Descriptor
Computer Security | 1 |
Crime | 1 |
Crime Prevention | 1 |
Electronic Libraries | 1 |
Information Management | 1 |
Internet | 1 |
Source
Computers in Libraries | 1 |
Author
Huwe, Terence K. | 1 |
Publication Type
Journal Articles | 1 |
Reports - Descriptive | 1 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Huwe, Terence K. – Computers in Libraries, 2005
The author of this column describes several instances in which secure data on computers were compromised. In each of these instances, a different route was involved in gaining access to the secure data--one by office-based theft, one by hacking, and one by burglary. Is is proposed that the most difficult factor to guarantee in the protection of…
Descriptors: Internet, Computer Security, Electronic Libraries, Information Management