Academic literature on the topic 'Universities and colleges – Security measures – Zimbabwe'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Universities and colleges – Security measures – Zimbabwe.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Universities and colleges – Security measures – Zimbabwe"
Zhao, Ying. "Applied-Information Technology in the Internet of Things in the Construction of File Security System in Colleges and Universities." Advanced Materials Research 1014 (July 2014): 399–403. http://dx.doi.org/10.4028/www.scientific.net/amr.1014.399.
Full textYaokumah, Winfred. "The Influence of Students' Characteristics on Mobile Device Security Measures." International Journal of Information Systems and Social Change 7, no. 3 (July 2016): 44–66. http://dx.doi.org/10.4018/ijissc.2016070104.
Full textLiu, Yongli, Weifang Zhai, and Song Ji. "Research on Campus Network Security Problem and Protection Strategy." International Journal of Advanced Pervasive and Ubiquitous Computing 9, no. 3 (July 2017): 15–31. http://dx.doi.org/10.4018/ijapuc.2017070102.
Full textSun, Xiu Juan. "Personal Computer Network Security Prevention Research." Advanced Materials Research 971-973 (June 2014): 1684–87. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1684.
Full textPiscikiene, Inga, Jurate Romeikiene, and Brigita Šustickienė. "CYBER VULNERABILITY IN LIGHT OF ONLINE LEARNING REALITY." SOCIETY. INTEGRATION. EDUCATION. Proceedings of the International Scientific Conference 5 (May 28, 2021): 426–35. http://dx.doi.org/10.17770/sie2021vol5.6367.
Full textXie, Jian Hua, and Jian Hua Xiao. "Constructing an University Scientific Research Management Information System of NET Platform." Applied Mechanics and Materials 441 (December 2013): 984–88. http://dx.doi.org/10.4028/www.scientific.net/amm.441.984.
Full textSilumba, Cassim, and Show Chibango. "Online Education in Promoting Continued Education during Coronavirus Outbreak in Zimbabwe: ‘Challenges and Solutions’." Asian Journal of Interdisciplinary Research 3, no. 4 (December 2, 2020): 74–88. http://dx.doi.org/10.34256/ajir2047.
Full textTatomur, Irina. "UNIVERSITY CYBER SECURITY AS A METHOD FOR ANTI-FISHING FRAUD." Economic discourse, no. 1 (March 2020): 59–67. http://dx.doi.org/10.36742/2410-0919-2020-1-7.
Full textMoore, Carolyn, Kathleen Davis, and Wanyi Wang. "Low Food Security Present on Texas College Campuses Despite High Nutrition Literacy." Current Developments in Nutrition 4, Supplement_2 (May 29, 2020): 246. http://dx.doi.org/10.1093/cdn/nzaa043_097.
Full textZhang, Dong, and Zhongyi Guo. "Mobile Sentry Robot for Laboratory Safety Inspection Based on Machine Vision and Infrared Thermal Imaging Detection." Security and Communication Networks 2021 (April 28, 2021): 1–16. http://dx.doi.org/10.1155/2021/6612438.
Full textDissertations / Theses on the topic "Universities and colleges – Security measures – Zimbabwe"
Viljoen, Stephen. "Applying a framework for IT governance in South African higher education institutions." Thesis, Nelson Mandela Metropolitan University, 2005. http://hdl.handle.net/10948/416.
Full textNcube, Lashias. "Campus policing : an ethnography of the University of Cape Town Campus Control Unit." Master's thesis, University of Cape Town, 1996. http://hdl.handle.net/11427/17205.
Full textThe aim of undertaking the project was to investigate the activities of the University of Cape Town Campus Control unit. The study is based on the premise that there is an underestimation of Campus Control work. A number of basic questions were examined in the field. The researcher sought to determine, among other things, the extent to which the unit's work is invisible, and the extent to which the university community's reported ambivalence and indifference to Campus Control practice a result of a lack of clarity regarding the role of the unit within the university. The research also moved from the premise that there is too great an emphasis on the use of crime statistics as indices of the unit' effectiveness. The racial and gender configuration of assignments was also investigated as was the training offered to new and old recruits. Participant observation as a body of different methods and techniques of research was used. The researcher spent six weeks in the field with the campus control officers in order to experience the demands of policing from "the native's point of view". The unit is in the process of transforming. It seeks to embrace the discourse of community participation with a view to getting the entire community involved in the provision of its own safety and security. The community involvement initiatives are also designed to improve the relationship between the unit and the community. In the past, the relationship has been a very traumatic one, fraught with mistrust and had far-reaching consequences for the unit's performance. The study comes to the conclusion that both women and blacks in Campus Control are a case of structural marginality. The unit does not reflect the racial and gender composition of the community it serves. It was also discovered that some of the unit's glaring shortcomings are played out in the sphere of training. The study should help members of the university community to understand and appreciate the role of this indispensable unit within the university community.
Osburn, Toby W. "Hazard mitigation and disaster preparedness planning at American Coastal University: Seeking the disaster-resistant university." Thesis, University of North Texas, 2008. https://digital.library.unt.edu/ark:/67531/metadc9745/.
Full textHall, Dennis H. H. "Impact of the Clery Act: An Examination of the Relationship between Clery Act Data and Recruitment at Private Colleges and Universities." Thesis, University of North Texas, 2017. https://digital.library.unt.edu/ark:/67531/metadc984250/.
Full textTsang, Yuenting. "GIS application in emergency management of terrorism events on the University of North Texas campus." Thesis, University of North Texas, 2008. https://digital.library.unt.edu/ark:/67531/metadc9021/.
Full textMurphy, Michael William. "Campus Sexual Assault: How Oregon University System Schools Respond." PDXScholar, 2011. https://pdxscholar.library.pdx.edu/open_access_etds/281.
Full textMaguraushe, Kudakwashe. "Development of a diagnostic instrument and privacy model for student personal information privacy perceptions at a Zimbabwean university." Thesis, 2021. http://hdl.handle.net/10500/27557.
Full textSchool of Computing
Ph. D. (Information Systems)
"Mitigating social media threats towards information security : a case study of two academic institutions." Thesis, 2015. http://hdl.handle.net/10210/14355.
Full textSince the introduction of Web 2.0, there has been an increase in the number of applications that promote the use of user-generated content, support social and collaborative interaction on the Web, and provide engaging user interactions. This together with the continuous increase in internet speed gave rise to the formation of interactive online communication channels, such as Social Media (SM). SM moved from just being a purely social platform to being an integral part of many organisations` business practices. Organisations saw an opportunity through SM to market themselves and interact with customers more efficiently and cost effectively, whist reaching a larger number of potential clients online ...
Jordaan, Ansa. "An information security policy architecture with special reference to a tertiary institution." Thesis, 2008. http://hdl.handle.net/10210/497.
Full textvon Solms, S.H., Prof.
Mohlabeng, Moyahabo Rossett. "An investigation of the information security implementation strategies in further education and training colleges in South Africa." 2014. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1001597.
Full textThe increasing sophistication of information security threats and the ever-growing body of regulation has made information security a critical function in higher education institutions. Research was undertaken to investigate the implementation of information security strategies in higher education institutions in South Africa. This thesis investigates the following: How will the formulation of an information security strategy improve information security in higher education institutions; in what way should higher education institutions employ information security policies in order to improve information security; and how may the adoption of information security framework create information security awareness among employees in higher education institutions?
Books on the topic "Universities and colleges – Security measures – Zimbabwe"
Thomas, Bacigalupi, ed. Campus security for public and private colleges and universities. 2nd ed. [Eagan,Minn.]: West, a Thomson Reuters business, 2009.
Find full textState Council of Higher Education for Virginia. Security on Virginia's campuses: Report of the State Council of Higher Education and the Advisoy Committee for Campus Security to the Governor and the General Assembly of Virginia. Richmond: Commonwealth of Virginia, 1994.
Find full textWisconsin. Governor's Task Force on Campus Safety. Governor's Task Force on Campus Safety: Final report. Madison, WI: Wisconsin Office of Justice Assistance, 2007.
Find full textWensyel, James W. Campus public safety and security: With guidance as well for high schools and private secondary schools. Springfield, Ill., U.S.A: Thomas, 1987.
Find full textNew York (State). Legislature. Senate. Higher Education Committee. Public hearing on college campus safety: Before the New York State Senate Standing Committee on Higher Education. Clifton Park, NY: Candyco Transcription Service, Inc., 2007.
Find full textCommission, Virginia State Crime. HJR 122 final report: Study on campus safety : report of the Virginia State Crime Commission to the Governor and the General Assembly of Virginia. Richmond, Va: Commonwealth of Virginia, 2006.
Find full textThe administration of public safety in higher education. Springfield, Ill., U.S.A: C.C. Thomas, 1987.
Find full textCommission on Accreditation for Law Enforcement Agencies. CALEA standards for campus security agencies: The standards manual for the CALEA Campus Security Accreditation Program. Gainesville, VA: Commission on Accreditation for Law Enforcement Agencies, Inc., 2011., 2011.
Find full textGao xiao bao mi gong zuo de li lun yu shi jian. Kunming Shi: Yunnan da xue chu ban she, 2009.
Find full textNew York (State). Legislature. Senate. Higher Education Committee. Public hearing, security on campus. [Albany, NY: New York State Senate Standing Committee on Higher Education, 2007.
Find full textBook chapters on the topic "Universities and colleges – Security measures – Zimbabwe"
Ran, Deling. "Research on the Development Trend and Protective Measures of Campus Network Security in Colleges and Universities." In Advances in Intelligent Systems and Computing, 550–58. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-15235-2_79.
Full textLiu, Yongli, Weifang Zhai, and Song Ji. "Research on Campus Network Security Problem and Protection Strategy." In Research Anthology on Artificial Intelligence Applications in Security, 1352–69. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch060.
Full textLiu, Yongli, Weifang Zhai, and Song Ji. "Research on Campus Network Security Problem and Protection Strategy." In Research Anthology on Artificial Intelligence Applications in Security, 1352–69. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch060.
Full text