Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 6 |
| Since 2007 (last 20 years) | 14 |
Descriptor
| Computer Security | 14 |
| Interviews | 14 |
| Case Studies | 7 |
| Qualitative Research | 7 |
| Information Security | 6 |
| Information Technology | 6 |
| Internet | 5 |
| Risk | 4 |
| Armed Forces | 3 |
| Models | 3 |
| Administrator Attitudes | 2 |
| More ▼ | |
Source
| ProQuest LLC | 14 |
Author
Publication Type
| Dissertations/Theses -… | 14 |
Education Level
| Higher Education | 2 |
| Elementary Education | 1 |
Audience
Location
| Afghanistan | 1 |
| California | 1 |
| District of Columbia | 1 |
| Florida | 1 |
| Iraq | 1 |
| Jamaica | 1 |
| Maryland | 1 |
| New York | 1 |
| Texas | 1 |
| Virginia | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Singletary, Tod J. – ProQuest LLC, 2017
The United States Military has become increasingly dependent upon technology to meet its mission objectives with a consequence being greater dependence on civilian defense contractors to provide specialized services in support of high-tech mission requirements. Modern military defense contractors have also become dependent upon reliable and secure…
Descriptors: Armed Forces, Information Security, Risk, Outsourcing
Stark, Adam – ProQuest LLC, 2017
This case study research explored the cybersecurity systems and training and education of IT professionals at a member college of the Florida College System. Thematic analysis was utilized to analyze interview transcripts of 6 respondents. A more descriptive analysis was completed using the survey responses from 15 respondents. From this analysis…
Descriptors: Case Studies, Information Security, Computer Security, Information Technology
Liesen, Joseph J. – ProQuest LLC, 2017
The higher education industry uses the very latest technologies to effectively prepare students for their careers, but these technologies often contain vulnerabilities that can be exploited via their connection to the Internet. The complex task of securing information and computing systems is made more difficult at institutions of higher education…
Descriptors: Qualitative Research, Case Studies, Barriers, Small Colleges
Armstead, Stanley K. – ProQuest LLC, 2017
In today's dynamic military environment, information technology plays a crucial role in the support of mission preparedness and operational readiness. This research examined the effectiveness of information technology security simulation and awareness training on U.S. military personnel in Iraq and Afghanistan. Also, the study analyzed whether…
Descriptors: Military Personnel, Foreign Countries, Computer Security, Information Security
Sadaghiani-Tabrizi, Avideh – ProQuest LLC, 2018
The educational system has been challenging children through competitive societal information-age education by promoting achievement among students, in preparing children for global excellence. This qualitative research case study of elementary school children's lack in cybersecurity knowledge and awareness served helpful with exploration into…
Descriptors: Computer Security, Computer Science Education, Internet, Elementary School Curriculum
Cooper, Paul K. – ProQuest LLC, 2017
There has been a significant growth of portable devices capable of storing both personal data as well as sensitive organizational data. This growth of these portable devices has led to an increased threat of cyber-criminal activity. The purpose of this study was to gain a better understanding of security threats to the data assets of organizations…
Descriptors: Information Security, Crime, Computer Security, Risk
Houghton, Robert F. – ProQuest LLC, 2013
A long standing problem in information technology security is how to help reduce the security footprint. Many specific proposals exist to address specific problems in information technology security. Most information technology solutions need to be repeatable throughout the course of an information systems lifecycle. The Chain-Link Fence Model is…
Descriptors: Information Technology, Computer Security, Models, Interviews
Toombs, Austin Lewis – ProQuest LLC, 2016
Recent scholarship in Human-Computer Interaction, science and technology studies, and design research has focused on hacker communities as sites of innovation and entrepreneurship, novel forms of education, and the democratization of technological production. However, hacking practices are more than new technical practices; they are also…
Descriptors: Computer Security, Man Machine Systems, Technological Literacy, Participation
Newmeyer, Kevin Patrick – ProQuest LLC, 2014
Developing nations have been slow to develop and implement cybersecurity strategies despite a growing threat to governance and public security arising from an increased dependency on Internet-connected systems in the developing world and rising cybercrime. Using a neorealist theoretical framework that draws from Gilpin and Waltz, this qualitative…
Descriptors: Foreign Countries, Developing Nations, Computer Security, Information Security
Commitment to Cybersecurity and Information Technology Governance: A Case Study and Leadership Model
Curtis, Scipiaruth Kendall – ProQuest LLC, 2012
The continual emergence of technologies has infiltrated government and industry business infrastructures, requiring reforming organizations and fragile network infrastructures. Emerging technologies necessitates countermeasures, commitment to cybersecurity and information technology governance for organization's survivability and sustainability.…
Descriptors: Computer Security, Information Technology, Governance, Case Studies
Clark, Kenneth Norman – ProQuest LLC, 2012
A "commons" is the conventional term that describes a widely accessible and shared resource, such as an ocean, open rangeland, a public park, or public portions of the Internet, which is difficult to exclude or limit use once naturally provided or humanly produced. Ruin of a commons can result when individuals use the resource recklessly…
Descriptors: Mixed Methods Research, Internet, Governance, Federal Government
Belcher, Kenneth L., II – ProQuest LLC, 2012
The cost of the American healthcare system has escalated to the point that the United States spends more per patient than any other country. Based on the cost controls and increase in efficiency seen in other industries, many agree that information technology solutions should be adopted by the American healthcare industry. However, healthcare…
Descriptors: Qualitative Research, Barriers, Health Services, Information Technology
McDonald, Aleecia M. – ProQuest LLC, 2010
As more people seek the benefits of going online, more people are exposed to privacy risks from their time online. With a largely unregulated Internet, self-determination about privacy risks must be feasible for people from all walks of life. Yet in many cases decisions are either not obvious or not accessible. As one example, privacy policies are…
Descriptors: Reading Comprehension, Economic Research, Risk, Internet
Pierce, Steven Russell – ProQuest LLC, 2009
Information technology (IT) certifiers evaluate risk and develop mitigations ensuring IT infrastructures remain protected within acceptable levels of operation, which if not properly maintained can potentially result in loss of life within Department of Defense (DoD) and federal environments. This qualitative phenomenological exploratory study…
Descriptors: Data Analysis, Certification, Internet, Information Technology

Direct link
