Open Access. Powered by Scholars. Published by Universities.®

Information Security Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Information Security

Online Privacy Policy Of The Thirty Dow Jones Corporations: Compliance With Ftc Fair Information Practice Principles And Readability Assessment, Yuanxiang Li Jan 2012

Online Privacy Policy Of The Thirty Dow Jones Corporations: Compliance With Ftc Fair Information Practice Principles And Readability Assessment, Yuanxiang Li

Theses Digitization Project

This project conducted a statistical study of online privacy to examine how well corporations comply with FIPs and assess how easy their privacy was to read.


The Development Of A Framework For Enterprise Security Architecture And Its Application In Organizations, Yi-Ting Shen Jan 2008

The Development Of A Framework For Enterprise Security Architecture And Its Application In Organizations, Yi-Ting Shen

Theses Digitization Project

The main purpose of this study is to develop an enterprise security framework that is based on a comprehensive following the Zachman EA architecture. The enterprise architecture (EA) is a long-term view or blueprint for an organization. It is a very important blueprint for balancing business and IT technology and for adding value to an organization. Security is also an essential dimension for enterprises nowadays. This paper will incorporate the security dimension with the Zachman EA framework, which intends to serve as an enterprise security framework in assisting an organization to successfully and effectively implement security.


A Secure Client/Server Java Application Programming Interface, Tawfik Lachheb Jan 2004

A Secure Client/Server Java Application Programming Interface, Tawfik Lachheb

Theses Digitization Project

The purpose of this project is to develop a generic Java Application Programming Interface (API) that would be used to provide security and user privacy to functions such as data transfer, key management, digital signature, etc.