Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 2 |
Descriptor
Databases | 6 |
Vandalism | 6 |
Computer Security | 3 |
Academic Libraries | 2 |
Crime | 2 |
Crime Prevention | 2 |
Higher Education | 2 |
Information Systems | 2 |
Library Collections | 2 |
Library Research | 2 |
Optical Data Disks | 2 |
More ▼ |
Author
Barthur, Ashrith | 1 |
Cardinali, Richard | 1 |
Constantinou, Constantia | 1 |
Hammond, Carol, Ed. | 1 |
Jabbour, Ghassan | 1 |
Publication Type
Journal Articles | 3 |
Dissertations/Theses -… | 2 |
Reports - Descriptive | 2 |
Collected Works - Proceedings | 1 |
Reports - Research | 1 |
Tests/Questionnaires | 1 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Barthur, Ashrith – ProQuest LLC, 2016
There are two essential goals of this research. The first goal is to design and construct a computational environment that is used for studying large and complex datasets in the cybersecurity domain. The second goal is to analyse the Spamhaus blacklist query dataset which includes uncovering the properties of blacklisted hosts and understanding…
Descriptors: Computer Security, Information Security, Data Collection, Internet
Jabbour, Ghassan – ProQuest LLC, 2010
The increasing proliferation of globally interconnected complex information systems has elevated the magnitude of attacks and the level of damage that they inflict on such systems. This open environment of intertwined financial, medical, defense, and other systems has attracted hackers to increase their malicious activities to cause harm or to…
Descriptors: Computer Software, Information Systems, Computers, Databases
American Libraries, 1983
Presents responses of five major bibliographic facilities--Library of Congress MARC program, Online Computer Library Center (OCLC), Research Libraries Information Network (RLIN), Washington Library Network (WLN), and University of Toronto Library Automated System (UTLAS)--to a set of fictional situations involving computer crime and security. (EJS)
Descriptors: Crime, Crime Prevention, Databases, Emergency Programs

Cardinali, Richard – Journal of Educational Media and Library Sciences, 1995
Discusses issues of database security and integrity, including computer crime and vandalism, human error, computer viruses, employee and user access, and personnel policies. Suggests some precautions to minimize system vulnerability such as careful personnel screening, audit systems, passwords, and building and software security systems. (JKP)
Descriptors: Computer Security, Crime Prevention, Databases, Information Systems

Constantinou, Constantia – College & Research Libraries, 1995
A study of 1264 incidents of journal mutilation at New York University indicates no relationship between the availability of indexing and abstracting services on CD-ROM databases and mutilation. Recommends posting warnings; raising awareness; providing adequate photocopiers, change, and vendor card machines; announcing closing time; encouraging…
Descriptors: Abstracts, Academic Libraries, Databases, Guidelines

Hammond, Carol, Ed. – 1991
The six papers in this collection address as many different topics. In "Circulation Desk Staff Amiability and Patron Satisfaction," Laureen Cardon and Nathan M. Smith describe a study at Brigham Young University which demonstrated that interpersonal relations training for circulation desk staff could improve patron satisfaction. Anna L.…
Descriptors: Academic Libraries, Course Integrated Library Instruction, Databases, Government Publications