Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Access to Information | 3 |
Computer Security | 3 |
Terrorism | 3 |
Federal Government | 2 |
Information Dissemination | 2 |
Public Agencies | 2 |
Agency Cooperation | 1 |
Barriers | 1 |
Censorship | 1 |
Computer Science | 1 |
Computer Science Education | 1 |
More ▼ |
Publication Type
Journal Articles | 2 |
Dissertations/Theses -… | 1 |
Reports - Descriptive | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 1 |
Audience
Location
District of Columbia | 1 |
Maryland | 1 |
Massachusetts | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Aburto, Rafael – ProQuest LLC, 2014
This qualitative study examined efforts by the military organizations and federal agencies to improve information sharing, interoperability, and systems integration in all business practices. More specifically, a survey instrument with six open-ended and eight demographic questions was used to measure the perceived progress, issues, challenges of…
Descriptors: Qualitative Research, Shared Resources and Services, Access to Information, Agency Cooperation
Basken, Paul – Chronicle of Higher Education, 2012
For some colleges and professors, classified research promises prestige and money. Powerhouses like the Massachusetts Institute of Technology and the Johns Hopkins University have for decades run large classified laboratories. But most other universities either do not allow such research or conduct it quietly, and in small doses. The…
Descriptors: Higher Education, Research, Access to Information, Barriers
Prichard, Janet J.; MacDonald, Laurie E. – Journal of Information Technology Education, 2004
On September 11th, 2001 the United States experienced the largest terrorist attack in its history. This event caused many government agencies to review their security practices and procedures. It also has raised awareness of other avenues that terrorists might pursue to achieve their goals, including cyber terrorism. Cyber terrorism can be…
Descriptors: Terrorism, Textbooks, Computer Security, Public Agencies