Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

2015

Security

Discipline
Institution
Publication
Publication Type
File Type

Articles 1 - 8 of 8

Full-Text Articles in Education

Addressing Security Risks For Mobile Devices: What Higher Education Leaders Should Know, Casey J. Gordon Dec 2015

Addressing Security Risks For Mobile Devices: What Higher Education Leaders Should Know, Casey J. Gordon

Department of Educational Administration: Dissertations, Theses, and Student Research

This qualitative study examined the topic of mobile device security at higher education institutions in the Midwestern United States. This study sought to answer the question of how higher education institutions have responded to threats to campus data security posed by mobile devices. It explored the questions of what institutions are doing currently, the policies and procedures they have in place, and what leaders should do in the future.

This research study consisted of four case studies, compiled through interviews with key Information Technology (IT) professionals and faculty at each of the four institutions studied as well as an examination …


A Systemic Approach For Simulation-Based Team Training In Maritime Safety, Michael Baldauf, Birgit Nolte-Schuster, Jens-Uwe Schröder-Hinrichs Oct 2015

A Systemic Approach For Simulation-Based Team Training In Maritime Safety, Michael Baldauf, Birgit Nolte-Schuster, Jens-Uwe Schröder-Hinrichs

Michael Baldauf

No abstract provided.


Student Right To Know & Campus Security, Lindenwood University Sep 2015

Student Right To Know & Campus Security, Lindenwood University

Security Reports

2015 Clery Report


Hacking Assessment, Phillip Dawson Aug 2015

Hacking Assessment, Phillip Dawson

2009 - 2019 ACER Research Conferences

Hackers exploit weaknesses in a system to achieve their own goals. In this paper I argue that hacking presents a significant threat to the growing world of online assessment. This threat needs to be addressed through a variety of means; technological anti-hacking approaches will not be sufficient. The most effective ways to prevent hacking may be changes to the assessment tasks themselves to make hacking less tempting; these approaches also have a range of positive side effects in terms of authenticity, transparency of criteria, and ensuring tasks involve work beyond the exam. I conclude with a brief exploration of the …


Intrusion Detection System Of Industrial Control Networks Using Network Telemetry, Stanislav Ponomarev Jul 2015

Intrusion Detection System Of Industrial Control Networks Using Network Telemetry, Stanislav Ponomarev

Doctoral Dissertations

Industrial Control Systems (ICSs) are designed, implemented, and deployed in most major spheres of production, business, and entertainment. ICSs are commonly split into two subsystems - Programmable Logic Controllers (PLCs) and Supervisory Control And Data Acquisition (SCADA) systems - to achieve high safety, allow engineers to observe states of an ICS, and perform various configuration updates. Before wide adoption of the Internet, ICSs used "air-gap" security measures, where the ICS network was isolated from other networks, including the Internet, by a physical disconnect [1]. This level of security allowed ICS protocol designers to concentrate on the availability and safety of …


The Value Of Professional Security Industry Certifications, Daniel Benny Ph.D Jan 2015

The Value Of Professional Security Industry Certifications, Daniel Benny Ph.D

Aviation / Aeronautics / Aerospace International Research Conference

In the security and aviation community there are many professional security certifications that can be achieved in all disciplines of security. Those pertinent to aviation will be explored.


The Relationship Between Terrorism, Oil Prices, And Airline Profitability, Ubirathan Miranda Jan 2015

The Relationship Between Terrorism, Oil Prices, And Airline Profitability, Ubirathan Miranda

Walden Dissertations and Doctoral Studies

Given the financial challenges faced by the airline industry, understanding of the combined effect of terrorism and the price of petroleum on airline profitability is imperative. The purpose of this correlational study was to determine if a combination of terrorism and the price of petroleum significantly predicted airline profitability, and which variable was the most significant. This study collected samples of financial records from major American commercial passenger and cargo airlines on costs of fuel (n = 84) and airline profitability (n = 84). The terrorism data (n = 84) were comprised of terrorist attacks on petroleum infrastructure in oil-producing …


Student Visa Control And Information Exchange, Lisa Bellamy Jan 2015

Student Visa Control And Information Exchange, Lisa Bellamy

Walden Dissertations and Doctoral Studies

Expired student visas can contribute to illegal residence in the U.S. and may also be a valuable source of information for Homeland Security. Although the reason for remaining in the U.S. might be for nonthreatening purposes, threatening actions could occur as an individual gets lost in the country. The purpose of this study was to determine how visas were issued, the reasons an individual may remain beyond the approved visa date, and the mechanisms intelligence and law enforcement agencies use to exchange information with each other. This research was based on the new war theory and the Lockwood Analytical Method …