NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 10 results Save | Export
Giovanni Bryan Jamal McKinney – ProQuest LLC, 2021
A high number of cyber breaches in organizations occur as a result of email phishing attempts. Research has shown that cyber education has a positive impact in user awareness of attack methods resulting in the reduction of compromises from email phishing attempts. However, in some instances, cyber education does not have a positive impact on the…
Descriptors: Employees, Computer Security, Information Security, Electronic Mail
Barthur, Ashrith – ProQuest LLC, 2016
There are two essential goals of this research. The first goal is to design and construct a computational environment that is used for studying large and complex datasets in the cybersecurity domain. The second goal is to analyse the Spamhaus blacklist query dataset which includes uncovering the properties of blacklisted hosts and understanding…
Descriptors: Computer Security, Information Security, Data Collection, Internet
Zhao, Mingyi – ProQuest LLC, 2016
In today's rapidly digitizing society, people place their trust in a wide range of digital services and systems that deliver latest news, process financial transactions, store sensitive information, etc. However, this trust does not have a solid foundation, because software code that supports this digital world has security vulnerabilities. These…
Descriptors: Computer Software, Information Security, Computer Security, Cooperation
Ray, Loye Lynn – ProQuest LLC, 2014
The need for detecting malicious behavior on a computer networks continued to be important to maintaining a safe and secure environment. The purpose of this study was to determine the relationship of multilayer feed forward neural network architecture to the ability of detecting abnormal behavior in networks. This involved building, training, and…
Descriptors: Computer Networks, Computer Security, Safety, Artificial Intelligence
West, Andrew G. – ProQuest LLC, 2013
Collaborative functionality is changing the way information is amassed, refined, and disseminated in online environments. A subclass of these systems characterized by "open collaboration" uniquely allow participants to "modify" content with low barriers-to-entry. A prominent example and our case study, English Wikipedia,…
Descriptors: Encyclopedias, Collaborative Writing, Electronic Publishing, Information Security
Sibai, Faisal M. – ProQuest LLC, 2012
There has been a constant growing security concern with insider attacks on network accessible computer systems. Users with power credentials can do almost anything they want with the systems they own with very little control or oversight. Most breaches occurring nowadays by power users are considered legitimate access and not necessarily…
Descriptors: Computer Security, Power Structure, Information Technology, Computer Networks
Sellke, Sarah H. – ProQuest LLC, 2010
Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…
Descriptors: Internet, Computer Security, Crime Prevention, Technical Support
Zhao, Haifeng – ProQuest LLC, 2013
Social media provide a multitude of opportunities for knowledge contribution and sharing. However, the content reliability issue has caused comprehensive attention, especially on credible social media, such as Wikipedia. Despite Wikipedia's success with the open editing model, dissenting voices give rise to unreliable content due to two…
Descriptors: Conflict, Vandalism, Knowledge Representation, Cooperation
Jabbour, Ghassan – ProQuest LLC, 2010
The increasing proliferation of globally interconnected complex information systems has elevated the magnitude of attacks and the level of damage that they inflict on such systems. This open environment of intertwined financial, medical, defense, and other systems has attracted hackers to increase their malicious activities to cause harm or to…
Descriptors: Computer Software, Information Systems, Computers, Databases
Randle, Dawn DuBose – ProQuest LLC, 2010
The purpose of this study was to examine the differences in the administering of punishment procedures for violations of a school district's Code of Student Conduct among school-based administrators. Specifically, this study was concerned with the impact of the socio-demographic variables of: gender, years of administrative experience,…
Descriptors: Punishment, Administrators, Elementary Secondary Education, Predictor Variables