Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Accountability | 3 |
| Computer Networks | 3 |
| Computer Security | 3 |
| Information Security | 3 |
| Correlation | 2 |
| Models | 2 |
| Audits (Verification) | 1 |
| Business | 1 |
| Community Programs | 1 |
| Costs | 1 |
| Crime | 1 |
| More ▼ | |
Source
| ProQuest LLC | 2 |
| Grantee Submission | 1 |
Publication Type
| Dissertations/Theses -… | 2 |
| Reports - Research | 1 |
Education Level
| Elementary Secondary Education | 1 |
| High Schools | 1 |
| Higher Education | 1 |
| Postsecondary Education | 1 |
| Secondary Education | 1 |
Audience
Location
| California | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
White, Jautau Kelton – ProQuest LLC, 2017
Current cybersecurity measures have become a major concern for commercial organizations in the United States. As the cyber-attack landscape expands and the skills and knowledge of the cyber-attacker become broader, the current measures that are taken and the laws structured around them are making it increasingly difficult for commercial…
Descriptors: Information Security, Computer Security, Computer Networks, Crime
Ibrahim, Sara – ProQuest LLC, 2017
The insider security threat causes new and dangerous dimensions in cloud computing. Those internal threats are originated from contractors or the business partners' input that have access to the systems. A study of trustworthiness and transparency might assist the organizations to monitor employees' activity more cautiously on cloud technologies…
Descriptors: Trust (Psychology), Accountability, Regression (Statistics), Computer Security
Wang, Jianjun – Grantee Submission, 2015
Over the past three years, California State University, Bakersfield received NSF funding to support hands-on explorations in "network security" and "cryptography" through Research Experience Vitalizing Science-University Program (REVS-UP). In addition to the summer bridge component, the grant included development of…
Descriptors: Technology, Computer Security, Crime Prevention, Computer Networks

Direct link
