Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Other Education (3)
- Engineering (2)
- Social and Behavioral Sciences (2)
- Aviation (1)
- Aviation Safety and Security (1)
-
- Aviation and Space Education (1)
- Business (1)
- Business Administration, Management, and Operations (1)
- Computer Sciences (1)
- Educational Administration and Supervision (1)
- Educational Assessment, Evaluation, and Research (1)
- Educational Leadership (1)
- Electrical and Computer Engineering (1)
- Higher Education Administration (1)
- Instructional Media Design (1)
- Language and Literacy Education (1)
- Leadership Studies (1)
- Management Sciences and Quantitative Methods (1)
- Online and Distance Education (1)
- Physical Sciences and Mathematics (1)
- Public Affairs, Public Policy and Public Administration (1)
- Public Policy (1)
- Quantitative, Qualitative, Comparative, and Historical Methodologies (1)
- Sociology (1)
- Institution
- Publication
- Publication Type
- File Type
Articles 1 - 8 of 8
Full-Text Articles in Education
Addressing Security Risks For Mobile Devices: What Higher Education Leaders Should Know, Casey J. Gordon
Addressing Security Risks For Mobile Devices: What Higher Education Leaders Should Know, Casey J. Gordon
Department of Educational Administration: Dissertations, Theses, and Student Research
This qualitative study examined the topic of mobile device security at higher education institutions in the Midwestern United States. This study sought to answer the question of how higher education institutions have responded to threats to campus data security posed by mobile devices. It explored the questions of what institutions are doing currently, the policies and procedures they have in place, and what leaders should do in the future.
This research study consisted of four case studies, compiled through interviews with key Information Technology (IT) professionals and faculty at each of the four institutions studied as well as an examination …
A Systemic Approach For Simulation-Based Team Training In Maritime Safety, Michael Baldauf, Birgit Nolte-Schuster, Jens-Uwe Schröder-Hinrichs
A Systemic Approach For Simulation-Based Team Training In Maritime Safety, Michael Baldauf, Birgit Nolte-Schuster, Jens-Uwe Schröder-Hinrichs
Michael Baldauf
No abstract provided.
Student Right To Know & Campus Security, Lindenwood University
Student Right To Know & Campus Security, Lindenwood University
Security Reports
2015 Clery Report
Hacking Assessment, Phillip Dawson
Hacking Assessment, Phillip Dawson
2009 - 2019 ACER Research Conferences
Hackers exploit weaknesses in a system to achieve their own goals. In this paper I argue that hacking presents a significant threat to the growing world of online assessment. This threat needs to be addressed through a variety of means; technological anti-hacking approaches will not be sufficient. The most effective ways to prevent hacking may be changes to the assessment tasks themselves to make hacking less tempting; these approaches also have a range of positive side effects in terms of authenticity, transparency of criteria, and ensuring tasks involve work beyond the exam. I conclude with a brief exploration of the …
Intrusion Detection System Of Industrial Control Networks Using Network Telemetry, Stanislav Ponomarev
Intrusion Detection System Of Industrial Control Networks Using Network Telemetry, Stanislav Ponomarev
Doctoral Dissertations
Industrial Control Systems (ICSs) are designed, implemented, and deployed in most major spheres of production, business, and entertainment. ICSs are commonly split into two subsystems - Programmable Logic Controllers (PLCs) and Supervisory Control And Data Acquisition (SCADA) systems - to achieve high safety, allow engineers to observe states of an ICS, and perform various configuration updates. Before wide adoption of the Internet, ICSs used "air-gap" security measures, where the ICS network was isolated from other networks, including the Internet, by a physical disconnect [1]. This level of security allowed ICS protocol designers to concentrate on the availability and safety of …
The Value Of Professional Security Industry Certifications, Daniel Benny Ph.D
The Value Of Professional Security Industry Certifications, Daniel Benny Ph.D
Aviation / Aeronautics / Aerospace International Research Conference
In the security and aviation community there are many professional security certifications that can be achieved in all disciplines of security. Those pertinent to aviation will be explored.
The Relationship Between Terrorism, Oil Prices, And Airline Profitability, Ubirathan Miranda
The Relationship Between Terrorism, Oil Prices, And Airline Profitability, Ubirathan Miranda
Walden Dissertations and Doctoral Studies
Given the financial challenges faced by the airline industry, understanding of the combined effect of terrorism and the price of petroleum on airline profitability is imperative. The purpose of this correlational study was to determine if a combination of terrorism and the price of petroleum significantly predicted airline profitability, and which variable was the most significant. This study collected samples of financial records from major American commercial passenger and cargo airlines on costs of fuel (n = 84) and airline profitability (n = 84). The terrorism data (n = 84) were comprised of terrorist attacks on petroleum infrastructure in oil-producing …
Student Visa Control And Information Exchange, Lisa Bellamy
Student Visa Control And Information Exchange, Lisa Bellamy
Walden Dissertations and Doctoral Studies
Expired student visas can contribute to illegal residence in the U.S. and may also be a valuable source of information for Homeland Security. Although the reason for remaining in the U.S. might be for nonthreatening purposes, threatening actions could occur as an individual gets lost in the country. The purpose of this study was to determine how visas were issued, the reasons an individual may remain beyond the approved visa date, and the mechanisms intelligence and law enforcement agencies use to exchange information with each other. This research was based on the new war theory and the Lockwood Analytical Method …