Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 6 |
Descriptor
Computer Networks | 6 |
Information Technology | 6 |
Statistical Analysis | 6 |
Comparative Analysis | 3 |
Computer Security | 3 |
Computer Science | 2 |
Data Analysis | 2 |
Foreign Countries | 2 |
Metadata | 2 |
Predictor Variables | 2 |
Program Effectiveness | 2 |
More ▼ |
Author
Publication Type
Dissertations/Theses -… | 3 |
Journal Articles | 3 |
Reports - Research | 2 |
Reports - Evaluative | 1 |
Tests/Questionnaires | 1 |
Education Level
Elementary Education | 1 |
Higher Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Handorf, C. Russell – ProQuest LLC, 2016
This study analyzed the meta-data collected from a honeypot that was run by the Federal Bureau of Investigation for a period of 5 years. This analysis compared the use of existing industry methods and tools, such as Intrusion Detection System alerts, network traffic flow and system log traffic, within the Open Source Security Information Manager…
Descriptors: Information Technology, Computer Security, Information Security, Program Effectiveness
Lederer, Karen – ProQuest LLC, 2012
The purpose of this quantitative study was to investigate six factors that may influence adoption of virtual private network (VPN) technologies in small businesses with fewer than 100 employees. Prior research indicated small businesses employing fewer than 100 workers do not adopt VPN technology at the same rate as larger competitors, and the…
Descriptors: Small Businesses, Technology Integration, Computer Networks, Information Technology
Sivakumar, Paramasivan Sethuraman; Parasar, Bibudha; Das, Raghu Nath; Anantharaman, Mathevanpillai – Journal of Agricultural Education and Extension, 2014
Purpose: Information technology (IT) has tremendous potential for fostering grassroots development and the Indian government has created various capital-intensive computer networks to promote agricultural development. However, research studies have shown that information technology investments are not always translated into productivity gains due…
Descriptors: Foreign Countries, Information Technology, Computer Networks, Agriculture
Allaire, Stéphane; Thériault, Pascale; Gagnon, Vincent; Lalancette, Evelyne – Canadian Journal of Learning and Technology, 2013
This study documents to what extent writing on a blog in a networked learning environment could influence the affective variables of elementary-school students' writing. The framework is grounded more specifically in theory of self-determination (Deci & Ryan, 1985), relationship to writing (Chartrand & Prince, 2009) and the transactional…
Descriptors: Foreign Countries, Elementary School Students, Web Sites, Electronic Publishing
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Rice, George; Bowman, Michael – Journal of Information Technology Education, 2007
Children in the back seat on a long trip are not the only ones asking the question "Are we there yet?" At Murray State University (MSU) and other universities starting new programs, the question becomes one of validation of the program. In the late 90s, MSU, a midsize university, was entrusted with the responsibility of developing a program of…
Descriptors: Information Systems, Computers, Information Technology, Computer Science