Securing networks of educational institutions and role of virus protection programs in securing information networks

Akmal sakr

Abstract


Securing networks of educational institutions and role of protection programs against virus in securing networks are important factors in different departments in the ministry of education in Kuwait, and have differences significant statistically, that could be assigned to variable sex, age, educational qualification, functional level, service period, and number of computer courses. Moreover, the protection measurements should depend on the type of networks that varied from Ring network to Bus network and Hybrid network. 


References


Adel M. Aladwani, Implications of Some of the Recent Improvement Philosophies for the Management of the In-formation Systems organization, Industrial Management & Data systems, Vol. 99, No 1, 2010, PP33-39.

Christian Hogberg & Leif Edvinsson, A Design for Futurizing Knowledge Networking, Journal of knowledge Management, Vol. 2,No 2,2005, P4.

Francios Bergeron, Louis Raymond & Suzanne Rivard, Fit in Strategic Information Technology Management Research: An Empirical Comparison of Perspectives, Omega, Vol.29, No.2, 2001,pp125-142.

G.Premkumar & Margaret Roberts, Adoption of New Information Technologies in Rural Small Businesses, Omega, Vol.27, No.4, 1999, pp467-484.

Ganesh D. Bhatt and Rodney L.Stump, An Empirically Derived Modal of the Role of IS Network in Business Process Improvement Initiatives, Omega, Vol. 29,No1, 2001,pp 29-48.

Ganesh D. Bhatt, An Empirical Examination of the Ef-fects of Information Systems Integration on Business Pro-cess Improvement, International Journal of operations & production Management, Vol. 20, No11, 2000, PP1331-1359.

Geoffrey Elliott & Susan StarKings, Business Information Technology: System, Theoy & Practice, prentice Hall, London, 2005,PP 258-264.

Sang M. Lee &Soongo Hong, An Enterprise- Wide Knowledge Management Systems Infrastructure, Industrial Management & Data Systems, Vol. 102,No1, 2002,PP 17-25.

Yao-Chuan Tasi, Comparative Analysis of Model Management and Relational Database Management, Omega, Vol.29, N 2, 2001, pp157-170.

Zakaryia Ahmed Amar: Protection of main networks from penetration and harmful programs, M Sc Thesis, In-formation Technology Department, Higher Studies College, El Nyleen University, Sudan, 2011, p.19 (in arabic)


Refbacks

  • There are currently no refbacks.