Jeff Ramsdell.Jpg, 2017 Appalachian State University
From The Editors, 2017 Kennesaw State University
From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth
Journal of Cybersecurity Education, Research and Practice
No abstract provided.
A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, 2017 Nova Southeastern University
A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard K. Nilsen, Yair Levy, Steven R. Terrell Ph.D., Dawn Beyer
Journal of Cybersecurity Education, Research and Practice
Organizational information system users (OISUs) that are open to cyber threats vectors are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, technical cybersecurity controls may be rendered useless due to a lack of cybersecurity competency of OISUs. The main goal of this research study was to propose and validate, using subject matter experts (SMEs), a reliable hands-on assessment prototype tool for measuring the knowledge, skills, and abilities (KSAs) that comprise the cybersecurity competency of an OISU. Primarily using the Delphi methodology, this study implemented four phases of data collection using cybersecurity SMEs for proposing and …
Social Media Risk Perceptions Of Human Resource Professionals: Issues Undergraduate Students Should Consider, 2017 University of Alabama, Birmingham
Social Media Risk Perceptions Of Human Resource Professionals: Issues Undergraduate Students Should Consider, Julio C. Rivera, Jack Howard, Samuel Goh, James L. Worrell, Paul Di Gangi
Journal of Cybersecurity Education, Research and Practice
This study contrasts the social media risk perceptions of undergraduate students, versus those of certified Human Resource professionals. Social media is widely used by most segments of the population, and particularly among the age group that includes most undergraduate students. Organizations hiring employees are increasingly examining job applicant's social media postings as part of the applicant screening process. In this study we examine how these groups differ in their perceptions of the risks inherent in using social media, and what these differences may mean for students seeking employment. Recommendations are made for raising undergraduate student awareness of these risks.
Synergistic Security: A Work System Case Study Of The Target Breach, 2017 Arkansas Tech University
Synergistic Security: A Work System Case Study Of The Target Breach, Martha Nanette Harrell
Journal of Cybersecurity Education, Research and Practice
Recent publicized security breaches can be used to evaluate information security programs. The processes and procedures that allowed the event to occur can be examined in a case study and then be used to find methods for future mitigation of risk. The Target security breach is used in this study to examine the organization’s information security program using a macro-ergonomic model. This research posits that an information security program should consider the work system design, based in macro-ergonomics, to help mitigate information security risk to the organization and ensure an efficient and effective information security program. Based on a seminal …
A Toolkit Approach To Information Security Awareness And Education, 2017 Plymouth University, U.K.
A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland
Journal of Cybersecurity Education, Research and Practice
In today’s business environment where all operations are enabled by technology, information security has become an established discipline as more and more businesses realize its value. The human component has been recognized to have an important role in information security since the only way to reduce security risks is through making employees more information security aware. Towards this goal the research will appreciate the importance of information security awareness by illustrating the need for more effective user training. Further to that it proposes and develops an information security toolkit as a prototype awareness raising initiative. Apart from the elements of …
What Bitcoin Is, And How It Can Change Commerce, 2017 CUNY Graduate School of Journalism
What Bitcoin Is, And How It Can Change Commerce, Jeffrey Bukhari
Capstones
The use of the digital currency Bitcoin has spiked dramatically over the last several years. Spurred by interest from investors and those excited about its commercial and banking potential, the value of the cryptocurrency has seen its value greatly increase since its beginning in 2009.
This project explains the underlying technology behind Bitcoin, how Bitcoin is and will change commerce, and what potential lies ahead for the digital currency.
An Integrated Behavioural Model Towards Evaluating And Influencing Energy Behaviour—The Role Of Motivation In Behaviour Demand Response, 2017 People Behaviour & Technology Integration Group, Nimbus Research Centre, Cork Institute of Technology, Cork T12P928, Ireland
An Integrated Behavioural Model Towards Evaluating And Influencing Energy Behaviour—The Role Of Motivation In Behaviour Demand Response, Julia Blanke, Christian Beder, Martin Klepal
NIMBUS Articles
The change in the actual use of buildings by its occupants is receiving more and more attention. Over the lifecycle of a building the occupants and therefore the demands towards the buildings often change a lot. To match these altering conditions, particularly in the context of the demand for energy efficiency, purely technical approaches usually cannot solve the problem on their own or are not financially viable. It is therefore essential to take the behaviour of the end user into account and ask the fundamental question: “How is it possible to influence people’s behaviour towards a more pro-environmental outcome, and …
Breadcrumbs: Privacy As A Privilege, 2017 City University of New York (CUNY)
Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj
Capstones
Breadcrumbs: Privacy as a Privilege Abstract
By: Prachi Bhardwaj
In 2017, the world saw more data breaches than in any year prior. The count was more than the all-time high record in 2016, which was 40 percent more than the year before that.
That’s because consumer data is incredibly valuable today. In the last three decades, data storage has gone from being stored physically to being stored almost entirely digitally, which means consumer data is more accessible and applicable to business strategies. As a result, companies are gathering data in ways previously unknown to the average consumer, and hackers are …
Applying Agile Project Management To Art Museums: A Proposal For Implementing A Generalist Scrum Master, 2017 The University of San Francisco
Applying Agile Project Management To Art Museums: A Proposal For Implementing A Generalist Scrum Master, Vincent Sulit
Master's Projects and Capstones
This capstone project examines organizational change, along with its challenges, through case studies in museums and businesses in the private sector, subsequently providing a possible solution for museums to adapt to the current global market economy through the use of Agile Project Management (Agile). I cite recent case studies of art museums implementing Agile for digital product development. This project proposal aims to introduce Agile outside of digital departments, including Exhibitions and Education, with the goal of developing better visitor-centered offerings from museums. This may be achieved through the proposal of a job description for a new museum position of …
Nebraska Unwrapped: Innovation Studio Provides 'Makers' Tools Of Their Dreams, 2017 University of Nebraska-Lincoln
Nebraska Unwrapped: Innovation Studio Provides 'Makers' Tools Of Their Dreams, Deann Gayman
Nebraska Innovation Studio
Nebraska Unwrapped: Innovation Studio provides 'makers' tools of their dreams, December 12, 2017.
It has been another successful year for the University of Nebraska-Lincoln. In the spirit of the holiday season, we’re unwrapping the impact of the state’s flagship institution and taking a closer look at some highlights. Today, "Nebraska Unwrapped" is focusing on innovation. Other topics in the series include student experience, outreach, and research.
Nebraska Innovation Studio makes sought-after tools and work space available to University of Nebraska-Lincoln students and members of the public. For a small monthly fee, ranging from $15 to $55 (https://innovationstudio.unl.edu/fee-breakdown) , …
A Framework Towards Technology Creation In Africa: Focusing On Ghana, 2017 Ho Polytechnic, Ghana
A Framework Towards Technology Creation In Africa: Focusing On Ghana, Martin Yao Donani, Hannatu Abue Kugblenu, Azindow Bawa Fuseini
International Journal of African Development
Underdevelopment in Africa has been historical and a global concern coupled with the quest for good governance. Several efforts have been made in academia, national governments, the international community, and other institutional arrangements to reverse the trend. These efforts however are yet to produce a lasting result as Africa is still characterized by low productivity output, poverty and a widening technology gap when compared to other developing regions of the world. Conventional approaches used to address the African problem have consistently been devoid of indigenous technology development. Technology is here seen as paramount to every form of production on which …
Technology Planning For Aligning Emerging Business Models And Regulatory Structures: The Case Of Electric Vehicle Charging And The Smart Grid, 2017 Portland State University
Technology Planning For Aligning Emerging Business Models And Regulatory Structures: The Case Of Electric Vehicle Charging And The Smart Grid, Kelly R. Cowan
Dissertations and Theses
Smart grid has been described as the Energy Internet: Where Energy Technology meets Information Technology. The incorporation of such technology into vast existing utility infrastructures offers many advantages, including possibilities for new smart appliances, energy management systems, better integration of renewable energy, value added services, and new business models, both for supply- and demand-side management. Smart grid also replaces aging utility technologies that are becoming increasingly unreliable, as the average ages for many critical components in utility systems now exceed their original design lives. However, while smart grid offers the promise of revolutionizing utility delivery systems, many questions remain about …
An Integrative Model Of Managing Software Security During Information Systems Development, 2017 Northern Kentucky University
An Integrative Model Of Managing Software Security During Information Systems Development, Vijay Raghavan, Xiaoni Zhang
Journal of International Technology and Information Management
This study investigates the critical relationship between organizational system development policies, procedures and processes and the resulting security quality of the systems developed. We draw from a general software quality model to provide a theoretical foundation for testing this relationship. We used paper-based survey as well as online surveys to collect data from software developers and project managers. Our results revealed a significant relationship between management support and security policies and development process control. We also found significant relationships between development-process control and security quality, attitude and security quality, and the interaction between value congruence and commitment to provide security …
Recognizing Linguistic Cues To Align Financial Coaching Strategies With The Transtheoretical Model Of Change, 2017 Utah State University
Recognizing Linguistic Cues To Align Financial Coaching Strategies With The Transtheoretical Model Of Change, Lucy M. Delgadillo
Applied Sciences, Technology and Education Faculty Publications
Financial coaching is more effective if a finance professional understands where a client is in the process of change. This article presents five mini scenarios exemplifying the stages of change as they apply to clients receiving financial coaching as well as a sampling of coaching strategies useful for helping clients move through those stages. In particular, the focus of each mini scenario is language used by clients that can provide clues about the stage of change the client is in. Financial management Extension professionals can use the information presented to recognize linguistic cues related to stages of change and align …
Effect Of A Ubiquitous Moral Cue On Ethical Leadership, Moral Disengagement And Goal Difficulty: Real-World Outcomes Of A Novel Behavioural Intervention By Mobile Application Technology, 2017 Singapore Management University
Effect Of A Ubiquitous Moral Cue On Ethical Leadership, Moral Disengagement And Goal Difficulty: Real-World Outcomes Of A Novel Behavioural Intervention By Mobile Application Technology, Boon Heon Tan
Dissertations and Theses Collection (Open Access)
Firms invest significant resources in their ethical infrastructure to influence the ethical decision-making of employees. The advent of mobile technology has extended the frontier of interventions that may discourage unethical behaviour, through the use of ubiquitously-present mobile-based moral cues. I conducted a prospective, randomized field experiment, to study how a ubiquitous moral cue may positively enhance ethical decision-making. Sales professionals working in a pharmaceutical firm in China were assigned randomly by teams to either receive, or not, a mobile application from their firm’s compliance department. Over six months, participants completed three cross-sectional surveys, and were randomly monitored by an independent …
Blockchain Technology: An Analysis Of Potential Applications And Uses, 2017 Honors College, Pace University
Blockchain Technology: An Analysis Of Potential Applications And Uses, Jeffrey Kogon
Honors College Theses
This paper will focus on explaining what blockchain technology is, the fundamentals of how it works, and applications of it. By utilizing sophisticated cryptography, a distributed network, a specified order of events the technology is able to create a ledger that cannot be altered due to its existence on many computers that able to detect if the data has been changed or tampered with. To help illustrate the uses of blockchain technology the technical explanation is complemented with real and hypothetical ways that the technology it being used. The use of blockchain technology originated with financial application and has expanded …
Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., 2017 University of East London
Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr
Journal of International Technology and Information Management
The discovery of useful or worthwhile process models must be performed with due regards to the transformation that needs to be achieved. The blend of the data representations (i.e data mining) and process modelling methods, often allied to the field of Process Mining (PM), has proven to be effective in the process analysis of the event logs readily available in many organisations information systems. Moreover, the Process Discovery has been lately seen as the most important and most visible intellectual challenge related to the process mining. The method involves automatic construction of process models from event logs about any domain …
Developing A Digital Contents Valuing Model: How Users Appreciate Their Values, 2017 Yeungnam University
Developing A Digital Contents Valuing Model: How Users Appreciate Their Values, Changsu Kim, Jongheon Kim
Journal of International Technology and Information Management
The principal objective of this paper was to propose and verify a digital content valuing model, which is expected to perform a significant role in future research, and provide novel and practical implications. For the efficacy of a model for the evaluation of digital content value, this study reviewed digital content value and categorized it into intrinsic, interaction, and business value. Based on the research model, we attempted to identify and assess the effects of intrinsic digital content value on digital content interaction value, and to characterize the relationship between digital content interaction value and digital content business value. Consequently, …
Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, 2017 Adeleke University, Ede
Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele
Journal of International Technology and Information Management
This paper provides an overview of the current state of privacy and data protection policies and regulations in Nigeria. The paper contends that the extant legal regime in Nigeria is patently inadequate to effectively protect individuals against abuse resulting from the processing of their personal data. The view is based on the critical analysis of the current legal regime in Nigeria vis-à-vis the review of some vital data privacy issues. The paper makes some recommendations for the reform of the law.