NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 1 to 15 of 22 results Save | Export
Stevenson, Gregory V. – ProQuest LLC, 2017
Rationale: Former President Barack Obama's $3.9 trillion for the 2015 fiscal year budget request included a $2.9 billion investment in Science, Technology, Engineering and Math (STEM) education. Research then showed that the national spending for cybersecurity has exceeded $10.7 billion in the 2015 fiscal year. Nonetheless, the number of…
Descriptors: Computer Security, Qualitative Research, Case Studies, STEM Education
Walton, Marquetta – ProQuest LLC, 2016
The effectiveness of U.S. cyber-capabilities can have a serious effect on the cyber-security stance of the US and significantly impact how well U.S. critical infrastructures are protected. The problem is that the state of the U.S. cyber-security could be negatively impacted by the dependency that the US displays in its use of defensive…
Descriptors: Technological Literacy, Computer Security, Information Security, Qualitative Research
Reddy, Dinesh Sampangirama – ProQuest LLC, 2017
Cybersecurity threats confront the United States on a daily basis, making them one of the major national security challenges. One approach to meeting these challenges is to improve user cybersecurity behavior. End user security behavior hinges on end user acceptance and use of the protective information technologies such as anti-virus and…
Descriptors: Computer Security, Information Security, Information Technology, Self Efficacy
White, Jautau Kelton – ProQuest LLC, 2017
Current cybersecurity measures have become a major concern for commercial organizations in the United States. As the cyber-attack landscape expands and the skills and knowledge of the cyber-attacker become broader, the current measures that are taken and the laws structured around them are making it increasingly difficult for commercial…
Descriptors: Information Security, Computer Security, Computer Networks, Crime
Newmeyer, Kevin Patrick – ProQuest LLC, 2014
Developing nations have been slow to develop and implement cybersecurity strategies despite a growing threat to governance and public security arising from an increased dependency on Internet-connected systems in the developing world and rising cybercrime. Using a neorealist theoretical framework that draws from Gilpin and Waltz, this qualitative…
Descriptors: Foreign Countries, Developing Nations, Computer Security, Information Security
Morsey, Christopher – ProQuest LLC, 2017
In the critical infrastructure world, many critical infrastructure sectors use a Supervisory Control and Data Acquisition (SCADA) system. The sectors that use SCADA systems are the electric power, nuclear power and water. These systems are used to control, monitor and extract data from the systems that give us all the ability to light our homes…
Descriptors: Information Security, Computer Security, National Security, Energy
Wilson, Joe M. – ProQuest LLC, 2013
This dissertation uses design science research and engineering to develop a cloud-based simulator for modeling next-generation cybersecurity protection frameworks in the United States. The claim is made that an agile and neutral framework extending throughout the cyber-threat plane is needed for critical infrastructure protection (CIP). This…
Descriptors: Computer Security, Information Security, Engineering, Computer Simulation
Curtis, Scipiaruth Kendall – ProQuest LLC, 2012
The continual emergence of technologies has infiltrated government and industry business infrastructures, requiring reforming organizations and fragile network infrastructures. Emerging technologies necessitates countermeasures, commitment to cybersecurity and information technology governance for organization's survivability and sustainability.…
Descriptors: Computer Security, Information Technology, Governance, Case Studies
Choi, Min Suk – ProQuest LLC, 2013
Cybersecurity threats and vulnerabilities are causing substantial financial losses for governments and organizations all over the world. Cybersecurity criminals are stealing more than one billion dollars from banks every year by exploiting vulnerabilities caused by bank users' computer misuse. Cybersecurity breaches are threatening the common…
Descriptors: Public Agencies, Computer Security, Self Efficacy, Computer Use
Giacobe, Nicklaus A. – ProQuest LLC, 2013
Cyber-security involves the monitoring a complex network of inter-related computers to prevent, identify and remediate from undesired actions. This work is performed in organizations by human analysts. These analysts monitor cyber-security sensors to develop and maintain situation awareness (SA) of both normal and abnormal activities that occur on…
Descriptors: Computer Security, Crime Prevention, Computer Networks, Risk Management
Minotra, Dev – ProQuest LLC, 2012
With increased volume and sophistication of cyber attacks in recent years, maintaining situation awareness and effective task-prioritization strategy is critical to the task of cybersecurity analysts. However, high levels of mental-workload associated with the task of cybersecurity analyst's limits their ability to prioritize tasks.…
Descriptors: Task Analysis, Computer Security, Human Factors Engineering, Attention
Stark, Adam – ProQuest LLC, 2017
This case study research explored the cybersecurity systems and training and education of IT professionals at a member college of the Florida College System. Thematic analysis was utilized to analyze interview transcripts of 6 respondents. A more descriptive analysis was completed using the survey responses from 15 respondents. From this analysis…
Descriptors: Case Studies, Information Security, Computer Security, Information Technology
Sturm, John Andrew – ProQuest LLC, 2011
The recent White House (2011) policy paper for the Smart Grid that was released on June 13, 2011, "A Policy Framework for the 21st Century Grid: Enabling Our Secure Energy Future," defines four major problems to be solved and the one that is addressed in this dissertation is Securing the Grid. Securing the Grid is referred to as one of…
Descriptors: Energy, Communications, Information Technology, Automation
McFadden, Matthew – ProQuest LLC, 2013
Cyber incident response is an emphasized subject area in cybersecurity in information technology with increased need for the protection of data. Due to ongoing threats, cybersecurity imposes many challenges and requires new investigative response techniques. In this study a Linux Incident Response Framework is designed for collecting volatile data…
Descriptors: Data Analysis, Computer Security, Crime, Models
Alexander, Rodney T. – ProQuest LLC, 2017
Organizational computing devices are increasingly becoming targets of cyber-attacks, and organizations have become dependent on the safety and security of their computer networks and their organizational computing devices. Business and government often use defense in-depth information assurance measures such as firewalls, intrusion detection…
Descriptors: Information Security, Statistical Analysis, Computers, Computer Security
Previous Page | Next Page ยป
Pages: 1  |  2