Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 5 |
Descriptor
Computer Security | 6 |
Computer Software | 6 |
Confidentiality | 6 |
Prevention | 3 |
Access to Information | 2 |
Computer Networks | 2 |
Information Technology | 2 |
Internet | 2 |
Access to Computers | 1 |
Business | 1 |
Censorship | 1 |
More ▼ |
Source
ProQuest LLC | 2 |
Chronicle of Higher Education | 1 |
Computers in Libraries | 1 |
Journal of Cybersecurity… | 1 |
Journal of School Nursing | 1 |
Author
Bergren, Martha Dewey | 1 |
Cesarini, Paul | 1 |
Fink, Russell A. | 1 |
Mackelprang, Scott | 1 |
Sendze, Monique | 1 |
Washington, Mark Allen | 1 |
Witman, Paul D. | 1 |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 3 |
Dissertations/Theses -… | 2 |
Reports - Research | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Kansas | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Washington, Mark Allen – ProQuest LLC, 2023
The need to protect confidential data stored in university enterprise information systems and to prevent infiltration through phishing cyber attacks by malicious individuals and organizations has emerged. The unfortunate target of phishing attacks is university employees and students with access to confidential information. This research specifies…
Descriptors: Systems Approach, Information Security, Computer Security, Confidentiality
Witman, Paul D.; Mackelprang, Scott – Journal of Cybersecurity Education, Research and Practice, 2022
In mid-July 2020, the social media site Twitter had over 100 of its most prominent user accounts start to tweet requests to send Bitcoin to specified Bitcoin wallets. The requests promised that the Bitcoin senders would receive their money back doubled, as a gesture of charity amidst the COVID-19 pandemic. The attack appears to have been carried…
Descriptors: Social Media, Computer Security, Crime Prevention, Computer Software
Fink, Russell A. – ProQuest LLC, 2010
"End-to-End (E2E)" voting systems provide cryptographic proof that the voter's intention is captured, cast, and tallied correctly. While E2E systems guarantee integrity independent of software, most E2E systems rely on software to provide confidentiality, availability, authentication, and access control; thus, end-to-end integrity is not…
Descriptors: Voting, Confidentiality, Integrity, Computer Software
Cesarini, Paul – Chronicle of Higher Education, 2007
This article describes The Onion Router (TOR). It is a freely available, open-source program developed by the U.S. Navy about a decade ago. A browser plug-in, it thwarts online traffic analysis and related forms of Internet surveillance by sending your data packets through different routers around the world. As each packet moves from one router to…
Descriptors: Internet, Computer Software, Computer Security, Confidentiality
Bergren, Martha Dewey – Journal of School Nursing, 2004
School nurses access an enormous amount of information through the Internet. Although most avid computer users are savvy to the threat of viruses to the integrity of data, many who surf the Web do not know that their data and the functioning of their computer is at risk to another hidden threat--spyware. This article will describe spyware, why it…
Descriptors: School Nurses, Confidentiality, Risk, Computer Software
Sendze, Monique – Computers in Libraries, 2006
Securing public access workstations should be a significant part of any library's network and information-security strategy because of the sensitive information patrons enter on these workstations. As the IT manager for the Johnson County Library in Kansas City, Kan., this author is challenged to make sure that thousands of patrons get the access…
Descriptors: Workstations, Public Libraries, Library Services, Library Role