NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 9 results Save | Export
Washington, Mark Allen – ProQuest LLC, 2023
The need to protect confidential data stored in university enterprise information systems and to prevent infiltration through phishing cyber attacks by malicious individuals and organizations has emerged. The unfortunate target of phishing attacks is university employees and students with access to confidential information. This research specifies…
Descriptors: Systems Approach, Information Security, Computer Security, Confidentiality
Cheek, Gorrell P. – ProQuest LLC, 2013
Internet use, in general, and online social networking sites, in particular, are experiencing tremendous growth with hundreds of millions of active users. As a result, there is a tremendous amount of privacy information and content online. Protecting this information is a challenge. Access control policy composition is complex, laborious and…
Descriptors: Computer Security, Information Security, Access to Information, Users (Information)
Aburto, Rafael – ProQuest LLC, 2014
This qualitative study examined efforts by the military organizations and federal agencies to improve information sharing, interoperability, and systems integration in all business practices. More specifically, a survey instrument with six open-ended and eight demographic questions was used to measure the perceived progress, issues, challenges of…
Descriptors: Qualitative Research, Shared Resources and Services, Access to Information, Agency Cooperation
Pagano, Matthew Wallach – ProQuest LLC, 2013
The conversion of paper-based medical records into electronic formats is set to bring many benefits to healthcare. This includes creating a more seamless exchange of electronic health records (EHRs) between providers, improving healthcare while lowering its costs, and providing patients with increased access to their EHRs. As more medical…
Descriptors: Patients, Health Services, Information Technology, Information Security
Sibai, Faisal M. – ProQuest LLC, 2012
There has been a constant growing security concern with insider attacks on network accessible computer systems. Users with power credentials can do almost anything they want with the systems they own with very little control or oversight. Most breaches occurring nowadays by power users are considered legitimate access and not necessarily…
Descriptors: Computer Security, Power Structure, Information Technology, Computer Networks
Srinivasan, Satish Mahadevan – ProQuest LLC, 2010
Data Aggregation (DA) is a set of functions that provide components of a distributed system access to global information for purposes of network management and user services. With the diverse new capabilities that networks can provide, applicability of DA is growing. DA is useful in dealing with multi-value domain information and often requires…
Descriptors: Data, Computer Networks, Computer Security, Access to Information
Price, Alan – ProQuest LLC, 2011
Today, advances in wireless sensor networks are making it possible to capture large amounts of information about a person and their interaction within their home environment. However, what is missing is how to ensure the security of the collected data and its use to alter human behavior for positive benefit. In this research, exploration was…
Descriptors: Physical Activities, Measurement Techniques, Physical Activity Level, Behavior Modification
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Anderson, Catherine L. – ProQuest LLC, 2010
Today's interconnected technical environment creates unprecedented opportunities while simultaneously introducing risks. With economic, social and personal interactions increasingly occurring in technology-mediated settings new vulnerabilities are continually being introduced. This dissertation seeks to improve extant understanding of how…
Descriptors: Cues, Health Education, Hospitals, Health Conditions