Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 6 |
Descriptor
| Computer System Design | 6 |
| Identification | 6 |
| Information Technology | 6 |
| Internet | 4 |
| Computer Security | 3 |
| Computer Software | 2 |
| Higher Education | 2 |
| Information Security | 2 |
| Privacy | 2 |
| Risk | 2 |
| Social Networks | 2 |
| More ▼ | |
Author
| AL Faresi, Ahmed | 1 |
| Cobb, William E. | 1 |
| Doyle, Gerald S. | 1 |
| Grush, Mary | 1 |
| Shuliang, Ding | 1 |
| Shuqun, Yang | 1 |
| Zeltser, Lenny | 1 |
| Zhiqiang, Yao | 1 |
Publication Type
| Dissertations/Theses -… | 3 |
| Journal Articles | 3 |
| Reports - Descriptive | 2 |
| Reports - Evaluative | 1 |
Education Level
| Higher Education | 2 |
Audience
Location
| China | 1 |
Laws, Policies, & Programs
| Health Insurance Portability… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Cobb, William E. – ProQuest LLC, 2011
The information leakage of electronic devices, especially those used in cryptographic or other vital applications, represents a serious practical threat to secure systems. While physical implementation attacks have evolved rapidly over the last decade, relatively little work has been done to allow system designers to effectively counter the…
Descriptors: Identification, Program Effectiveness, Computer Security, Information Security
Zeltser, Lenny – Campus Technology, 2011
Too often, organizations make the mistake of treating malware infections as a series of independent occurrences. Each time a malicious program is discovered, IT simply cleans up or rebuilds the affected host, and then moves on with routine operational tasks. Yet, this approach doesn't allow the institution to keep up with the increasingly…
Descriptors: Computer Security, Computer Software, Workstations, Campuses
Doyle, Gerald S. – ProQuest LLC, 2010
Complex and expensive systems' development suffers from a lack of method for making good system-architecture-selection decisions early in the development process. Failure to make a good system-architecture-selection decision increases the risk that a development effort will not meet cost, performance and schedule goals. This research provides a…
Descriptors: Computer System Design, Architecture, Probability, Research Opportunities
AL Faresi, Ahmed – ProQuest LLC, 2011
Current research in health care lacks a systematic investigation to identify and classify various sources of threats to information privacy when sharing health data. Identifying and classifying such threats would enable the development of effective information security risk monitoring and management policies. In this research I put the first step…
Descriptors: Identification, Information Security, Compliance (Legal), Patients
Shuqun, Yang; Shuliang, Ding; Zhiqiang, Yao – International Journal of Distance Education Technologies, 2009
Cognitive diagnosis (CD) plays an important role in intelligent tutoring system. Computerized adaptive testing (CAT) is adaptive, fair, and efficient, which is suitable to large-scale examination. Traditional cognitive diagnostic test needs quite large number of items, the efficient and tailored CAT could be a remedy for it, so the CAT with…
Descriptors: Monte Carlo Methods, Distance Education, Adaptive Testing, Intelligent Tutoring Systems
Grush, Mary – Campus Technology, 2007
Ken Klingenstein has led national networking initiatives for the past 25 years. He served as director of computing and network services at the University of Colorado at Boulder from 1985-1999, and today, Klingenstein is director of middleware and security for Internet2. Truth is, this networking innovator has participated in the development of the…
Descriptors: Higher Education, Internet, Information Technology, Computer Interfaces

Direct link
Peer reviewed
