratory, normative study examined the security and privacy of location based services in mobile applications. This study explored risk, and controls to implement privacy and security. This study was addressed using components of the FIPS Risk Management Framework. This study found that risk to location information was…
Descriptors: Handheld Devices, Information Security, Privacy, Risk Management
Almohri, Hussain M. J. – ProQuest LLC, 2013
Despite the recent advances in systems and network security, attacks on large enterprise networks consistently impose serious challenges to maintaining data privacy and software service integrity. We identify two main problems that contribute to increasing the security risk in a networked environment: (i) vulnerable servers, workstations, and…
Descriptors: Computer Security, Information Security, Risk, Computer Networks
Owens, Rodney – ProQuest LLC, 2013
Organizations increasingly utilize cloud computing architectures to reduce costs and energy consumption both in the data warehouse and on mobile devices by better utilizing the computing resources available. However, the security and privacy issues with publicly available cloud computing infrastructures have not been studied to a sufficient depth…
Descriptors: Computer Software, Risk, Handheld Devices, Information Technology
Saunders, Lewis O. – ProQuest LLC, 2014
The growth of mobile phone use has paralleled increased reports of identity theft. Identity theft can result in financial loss and threats to a victim's personal safety. Although trends in identity theft are well-known, less is known about individual cell phone users' attitudes toward identity theft and the extent to which they connect it to cell…
Descriptors: Telecommunications, Handheld Devices, Crime, Safety
Previous Page | Next Page »
Pages: 1  |  2