Auswahl der wissenschaftlichen Literatur zum Thema „Universities and colleges – Security measures – Zimbabwe“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Universities and colleges – Security measures – Zimbabwe" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Universities and colleges – Security measures – Zimbabwe"

1

Zhao, Ying. „Applied-Information Technology in the Internet of Things in the Construction of File Security System in Colleges and Universities“. Advanced Materials Research 1014 (Juli 2014): 399–403. http://dx.doi.org/10.4028/www.scientific.net/amr.1014.399.

Der volle Inhalt der Quelle
Annotation:
Along with the development of information technology, archives information has developed from original paper archives to current digital archives, electronic photos, electronic drawings etc., and the utilization of archives has also achieved computer search and online inquiry. The development of various modern information stealing technologies has brought potential threat to the security of network archival information, especially some military scientific research archives, student archives etc., which are not only involved with the normal operation and development of schools, but also with official secrets. Therefore, establishing the archives security system of colleges and universities has become the priority among priorities in the archives work of colleges and universities. This article starts from the current status of the archives security system construction of colleges and universities, analyzing the apparent features of the technology of the Internet of Things in information technology, and then raising the specific application measures of the technology of the Internet of Things in archives security system construction of colleges and universities, making suggestions on the archives security system construction of colleges and universities.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Yaokumah, Winfred. „The Influence of Students' Characteristics on Mobile Device Security Measures“. International Journal of Information Systems and Social Change 7, Nr. 3 (Juli 2016): 44–66. http://dx.doi.org/10.4018/ijissc.2016070104.

Der volle Inhalt der Quelle
Annotation:
This study aimed at investigating the influence of students' characteristics (majors, maturity, and gender) on mobile device security practices in the context of a developing country. Focusing on graduate and undergraduate students from both public and private universities, participants' characteristics were measured against three approaches of mobile devices security practices (user-behavior and activities, device settings, and disaster recovery). The sample consisted of 375 students from two public universities and three private university colleges. The results found that Technology and Engineering students differ statistically from Business and Arts students in terms of mobile device settings and disaster recovery practices. The undergraduate students were less engaged in risky activities with their devices compared with the graduate students. Moreover, the younger students were more cautious than the older students regarding user-behavior and device settings. Finally, female students were more negligent when it comes to setting the devices to militate against security threats.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Liu, Yongli, Weifang Zhai und Song Ji. „Research on Campus Network Security Problem and Protection Strategy“. International Journal of Advanced Pervasive and Ubiquitous Computing 9, Nr. 3 (Juli 2017): 15–31. http://dx.doi.org/10.4018/ijapuc.2017070102.

Der volle Inhalt der Quelle
Annotation:
With the “Internet +” era of arrival, the major colleges and universities are in the construction of the wisdom of the campus, students and teachers living with the campus network is more and more closely related, Campus network security has become the protection of the wisdom of the campus construction. Campus network security issues become increasingly serious; a single security protection has been unable to meet the current security needs. This paper analyzes the major security threats facing the campus network, and presents the campus network security protection measures from the physical layer, network layer, system layer, application layer and management of five aspects, thus constructing the campus network's overall security defense system. The system has multiple security protection for Campus Network, thus improving the security of the campus network.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Sun, Xiu Juan. „Personal Computer Network Security Prevention Research“. Advanced Materials Research 971-973 (Juni 2014): 1684–87. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1684.

Der volle Inhalt der Quelle
Annotation:
this article from the various security threats facing the computer network, systematically introduces the network security technology. And in view of the campus network security issues, firstly analyzes the hidden dangers to the safety of network system in colleges and universities, and then from the build two aspects of security defense system and strengthen the safety management design of the campus network security policy. This paper study, the first thing I learned the main threat to the network security problem, and use the knowledge of security network security problems are analyzed. Secondly, based on the research of the network technology, campus network will also be faced with the security threat. Finally, the idea of established with P2DR model to establish campus network security defense system. And it is concluded that the building of a set of effective network security defense system is the solution Campus network main threats and hidden trouble of necessary ways and measures.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Piscikiene, Inga, Jurate Romeikiene und Brigita Šustickienė. „CYBER VULNERABILITY IN LIGHT OF ONLINE LEARNING REALITY“. SOCIETY. INTEGRATION. EDUCATION. Proceedings of the International Scientific Conference 5 (28.05.2021): 426–35. http://dx.doi.org/10.17770/sie2021vol5.6367.

Der volle Inhalt der Quelle
Annotation:
Presently, as Covid 19 has caused most of educational processes to move online, cybersecurity and data protection is rapidly gaining importance in all educational institutions, and most of the academia became more vulnerable to cyberattacks. This article sheds some light on how communities of higher education institutions perceive increased online threats, what measures they take to protect themselves against cybercrime, whether they practice good security hygiene. This paper presents and analyses results of a survey conducted at higher education institutions (universities, colleges) into perception of cybersecurity, online culture and hygiene during the present times of remote education.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Xie, Jian Hua, und Jian Hua Xiao. „Constructing an University Scientific Research Management Information System of NET Platform“. Applied Mechanics and Materials 441 (Dezember 2013): 984–88. http://dx.doi.org/10.4028/www.scientific.net/amm.441.984.

Der volle Inhalt der Quelle
Annotation:
Researching the design process of scientific research management information system of Jiangmen polytechnic. According to the characteristics of the scientific research management in colleges and universities, the system is developing by using the B/S application model and the advanced .NET framework. The system consists of teachers management module, faculty-level management module, and library management module, scientific research department management module, system management module and public management module. Aim at the application maintenance and security, the system uses three-tier architecture, authorize to the management mechanism, data encryption and software separation and other security measures. The system has realized the classification audit of scientific research information and the dynamic management of the research integral reports. The using results show that the system is not only stable, but also easy to operate, and it also greatly improves the accuracy and efficiency of the scientific research management.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Silumba, Cassim, und Show Chibango. „Online Education in Promoting Continued Education during Coronavirus Outbreak in Zimbabwe: ‘Challenges and Solutions’“. Asian Journal of Interdisciplinary Research 3, Nr. 4 (02.12.2020): 74–88. http://dx.doi.org/10.34256/ajir2047.

Der volle Inhalt der Quelle
Annotation:
The education system has been affected by 2019–20 coronavirus pandemic. In order to curb the widespread of coronavirus pandemic, people were recommended to exercise social-distancing and self-isolation. The idea of social-distancing and self-isolation has resulted in the closures of schools, universities and colleges as Ministry of Primary and Secondary Education try to control the spread of the contagious disease among learners in Zimbabwe. The effects and perceptions of Zimbabwean parents, teachers, learners and stakeholders on education and Covid19 are a cause for concern. The closure of educational institutions in response to the pandemic has risen to alarming levels. In this article, the issue of online learning has been seen as the impending solution to the challenges posed to the teaching and learning process during the coronavirus pandemic outbreak in Zimbabwe. What is very disturbing is that the mitigating measures proposed by stakeholders and government seem to favour the have and the have-not are severely impacted. At the end of the day, all the strides Zimbabwe has been making in terms of bringing education to the door step and improvement of standards of life is just going down the drain due to lack of ICT equipment and technical expertise. The study was carried out through qualitative method through a phenomenological approach. Snowballing, interviews, observations and document reviews were made use of in gathering the data for this article. Presentation is mainly descriptive since the type of data gathered depended much on the experiences and feelings of the people in the society about the impact of Covid19 on education. A number of recommendations were put forward that include the government putting in place laws that restrict mobile operators to hike their charges and all educational stakeholders should be heard when they air their concern.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Tatomur, Irina. „UNIVERSITY CYBER SECURITY AS A METHOD FOR ANTI-FISHING FRAUD“. Economic discourse, Nr. 1 (März 2020): 59–67. http://dx.doi.org/10.36742/2410-0919-2020-1-7.

Der volle Inhalt der Quelle
Annotation:
Introduction. With the rapid adoption of computer and networking technologies, educational institutions pay insufficient attention to the implementation of security measures to ensure the confidentiality, integrity and accessibility of data, and thus fall prey to cyber-attacks. Methods. The following methods were used in the process of writing the article: methods of generalization, analogy and logical analysis to determine and structure the motives for phishing attacks, ways to detect and prevent them; statistical analysis of data – to build a chronological sample of the world's largest cyber incidents and determine the economic losses suffered by educational institutions; graphical method – for visual presentation of results; abstraction and generalization – to make recommendations that would help reduce the number of cyber scams. Results. The article shows what role cyber security plays in counteracting phishing scams in the educational field. The motives for the implementation of phishing attacks, as well as methods for detecting and preventing them, have been identified and regulated. The following notions as "phishing", "submarine" and "whaling" are evaluated as the most dangerous types of fraud, targeting both small and large players in the information chain of any educational institution. An analytical review of the educational services market was conducted and a chronological sampling of the largest cyber incidents that occurred in the period 2010-2019 was made. The economic losses incurred by colleges, research institutions and leading universities in the world were described. It has been proven that the US and UK educational institutions have been the most attacked by attackers, somewhat inferior to Canada and countries in the Asia-Pacific region. It is found that education has become the top industry in terms of the number of Trojans detected on devices belonging to educational institutions and the second most listed among the most affected by the ransomware. A number of measures have been proposed to help reduce the number of cyber incidents. Discussion. The obtained results should be taken into account when formulating a strategy for the development of educational institutions, as well as raising the level of awareness of the representatives of the academic community in cybersecurity. Keywords: phishing, cyber security, cyber stalkers, insider threat, rootkit, backdoor.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Moore, Carolyn, Kathleen Davis und Wanyi Wang. „Low Food Security Present on Texas College Campuses Despite High Nutrition Literacy“. Current Developments in Nutrition 4, Supplement_2 (29.05.2020): 246. http://dx.doi.org/10.1093/cdn/nzaa043_097.

Der volle Inhalt der Quelle
Annotation:
Abstract Objectives The relationship between student food security and nutrition literacy on college campuses has not been explored previously. Objectives of this study were to assess the relationship between student food security and nutrition literacy, and to explore associations of food security and nutrition literacy with demographic characteristics of college students. Methods An online survey tool in Psych Data was used to assess food security and nutrition literacy of students (n = 672) on the three Texas Woman's University (TWU) campuses. The USDA Six-Item Short Form assessed food security and nutrition literacy questions were derived from a large valid and reliable assessment instrument. Cross tabulations using Pearson's chi-square or Fisher's exact test were used to explore the relationship among demographics, food security levels, and nutrition literacy. All analyses were conducted using IBM SPSS Statistics v25, with significance set as P < 0.05. Results Students (n = 672) from all three campuses participated in the survey and 88.4% were females. The total prevalence of food insecurity (low and very low food security) was high across all campuses: Denton (47.3%), Dallas (36.1%), and Houston (45.9%). Significant differences in the degree of food security existed when the three campuses were compared (P = 0.001). The highest percentage of very low food security existed among black (30%) and freshman (32.7%) students. The overall likelihood of adequate nutrition literacy among students was high (90.0%) with white students (95.7%) being more likely to have adequate nutrition literacy compared to other races/ethnicities (P < 0.001). A greater proportion of students with adequate nutrition literacy were food secure (58%) than students with very low food security (18%). Graduate students had the highest nutrition literacy (95.7%) and campus residents had the lowest nutrition literacy (83.9%). Conclusions Food insecurity undermines educational success of students. Targeted measures to address the crisis of food security on college campuses must also address disparities by race and student class. Universities and colleges must consider creative, sustainable solutions to help improve student food security. Funding Sources Internally funded by Texas Woman's University.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Zhang, Dong, und Zhongyi Guo. „Mobile Sentry Robot for Laboratory Safety Inspection Based on Machine Vision and Infrared Thermal Imaging Detection“. Security and Communication Networks 2021 (28.04.2021): 1–16. http://dx.doi.org/10.1155/2021/6612438.

Der volle Inhalt der Quelle
Annotation:
As is known to all, university chemistry laboratories have always been considered as dangerous areas on campus, especially pharmaceutical chemistry laboratories, which are often the focus of pharmaceutical laboratory management. The innovation in safety management mode can effectively reduce or even eliminate security risks and reduce the risk of safety accidents. With the rapid development of artificial intelligence, robots have been introduced into all walks of life, replacing humans to complete part of the safety inspection. One of the core tasks of laboratory safety inspection is to find the source of fire and take measures to extinguish the fire in time. The intention of this paper is to design a sentry robot, which could take appropriate emergency measures to detect dangerous situations, including sounding alarms and carrying out firefighting, in order to minimize accidents and economic losses, based on machine vision for periodic inspection of laboratories with a temperature thermal imager to scan surroundings at the same time. The preliminary research results show that based on the machine vision, the robot identified the fire source and adjusted the spray device to carry out the fire-extinguishing experiment successfully. The development and utilization of laboratory patrol robots can share the work of laboratory patrol to a certain extent, guarantee the safety of experimental teaching in colleges and universities, and have room for sustainable research.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "Universities and colleges – Security measures – Zimbabwe"

1

Viljoen, Stephen. „Applying a framework for IT governance in South African higher education institutions“. Thesis, Nelson Mandela Metropolitan University, 2005. http://hdl.handle.net/10948/416.

Der volle Inhalt der Quelle
Annotation:
Background: Higher Education (HE), through HE Institutions, plays a very important role in society. There is thus a need for this sector to be well managed, especially with regards to planning, organising, and controlling. Corporate Governance has received a lot of attention in recent times, especially to engender trust on the part of the stakeholders. There are many similarities, but also significant differences in the governance of HE institutions and public companies. Information Technology (IT) plays an extremely important role in the modern organisation, creating huge opportunities, but also increasing the risk to the organisation. Therefore, effective governance of IT in HE Institutions is of great importance.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Ncube, Lashias. „Campus policing : an ethnography of the University of Cape Town Campus Control Unit“. Master's thesis, University of Cape Town, 1996. http://hdl.handle.net/11427/17205.

Der volle Inhalt der Quelle
Annotation:
Includes bibliography.
The aim of undertaking the project was to investigate the activities of the University of Cape Town Campus Control unit. The study is based on the premise that there is an underestimation of Campus Control work. A number of basic questions were examined in the field. The researcher sought to determine, among other things, the extent to which the unit's work is invisible, and the extent to which the university community's reported ambivalence and indifference to Campus Control practice a result of a lack of clarity regarding the role of the unit within the university. The research also moved from the premise that there is too great an emphasis on the use of crime statistics as indices of the unit' effectiveness. The racial and gender configuration of assignments was also investigated as was the training offered to new and old recruits. Participant observation as a body of different methods and techniques of research was used. The researcher spent six weeks in the field with the campus control officers in order to experience the demands of policing from "the native's point of view". The unit is in the process of transforming. It seeks to embrace the discourse of community participation with a view to getting the entire community involved in the provision of its own safety and security. The community involvement initiatives are also designed to improve the relationship between the unit and the community. In the past, the relationship has been a very traumatic one, fraught with mistrust and had far-reaching consequences for the unit's performance. The study comes to the conclusion that both women and blacks in Campus Control are a case of structural marginality. The unit does not reflect the racial and gender composition of the community it serves. It was also discovered that some of the unit's glaring shortcomings are played out in the sphere of training. The study should help members of the university community to understand and appreciate the role of this indispensable unit within the university community.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Osburn, Toby W. „Hazard mitigation and disaster preparedness planning at American Coastal University: Seeking the disaster-resistant university“. Thesis, University of North Texas, 2008. https://digital.library.unt.edu/ark:/67531/metadc9745/.

Der volle Inhalt der Quelle
Annotation:
This study employed a qualitative case study method to evaluate the efforts of one university to conduct hazard mitigation and disaster preparedness planning activities and used the Federal Emergency Management Agency framework and selected writings of sociologist and disaster researcher E.L. Quarantelli as models for evaluating the institution's approach. The institution studied was assigned a fictitious name and the identities of the study participants withheld in order to protect the integrity of the institution's planning efforts and its personnel. The study utilized a 92-item questionnaire, field interviews, and review and analysis of documentary materials provided by the institution for data collection purposes. Pattern-matching techniques were applied to identify themes and trends that emerged through the course of data collection. The results indicate the institution has developed an organizational culture that is broadly responsive to and engaged in disaster preparedness planning at multiple levels in a manner generally consistent with principles identified in select writings of Quarantelli. Results further indicate the institution has engaged in identifying hazard mitigation priorities but not in a manner consistent with that advocated by the Federal Emergency Management Agency in its publication entitled Building a Disaster-Resistant University.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Hall, Dennis H. H. „Impact of the Clery Act: An Examination of the Relationship between Clery Act Data and Recruitment at Private Colleges and Universities“. Thesis, University of North Texas, 2017. https://digital.library.unt.edu/ark:/67531/metadc984250/.

Der volle Inhalt der Quelle
Annotation:
The problem this study addressed is the relationship between Clery Act crime data and student recruitment at private colleges and universities. For this quantitative study, I used secondary data from the Department of Education and the Delta Cost Project (2013) to conduct ordinary least squares regression analyses to determine the predictive ability of institutional characteristics, specifically the total number of crime incidents reported in compliance with the Clery Act, on the variance in number of applications and applicant yield rate at private four-year institutions in the United States. Findings showed that the total number of reported incidents was a significant positive predictor of the total number of applications. Conversely, findings also showed that the total number of incidents had a significant negative impact on institutional yield rates. An implication of this study is that although crime statistics required by the Clery Act may not serve as variables used in the student application process, they are part of numerous variables used in the student's decision to enroll at a particular school. The findings highlight the importance of prioritizing and investing in safety and security measures designed to reduce rates of crime; especially for private, enrollment-driven institutions of higher education.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Tsang, Yuenting. „GIS application in emergency management of terrorism events on the University of North Texas campus“. Thesis, University of North Texas, 2008. https://digital.library.unt.edu/ark:/67531/metadc9021/.

Der volle Inhalt der Quelle
Annotation:
This thesis presents a Web-based geographic information system (GIS) application for campus emergency management that allows users to visualize, integrate, and analyze student population, facilities, and hazard data for efficient emergency management of University of North Texas before, during, and after a terrorism event. End-users can locate and search the source area of an event on a digital map from the ArcIMS-based Website. The website displays corresponding population information and attributes of impacted facilities in real time. School officials and first responders including police, firefighters and medical personnel can promptly plan the appropriate rescue and response procedures according to the displayed results. Finally, the thesis outlines the limitations of Web-based GIS in the arena of campus emergency management.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Murphy, Michael William. „Campus Sexual Assault: How Oregon University System Schools Respond“. PDXScholar, 2011. https://pdxscholar.library.pdx.edu/open_access_etds/281.

Der volle Inhalt der Quelle
Annotation:
College is usually thought of as a time where students, often living alone for their first time, are encouraged towards healthy risk-taking behavior, as well as social, intellectual, and vocational development. Unfortunately for female students, college becomes the time of their lives where they are exposed to the highest risk of sexual victimization. Many colleges across America have taken steps to address the significant problem of sexual assault on their campuses. However, even with rising concern about the sexual victimization of college students, there remains very little systematic information published about the content of sexual assault policies, protocols and programs that exist on college campuses. Focusing on the seven schools of the Oregon University System (OUS), this study sought to examine the schools' sexual assault policies, as well as their prevention and response efforts to sexual assault. Additionally schools' willingness for assistance and training from Oregon Sexual Assault Task Force (OSATF) was also studied. Specifically, official school sexual assault policies were content analysis and secondary survey data gathered by the OSATF was examined. Results demonstrated that, in most cases, policies of the OUS schools were vague in their definitions of what constituted a sexual assault, and lacked the additional information necessary for victims to respond to their sexual victimization. However, Universities also offered various forms of educational opportunities and awareness raising activities. While this proves promising, there is clearly room for improvement. OUS schools also appeared willing to work with the OSATF to improve the delivery of their sexual assault prevention services. The findings of this thesis are important in directing future actions of the OUS when developing and implementing sexual assault response and prevention strategies.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Maguraushe, Kudakwashe. „Development of a diagnostic instrument and privacy model for student personal information privacy perceptions at a Zimbabwean university“. Thesis, 2021. http://hdl.handle.net/10500/27557.

Der volle Inhalt der Quelle
Annotation:
Orientation: The safety of any natural being with respect to the processing of their personal information is an essential human right as specified in the Zimbabwe Data Protection Act (ZDPA) bill. Once enacted, the ZDPA bill will affect universities as public entities. It will directly impact how personal information is collected and processed. The bill will be fundamental in understanding the privacy perceptions of students in relation to privacy awareness, privacy expectations and confidence within university. These need to be understood to give guidelines to universities on the implementation of the ZPDA. Problem Statement: The current constitution and the ZDPA are not sufficient to give organisations guidelines on ensuring personal information privacy. There is need for guidelines to help organisations and institutions to implement and comply with the provisions of the ZDPA in the context of Zimbabwe. The privacy regulations, regarded as the three concepts (awareness, expectations and confidence), were used to determine the student perceptions. These three concepts have not been researched before in the privacy context and the relationship between the three concepts has not as yet been established. Research purpose: The main aim of the study was to develop and validate an Information Privacy Perception Survey (IPPS) diagnostic tool and a Student Personal Information Privacy Perception (SPIPP) model to give guidelines to universities on how they can implement the ZDPA and aid universities in comprehending student privacy perceptions to safeguard personal information and assist in giving effect to their privacy constitutional right. Research Methodology: A quantitative research method was used in a deductive research approach where a survey research strategy was applied using the IPPS instrument for data collection. The IPPS instrument was designed with 54 items that were developed from the literature. The preliminary instrument was taken through both the expert review and pilot study. Using the non-probability convenience sampling method, 287 students participated in the final survey. SPSS version 25 was used for data analysis. Both descriptive and inferential statistics were done. Exploratory factor analysis (EFA) was used to validate the instrument while confirmatory factor analysis (CFA) and the structural equation modelling (SEM) were used to validate the model. Main findings: diagnostic instrument was validated and resulted in seven new factors, namely university confidence (UC), privacy expectations (PE), individual awareness (IA), external awareness (EA), privacy awareness (PA), practice confidence (PC) and correctness expectations (CE). Students indicated that they had high expectations of the university on privacy. The new factors showed a high level of awareness of privacy and had low confidence in the university safeguarding their personal information privacy. A SPIPP empirical model was also validated using structural equation modelling (SEM) and it indicated an average overall good fit between the proposed SPIPP conceptual model and the empirically derived SPIPP model Contribution: A diagnostic instrument that measures the perceptions (privacy awareness, expectations and confidence of students) was developed and validated. This study further contributed a model for information privacy perceptions that illustrates the relationship between the three concepts (awareness, expectations and confidence). Other universities can use the model to ascertain the perceptions of students on privacy. This research also contributes to improvement in the personal information protection of students processed by universities. The results will aid university management and information regulators to implement measures to create a culture of privacy and to protect student data in line with regulatory requirements and best practice.
School of Computing
Ph. D. (Information Systems)
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

„Mitigating social media threats towards information security : a case study of two academic institutions“. Thesis, 2015. http://hdl.handle.net/10210/14355.

Der volle Inhalt der Quelle
Annotation:
M.Tech. (Information Technology)
Since the introduction of Web 2.0, there has been an increase in the number of applications that promote the use of user-generated content, support social and collaborative interaction on the Web, and provide engaging user interactions. This together with the continuous increase in internet speed gave rise to the formation of interactive online communication channels, such as Social Media (SM). SM moved from just being a purely social platform to being an integral part of many organisations` business practices. Organisations saw an opportunity through SM to market themselves and interact with customers more efficiently and cost effectively, whist reaching a larger number of potential clients online ...
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Jordaan, Ansa. „An information security policy architecture with special reference to a tertiary institution“. Thesis, 2008. http://hdl.handle.net/10210/497.

Der volle Inhalt der Quelle
Annotation:
This dissertation will be limited to the compilation of an Information Security Policy Architecture for a Tertiary Institution. An Information Security Policy Architecture for a Tertiary Institution is probably the most challenging architecture to develop in an environment where information accessibility is promoted. The Security Policy Architecture is a component of a complete Information Security Architecture, which will not be addressed in this dissertation. To mitigate and manage risks, it is essential to know what the information technology risks are and as a second step, to actively manage these risks to ensure that they stay within acceptable limits. The reporting and the monitoring of these risks open new fields of research and will not be discussed in this dissertation.
von Solms, S.H., Prof.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Mohlabeng, Moyahabo Rossett. „An investigation of the information security implementation strategies in further education and training colleges in South Africa“. 2014. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1001597.

Der volle Inhalt der Quelle
Annotation:
M. Tech. Information Networks
The increasing sophistication of information security threats and the ever-growing body of regulation has made information security a critical function in higher education institutions. Research was undertaken to investigate the implementation of information security strategies in higher education institutions in South Africa. This thesis investigates the following: How will the formulation of an information security strategy improve information security in higher education institutions; in what way should higher education institutions employ information security policies in order to improve information security; and how may the adoption of information security framework create information security awareness among employees in higher education institutions?
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "Universities and colleges – Security measures – Zimbabwe"

1

Thomas, Bacigalupi, Hrsg. Campus security for public and private colleges and universities. 2. Aufl. [Eagan,Minn.]: West, a Thomson Reuters business, 2009.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

State Council of Higher Education for Virginia. Security on Virginia's campuses: Report of the State Council of Higher Education and the Advisoy Committee for Campus Security to the Governor and the General Assembly of Virginia. Richmond: Commonwealth of Virginia, 1994.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Wisconsin. Governor's Task Force on Campus Safety. Governor's Task Force on Campus Safety: Final report. Madison, WI: Wisconsin Office of Justice Assistance, 2007.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Wensyel, James W. Campus public safety and security: With guidance as well for high schools and private secondary schools. Springfield, Ill., U.S.A: Thomas, 1987.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

New York (State). Legislature. Senate. Higher Education Committee. Public hearing on college campus safety: Before the New York State Senate Standing Committee on Higher Education. Clifton Park, NY: Candyco Transcription Service, Inc., 2007.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Commission, Virginia State Crime. HJR 122 final report: Study on campus safety : report of the Virginia State Crime Commission to the Governor and the General Assembly of Virginia. Richmond, Va: Commonwealth of Virginia, 2006.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

The administration of public safety in higher education. Springfield, Ill., U.S.A: C.C. Thomas, 1987.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Commission on Accreditation for Law Enforcement Agencies. CALEA standards for campus security agencies: The standards manual for the CALEA Campus Security Accreditation Program. Gainesville, VA: Commission on Accreditation for Law Enforcement Agencies, Inc., 2011., 2011.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Gao xiao bao mi gong zuo de li lun yu shi jian. Kunming Shi: Yunnan da xue chu ban she, 2009.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

New York (State). Legislature. Senate. Higher Education Committee. Public hearing, security on campus. [Albany, NY: New York State Senate Standing Committee on Higher Education, 2007.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "Universities and colleges – Security measures – Zimbabwe"

1

Ran, Deling. „Research on the Development Trend and Protective Measures of Campus Network Security in Colleges and Universities“. In Advances in Intelligent Systems and Computing, 550–58. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-15235-2_79.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Liu, Yongli, Weifang Zhai und Song Ji. „Research on Campus Network Security Problem and Protection Strategy“. In Research Anthology on Artificial Intelligence Applications in Security, 1352–69. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch060.

Der volle Inhalt der Quelle
Annotation:
With the “Internet +” era of arrival, the major colleges and universities are in the construction of the wisdom of the campus, students and teachers living with the campus network is more and more closely related, Campus network security has become the protection of the wisdom of the campus construction. Campus network security issues become increasingly serious; a single security protection has been unable to meet the current security needs. This paper analyzes the major security threats facing the campus network, and presents the campus network security protection measures from the physical layer, network layer, system layer, application layer and management of five aspects, thus constructing the campus network's overall security defense system. The system has multiple security protection for Campus Network, thus improving the security of the campus network.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Liu, Yongli, Weifang Zhai und Song Ji. „Research on Campus Network Security Problem and Protection Strategy“. In Research Anthology on Artificial Intelligence Applications in Security, 1352–69. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch060.

Der volle Inhalt der Quelle
Annotation:
With the “Internet +” era of arrival, the major colleges and universities are in the construction of the wisdom of the campus, students and teachers living with the campus network is more and more closely related, Campus network security has become the protection of the wisdom of the campus construction. Campus network security issues become increasingly serious; a single security protection has been unable to meet the current security needs. This paper analyzes the major security threats facing the campus network, and presents the campus network security protection measures from the physical layer, network layer, system layer, application layer and management of five aspects, thus constructing the campus network's overall security defense system. The system has multiple security protection for Campus Network, thus improving the security of the campus network.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie