Impact of Information Security in Academic Institutions on Public Safety and Security in the United States, 2005-2006

Despite the critical information security issues faced by academic institutions, little research has been conducted at the policy, practice, or theoretical levels to address these issues, and few policies or cost-effective controls have been developed. The purpose of this research study was three-fo...

Descripción completa

Guardado en:  
Detalles Bibliográficos
Autor principal: Burd, Steffani A. (Autor)
Tipo de documento: Electrónico Research Data
Lenguaje:Inglés
Publicado: [Erscheinungsort nicht ermittelbar] [Verlag nicht ermittelbar] 2008
En:Año: 2008
Acceso en línea: Volltext (kostenfrei)
Verificar disponibilidad: HBZ Gateway
Palabras clave:

MARC

LEADER 00000cam a22000002c 4500
001 1840056088
003 DE-627
005 20230325055159.0
007 cr uuu---uuuuu
008 230324s2008 xx |||||o 00| ||eng c
024 7 |a 10.3886/ICPSR21188.v1  |2 doi 
035 |a (DE-627)1840056088 
035 |a (DE-599)KXP1840056088 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a Burd, Steffani A.  |e VerfasserIn  |4 aut 
245 1 0 |a Impact of Information Security in Academic Institutions on Public Safety and Security in the United States, 2005-2006 
264 1 |a [Erscheinungsort nicht ermittelbar]  |b [Verlag nicht ermittelbar]  |c 2008 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a Despite the critical information security issues faced by academic institutions, little research has been conducted at the policy, practice, or theoretical levels to address these issues, and few policies or cost-effective controls have been developed. The purpose of this research study was three-fold: (1) to create an empirically-based profile of issues and approaches, (2) to develop a practical road map for policy and practice, and (3) to advance the knowledge, policy, and practice of academic institutions, law enforcement, government, and researchers. The study design incorporated three methods of data collection: a quantitative field survey, qualitative one-on-one interviews, and an empirical assessment of the institutions' network activity. Survey data collection involved simple random sampling of 600 academic institutions from the Department of Education's National Center for Education Statistics (NCES) Integrated Postsecondary Education Data System (IPEDS) database, recruitment via postcard, telephone, and email, Web-based survey administration, and three follow-ups. Results are contained in Part 1, Quantitative Field Survey Data. Interview data collection involved selecting a sample size of 15 institutions through a combination of simple random and convenience sampling, recruitment via telephone and email, and face-to-face or telephone interviews. Results are contained in Part 2, Qualitative One-on-One Interview Data. Network analysis data collection involved convenience sampling of two academic institutions, recruitment via telephone and email, installing Higher Education Network Analysis (HENA) on participants' systems, and six months of data collection. Results are in Part 3, Subject 1 Network Analysis Data, and Part 4, Subject 2 Network Analysis Data. The Quantitative Field Survey Data (Part 1) contains 19 variables on characteristics of institutions that participated in the survey component of this study, as well as 263 variables derived from responses to the Information Security in Academic Institutions Survey, which was organized into five sections: Environment, Policy, Information Security Controls, Information Security Challenges, and Resources. The Qualitative One-on-One Interview Data (Part 2) contains qualitative responses to a combination of closed-response and open-response formats. The data are divided into the following seven sections: Environment, Institution's Potential Vulnerability, Institution's Potential Threat, Information Value and Sharing, End Users, Countermeasures, and Insights. Data collected through the empirical analysis of network activity (Part 3 and Part 4) include type and protocol of attack, source and destination information, and geographic location. 
540 |a ICPSR Terms of Use 
650 4 |a Internet 
650 4 |a Colleges 
650 4 |a computer related crimes 
650 4 |a Higher Education 
650 4 |a Information 
650 4 |a information policy 
650 4 |a Information systems 
650 4 |a Information Technology 
650 4 |a National security 
650 4 |a Public safety 
650 4 |a Security 
650 4 |a Terrorism 
650 4 |a terrorist threat 
650 4 |a Threats 
650 4 |a Universities 
655 7 |a Forschungsdaten  |0 (DE-588)1098579690  |0 (DE-627)857755366  |0 (DE-576)469182156  |2 gnd-content 
856 4 0 |u https://doi.org/10.3886/ICPSR21188.v1  |x Resolving-System  |z kostenfrei  |3 Volltext 
935 |a mkri 
951 |a BO 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4296803670 
LOK |0 003 DE-627 
LOK |0 004 1840056088 
LOK |0 005 20230324125244 
LOK |0 008 230324||||||||||||||||ger||||||| 
LOK |0 035   |a (DE-2619)ICPSR21188 
LOK |0 040   |a DE-2619  |c DE-627  |d DE-2619 
LOK |0 092   |o n 
LOK |0 852   |a DE-2619 
LOK |0 852 1  |9 00 
LOK |0 935   |a foda  |a nacj 
OAS |a 1 
ORI |a SA-MARC-krimdoka001.raw