Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- City University of New York (CUNY) (23)
- Bridgewater State University (6)
- Old Dominion University (6)
- Nova Southeastern University (5)
- Walden University (5)
-
- Air Force Institute of Technology (3)
- Kennesaw State University (3)
- Edith Cowan University (2)
- University of Arkansas, Fayetteville (2)
- Dakota State University (1)
- Franklin University (1)
- Maurer School of Law: Indiana University (1)
- Merrimack College (1)
- San Jose State University (1)
- Singapore Management University (1)
- The University of Akron (1)
- University of Kentucky (1)
- University of Massachusetts Amherst (1)
- University of New Haven (1)
- University of South Florida (1)
- University of Texas Rio Grande Valley (1)
- Wayne State University (1)
- Publication
-
- Open Educational Resources (22)
- International Journal of Cybersecurity Intelligence & Cybercrime (6)
- CCE Theses and Dissertations (5)
- Walden Dissertations and Doctoral Studies (5)
- Journal of Cybersecurity Education, Research and Practice (3)
-
- Theses and Dissertations (3)
- Graduate Theses and Dissertations (2)
- OUR Journal: ODU Undergraduate Research Journal (2)
- Psychology Theses & Dissertations (2)
- Research outputs 2014 to 2021 (2)
- All Faculty and Staff Scholarship (1)
- Articles by Maurer Faculty (1)
- Centre for AI & Data Governance (1)
- Chemical Engineering and Materials Science Faculty Research Publications (1)
- Computer Science Faculty Publications and Presentations (1)
- Doctoral Dissertations (1)
- Electrical & Computer Engineering and Computer Science Faculty Publications (1)
- Honors Program Contracts (1)
- Information Science Faculty Publications (1)
- Masters Theses & Doctoral Dissertations (1)
- Mineta Transportation Institute (1)
- Publications and Research (1)
- STEMPS Faculty Publications (1)
- USF Tampa Graduate Theses and Dissertations (1)
- Virginia Journal of Science (1)
- Williams Honors College, Honors Research Projects (1)
- Publication Type
- File Type
Articles 61 - 68 of 68
Full-Text Articles in Physical Sciences and Mathematics
It Security Managers' Strategies For Mitigating Data Breaches In Texas School Districts, Mercy Ikhuoria Nwankwo
It Security Managers' Strategies For Mitigating Data Breaches In Texas School Districts, Mercy Ikhuoria Nwankwo
Walden Dissertations and Doctoral Studies
School districts are increasingly becoming a prime target for cybercriminals. As a result, information technology (IT) security managers in Texas school districts are concerned about hackers gaining access to network resources that could lead to data breaches on their network. Grounded in the technology threat avoidance theory, the purpose of this qualitative multiple case study was to explore strategies IT security managers use to mitigate data breaches in school district networks in Texas. The participants comprised 6 IT security managers in 3 Texas school districts whose roles involved managing and implementing data security strategies. Data collection involved conducting semistructured interviews …
Exploring Strategies For Enforcing Cybersecurity Policies, Bayo Olushola Omoyiola
Exploring Strategies For Enforcing Cybersecurity Policies, Bayo Olushola Omoyiola
Walden Dissertations and Doctoral Studies
Some cybersecurity leaders have not enforced cybersecurity policies in their organizations. The lack of employee cybersecurity policy compliance is a significant threat in organizations because it leads to security risks and breaches. Grounded in the theory of planned behavior, the purpose of this qualitative case study was to explore the strategies cybersecurity leaders utilize to enforce cybersecurity policies. The participants were cybersecurity leaders from 3 large organizations in southwest and northcentral Nigeria responsible for enforcing cybersecurity policies. The data collection included semi-structured interviews of participating cybersecurity leaders (n = 12) and analysis of cybersecurity policy documents (n = 20). Thematic …
Obstacles With Data Security: Strategies From Carolina Universities, Yamiah R. Compton
Obstacles With Data Security: Strategies From Carolina Universities, Yamiah R. Compton
Walden Dissertations and Doctoral Studies
Some university data custodians lack information security strategies to prevent data security breaches. Reducing duplicitous use of personally identifiable information (PII) obtained maliciously from colleges and universities should be important to university data custodians, IT leadership of all levels, state legislators, and individuals that have an interest in moving into the cybersecurity space in higher education. Grounded in general systems theory, the purpose of this multiple qualitative case study was to examine information security strategies that university data custodians use to protect PII collected from staff, students, and other stakeholders. The participants consisted of 15 college and university data custodians …
Hacking For Intelligence Collection In The Fight Against Terrorism: Israeli, Comparative, And International Perspectives, Asaf Lubin
Articles by Maurer Faculty
תקציר בעברית: הניסיון של המחוקק הישראלי להביא להסדרה מפורשת של סמכויות השב״כ במרחב הקיברנטי משקף מגמה רחבה יותר הניכרת בעולם לעיגון בחקיקה ראשית של הוראות בדבר פעולות פצחנות מצד גופי ביון ומודיעין ורשויות אכיפת חוק למטרות איסוף מודיעין לשם סיכול עבירות חמורות, ובייחוד עבירות טרור אם בעבר היו פעולות מסוג אלה כפופות לנהלים פנימיים ומסווגים, הרי שהדרישה לשקיפות בעידן שלאחר גילויי אדוארד סנודן מחד והשימוש הנרחב בתקיפות מחשב לביצוע פעולות חיפוש וחקירה לסיכול טרור מאידך, מציפים כעת את הדרישה להסמכה מפורשת. במאמר זה אבקש למפות הן את השדה הטכנולוגי והן את השדה המשפטי בכל האמור בתקיפות מחשבים למטרות ריגול ומעקב. …
Intelligent Building Systems: Security And Facility Professionals’ Understanding Of System Threats,Vulnerabilities And Mitigation Practice, David J. Brooks, Michael Coole, Paul Haskell-Dowland
Intelligent Building Systems: Security And Facility Professionals’ Understanding Of System Threats,Vulnerabilities And Mitigation Practice, David J. Brooks, Michael Coole, Paul Haskell-Dowland
Research outputs 2014 to 2021
Intelligent Buildings or Building Automation and Control Systems (BACS) are becoming common in buildings, driven by the commercial need for functionality, sharing of information, reduced costs and sustainable buildings. The facility manager often has BACS responsibility; however, their focus is generally not on BACS security. Nevertheless, if a BACS-manifested threat is realised, the impact to a building can be significant, through denial, loss or manipulation of the building and its services, resulting in loss of information or occupancy. Therefore, this study garnered a descriptive understanding of security and facility professionals’ knowledge of BACS, including vulnerabilities and mitigation practices. Results indicate …
Gaming Lan Setup With Local And Remote Access And Downloads, Ethelyn Tran
Gaming Lan Setup With Local And Remote Access And Downloads, Ethelyn Tran
Williams Honors College, Honors Research Projects
The Gaming LAN Setup project aims to design and implement a basic functioning, hardened network that could be utilized locally and remotely to allow users access to respective servers for the option to host a session or join. Users will have the ability to securely log into the internal network to download files via a web interface. The network allows the designated user to take a management position in order to perform basic penetration testing and discover vulnerabilities through various scans to maintain the network
Cybersecurity Education Through Technological And Engineering Literacy Standards, Philip A. Reed, Steven A. Barbato
Cybersecurity Education Through Technological And Engineering Literacy Standards, Philip A. Reed, Steven A. Barbato
STEMPS Faculty Publications
No abstract provided.
Technological Challenges And Innovations In Cybersecurity And Networking Technology Program, Syed R. Zaidi, Ajaz Sana, Aparicio Carranza
Technological Challenges And Innovations In Cybersecurity And Networking Technology Program, Syed R. Zaidi, Ajaz Sana, Aparicio Carranza
Publications and Research
This era is posing a unique challenge to the Cybersecurity and related Engineering Technology areas, stimulated by the multifaceted technological boom expressed in accelerated globalization, digital transformation, the cloud, mobile access apps, and the Internet of Things (IoT)—where more and more devices are connected to the Internet every day. As the use of new Internet-based technologies increase; so does the risk of theft and misuse of sensitive information. This demands the awareness of cyber-criminality and the need for cyber hygiene in corporations, small businesses, and the government. As the need for experienced cybersecurity specialists has skyrocketed in recent years and …