Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Access to Information (1)
- Cataloging (1)
- Compliance (Legal) (1)
- Computer Security (1)
- Computer security (1)
-
- Computers (1)
- Confidentiality (1)
- Controlled vocabulary (1)
- Courseware (1)
- Data security (1)
- Database Design (1)
- Database Management Systems (1)
- Databases (1)
- Diversity (1)
- Diversity in the workplace (1)
- Educational Needs (1)
- Higher Education (1)
- Human Factors Engineering (1)
- Information Management (1)
- Information Policy (1)
- Information Systems (1)
- Information Technology (1)
- Information security (1)
- Information technology (1)
- Integrity (1)
- Stereotypes (1)
- Telecommuting (1)
- Windows (1)
- Women (1)
- Publication
- Publication Type
Articles 1 - 4 of 4
Full-Text Articles in Physical Sciences and Mathematics
The Mississippi Digital Library’S Civil Rights Thesaurus: An Evolving Authority Control Tool For Civil Rights-Related Headings In Metadata Records, Kathleen L. Wells
The Mississippi Digital Library’S Civil Rights Thesaurus: An Evolving Authority Control Tool For Civil Rights-Related Headings In Metadata Records, Kathleen L. Wells
The Southeastern Librarian
The online Civil Rights Thesaurus (CRT) at the University of Southern Mississippi (USM) had its beginnings in the digitization of civil rights materials in the university’s McCain Library and Archives in the early 2000s. The materials included oral history interviews, letters, newspaper clippings, photographs, and other items from the rich history of the civil rights movement in Mississippi, including materials from the Freedom Summer of 1964. In addition to the creation of digitized images, making these materials available online as the Civil Rights in Mississippi Digital Archive included the formulation of descriptive records using Dublin Core metadata and the development …
A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade
A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade
Faculty and Research Publications
Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the perceptions of women in IT within the context of information security and assurance. This paper describes results from a study of a relatively new career path to see if there are female-friendly opportunities that have not existed in previous IT career paths. Research methodology focuses on a qualitative analysis of in-depth interviews with women who are self-described information security professionals. A primary goal of the study is to understand the perceptions of women in information security and determine …
Database Security: What Students Need To Know, Meg C. Murray
Database Security: What Students Need To Know, Meg C. Murray
Faculty and Research Publications
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of Defense (2004), in its Database Security Technical Implementation Guide, states that database security should provide controlled, protected access to the contents of a database as well as preserve the integrity, consistency, and overall quality of the data. Students in the computing disciplines must develop an …
Save Gas Using Your Office Computer From Home, Steve Duckworth, Damon Armour, Jeff Heck
Save Gas Using Your Office Computer From Home, Steve Duckworth, Damon Armour, Jeff Heck
Georgia Library Quarterly
The article discusses the protocols used to establish remote computer connections from home. The Remote Desktop Protocol (RDP) used in Windows 7 connecting to a Windows 2008 server reportedly allows the playing of high-definition video using Media Player. It is stated that commercial product connections which may bypass security infrastructure are risky because of the home computer's possible insecurity and that home devices used for business purposes may be legally searched by the state.