Oxford Index Browse

You are looking at 1-10 of 20 items for:

Computer Science x Computing x clear all

Refine by type

Refine by product

 

The cloud computer

in The Computer

December 2011; p ublished online September 2013 .

Chapter. Subjects: Computer Science; Computing. 5062 words.

‘The cloud computer’ shows how the Internet can be treated and used as a massive supercomputer. This supercomputer holds closed data, accessible only by certain parties, and open data,...

Go to Very Short Introductions »  abstract

The Computer

Darrel Ince.

December 2011; p ublished online September 2013 .

Book. Subjects: Computer Science; Computing. 152 pages.

The Computer: A Very Short Introduction shows how computers have changed so much since the room–filling, bulky magnetic tape running monsters of the mid–20th century. They now form a vital...

Go to Very Short Introductions »  abstract

Critical visualization: a case for rethinking how we visualize risk and security

Peter Hall, Claude Heath and Lizzie Coles-Kemp.

in Journal of Cybersecurity

September 2015; p ublished online December 2015 .

Journal Article. Subjects: IT and Communications Law; Computer Science; Computer Security. 7264 words.

In an era of high-profile hacks, information leaks and cybercrime, cybersecurity is the focus of much corporate and state-funded research. Data visualization is regarded as an important...

Go to Oxford Journals »  full text: open access

The disruptive computer

in The Computer

December 2011; p ublished online September 2013 .

Chapter. Subjects: Computer Science; Computing. 6294 words.

‘The disruptive computer’ assesses the many ways in which computers have affected the way we interact with each other. There are two types of disruption arising from computer use: low-end...

Go to Very Short Introductions »  abstract

From physical security to cybersecurity

Arunesh Sinha, Thanh H. Nguyen, Debarun Kar, Matthew Brown, Milind Tambe and Albert Xin Jiang.

in Journal of Cybersecurity

September 2015; p ublished online November 2015 .

Journal Article. Subjects: IT and Communications Law; Computer Science; Computer Security. 14191 words.

Security is a critical concern around the world. In many domains from cybersecurity to sustainability, limited security resources prevent complete security coverage at all times. Instead,...

Go to Oxford Journals »  full text: open access

The global computer

in The Computer

December 2011; p ublished online September 2013 .

Chapter. Subjects: Computer Science; Computing. 3406 words.

‘The global computer’ aims to change the reader's perception of a computer from a single grey box to part of a global supercomputer linked via the Internet. Computers cannot solve every...

Go to Very Short Introductions »  abstract

Identifying patterns in informal sources of security information

Emilee Rader and Rick Wash.

in Journal of Cybersecurity

September 2015; p ublished online December 2015 .

Journal Article. Subjects: IT and Communications Law; Computer Science; Computer Security. 20810 words.

Computer users have access to computer security information from many different sources, but few people receive explicit computer security training. Despite this lack of formal education,...

Go to Oxford Journals »  full text: open access

Increasing cybersecurity investments in private sector firms

Lawrence A. Gordon, Martin P. Loeb, William Lucyshyn and Lei Zhou.

in Journal of Cybersecurity

September 2015; p ublished online November 2015 .

Journal Article. Subjects: IT and Communications Law; Computer Science; Computer Security. 13628 words.

The primary objective of this article is to develop an economics-based analytical framework for assessing the impact of government incentives/regulations designed to offset the tendency to...

Go to Oxford Journals »  full text: open access

The insecure computer

in The Computer

December 2011; p ublished online September 2013 .

Chapter. Subjects: Computer Science; Computing. 4668 words.

‘The insecure computer’ outlines the main threats to computer security, and gives advice on how they can be countered. Malware is software that is introduced to a system illegally and which...

Go to Very Short Introductions »  abstract

Journal of Cybersecurity

Journal. Subjects: IT and Communications Law; Computer Science; Computer Security.

Go to Oxford Journals »  home page