Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Access to Information | 6 |
| Computer Networks | 6 |
| Computer Software Evaluation | 6 |
| Computer Security | 4 |
| Coding | 2 |
| Comparative Analysis | 2 |
| Computer Software | 2 |
| Computer System Design | 2 |
| Electronic Mail | 2 |
| Information Dissemination | 2 |
| Information Networks | 2 |
| More ▼ | |
Author
| Amin, Rohan Mahesh | 1 |
| Kesten, Philip R. | 1 |
| McCollum, Roy | 1 |
| McCulley, P. Michael | 1 |
| Snyder, Robin M. | 1 |
| Zhao, Jensen | 1 |
| Zhao, Sherry Y. | 1 |
Publication Type
| Reports - Descriptive | 3 |
| Speeches/Meeting Papers | 3 |
| Journal Articles | 2 |
| Book/Product Reviews | 1 |
| Dissertations/Theses -… | 1 |
| Guides - Non-Classroom | 1 |
| Reports - Research | 1 |
Education Level
| Higher Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Zhao, Jensen; Zhao, Sherry Y. – Journal of Education for Business, 2015
While the growing popularity of social media has brought many benefits to society, it has also resulted in privacy and security threats. The authors assessed the security and vulnerability of 50 social media sites. The findings indicate that most sites (a) posted privacy and security policies but only a minority stated clearly their execution of…
Descriptors: Social Media, Information Security, Information Policy, Privacy
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
McCulley, P. Michael – Online, 1995
Examines The Internet Adapter (TIA), an Internet protocol that allows computers to be directly on the Internet and access graphics over standard telephone lines using high-speed modems. Compares TIA's system requirements, performance, and costs to other Internet connections. Sidebars describe connections other than TIA and how to find information…
Descriptors: Access to Information, Comparative Analysis, Computer Graphics, Computer Networks
Snyder, Robin M. – 1995
This paper focuses on practical and cost-effective NetWare-specific approaches to information systems and computer security. A series of real world experiences is presented that illustrate fundamental information systems and security concepts. A NetWare network is a client-server network which uses a file server to share files while client…
Descriptors: Access to Information, Computer Networks, Computer Security, Computer Software Evaluation
McCollum, Roy – 1995
With today's growth in the use of electronic information systems for e-mail, data development and research, and the relative ease of access to such resources, protecting one's data and correspondence has become a great concern. "Pretty Good Privacy" (PGP), an encryption program developed by Phil Zimmermann, may be the software tool that…
Descriptors: Access to Information, Coding, Computer Networks, Computer Security
Kesten, Philip R. – 1997
ERes, an electronic reserve system, allows faculty and staff to make documents available on the World Wide Web without requiring any technical skills. The system was developed at Santa Clara University (California). This paper provides an overview of ERes and includes: technical information; the user interface for entering and viewing documents;…
Descriptors: Access to Information, Computer Networks, Computer Software, Computer Software Evaluation

Peer reviewed
Direct link
