Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Editor (4)
- Table (4)
- Contents (3)
- Information (2)
- International (2)
-
- Journal (2)
- Management (2)
- Technology (2)
- Analytics (1)
- Big Data (1)
- Command and Control (1)
- Cybercrime (1)
- Cybersecurity (1)
- Cyberspace Operations (1)
- Data Breach (1)
- Data Security (1)
- DePaul College of Computing and Digital Media (1)
- Decision Making (1)
- Desk (1)
- Editor's remarks (1)
- Hacking (1)
- Identity Theft (1)
- Military (1)
- Remarks (1)
- Table of contents (1)
Articles 1 - 10 of 10
Full-Text Articles in Computer Engineering
Data To Decisions For Cyberspace Operations, Steve Stone
Data To Decisions For Cyberspace Operations, Steve Stone
Military Cyber Affairs
In 2011, the United States (U.S.) Department of Defense (DOD) named cyberspace a new operational domain. The U.S. Cyber Command and the Military Services are working to make the cyberspace environment a suitable place for achieving national objectives and enabling military command and control (C2). To effectively conduct cyberspace operations, DOD requires data and analysis of the Mission, Network, and Adversary. However, the DOD’s current data processing and analysis capabilities do not meet mission needs within critical operational timelines. This paper presents a summary of the data processing and analytics necessary to effectively conduct cyberspace operations.
Cybersecurity In The Information Age
Cybersecurity In The Information Age
DePaul Magazine
According to the Identify Theft Resource Center, more than 750 breaches occurred in 2014, exposing more than 83 million records. Breaches occur because people have discovered that there’s money to be made from stealing corporate and customer information. Faced with this reality, consumers and companies may wonder if it’s possible to protect their personal and financial data. DePaul's College of Computing and Digital Media is training the next generation of cybersecurity experts to thwart cybersecurity attacks. In addition, DePaul faculty and alumni in data security offer advice to consumers on securing their financial and personal information.
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.