Publication Date
In 2025 | 0 |
Since 2024 | 3 |
Since 2021 (last 5 years) | 7 |
Since 2016 (last 10 years) | 13 |
Since 2006 (last 20 years) | 56 |
Descriptor
Computer Networks | 56 |
Information Technology | 56 |
Computer Security | 20 |
Telecommunications | 16 |
Internet | 12 |
Computer Software | 10 |
Computer System Design | 10 |
Information Security | 10 |
Models | 10 |
Information Systems | 8 |
Data Analysis | 6 |
More ▼ |
Source
ProQuest LLC | 56 |
Author
Publication Type
Dissertations/Theses -… | 56 |
Education Level
Higher Education | 8 |
Postsecondary Education | 5 |
Adult Education | 3 |
Elementary Secondary Education | 1 |
High School Equivalency… | 1 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Administrators | 1 |
Location
United States | 2 |
California | 1 |
Cameroon | 1 |
District of Columbia | 1 |
Ethiopia | 1 |
Florida | 1 |
Kansas | 1 |
New Jersey | 1 |
South Africa | 1 |
Texas | 1 |
Texas (Dallas) | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Peabody Individual… | 1 |
What Works Clearinghouse Rating
Herbert C. Peluzzo Jr. – ProQuest LLC, 2022
K-12 school districts are on the frontlines of cyber warfare, with many districts across America to become victims of phishing, social engineering, malware, and ransomware attacks. As a result, many districts have been forced to cease operations for extended periods of time, pay costly ransoms, and endure the embarrassment of having highly…
Descriptors: Elementary Secondary Education, Administrators, Teachers, Computer Security
Frank Xavier Gearhart – ProQuest LLC, 2024
Digital systems are pervasive in modern societies -- augmenting personal and commercial driving, detecting cancer, and exploiting transitory events in financial markets. Attacks on these systems are growing in number, sophistication, and impact. Current cyber defenses are proving inadequate against some of these attacks. Cyber defense tools that…
Descriptors: Artificial Intelligence, Information Security, Man Machine Systems, Natural Language Processing
Jorge J. Mendieta – ProQuest LLC, 2021
This qualitative descriptive study explored how full-time faculty of a California higher education institution described their experience with the Information Technology Services employees' commitment, communications, and quality of customer service when resolving classroom Wi-Fi issues. The study used the model of Total Quality Management (TQM)…
Descriptors: Information Technology, Higher Education, Technical Support, Teacher Attitudes
Rene Ekoteson – ProQuest LLC, 2024
Cyberattacks pose a significant threat to university institutions as universities increasingly rely on computer networks to conduct day-to-day business activities. University information technology (IT) leaders are concerned about the increasing level of cyberattacks because these attacks can result in the loss of sensitive data, identity theft,…
Descriptors: Prevention, Information Technology, Information Security, Computer Security
Chris Sanders – ProQuest LLC, 2021
Despite significant investment in cyber security, the industry is unable to stem the tide of damaging attacks against computer networks. This unfortunate situation is, in part, because cyber security exists in a state of cognitive crisis defined by tacit knowledge and poorly understood processes. At the heart of the crisis are digital forensic…
Descriptors: Cognitive Ability, Thinking Skills, Crime, Computer Security
Hari Prasad Challa – ProQuest LLC, 2024
The increasing complexity of modern power systems, coupled with the integration of diverse rapidly evolving technologies involving physical systems requiring cybersecurity, has presented significant challenges for engineers in the field and researchers in laboratory facilities. This research and dissertation presents the development of a…
Descriptors: Computer Security, Information Systems, Technology Integration, Information Technology
Solomon Mosisa Gofere – ProQuest LLC, 2023
This dissertation addresses three separate questions in human capital and development economics. In the first chapter, I study how college admission concerns drive students' field choices in a field-specific college admission system. To study this question, I leverage a college admission policy reform in Ethiopia that sharply increased the…
Descriptors: Human Capital, STEM Education, State Universities, College Admission
Younge, Andrew J. – ProQuest LLC, 2016
With the advent of virtualization and Infrastructure-as-a-Service (IaaS), the broader scientific computing community is considering the use of clouds for their scientific computing needs. This is due to the relative scalability, ease of use, advanced user environment customization abilities, and the many novel computing paradigms available for…
Descriptors: Computers, Computer Networks, Client Server Architecture, Information Technology
Campbell, Wendy – ProQuest LLC, 2017
The speed and availability of Internet-capable devices, such as computers, smartphones, gaming consoles, TVs, and tablets have made it possible for our society to be connected, and stay connected to the Internet 24 hours a day. The Internet of Things (IoT) describes a new environment where common objects are uniquely identifiable and accessible…
Descriptors: Internet, Information Technology, Information Security, Universities
Handorf, C. Russell – ProQuest LLC, 2016
This study analyzed the meta-data collected from a honeypot that was run by the Federal Bureau of Investigation for a period of 5 years. This analysis compared the use of existing industry methods and tools, such as Intrusion Detection System alerts, network traffic flow and system log traffic, within the Open Source Security Information Manager…
Descriptors: Information Technology, Computer Security, Information Security, Program Effectiveness
Chen, Haoming – ProQuest LLC, 2016
Video compression and communication has been an important field over the past decades and critical for many applications, e.g., video on demand, video-conferencing, and remote education. In many applications, providing low-delay and error-resilient video transmission and increasing the coding efficiency are two major challenges. Low-delay and…
Descriptors: Video Technology, Telecommunications, Information Technology, Coding
Ippoliti, Dennis – ProQuest LLC, 2014
Anomaly detection is a challenging problem that has been researched within a variety of application domains. In network intrusion detection, anomaly based techniques are particularly attractive because of their ability to identify previously unknown attacks without the need to be programmed with the specific signatures of every possible attack.…
Descriptors: Computer Security, Information Technology, Computer Networks, Identification
Dogan, Gulustan – ProQuest LLC, 2013
Trust can be an important component of wireless sensor networks for believability of the produced data and historical value is a crucial asset in deciding trust of the data. A node's trust can change over time after its initial deployment due to various reasons such as energy loss, environmental conditions or exhausting sources. Provenance can…
Descriptors: Computer Networks, Telecommunications, Credibility, Information Technology
Zhou, Shan – ProQuest LLC, 2013
The rapid advancement of wireless technology has instigated the broad deployment of wireless networks. Different types of networks have been developed, including wireless sensor networks, mobile ad hoc networks, wireless local area networks, and cellular networks. These networks have different structures and applications, and require different…
Descriptors: Computer Networks, Telecommunications, Information Technology, Mathematics
Nychis, George P. – ProQuest LLC, 2013
In the past two decades, we have seen an unprecedented rise in unlicensed wireless devices and applications of wireless technology. To meet various application constraints, we continually customize the radios and their protocols to the application domain which has led to significant diversity in spectrum use. Unfortunately, this diversity (coupled…
Descriptors: Computer Networks, Telecommunications, Radio, Information Technology