Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Access to Information (1)
- Compliance (Legal) (1)
- Computer Security (1)
- Confidentiality (1)
- Courseware (1)
-
- Data security (1)
- Database Design (1)
- Database Management Systems (1)
- Diversity (1)
- Diversity in the workplace (1)
- Educational Needs (1)
- Higher Education (1)
- Human Factors Engineering (1)
- Information Management (1)
- Information Policy (1)
- Information Systems (1)
- Information Technology (1)
- Information security (1)
- Information technology (1)
- Integrity (1)
- Stereotypes (1)
- Women (1)
Articles 1 - 2 of 2
Full-Text Articles in Business
A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade
A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade
Faculty Articles
Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the perceptions of women in IT within the context of information security and assurance. This paper describes results from a study of a relatively new career path to see if there are female-friendly opportunities that have not existed in previous IT career paths. Research methodology focuses on a qualitative analysis of in-depth interviews with women who are self-described information security professionals. A primary goal of the study is to understand the perceptions of women in information security and determine …
Database Security: What Students Need To Know, Meg C. Murray
Database Security: What Students Need To Know, Meg C. Murray
Faculty Articles
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of Defense (2004), in its Database Security Technical Implementation Guide, states that database security should provide controlled, protected access to the contents of a database as well as preserve the integrity, consistency, and overall quality of the data. Students in the computing disciplines must develop an …