Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 4 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 5 |
Descriptor
Computer Security | 5 |
Computer Software | 5 |
Universities | 5 |
Information Security | 4 |
Information Technology | 3 |
Computers | 2 |
Delivery Systems | 2 |
Information Management | 2 |
Information Storage | 2 |
Internet | 2 |
Users (Information) | 2 |
More ▼ |
Author
Bhunia, Swarup | 1 |
Isaac Atta Junior Ampofo | 1 |
Isaac Atta Senior Ampofo | 1 |
James Edwin Tippey Jr. | 1 |
Panettieri, Joseph C. | 1 |
Paul, Shubhra Deb | 1 |
Washington, Mark Allen | 1 |
Yang, Shuo | 1 |
Publication Type
Journal Articles | 3 |
Dissertations/Theses -… | 2 |
Information Analyses | 1 |
Reports - Descriptive | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 5 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Washington, Mark Allen – ProQuest LLC, 2023
The need to protect confidential data stored in university enterprise information systems and to prevent infiltration through phishing cyber attacks by malicious individuals and organizations has emerged. The unfortunate target of phishing attacks is university employees and students with access to confidential information. This research specifies…
Descriptors: Systems Approach, Information Security, Computer Security, Confidentiality
Isaac Atta Senior Ampofo; Isaac Atta Junior Ampofo – Journal of Research Initiatives, 2023
The most efficient approach to giving large numbers of students' access to computational resources is through a data center. A contemporary method for building the data center's computer infrastructure is the software-defined model, which enables user tasks to be processed in a reasonable amount of time and at a reasonable cost. The researcher…
Descriptors: Educational Trends, Educational Facilities Design, Access to Computers, Computer Centers
James Edwin Tippey Jr. – ProQuest LLC, 2021
This study explored the training needs of small colleges and universities to adopt cloud computing securely. The purpose of this qualitative phenomenological study was to determine what training would allow the small colleges and universities to deploy cloud computing solutions securely. The research interviewed 10 IT leaders from small colleges…
Descriptors: Small Colleges, Universities, Computer Security, Information Security
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Panettieri, Joseph C. – Campus Technology, 2006
Simplifying and securing an IT infrastructure is not easy. It frequently requires rethinking years of hardware and software investments, and a gradual migration to modern systems. Even so, writes the author, universities can take six practical steps to success: (1) Audit software infrastructure; (2) Evaluate current applications; (3) Centralize…
Descriptors: Information Technology, Universities, Audits (Verification), Computer Software