Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Computer Security | 2 |
| Information Technology | 2 |
| Knowledge Management | 2 |
| Case Studies | 1 |
| Clinical Diagnosis | 1 |
| Crime | 1 |
| Identification | 1 |
| Interdisciplinary Approach | 1 |
| Learning | 1 |
| Medicine | 1 |
| Models | 1 |
| More ▼ | |
Source
| ProQuest LLC | 2 |
Publication Type
| Dissertations/Theses -… | 2 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Lamb, Christopher J. – ProQuest LLC, 2013
The Advanced Persistent Threat (APT) presents an ever present and more growing threat to organizations across the globe. Traditional Information Technology (IT) incident response falls short in effectively addressing this threat. This researcher investigated the use of single-loop and double-loop learning in two organizations with internal…
Descriptors: Learning, Case Studies, Information Technology, Computer Security
Conley-Ware, Lakita D. – ProQuest LLC, 2010
This research addresses a real world cyberspace problem, where currently no cross industry standard methodology exists. The goal is to develop a model for identification and detection of vulnerabilities and threats of cyber-crime or cyber-terrorism where cyber-technology is the vehicle to commit the criminal or terrorist act (CVCT). This goal was…
Descriptors: Crime, Terrorism, Identification, Computer Security

Direct link
