NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 2 results Save | Export
Jackie Christopher Scott – ProQuest LLC, 2023
Although there have been numerous technological advancements in the last several years, there continues to be a real threat as it pertains to social engineering, especially phishing, spear-phishing, and Business Email Compromise (BEC). While the technologies to protect corporate employees and network borders have gotten better, there are still…
Descriptors: Information Security, Computer Mediated Communication, Electronic Mail, Computer Science Education
Peer reviewed Peer reviewed
Davenport, Elisabeth; McKim, Geoffrey – Annual Review of Information Science and Technology (ARIST), 1995
Focuses on computer systems that support groups who complete tasks together despite separations in space, time, or variations in team size. Reviews the literature on the history of the technology, application packages, case histories, and current research, and includes a synopsis of activity in academic and commercial institutions. Contains 217…
Descriptors: Business Communication, Computer Mediated Communication, Computer Networks, Computer Software