NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 9 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Plachkinova, Miloslava; Maurer, Chris – Journal of Information Systems Education, 2018
This case study follows the security breach that affected Target at the end of 2013 and resulted in the loss of financial data for over 70 million customers. The case provides an overview of the company and describes the reasons that led to one of the biggest security breaches in history. It offers a discussion on Target's vendor management…
Descriptors: Information Security, Information Systems, Case Method (Teaching Technique), Online Vendors
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Marchant, Robert L.; Bonneau, Thomas – Information Systems Education Journal, 2013
Transition from small, independent LANs into larger enterprise managed infrastructures is becoming more prominent in academia, business and government. Consolidation of IT resources into larger, more disciplined, and more professionally managed environments has significant advantages however they do bring their own unique issues to solve in order…
Descriptors: Computer Networks, Computer Security, Client Server Architecture, Computer Interfaces
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nkotagu, Gabriel Hudson – Journal of International Students, 2011
Internet fraud takes a number of forms with the responsible individuals changing tactics rapidly to avoid detection. The perpetrators rely on telemarketing, emails, as well as presenting themselves personally to unsuspecting people. The evolution of internet marketing as well as ecommerce and the ease of connectivity create increasing…
Descriptors: Internet, Deception, Online Vendors, Marketing
Pearring, John – American School & University, 2012
The education sector remains abuzz with cost-cutting expectations despite pressures to increase services. Automation of costly manual tasks could save funds for many of these institutions, specifically in data protection. The IT departments of schools and universities can take advantage of a proven cost-savings opportunity in data protection that…
Descriptors: Educational Technology, Automation, Technological Advancement, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Hodgins, Dave – Journal of Web Librarianship, 2010
The explosion of Web 2.0 into libraries has left many smaller academic libraries (and other libraries with limited computing resources or support) to work in the cloud using free Web applications. The use of commercial Web hosting is an innovative approach to the problem of inadequate local resources. While the idea of insourcing IT will seem…
Descriptors: Computers, Academic Libraries, Internet, Word Processing
Peer reviewed Peer reviewed
Direct linkDirect link
Hartnett, Stephen John – Quarterly Journal of Speech, 2011
The "twisted cyber spy" affair began in 2010, when Google was attacked by Chinese cyber-warriors charged with stealing Google's intellectual property, planting viruses in its computers, and hacking the accounts of Chinese human rights activists. In the ensuing international embroglio, the US mainstream press, corporate leaders, and White…
Descriptors: Civil Rights, Rhetoric, Intellectual Property, Global Approach
Foster, Andrea – Chronicle of Higher Education, 2008
At least 18 colleges are scrambling to inform tens of thousands of students that they are at risk of having their identities stolen after SunGard, a leading software vendor, reported that a laptop owned by one of its consultants was stolen. The extent of the problem is still unknown, though many of the campuses that have been identified are in…
Descriptors: Computer Software, Confidential Records, Student Records, Computer Security
Online Libraries and Microcomputers, 1999
Presents guidelines developed by the ICOLC (International Coalition of Library Consortia) regarding vendor contracts and negotiations that involve electronic information resources. Highlights include content issues, including HTML, use of printers, and use of multimedia; and platform issues, including system architecture, access control, security…
Descriptors: Access to Information, Computer Printers, Computer Security, Consortia
Collet, Robert – Telecommunications, 1998
Argues that the Internet can continue its explosive growth only if it is carefully, constantly, and thoughtfully administered. Discusses the role of ISPs (Internet Service Providers); the need to respond to the market force; making the transition from the federal to the commercial level; funding; the domain name server; security; and challenges to…
Descriptors: Computer Security, Financial Support, Futures (of Society), Government (Administrative Body)