Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Access to Information | 2 |
Computer Security | 2 |
Information Management | 2 |
Information Transfer | 2 |
Classification | 1 |
Coding | 1 |
Computer Mediated… | 1 |
Computer Networks | 1 |
Computer Science | 1 |
Computer Science Education | 1 |
Computer Software Evaluation | 1 |
More ▼ |
Author
Amin, Rohan Mahesh | 1 |
Patel, Praj | 1 |
Publication Type
Dissertations/Theses -… | 1 |
Journal Articles | 1 |
Reports - Descriptive | 1 |
Education Level
Higher Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Patel, Praj – Information Management & Technology, 1997
Because they bring a large gain in productivity for a small investment in software, training, and overhead, organizations are embracing intranets: private World Wide Web sites that limit access to select groups by placing the Web behind a "firewall" or using the server's ability to provide security. Discusses intranets, document…
Descriptors: Access to Information, Computer Security, Cooperative Programs, Cost Effectiveness