Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 9 |
Descriptor
Access to Information | 9 |
Computer Networks | 9 |
Telecommunications | 4 |
Computer Security | 3 |
Information Technology | 3 |
Internet | 3 |
Coding | 2 |
Computer System Design | 2 |
Data | 2 |
Information Security | 2 |
Models | 2 |
More ▼ |
Source
ProQuest LLC | 9 |
Author
Amin, Rohan Mahesh | 1 |
Arnold, Bradley A. | 1 |
Chetty, Marshini | 1 |
Le, Meixing | 1 |
Sawyer, Thomas Scott | 1 |
Sibai, Faisal M. | 1 |
Srinivasan, Satish Mahadevan | 1 |
Van Epps, Daniel L. | 1 |
Vigil-Hayes, Morgan Ashlee | 1 |
Publication Type
Dissertations/Theses -… | 9 |
Education Level
Higher Education | 2 |
Middle Schools | 1 |
Postsecondary Education | 1 |
Audience
Location
South Africa | 1 |
Tennessee | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Le, Meixing – ProQuest LLC, 2013
In this dissertation, we discuss the problem of enabling cooperative query execution in a multi-cloud environment where the data is owned and managed by multiple enterprises. Each enterprise maintains its own relational database using a private cloud. In order to implement desired business services, parties need to share selected portion of their…
Descriptors: Data, Access to Information, Computer Networks, Internet
Arnold, Bradley A. – ProQuest LLC, 2018
The purpose of this qualitative case study was to develop descriptions of how teenage students remain engaged in learning while using mobile technology. Developments in technology have expanded learning contexts and provided learners with improved capacities to connect with others to exchange, gain, and construct knowledge. Developments in…
Descriptors: Middle School Students, Telecommunications, Learning Activities, Qualitative Research
Van Epps, Daniel L. – ProQuest LLC, 2013
Expanded telecommunications was deemed a serious need for end users. The "Local Market" and "Last Mile" market segments have largely consolidated into "natural utilities". Competition and access problems occur if new providers enter the local market and desire competitive access and service to end users. Local and…
Descriptors: Telecommunications, Competition, Barriers, Laboratories
Vigil-Hayes, Morgan Ashlee – ProQuest LLC, 2017
The Internet as a networked system has been rendered more complex than ever before as human endpoints are grafted into the system via increasingly pervasive and personalized networked devices. According to the United Nations, the Internet is a transnational enabler of a number of human rights, and as such, access to the Internet has been…
Descriptors: Internet, Computer Networks, Social Networks, Access to Information
Sawyer, Thomas Scott – ProQuest LLC, 2013
The purpose of this study was to determine the availability of Internet access for students attending East Tennessee State University during the fall semester 2013. It has been unknown to what degree broadband access is available in the East Tennessee State University service area that includes counties in East Tennessee, Southwest Virginia, and…
Descriptors: Internet, College Students, Access to Information, Access to Computers
Sibai, Faisal M. – ProQuest LLC, 2012
There has been a constant growing security concern with insider attacks on network accessible computer systems. Users with power credentials can do almost anything they want with the systems they own with very little control or oversight. Most breaches occurring nowadays by power users are considered legitimate access and not necessarily…
Descriptors: Computer Security, Power Structure, Information Technology, Computer Networks
Srinivasan, Satish Mahadevan – ProQuest LLC, 2010
Data Aggregation (DA) is a set of functions that provide components of a distributed system access to global information for purposes of network management and user services. With the diverse new capabilities that networks can provide, applicability of DA is growing. DA is useful in dealing with multi-value domain information and often requires…
Descriptors: Data, Computer Networks, Computer Security, Access to Information
Chetty, Marshini – ProQuest LLC, 2011
Technological infrastructure is often taken for granted in our day to day lives until it breaks down, usually because it invisibly supports tasks otherwise. Previous work in HCI has focused on how people react and deal with breaks in infrastructure as well as how to help people to fix or exploit these breaks. However, few have sought to understand…
Descriptors: Computer Networks, Physical Environment, Family Environment, Computer System Design
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis