Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 6 |
Descriptor
Computer Security | 7 |
Information Technology | 7 |
Integrity | 7 |
Confidentiality | 6 |
Information Management | 3 |
Internet | 3 |
Computers | 2 |
Higher Education | 2 |
Information Systems | 2 |
Access to Information | 1 |
Accountability | 1 |
More ▼ |
Author
Fink, Russell A. | 1 |
Hawkins, Brian L. | 1 |
Hinojosa, Patrick | 1 |
Jokela, Paivi | 1 |
Karlsudd, Peter | 1 |
Murray, Meg Coffin | 1 |
Mussa, Constance C. | 1 |
Oblinger, Diana G. | 1 |
Qleibo, Haider W. | 1 |
Publication Type
Journal Articles | 4 |
Dissertations/Theses -… | 3 |
Reports - Descriptive | 2 |
Opinion Papers | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 3 |
Audience
Location
Sweden | 1 |
Laws, Policies, & Programs
Health Insurance Portability… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Fink, Russell A. – ProQuest LLC, 2010
"End-to-End (E2E)" voting systems provide cryptographic proof that the voter's intention is captured, cast, and tallied correctly. While E2E systems guarantee integrity independent of software, most E2E systems rely on software to provide confidentiality, availability, authentication, and access control; thus, end-to-end integrity is not…
Descriptors: Voting, Confidentiality, Integrity, Computer Software
Mussa, Constance C. – ProQuest LLC, 2011
In recent years, many health care organizations have begun to take advantage of computerized information systems to facilitate more effective and efficient management and processing of information. However, commensurate with the vastly innovative enhancements that computer technology has contributed to traditional paper-based health care…
Descriptors: Information Management, Health Insurance, Confidentiality, Intention
Qleibo, Haider W. – ProQuest LLC, 2009
WSNs are susceptible to a variety of attacks. These attacks vary in the way they are performed and executed; they include but not limited to node capture, physical tampering, denial of service, and message alteration. It is of paramount importance to protect gathered data by WSNs and defend the network against illegal access and malicious…
Descriptors: Confidentiality, Integrity, Computer Security, Internet
Murray, Meg Coffin – Journal of Information Technology Education, 2010
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of…
Descriptors: Information Technology, Database Design, Confidentiality, Compliance (Legal)
Jokela, Paivi; Karlsudd, Peter – Journal of Information Technology Education, 2007
The current higher education, both distance education and traditional campus courses, relies more and more on modern information and communication technologies (ICT). The use of computer systems and networks results in a wide range of security issues that must be dealt with in order to create a safe learning environment. In this work, we study the…
Descriptors: Higher Education, Plagiarism, Distance Education, Confidentiality
Oblinger, Diana G.; Hawkins, Brian L. – EDUCAUSE Review, 2006
Seeing an institution's name in the headlines for a security breach may be among a CIO's-- and a president's--worst nightmares. Whether the breached data involves social security numbers, credit card accounts, clinical records, or research, this is bad news. Federal agencies that provide research funding may lose confidence in data integrity,…
Descriptors: Information Technology, Computer Security, Integrity, Risk Management

Hinojosa, Patrick – T.H.E. Journal, 2005
Information security management consists of identifying an organization's electronic informational assets, as well as the planning and programs that must be carried out to ensure its continued availability, confidentiality and integrity. Whether the organization is a commercial enterprise, governmental agency or educational institution, these…
Descriptors: Confidentiality, Integrity, Computer Security, Information Technology