Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 5 |
Descriptor
Computer Networks | 5 |
Information Security | 5 |
Risk | 5 |
Computer Software | 3 |
Information Technology | 3 |
Computer Security | 2 |
Models | 2 |
Qualitative Research | 2 |
Universities | 2 |
Administrator Attitudes | 1 |
Case Studies | 1 |
More ▼ |
Author
Almohri, Hussain M. J. | 1 |
Bhunia, Swarup | 1 |
Campbell, Wendy | 1 |
Gendreau, Audrey | 1 |
Johnson, Kenneth T. | 1 |
Paul, Shubhra Deb | 1 |
Yang, Shuo | 1 |
Publication Type
Dissertations/Theses -… | 4 |
Journal Articles | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 1 |
Audience
Location
Florida | 1 |
Texas (Dallas) | 1 |
Utah | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Campbell, Wendy – ProQuest LLC, 2017
The speed and availability of Internet-capable devices, such as computers, smartphones, gaming consoles, TVs, and tablets have made it possible for our society to be connected, and stay connected to the Internet 24 hours a day. The Internet of Things (IoT) describes a new environment where common objects are uniquely identifiable and accessible…
Descriptors: Internet, Information Technology, Information Security, Universities
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Johnson, Kenneth T. – ProQuest LLC, 2017
Increased internal and external training approaches are elements senior leaders need to know before creating a training plan for security professionals to protect sensitive information. The purpose of this qualitative case study was to explore training strategies telecommunication industry leaders use to ensure security professionals can protect…
Descriptors: Information Security, Corporations, Telecommunications, Industry
Almohri, Hussain M. J. – ProQuest LLC, 2013
Despite the recent advances in systems and network security, attacks on large enterprise networks consistently impose serious challenges to maintaining data privacy and software service integrity. We identify two main problems that contribute to increasing the security risk in a networked environment: (i) vulnerable servers, workstations, and…
Descriptors: Computer Security, Information Security, Risk, Computer Networks
Gendreau, Audrey – ProQuest LLC, 2014
Efficient self-organizing virtual clusterheads that supervise data collection based on their wireless connectivity, risk, and overhead costs, are an important element of Wireless Sensor Networks (WSNs). This function is especially critical during deployment when system resources are allocated to a subsequent application. In the presented research,…
Descriptors: Computer Simulation, Computer Networks, Costs, Risk