Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Computer Engineering

Ensuring The Effectiveness Of Information Security Policy : The Development And Validation Of An Information Security Policy Model, Vivid Vicki Chen Jan 2012

Ensuring The Effectiveness Of Information Security Policy : The Development And Validation Of An Information Security Policy Model, Vivid Vicki Chen

Legacy Theses & Dissertations (2009 - 2024)

The purpose of this dissertation is to develop and test a conceptual model of an Information Security Policy (ISP) and to measure the benefits that accrue to organizations that implement and deploy such policies. As a result of rapid changes in technology, the importance of computer Information Security Policy (ISP) has increased dramatically. In recent decades, governments and private enterprises have increasingly come to store ever greater amounts of information on computers and on networks. Unfortunately, storing information in this manner not only makes firms engaged in cutting-edge technology vulnerable to hackers, but may also jeopardize customer / employee relations, …


Graphene-Based Post-Cmos Architecture, Sansiri Tanachutiwat Jan 2012

Graphene-Based Post-Cmos Architecture, Sansiri Tanachutiwat

Legacy Theses & Dissertations (2009 - 2024)

The semiconductor industry relies on CMOS technology which is nearing its scaling limitations. In order to continue the historical growth rate of the device density of digital logic chips, novel nanomaterials and nanodevices will need to be developed.