Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 1 |
Descriptor
| Computer Security | 2 |
| Emergency Programs | 2 |
| Information Systems | 2 |
| Online Systems | 2 |
| Case Method (Teaching… | 1 |
| Corporations | 1 |
| Crime Prevention | 1 |
| Database Management Systems | 1 |
| Information Science Education | 1 |
| Information Security | 1 |
| Libraries | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 2 |
| Reports - Descriptive | 1 |
| Reports - Research | 1 |
Education Level
| Higher Education | 1 |
Audience
| Media Staff | 1 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Plachkinova, Miloslava; Maurer, Chris – Journal of Information Systems Education, 2018
This case study follows the security breach that affected Target at the end of 2013 and resulted in the loss of financial data for over 70 million customers. The case provides an overview of the company and describes the reasons that led to one of the biggest security breaches in history. It offers a discussion on Target's vendor management…
Descriptors: Information Security, Information Systems, Case Method (Teaching Technique), Online Vendors
Balas, Janet L. – Computers in Libraries, 2006
It is easy for a library systems administrator to sometimes feel quite overwhelmed by the responsibilities of the job. Keeping a network running smoothly is a challenge in itself, but they must also be concerned with protecting the network from the many threats that exist. Constant vigilance is necessary to guard against electronic attacks…
Descriptors: Computer Security, Emergency Programs, Libraries, Information Systems

Peer reviewed
Direct link
