Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 7 |
Descriptor
Computer Security | 9 |
Online Vendors | 9 |
Information Technology | 4 |
Information Security | 3 |
Internet | 3 |
Computer Networks | 2 |
Computer Software | 2 |
Higher Education | 2 |
Information Systems | 2 |
Marketing | 2 |
Online Systems | 2 |
More ▼ |
Source
Author
Bonneau, Thomas | 1 |
Collet, Robert | 1 |
Foster, Andrea | 1 |
Hartnett, Stephen John | 1 |
Hodgins, Dave | 1 |
Marchant, Robert L. | 1 |
Maurer, Chris | 1 |
Nkotagu, Gabriel Hudson | 1 |
Pearring, John | 1 |
Plachkinova, Miloslava | 1 |
Publication Type
Journal Articles | 9 |
Reports - Descriptive | 6 |
Guides - Non-Classroom | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 4 |
Adult Education | 1 |
Elementary Secondary Education | 1 |
Audience
Location
China | 1 |
Colorado | 1 |
Connecticut | 1 |
New York | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Plachkinova, Miloslava; Maurer, Chris – Journal of Information Systems Education, 2018
This case study follows the security breach that affected Target at the end of 2013 and resulted in the loss of financial data for over 70 million customers. The case provides an overview of the company and describes the reasons that led to one of the biggest security breaches in history. It offers a discussion on Target's vendor management…
Descriptors: Information Security, Information Systems, Case Method (Teaching Technique), Online Vendors
Marchant, Robert L.; Bonneau, Thomas – Information Systems Education Journal, 2013
Transition from small, independent LANs into larger enterprise managed infrastructures is becoming more prominent in academia, business and government. Consolidation of IT resources into larger, more disciplined, and more professionally managed environments has significant advantages however they do bring their own unique issues to solve in order…
Descriptors: Computer Networks, Computer Security, Client Server Architecture, Computer Interfaces
Nkotagu, Gabriel Hudson – Journal of International Students, 2011
Internet fraud takes a number of forms with the responsible individuals changing tactics rapidly to avoid detection. The perpetrators rely on telemarketing, emails, as well as presenting themselves personally to unsuspecting people. The evolution of internet marketing as well as ecommerce and the ease of connectivity create increasing…
Descriptors: Internet, Deception, Online Vendors, Marketing
Pearring, John – American School & University, 2012
The education sector remains abuzz with cost-cutting expectations despite pressures to increase services. Automation of costly manual tasks could save funds for many of these institutions, specifically in data protection. The IT departments of schools and universities can take advantage of a proven cost-savings opportunity in data protection that…
Descriptors: Educational Technology, Automation, Technological Advancement, Computer Security
Hodgins, Dave – Journal of Web Librarianship, 2010
The explosion of Web 2.0 into libraries has left many smaller academic libraries (and other libraries with limited computing resources or support) to work in the cloud using free Web applications. The use of commercial Web hosting is an innovative approach to the problem of inadequate local resources. While the idea of insourcing IT will seem…
Descriptors: Computers, Academic Libraries, Internet, Word Processing
Hartnett, Stephen John – Quarterly Journal of Speech, 2011
The "twisted cyber spy" affair began in 2010, when Google was attacked by Chinese cyber-warriors charged with stealing Google's intellectual property, planting viruses in its computers, and hacking the accounts of Chinese human rights activists. In the ensuing international embroglio, the US mainstream press, corporate leaders, and White…
Descriptors: Civil Rights, Rhetoric, Intellectual Property, Global Approach
Foster, Andrea – Chronicle of Higher Education, 2008
At least 18 colleges are scrambling to inform tens of thousands of students that they are at risk of having their identities stolen after SunGard, a leading software vendor, reported that a laptop owned by one of its consultants was stolen. The extent of the problem is still unknown, though many of the campuses that have been identified are in…
Descriptors: Computer Software, Confidential Records, Student Records, Computer Security
Online Libraries and Microcomputers, 1999
Presents guidelines developed by the ICOLC (International Coalition of Library Consortia) regarding vendor contracts and negotiations that involve electronic information resources. Highlights include content issues, including HTML, use of printers, and use of multimedia; and platform issues, including system architecture, access control, security…
Descriptors: Access to Information, Computer Printers, Computer Security, Consortia
Collet, Robert – Telecommunications, 1998
Argues that the Internet can continue its explosive growth only if it is carefully, constantly, and thoughtfully administered. Discusses the role of ISPs (Internet Service Providers); the need to respond to the market force; making the transition from the federal to the commercial level; funding; the domain name server; security; and challenges to…
Descriptors: Computer Security, Financial Support, Futures (of Society), Government (Administrative Body)