Publication Date
In 2025 | 0 |
Since 2024 | 5 |
Since 2021 (last 5 years) | 18 |
Since 2016 (last 10 years) | 26 |
Since 2006 (last 20 years) | 48 |
Descriptor
Crime Prevention | 48 |
Computer Security | 18 |
Program Effectiveness | 12 |
Violence | 12 |
Crime | 11 |
Information Security | 9 |
Qualitative Research | 9 |
School Safety | 8 |
Internet | 7 |
Prevention | 7 |
Information Technology | 6 |
More ▼ |
Source
ProQuest LLC | 48 |
Author
Abu Jbara, Ahmed | 1 |
Akuta, Eric Agwe-Mbarika | 1 |
Appelt, Lianne C. | 1 |
Baum, Haley | 1 |
Bivins, Jennifer | 1 |
Blakely, Benjamin A. | 1 |
Bloom, Marlo | 1 |
Brigette Allen | 1 |
Caitlyn J. Zang | 1 |
Cheryl Resch | 1 |
Choi, Min Suk | 1 |
More ▼ |
Publication Type
Dissertations/Theses -… | 48 |
Education Level
Higher Education | 17 |
Postsecondary Education | 13 |
Elementary Education | 2 |
Elementary Secondary Education | 2 |
High Schools | 2 |
Grade 5 | 1 |
Grade 6 | 1 |
Intermediate Grades | 1 |
Middle Schools | 1 |
Secondary Education | 1 |
Audience
Location
Texas | 3 |
California | 2 |
Cameroon | 1 |
Illinois (Chicago) | 1 |
New Jersey | 1 |
Oklahoma | 1 |
Texas (San Antonio) | 1 |
West Virginia | 1 |
Laws, Policies, & Programs
Digital Millennium Copyright… | 1 |
Higher Education Act Title IX | 1 |
Safe and Drug Free Schools… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Wilson, Joe M. – ProQuest LLC, 2013
This dissertation uses design science research and engineering to develop a cloud-based simulator for modeling next-generation cybersecurity protection frameworks in the United States. The claim is made that an agile and neutral framework extending throughout the cyber-threat plane is needed for critical infrastructure protection (CIP). This…
Descriptors: Computer Security, Information Security, Engineering, Computer Simulation
Srinivasan, Deepa – ProQuest LLC, 2013
Recent rapid malware growth has exposed the limitations of traditional in-host malware-defense systems and motivated the development of secure virtualization-based solutions. By running vulnerable systems as virtual machines (VMs) and moving security software from inside VMs to the outside, the out-of-VM solutions securely isolate the anti-malware…
Descriptors: Computer Security, Computer Software, Semantics, Computer Simulation
Akuta, Eric Agwe-Mbarika – ProQuest LLC, 2012
The past decade has projected much of Africa as a haven for cybercrime perpetration. This view was widely evidenced in Cameroon, a country regarded as a miniature Africa due to its diverse socio-cultural, economic and political characteristics. In spite of efforts by government to curb cybercrime, the perpetration rate has not declined due to a…
Descriptors: Foreign Countries, Computer Security, Internet, Criminals
Sibai, Faisal M. – ProQuest LLC, 2012
There has been a constant growing security concern with insider attacks on network accessible computer systems. Users with power credentials can do almost anything they want with the systems they own with very little control or oversight. Most breaches occurring nowadays by power users are considered legitimate access and not necessarily…
Descriptors: Computer Security, Power Structure, Information Technology, Computer Networks
Abu Jbara, Ahmed – ProQuest LLC, 2013
Models, created using different modeling techniques, usually serve different purposes and provide unique insights. While each modeling technique might be capable of answering specific questions, complex problems require multiple models interoperating to complement/supplement each other; we call this Multi-Modeling. To address the syntactic and…
Descriptors: Models, Problem Solving, Research Methodology, Research Problems
Domain, Melinda Willoughby – ProQuest LLC, 2014
This qualitative phenomenological study employed narrative inquiry to describe the decision-making processes that Texas school districts followed in enacting firearms policies that allow school employees to carry concealed weapons on district property. Exploration of the lived experiences of eight Texas superintendents in such schools contributed…
Descriptors: Decision Making, School Districts, Weapons, Gun Control
Sellke, Sarah H. – ProQuest LLC, 2010
Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…
Descriptors: Internet, Computer Security, Crime Prevention, Technical Support
Lewis, Jacquelyne L. – ProQuest LLC, 2011
Identity theft is quite expensive and devastating for victims; unfortunately, it is also a rapidly growing crime. Much of the prior research on identity theft has focused on legislative efforts that may prevent the crime. However, limited research exists on what consumers perceive as identity prevention and the measures they take to prevent…
Descriptors: Undergraduate Students, Crime, Reputation, Prevention
Choi, Min Suk – ProQuest LLC, 2013
Cybersecurity threats and vulnerabilities are causing substantial financial losses for governments and organizations all over the world. Cybersecurity criminals are stealing more than one billion dollars from banks every year by exploiting vulnerabilities caused by bank users' computer misuse. Cybersecurity breaches are threatening the common…
Descriptors: Public Agencies, Computer Security, Self Efficacy, Computer Use
Seckinger-Bancroft, Kimberly E. – ProQuest LLC, 2010
Nearly all children receive abduction prevention training. Most traditional education programs increase the learner's knowledge, but often fail to produce concomitant behavior change. Behavioral Skills Training (BST) is a multi-component, behavior-based training strategy with empirical support demonstrating its effectiveness in teaching children…
Descriptors: Child Safety, Crime Prevention, Behavior Modification, Computer Assisted Instruction
Portis, Dennis L., III – ProQuest LLC, 2013
The purpose of this historical case study was to gain an understanding of dropout recovery programs from an interpretive historical perspective. Dropout Recovery is an Oklahoma Department of Career and Technology Education initiative that provides high school dropouts an opportunity to re-enroll in school, gain academic credit, and participate in…
Descriptors: Educational History, Case Studies, Dropout Prevention, Dropouts
Womer, Denise R. – ProQuest LLC, 2012
People in the United States live in an era of heightened fear of sexual offenders. The general public, especially women, fear sexual assault and for the safety of their children. Federal and state legislation has established stringent sexual offender notification and registration, and residency restriction laws to protect citizens in communities.…
Descriptors: Criminals, Fear, Sexual Abuse, Violence
Reiss, Jeffrey – ProQuest LLC, 2010
Digital piracy is a problem that may never disappear from society. Through readily available resources such as those found in a university, students will always have access to illegal goods. While piracy is a global phenomenon, an institution's resources combined with the typical college student's lack of funds makes it more lucrative. Students…
Descriptors: Copyrights, Computer Software, Corporations, Ethics
Miles, Tracy L. – ProQuest LLC, 2009
One of the most significant challenges faced by government officials today is securing information systems to make them more resilient to attack from increasingly complex challenges from cyber-criminals, state-sponsored groups, and other threats. Over the years, the federal government has developed and implemented Certification and Accreditation…
Descriptors: Information Systems, Information Technology, Federal Government, Accreditation (Institutions)
Rodriguez, Hector – ProQuest LLC, 2009
In recent years, schools have become a focal point for general delinquency and gang prevention programs for a variety of reasons. One premise behind this approach is that schools can serve as ideal settings for providing delinquency and intervention services because youths spend so much time there. School-based gang prevention efforts are supposed…
Descriptors: Intervention, Delinquency, Prevention, Risk