NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 166 to 180 of 1,325 results Save | Export
Blakely, Benjamin A. – ProQuest LLC, 2012
The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…
Descriptors: Computer Security, Information Technology, Crime, Crime Prevention
Peer reviewed Peer reviewed
Direct linkDirect link
Amosun, Peter Adewale; Ige, Olugbenga Adedayo; Choo, Kim-Kwang Raymond – Education and Information Technologies, 2015
Nigeria is considered by many to be a cyber crime hot spot, and is often ranked among the world's top cyber crime committing countries (e.g. advanced fee fraud is also known as Nigerian scams and 419 scams--419 is a section under the Nigerian Criminal Code Act that prohibits obtaining goods by false pretences). We designed a cyber crime prevention…
Descriptors: Foreign Countries, Crime, Computer Security, Crime Prevention
Peer reviewed Peer reviewed
Direct linkDirect link
Weiler, Spencer C.; Armenta, Anthony D. – Clearing House: A Journal of Educational Strategies, Issues and Ideas, 2014
The United States has experienced several mass killings by firearms in the recent past, but none has stirred the passions of the nation's citizens like the killing of innocent schoolchildren in Newtown, Connecticut. Debates immediately began regarding proposed solutions for making students safer in schools. One recommendation for promoting…
Descriptors: Principals, Administrator Attitudes, Law Enforcement, Legal Problems
Sood, Aditya – ProQuest LLC, 2013
The global nature of Internet has revolutionized cultural and commercial interactions while at the same time it has provided opportunities for cyber criminals. Crimeware services now exist that have transformed the nature of cyber crime by making it more automated and robust. Furthermore, these crimeware services are sold as a part of a growing…
Descriptors: Computer Security, Web Browsers, Internet, Crime Prevention
Peer reviewed Peer reviewed
Direct linkDirect link
Metsala, Jamie L.; David, Margaret D.; Brown, Sarah – Reading & Writing Quarterly, 2017
This study examined the incidence of reading impairments, the reading profiles, and the outcomes of a reading intervention for youth involved in a comprehensive crime prevention program. Rates of reading impairments were between 55% and 61%. Reading profiles for participants with reading comprehension impairments showed deficits in phonological…
Descriptors: Reading Programs, Reading Difficulties, Reading Instruction, Youth Programs
Shah, Nirvi – Education Week, 2013
With nightmare visions of a gunman stalking school halls, districts often rush to hire police officers to patrol their campuses after news of a school shooting. Critics of that impulsive response, which has been in high gear nationwide since the Sandy Hook Elementary School shootings in December, acknowledge the concern for student and staff…
Descriptors: School Security, Discipline Policy, Discipline Problems, Crime Prevention
Cole, Robert – ProQuest LLC, 2013
Organizations in all sectors of business have become highly dependent upon information systems for the conduct of business operations. Of necessity, these information systems are designed with many points of ingress, points of exposure that can be leveraged by a motivated attacker seeking to compromise the confidentiality, integrity or…
Descriptors: Bayesian Statistics, Information Systems, Computer Security, Information Security
Giacobe, Nicklaus A. – ProQuest LLC, 2013
Cyber-security involves the monitoring a complex network of inter-related computers to prevent, identify and remediate from undesired actions. This work is performed in organizations by human analysts. These analysts monitor cyber-security sensors to develop and maintain situation awareness (SA) of both normal and abnormal activities that occur on…
Descriptors: Computer Security, Crime Prevention, Computer Networks, Risk Management
Wilson, Joe M. – ProQuest LLC, 2013
This dissertation uses design science research and engineering to develop a cloud-based simulator for modeling next-generation cybersecurity protection frameworks in the United States. The claim is made that an agile and neutral framework extending throughout the cyber-threat plane is needed for critical infrastructure protection (CIP). This…
Descriptors: Computer Security, Information Security, Engineering, Computer Simulation
Association of American Universities, 2017
This report describes the policies and programs implemented and reported through an institutional survey undertaken by Association of American Universities (AAU) member universities to prevent and respond to campus sexual assault and misconduct. Fifty-five of the 62 leading research universities that comprise AAU's membership completed the survey,…
Descriptors: Sexual Abuse, Rape, Crime Prevention, Crime
Tucker, J. William; Vance, Amelia – National Association of State Boards of Education, 2016
Schools watch their students. Nearly every responsibility that schools shoulder includes an element of surveillance--from ensuring that preschoolers do not wander off, to keeping third graders on task, to stopping bullying and sexting. These responsibilities are not new, but schools' increased ability to monitor students continuously is. Despite…
Descriptors: School Safety, School Security, Privacy, Student Records
DeNisco, Alison – District Administration, 2013
School psychologists are often the first professionals to reach students with mental illness, and part of their role is to help identify threats that can lead to events such as the massacre at Sandy Hook Elementary School in Newtown, Conn., which left 20 children and six adults dead, including school psychologist Mary Sherlach, who was one of the…
Descriptors: Violence, Risk, Mental Disorders, School Psychologists
Peer reviewed Peer reviewed
Direct linkDirect link
McCarty, William P.; Ren, Ling; Zhao, Jihong – Crime & Delinquency, 2012
The 1990s represented a unique decade in which to analyze the determinants of police strength in the United States. This decade was a time in which crime initially increased, then substantially decreased. Furthermore, this decade also was characterized by increases in the minority population throughout large American cities. Finally, the 1990s…
Descriptors: Crime Prevention, Police, Minority Groups, School Security
Peters, Dane L. – Independent School, 2012
The highly publicized story of unfathomable abuse by Penn State football coach Jerry Sandusky, as well the unfathomable response of those with the power to stop it, makes it clear that abuse can happen anywhere--and that adults need to be vigilant and educated. All of those who oversee schools must also ensure that their faculty and staff are well…
Descriptors: Child Abuse, Adults, Faculty, School Personnel
McNeil, Michele – Education Week, 2013
As U.S. Secretary of Education Arne Duncan works with other Obama administration officials on policy responses to the shootings at a Connecticut elementary school, he brings a personal and professional history that has acquainted him with the impact of gun violence. As schools chief in Chicago from 2001 to 2008, he was affected by the gun deaths…
Descriptors: Weapons, Gun Control, Advocacy, Violence
Pages: 1  |  ...  |  8  |  9  |  10  |  11  |  12  |  13  |  14  |  15  |  16  |  ...  |  89