Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Security | 6 |
Information Technology | 6 |
Terrorism | 6 |
Crime | 3 |
Internet | 3 |
Community Colleges | 2 |
Crime Prevention | 2 |
Safety | 2 |
Two Year Colleges | 2 |
Biology | 1 |
Clinical Diagnosis | 1 |
More ▼ |
Source
Community College Journal | 2 |
Association of Small Computer… | 1 |
Information Systems Education… | 1 |
Journal of Learning and… | 1 |
ProQuest LLC | 1 |
Author
Conley-Ware, Lakita D. | 1 |
Gamble, Cheryl | 1 |
Hovis, R. Corby | 1 |
Kuru, Hüseyin | 1 |
Peslak, Alan R. | 1 |
Smith, Carol L., Ed. | 1 |
Smith, Peter, Ed. | 1 |
Teles, Elizabeth J. | 1 |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 4 |
Collected Works - Proceedings | 1 |
Dissertations/Theses -… | 1 |
Education Level
Higher Education | 2 |
Elementary Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Pennsylvania | 1 |
South Carolina | 1 |
Laws, Policies, & Programs
Digital Millennium Copyright… | 1 |
First Amendment | 1 |
Health Insurance Portability… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Kuru, Hüseyin – Journal of Learning and Teaching in Digital Age, 2023
After the Cold War period, with the restructuring of the world, globalization, the revolution in information technology and the reconstruction of capitalism have created a new type of society, the "network society". The dependence of countries on information technologies, especially the internet, has increased day by day, and it has…
Descriptors: Terrorism, Information Technology, Facilities, Nuclear Energy
Conley-Ware, Lakita D. – ProQuest LLC, 2010
This research addresses a real world cyberspace problem, where currently no cross industry standard methodology exists. The goal is to develop a model for identification and detection of vulnerabilities and threats of cyber-crime or cyber-terrorism where cyber-technology is the vehicle to commit the criminal or terrorist act (CVCT). This goal was…
Descriptors: Crime, Terrorism, Identification, Computer Security
Peslak, Alan R. – Information Systems Education Journal, 2010
One of the most important topics for today's information technology professional is the study of legal and regulatory issues as they relate to privacy and security of personal and business data and identification. This manuscript describes the topics and approach taken by the instructors that focuses on independent research of source documents and…
Descriptors: Privacy, Information Security, Computer Security, Electronic Publishing
Gamble, Cheryl – Community College Journal, 2002
Explains the technology of biometrics, the science of identifying a person by unique physical characteristics, and its application in the fight against terrorism. Argues that biometrics, such as hand readers, fingerprint readers, and eye scans, are reliable and efficient. Also describes proximity cards, digital tracking systems, and smart cards.…
Descriptors: Biology, Community Colleges, Computer Security, Crime
Teles, Elizabeth J.; Hovis, R. Corby – Community College Journal, 2002
Describes recent federal legislation (H.R. 3394) that charges the National Science Foundation with offering more grants to colleges and universities for degree programs in computer and network security, and to establish trainee programs for graduate students who pursue doctoral degrees in computer and network security. Discusses aspects of…
Descriptors: College Role, Community Colleges, Computer Security, Crime
Smith, Peter, Ed.; Smith, Carol L., Ed. – Association of Small Computer Users in Education (ASCUE), 2004
This 2004 Association of Small Computer Users in Education (ASCUE) conference proceedings presented the theme "Leading Strategic & Cultural Change through Technology." The conference introduced its ASCUE Officers and Directors, and provides abstracts of the pre-conference workshops. The full-text conference papers in this document…
Descriptors: Small Colleges, Computers, Student Surveys, Interaction