NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 811 to 825 of 1,593 results Save | Export
Hall, Jacqueline Huynh – ProQuest LLC, 2011
In today's modern business world, most organizations use information as a critical business asset to gain competitive advantage and create market value. Increasingly, an organization's ability to protect information assets plays a critical role in its ability to meet regulatory compliance requirements, increase customer trust, preserve brand…
Descriptors: Organizations (Groups), Institutional Characteristics, Information Technology, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Romanosky, Sasha; Telang, Rahul; Acquisti, Alessandro – Journal of Policy Analysis and Management, 2011
In the United States, identity theft resulted in corporate and consumer losses of $56 billion dollars in 2005, with up to 35 percent of known identity thefts caused by corporate data breaches. Many states have responded by adopting data breach disclosure laws that require firms to notify consumers if their personal information has been lost or…
Descriptors: Identification (Psychology), Access to Information, Deception, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Corn, Michael; Rosenthal, Jane – EDUCAUSE Review, 2013
Where does privacy belong in the college/university ecosystem, and what should its relationship be with security and compliance? Are the three areas best kept separate and distinct? Should there be some overlap? Or would a single office, officer, and/or reporting line enable a big picture of the whole? This article examines several of the campus…
Descriptors: Privacy, Compliance (Legal), Campuses, Strategic Planning
Peer reviewed Peer reviewed
Direct linkDirect link
Korkmaz, Murat; Esen, Binnaz Kiran – Education, 2013
The aim of this study is to design and evaluate a peer-training program about changing students' internet use habits. This study was conducted with students from two different elementary schools in Mersin, Turkey, who were enrolled in 7th or 8th grade in the 2009-2010 academic year. A total of 24 students participated in the program, 12 of whom…
Descriptors: Peer Teaching, Elementary School Students, Foreign Countries, Experimental Colleges
Villegas, Rafael – ProQuest LLC, 2010
Remediating all vulnerabilities on computer systems in a timely and cost effective manner is difficult given that the window of time between the announcement of a new vulnerability and an automated attack has decreased. Hence, organizations need to prioritize the vulnerability remediation process on their computer systems. The goal of this…
Descriptors: Computer Security, Scoring, Risk Management, Measurement Techniques
Manzo, Kathleen Kennedy – Education Week, 2010
In its role helping the nation's schools connect to the Internet and other telecommunications services, the "E-rate" has been among the most consistent of federal programs. Funding for the "education rate" program has held at about $2.25 billion a year since it was created under the Telecommunications Act of 1996, and it covers…
Descriptors: Telecommunications, Educational Technology, Internet, Federal Legislation
Gupta, Manish – ProQuest LLC, 2011
Increasing complexity and sophistication of ever evolving information technologies has spurred unique and unprecedented challenges for organizations to protect their information assets. Companies suffer significant financial and reputational damage due to ineffective information technology security management, which has extensively been shown to…
Descriptors: Information Technology, Computer Security, Organizations (Groups), Global Approach
Vyas, Avinash – ProQuest LLC, 2011
Sender anonymity in Location-based services (LBS) refers to hiding the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. "find the nearest gas station etc."). The goal is to keep the requester's interest private even from attackers who (via hacking or subpoenas) gain access to the LBS…
Descriptors: Computers, Navigation, Experiments, Comparative Analysis
Nunnery, Christopher Edward – ProQuest LLC, 2011
Botnets remain a potent threat due to evolving modern architectures, inadequate remediation methods, and inaccurate measurement techniques. In response, this research exposes the architectures and operations of two advanced botnets, techniques to enumerate infected hosts, and pursues the scientific refinement of infected-host enumeration data by…
Descriptors: Measurement Techniques, Computer Science, Computer Security, Information Technology
Warfield, Douglas L. – ProQuest LLC, 2011
The evolution of information technology has included new methodologies that use information technology to control and manage various industries and government activities. Information Technology has also evolved as its own industry with global networks of interconnectivity, such as the Internet, and frameworks, models, and methodologies to control…
Descriptors: Information Technology, Industry, Computer Security, Governance
Cobb, William E. – ProQuest LLC, 2011
The information leakage of electronic devices, especially those used in cryptographic or other vital applications, represents a serious practical threat to secure systems. While physical implementation attacks have evolved rapidly over the last decade, relatively little work has been done to allow system designers to effectively counter the…
Descriptors: Identification, Program Effectiveness, Computer Security, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Wang, Jianjun – Grantee Submission, 2014
"Models for Information Assurance Education and Outreach" (MIAEO) is an NSF-funded, three-year project to support hands-on explorations in "network security" and "cryptography" through Research Experience Vitalizing Science-University Program (REVS-UP) at California State University, Bakersfield. In addition, the…
Descriptors: Information Technology, Computer Networks, Curriculum Development, Undergraduate Students
Venkatesh, Vijay P. – ProQuest LLC, 2013
The current computing landscape owes its roots to the birth of hardware and software technologies from the 1940s and 1950s. Since then, the advent of mainframes, miniaturized computing, and internetworking has given rise to the now prevalent cloud computing era. In the past few months just after 2010, cloud computing adoption has picked up pace…
Descriptors: Internet, Information Technology, Information Management, Online Surveys
Chen, Hong – ProQuest LLC, 2009
Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…
Descriptors: Computer Security, Computer Science, Policy
Hayajneh, Thaier Saleh – ProQuest LLC, 2009
Wireless ad hoc networks are suitable and sometimes the only solution for several applications. Many applications, particularly those in military and critical civilian domains (such as battlefield surveillance and emergency rescue) require that ad hoc networks be secure and stable. In fact, security is one of the main barriers to the extensive use…
Descriptors: Computer Networks, Telecommunications, Computer Security
Pages: 1  |  ...  |  51  |  52  |  53  |  54  |  55  |  56  |  57  |  58  |  59  |  ...  |  107