Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 21 of 21

Full-Text Articles in Entire DC Network

The Future Of Enterprise Information Systems, Ali Sunyaev, Tobias Dehling, Susanne Strahringer, Li Da Xu, Martin Heinig, Michael Perscheid, Rainer Alt, Matti Rossi Jan 2023

The Future Of Enterprise Information Systems, Ali Sunyaev, Tobias Dehling, Susanne Strahringer, Li Da Xu, Martin Heinig, Michael Perscheid, Rainer Alt, Matti Rossi

Information Technology & Decision Sciences Faculty Publications

[First paragraph] Enterprise information systems (EIS) have been important enablers of crossfunctional processes within businesses since the 1990s. Often referred to as enterprise resource planning (ERP) systems, they were extended in line with electronic businesses to integrate with suppliers as well as customers. Today, EIS architectures comprise not only ERP, supply chain, and customer relationship management systems, but also business intelligence and analytics. Recently, the move towards decentralized technologies has created new perspectives for EIS. Information systems (IS) research has already addressed opportunities and challenges of these developments quite well, but what will be the pressing opportunities and challenges for …


Data Breach Consequences And Responses: A Multi-Method Investigation Of Stakeholders, Hamid Reza Nikkhah May 2020

Data Breach Consequences And Responses: A Multi-Method Investigation Of Stakeholders, Hamid Reza Nikkhah

Graduate Theses and Dissertations

The role of information in today’s economy is essential as organizations that can effectively store and leverage information about their stakeholders can gain an advantage in their markets. The extensive digitization of business information can make organizations vulnerable to data breaches. A data breach is the unauthorized access to sensitive, protected, or confidential data resulting in the compromise of information security. Data breaches affect not only the breached organization but also various related stakeholders. After a data breach, stakeholders of the breached organizations show negative behaviors, which causes the breached organizations to face financial and non-financial costs. As such, the …


Newsletter Summer 2019, College Of Business &. Information Systems Jul 2019

Newsletter Summer 2019, College Of Business &. Information Systems

BIS Newsletter

No abstract provided.


Newsletter Spring 2018, College Of Business And Information Systems Apr 2018

Newsletter Spring 2018, College Of Business And Information Systems

BIS Newsletter

No abstract provided.


Unexpected Connections: Full Issue Of Volume 1, Issue 3, Marianna E. Richardson Dec 2017

Unexpected Connections: Full Issue Of Volume 1, Issue 3, Marianna E. Richardson

Marriott Student Review

Unexpected Connections is the Fall 2017 Issue of Marriott Student Review.


From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman Jan 2017

From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman

Wendi M. Kappers, PhD

Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two …


From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman Jan 2017

From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman

Wendi M. Kappers, PhD

Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two …


From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman Oct 2016

From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman

Leila A. Halawi

Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two …


Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig Jan 2016

Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig

CCE Theses and Dissertations

Hackers external to the organization continue to wreak havoc upon the information systems infrastructure of firms through breaches of security defenses, despite constant development of and continual investment in new IS security countermeasures by security professionals and vendors. These breaches are exceedingly costly and damaging to the affected organizations. The continued success of hackers in the face of massive amounts of security investments suggests that the defenders are losing and that the hackers can innovate at a much faster pace.

Underground hacker communities have been shown to be an environment where attackers can learn new techniques and share tools pertaining …


From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman Jan 2016

From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman

Publications

Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two …


From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman Jan 2016

From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman

Publications

Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two …


Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar Dec 2015

Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar

Maurice Dawson

Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, …


Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar Dec 2014

Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar

Maurice Dawson

Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, …


A Brief Review Of New Threats And Countermeasures In Digital Crime And Cyber Terrorism, Maurice Dawson Dec 2014

A Brief Review Of New Threats And Countermeasures In Digital Crime And Cyber Terrorism, Maurice Dawson

Maurice Dawson

Cyber security is becoming the cornerstone of national security policies in many countries around the world as it is an interest to many stakeholders, including utilities, regulators, energy markets, government entities, and even those that wish to exploit the cyber infrastructure. Cyber warfare is quickly becoming the method of warfare and the tool of military strategists. Additionally, it is has become a tool for governments to aid or exploit for their own personal benefits. For cyber terrorists there has been an overwhelmingly abundance of new tools and technologies available that have allowed criminal acts to occur virtually anywhere in the …


The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette Dec 2013

The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette

Maurice Dawson

Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security-related threats with the use of social media, mobile devices, virtual worlds, …


Transforming Information Systems And Computer Science Education With Virtualization, Maurice E. Dawson Jr., Jorja Wright, Jonathan Abramson Dec 2012

Transforming Information Systems And Computer Science Education With Virtualization, Maurice E. Dawson Jr., Jorja Wright, Jonathan Abramson

Maurice Dawson

This paper will propose an innovative method to transform information systems (IS) and computer science education on a global scale. This method will introduce the use of virtualization and cloud computing combined with open source software (OSS) in higher education. This will allow for those studying IS and computer science to work independently on projects anywhere in the world from a baseline image that has been developed with information assurance (IA) controls. Additionally, this will allow professors and course developers to deploy their own customized virtual machines (VMs) to be used with the course. These VMs will host their own …


Dod Cyber Technology Policies To Secure Automated Information Systems, Maurice E. Dawson Jr., Miguel Crespo, Stephen Brewster Dec 2012

Dod Cyber Technology Policies To Secure Automated Information Systems, Maurice E. Dawson Jr., Miguel Crespo, Stephen Brewster

Maurice Dawson

Availability, integrity, and confidentiality (AIC) is a key theme everywhere as cyber security has become more than an emerging topic. The Department of Defense (DoD) has implemented multiple processes such as the Department of Defense information assurance certification and accreditation process (DIACAP), common criteria (CC), and created proven baselines to include information assurance (IA) controls to protect information system (IS) resources. The aim of this research study shall provide insight to the applicable processes, IA controls, and standards to include providing a method for selecting necessary government models and for system development.


Information Security Awareness In Saudi Arabia, Abdulaziz Alarifi, H. Tootell, Peter Hyland Dec 2012

Information Security Awareness In Saudi Arabia, Abdulaziz Alarifi, H. Tootell, Peter Hyland

Dr Holly Tootell

While the Web, cell phone „apps‟ and cloud computing put a world of information at our fingertips, that information is under constant threat from cyber vandals and hackers. Although awareness of information threats is growing in the Western world, in places like Saudi Arabia, information security is very poor. Unlike Western pluralistic democracies, Saudi Arabia is a highly-censored country, with a patriarchical and tribal culture, which may influence its poor information security rating. This paper examines the level of information security awareness (ISA) among the general public in Saudi Arabia, using an anonymous online survey, based on instruments produced by …


Information Security Awareness In Saudi Arabia, Abdulaziz Alarifi, H. Tootell, Peter Hyland Nov 2012

Information Security Awareness In Saudi Arabia, Abdulaziz Alarifi, H. Tootell, Peter Hyland

Associate Professor Peter Hyland

While the Web, cell phone „apps‟ and cloud computing put a world of information at our fingertips, that information is under constant threat from cyber vandals and hackers. Although awareness of information threats is growing in the Western world, in places like Saudi Arabia, information security is very poor. Unlike Western pluralistic democracies, Saudi Arabia is a highly-censored country, with a patriarchical and tribal culture, which may influence its poor information security rating. This paper examines the level of information security awareness (ISA) among the general public in Saudi Arabia, using an anonymous online survey, based on instruments produced by …


Use Of Open Source Software And Virtualization In Academia To Enhance Higher Education Everywhere, Maurice E. Dawson Jr., Imad Al Saeed Dec 2011

Use Of Open Source Software And Virtualization In Academia To Enhance Higher Education Everywhere, Maurice E. Dawson Jr., Imad Al Saeed

Maurice Dawson

As costs around the world continue to rise for education, institutions must become innovative in the ways they teach and grow students. To do this effectively, professors and administrative staff should push toward the utilization of Open Source Software (OSS) and virtual tools to enhance or supplement currently available tools. In developing countries, OSS applications would allow students the ability to learn critical technological skills for success at small fraction of the cost. OSS also provides faculty members the ability to dissect source code and prepare students for low-level software development. It is critical that all institutions look at alternatives …


A Strategy For Third-Party Logistics Systems: A Case Analysis Using The Blue Ocean Strategy, Changsu Kim, Kyung Hoon Yang, Jaekyung Kim Aug 2008

A Strategy For Third-Party Logistics Systems: A Case Analysis Using The Blue Ocean Strategy, Changsu Kim, Kyung Hoon Yang, Jaekyung Kim

Department of Management: Faculty Publications

One of today’s most frequently discussed topics in the business world is how to escape from the intense Red Ocean and how to create an uncontested Blue Ocean. However, because there are few practical guidelines available on this topic, we will introduce a case study of a third-party logistics (3PL) provider, CJ-Global Logistics Service (CJ-GLS), to show how it aspires to be a leader in the newly introduced 3PL industry in South Korea. CJ-GLS is a latecomer in the logistics industry, and its resources, such as the number of trucks and warehouses, are relatively small in comparison to those of …