Zobrazeno 1 - 10
of 44
pro vyhledávání: '"Gerald V. Post"'
Autor:
Gerald V. Post, Suzanne B. Walchli
Publikováno v:
Journal of Information Privacy and Security. 10:113-137
Early social networks were generally open with minimal privacy controls. Some anecdotal evidence suggests that people might want more control over privacy on social networks. As an example of one response to this desire, the network Google+ was intro
Autor:
Albert Kagan, Gerald V. Post
Publikováno v:
International Journal of Business Intelligence Research. 3:16-28
Data mining and business intelligence tools have been adding features and gaining uses, and statistical tools developed for data mining tasks often require advanced knowledge and training to apply. Development of these selected tools requires tradeof
Autor:
Jace Hargis, Gerald V. Post
Publikováno v:
Decision Sciences Journal of Innovative Education. 10:79-107
Online education and computer-assisted instruction (CAI) have existed for years, but few general tools exist to help instructors create and evaluate lessons. Are these tools sufficient? Specifically, what elements do instructors want to see in online
Autor:
Gerald V. Post, Albert Kagan
Publikováno v:
Computers & Security. 26:229-237
Computer security is a balance between protecting information and enabling authorized access. Tightening security by making systems more inaccessible can hinder employees and make them less productive. It can also result in lower security as workers
Autor:
Gerald V. Post, Albert Kagan
Publikováno v:
Journal of Information Privacy and Security. 2:3-29
Computer security is increasingly relying on legal remedies. But is the legal system capable and ready to handle the complexities of security issues? This study surveys various members of legal institutions to identify readiness and potential shortco
Autor:
Gerald V. Post, Albert Kagan
Publikováno v:
EDPACS. 34:1-10
When taking a typical approach to computer security, one could make the following relatively extreme statements: A piece of data can be rendered completely secure with 100 percent assurance. Simply write the data on a piece of paper, burn the paper,
Autor:
Gerald V. Post, Thomas G. Whisenand
Publikováno v:
Decision Sciences Journal of Innovative Education. 3:273-293
Teaching and learning database design is difficult for both instructors and students. Students need to solve many problems with feedback and corrections. A Web-based specialized expert system was created to enable students to create designs online an
Autor:
Gerald V. Post, Albert H. Huang
Publikováno v:
Human Systems Management. 23:193-201
This paper reports an empirical study that evaluated the usability of two interaction approaches used by Web-based application software. Data was collected using 107 subjects. Each participant performed the same tasks on both systems: a user-driven,
Autor:
Albert Kagan, Gerald V. Post
Publikováno v:
Information and Software Technology. 45:461-467
Application and operating system errors are a continuing source of problems in computer security. As businesses increase the number of servers through distributed computing and server farms, it becomes more difficult to keep the systems up to date. A
Autor:
Albert Kagan, Gerald V. Post
Publikováno v:
Information Systems Security. 11:33-40
Security patches to operating systems present a dilemma. Fixing the systems requires notifying systems administrators and distributing patches. However, this same information makes it possible for attackers to create automated scripts to search for m