Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Information systems (5)
- Information technology (4)
- Information science (3)
- Security (3)
- Breach (2)
-
- Computer science (2)
- Cyber (2)
- Education (2)
- Information security (2)
- Management (2)
- Technology (2)
- Verifiable computation (2)
- ABE (1)
- AWS (1)
- Access Control (1)
- Accountability (1)
- Aggregate signature (1)
- Attribute-based encryption (1)
- Authentication (1)
- Authentication in e-learning activities (1)
- Authentication in e-learning systems (1)
- Benefits (1)
- Big Data (1)
- Big data (1)
- Biometrics (1)
- Branching logic (1)
- Business networking (1)
- CRM (1)
- Challenges (1)
- Chosen-keyword attack (1)
- Publication
-
- UBT International Conference (8)
- CCE Theses and Dissertations (7)
- Research Collection School Of Computing and Information Systems (6)
- Saverio Perugini (3)
- Articles by Maurer Faculty (1)
-
- Economic Crime Forensics Capstones (1)
- Electronic Theses and Dissertations (1)
- HON499 projects (1)
- Master's Projects (1)
- Masters Theses & Specialist Projects (1)
- Research & Publications (1)
- Rose-Hulman Undergraduate Research Publications (1)
- School of Technology Publications (1)
- The STEAM Journal (1)
- Theses (1)
- Publication Type
Articles 31 - 35 of 35
Full-Text Articles in Information Security
Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig
Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig
CCE Theses and Dissertations
Hackers external to the organization continue to wreak havoc upon the information systems infrastructure of firms through breaches of security defenses, despite constant development of and continual investment in new IS security countermeasures by security professionals and vendors. These breaches are exceedingly costly and damaging to the affected organizations. The continued success of hackers in the face of massive amounts of security investments suggests that the defenders are losing and that the hackers can innovate at a much faster pace.
Underground hacker communities have been shown to be an environment where attackers can learn new techniques and share tools pertaining …
An Empirical Investigation Of The Willingness Of Us Intelligence Community Analysts To Contribute Knowledge To A Knowledge Management System (Kms) In A Highly Classified And Sensitive Environment, Robert Hambly
CCE Theses and Dissertations
Since September 11, 2001, the United States Government (USG) has possessed unparalleled capability in terms of dedicated intelligence and information collection assets supporting the analysts of the Intelligence Community (IC). The USG IC has sponsored, developed, and borne witness to extraordinary advances in technology, techniques, and procedures focused on knowledge harvesting, knowledge sharing, and collaboration. Knowledge, within successful (effective & productive) organizations, exists as a commodity; a commodity that can be created, captured, imparted, shared, and leveraged. The research problem that this study addressed is the challenge of maintaining strong organizational effectiveness and productivity through the use of an information …
Big Data And The Fourth Estate: Protecting The Development Of News Media Monitoring Databases, Joseph A. Tomain
Big Data And The Fourth Estate: Protecting The Development Of News Media Monitoring Databases, Joseph A. Tomain
Articles by Maurer Faculty
No abstract provided.
Cloud Practical Exam Invigilation Control Systems With The Objective Of Enhancing Quality Control For Online Exams, Gordon O'Reilly
Cloud Practical Exam Invigilation Control Systems With The Objective Of Enhancing Quality Control For Online Exams, Gordon O'Reilly
Theses
Online cloud computing courses are becoming more common place facilitating a student to study from home from anywhere in the world. Coupled with this trend is a need for educational institutions to facilitate students to take tests or exams online from home. It reduces the remote student’s time and cost of travel to an exam invigilation centre as well as reducing the educational institution’s test administration overhead. It does however introduce potential quality control concerns. A new industry called online proctoring has emerged that attempts to provide quality control in these online test scenarios.
This research provides an insight into …
Privacy-Preserving And Verifiable Data Aggregation, Ngoc Hieu Tran, Robert H. Deng, Hwee Hwa Pang
Privacy-Preserving And Verifiable Data Aggregation, Ngoc Hieu Tran, Robert H. Deng, Hwee Hwa Pang
Research Collection School Of Computing and Information Systems
There are several recent research studies on privacy-preserving aggregation of time series data, where an aggregator computes an aggregation of multiple users' data without learning each individual's private input value. However, none of the existing schemes allows the aggregation result to be verified for integrity. In this paper, we present a new data aggregation scheme that protects user privacy as well as integrity of the aggregation. Towards this end, we first propose an aggregate signature scheme in a multi-user setting without using bilinear maps. We then extend the aggregate signature scheme into a solution for privacy-preserving and verifiable data aggregation. …