Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication Year
- Publication
- Publication Type
Articles 1 - 20 of 20
Full-Text Articles in Entire DC Network
Assessing Employees’ Cybersecurity Attitude Based On Working And Cybersecurity Threat Experience, Norshima Humaidi, Melissa Shahrom
Assessing Employees’ Cybersecurity Attitude Based On Working And Cybersecurity Threat Experience, Norshima Humaidi, Melissa Shahrom
The African Journal of Information Systems
Many cybersecurity problems are caused by human error, which is a worry in the commercial sector. Due to their attitude towards cybersecurity, many employees in the firm do not work in a way that safeguards data. This study seeks to examine employees' cybersecurity attitudes with a focus on their work experience and exposure to cybersecurity threats. Data were gathered through a survey conducted in targeted business firms located in the Klang Valley area, Malaysia. Utilizing ANOVA and two-sample tests, the study analysed 245 data samples to evaluate the hypotheses. The results show significant distinctions in employees' cybersecurity attitudes in relation …
Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo
Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo
Walden Dissertations and Doctoral Studies
Supply chain managers face challenges when adopting new technologies to remain competitive and satisfy consumer demands involving expedited delivery of food and services. Supply chain managers who fail to adopt new technology have a decreased propensity to stay competitive. Grounded in the transformation leadership theory, the purpose of this qualitative multiple-case study was to explore leadership strategies supply chain managers use in adopting innovative technology. Participants were six supply chain managers who successfully used leadership strategies to adopt new innovative technology. Sources for data collection were semistructured interviews, company archival documents, and field notes. Research data were analyzed via thematic …
Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda
Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda
Walden Dissertations and Doctoral Studies
All internet connected organizations are becoming increasingly vulnerable to cyberattacks due to information security policy noncompliance of personnel. The problem is important to information technology (IT) firms, organizations with IT integration, and any consumer who has shared personal information online, because noncompliance is the single greatest threat to cybersecurity, which leads to expensive breaches that put private information in danger. Grounded in the protection motivation theory, the purpose of this quantitative study was to use multiple regression analysis to examine the relationship between perceived importance, organizational compliance, management involvement, seeking guidance, and rate of cybersecurity attack. The research question for …
Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda
Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda
Walden Dissertations and Doctoral Studies
All internet connected organizations are becoming increasingly vulnerable to cyberattacks due to information security policy noncompliance of personnel. The problem is important to information technology (IT) firms, organizations with IT integration, and any consumer who has shared personal information online, because noncompliance is the single greatest threat to cybersecurity, which leads to expensive breaches that put private information in danger. Grounded in the protection motivation theory, the purpose of this quantitative study was to use multiple regression analysis to examine the relationship between perceived importance, organizational compliance, management involvement, seeking guidance, and rate of cybersecurity attack. The research question for …
Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo
Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo
Walden Dissertations and Doctoral Studies
Supply chain managers face challenges when adopting new technologies to remain competitive and satisfy consumer demands involving expedited delivery of food and services. Supply chain managers who fail to adopt new technology have a decreased propensity to stay competitive. Grounded in the transformation leadership theory, the purpose of this qualitative multiple-case study was to explore leadership strategies supply chain managers use in adopting innovative technology. Participants were six supply chain managers who successfully used leadership strategies to adopt new innovative technology. Sources for data collection were semistructured interviews, company archival documents, and field notes. Research data were analyzed via thematic …
Comparison Of The Mental Burden On Nursing Care Providers With And Without Mat-Type Sleep State Sensors At A Nursing Home In Tokyo, Japan: Quasi-Experimental Study, Sakiko Itoh, Hwee-Pink Tan, Kenichi Kudo, Yasuko Ogata
Comparison Of The Mental Burden On Nursing Care Providers With And Without Mat-Type Sleep State Sensors At A Nursing Home In Tokyo, Japan: Quasi-Experimental Study, Sakiko Itoh, Hwee-Pink Tan, Kenichi Kudo, Yasuko Ogata
Research Collection School Of Computing and Information Systems
Background: Increasing need for nursing care has led to the increased burden on formal caregivers, with those in nursing homes having to deal with exhausting labor. Although research activities on the use of internet of things devices to support nursing care for older adults exist, there is limited evidence on the effectiveness of these interventions among formal caregivers in nursing homes. Objective: This study aims to investigate whether mat-type sleep state sensors for supporting nursing care can reduce the mental burden of formal caregivers in a nursing home. Methods: This was a quasi-experimental study at a nursing home in Tokyo, …
Controversial And Global Issues Fantasy Sports' Outcomes, Amber A. Smith-Ditizio, Alan D. Smith, Walter Kendall
Controversial And Global Issues Fantasy Sports' Outcomes, Amber A. Smith-Ditizio, Alan D. Smith, Walter Kendall
Atlantic Marketing Association Proceedings
No abstract provided.
Technology Advancement Influence In Accounting And Information System Fields, Shannon Gordon
Technology Advancement Influence In Accounting And Information System Fields, Shannon Gordon
Accounting Undergraduate Honors Theses
This research serves to relate the accounting and information technology fields. The information in the research documents changes in the accounting and information technology fields, and how the fields are expected to change in the coming years. The research also discuss the relationship between the accounting and information technology fields. The topics on the ideal accounting candidates for employers and the expectation gap between graduates skills and employers’ expectations are also discussed. Careers in accounting and information systems and also similar and different basic skills of both fields are documented in the research.
The changes in accounting are influenced by …
A Qualitative Exploration Of The Security Practices Of Registered Nurses, Beth Ann Savage
A Qualitative Exploration Of The Security Practices Of Registered Nurses, Beth Ann Savage
Walden Dissertations and Doctoral Studies
Increased breach occurrences in healthcare cause concern for health information as reported by the Federal Government. Significant effort, regulations, and safeguards are in place to protect the systems used in the healthcare industry. Employee handling of security remains an area of vulnerability related to security protocols. The unified theory of acceptance and usage of technology (UTAUT) served as the model for this qualitative exploratory study with the purpose of understanding registered nurse (RN) perceptions and lived experiences related to IT security. Face-to-face interviews were conducted with 20 participants from the Three Rivers Chapter American Association Critical Care Nurses. Transcribed data …
Strategies To Manage Enterprise Information Technology Projects, Mario West
Strategies To Manage Enterprise Information Technology Projects, Mario West
Walden Dissertations and Doctoral Studies
Since 2005, most midsize company information technology (IT) projects had a 62.4% failure rate because of wrong project team communication skills or cost overruns. IT leaders expect negative IT project outcomes will cost over $2 billion by 2020. Using the actor-network theory, the purpose of this single case study was to explore strategies used by IT leaders from a midsize IT company in Washington, D.C. to plan and execute projects under budget and on time. Using purposeful sampling, 5 IT leaders were selected for this study because of their experience in implementing successful strategies for projects. Data were collected using …
An Analysis Of Faculty And Staff's Identification Of Malware Threats, Malora Quesinberry
An Analysis Of Faculty And Staff's Identification Of Malware Threats, Malora Quesinberry
Electronic Theses and Dissertations
This document presents findings related to faculty and staff member’s ability to identify malware threats. This study involved discovering the most common incidents of malware threats to higher education systems. From this research, eight categories of malware were identified to be the most common threats to higher education systems. This document also describes the impact of malware intrusions on higher education systems to emphasis the importance of recognizing malware threats. Faculty and staff members at a midsize southeastern university were presented with realistic scenarios to determine the ability to identify malware threats. The results indicate malware categories such as virus, …
Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig
Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig
CCE Theses and Dissertations
Hackers external to the organization continue to wreak havoc upon the information systems infrastructure of firms through breaches of security defenses, despite constant development of and continual investment in new IS security countermeasures by security professionals and vendors. These breaches are exceedingly costly and damaging to the affected organizations. The continued success of hackers in the face of massive amounts of security investments suggests that the defenders are losing and that the hackers can innovate at a much faster pace.
Underground hacker communities have been shown to be an environment where attackers can learn new techniques and share tools pertaining …
Designing An Effective Information Security Policy For Exceptional Situations In An Organization: An Experimental Study, George S. Antoniou
Designing An Effective Information Security Policy For Exceptional Situations In An Organization: An Experimental Study, George S. Antoniou
CCE Theses and Dissertations
An increasing number of researchers are recognizing the importance of the role played by employees in maintaining the effectiveness of an information security policy. Currently, little research exists to validate the relationship between the actions (behaviors) taken by employees in response to exceptional situations (antecedents) regarding an organization’s information security policy, the impact (consequences) those actions have on an organization, and the motives that prompt those actions. When these exceptional situations occur, employees may feel compelled to engage in behaviors that violate the terms of an information security policy because strict compliance with the policy could cause the organization to …
Virtue Ethics: Examining Influences On The Ethical Commitment Of Information System Workers In Trusted Positions, John Max Gray
Virtue Ethics: Examining Influences On The Ethical Commitment Of Information System Workers In Trusted Positions, John Max Gray
CCE Theses and Dissertations
Despite an abundance of research on the problem of insider threats, only limited success has been achieved in preventing trusted insiders from committing security violations. Virtue ethics may be an approach that can be utilized to address this issue. Human factors such as moral considerations impact Information System (IS) design, use, and security; consequently they affect the security posture and culture of an organization. Virtue ethics based concepts have the potential to influence and align the moral values and behavior of information systems workers with those of an organization in order to provide increased protection of IS assets. An individual’s …
Boon Or Bane: Business And The Anti-Cybercrime Law, Atty. James Keith C. Heffron
Boon Or Bane: Business And The Anti-Cybercrime Law, Atty. James Keith C. Heffron
Center for Business Research and Development
“The Internet is the first thing that humanity has built that humanity doesn't understand, the largest experiment in anarchy that we have ever had.” – Eric Schmidt, Executive Chairman, Google.
Cloud Computing Providers And Data Security Law: Building Trust With United States Companies, Jared A. Harshbarger Esq.
Cloud Computing Providers And Data Security Law: Building Trust With United States Companies, Jared A. Harshbarger Esq.
Jared A. Harshbarger
Cloud computing and software-as-a-service (SaaS) models are revolutionizing the information technology industry. As these services become more prevalent, data security and privacy concerns will also rise among consumers and the companies who consider using them. Cloud computing providers must establish a sufficient level of trust with their potential customers in order to ease initial fears - and ensure certain compliance obligations will be met - at least to the extent that any such inquiring customer will feel comfortable enough to ultimately take the irreversible step of releasing their sensitive data and personal information into the cloud.
The Effects Of The Attacks Of 9/11 On Organizational Policies, Employee Attitudes And Workers’ Psychological States, Amy E. Hurley-Hanson, Cristina M. Giannantonio, Heidi Carlos, Jessica Harnett, Melanie Jetta, Madeline Mercier
The Effects Of The Attacks Of 9/11 On Organizational Policies, Employee Attitudes And Workers’ Psychological States, Amy E. Hurley-Hanson, Cristina M. Giannantonio, Heidi Carlos, Jessica Harnett, Melanie Jetta, Madeline Mercier
Business Faculty Articles and Research
Problem statement: The attacks of September 11, 2001 (9/11) on the United States have had a profound effect on organizations and their employees. These effects occurred in the days and weeks immediately following the attacks, as well as in the years since the attacks occurred. In commemoration of the tenth anniversary of 9/11, this study focuses on the impact that the attacks of September 11, 2001 have had on organizational policies, employee attitudes and workers’ psychological states. Approach: Managers were surveyed regarding the effects of 9/11 on these issues. Results: The results of the study indicate that …
Consumer Subjectivity In The Age Of Internet: The Radical Concept Of Marketing Control Through Customer Relationship Management, Detlev Zwick, Nikhilesh Dholakia
Consumer Subjectivity In The Age Of Internet: The Radical Concept Of Marketing Control Through Customer Relationship Management, Detlev Zwick, Nikhilesh Dholakia
College of Business Faculty Publications
In this paper, we present a poststructuralist analysis of customer database technology. This approach allows us to regard customer databases as configurations of language that produce new and significant discursive effects. In particular, we focus on the role of databases and related technologies such as customer relationship management (CRM) in the discursive construction of both customers and customer relationships. First, we argue that organizations become the authors of customer identities, using the language of the database to configure customer representation. From this perspective, we can see the radical innovation that the customer database brings to the organizational construction of its …
Cultural Contradictions Of The Anytime, Anywhere Economy: Reframing Communication Technology, Nikhilesh Dholakia, Detlev Zwick
Cultural Contradictions Of The Anytime, Anywhere Economy: Reframing Communication Technology, Nikhilesh Dholakia, Detlev Zwick
College of Business Faculty Publications
Technology-aided ubiquity and instantaneity have emerged as major goals of most information technology providers and of certain classes of users such as “road warriors”. New mobile technologies promise genie-in-a-bottle type near-magical qualities with anytime, anywhere access to information and services. While the complex science, systems, and economics of such technologies receive considerable attention from industry executives and researchers, the social and cultural aspects of these technologies attract less attention. This paper explores the oft-contradictory promises and pitfalls of anytime, anywhere technologies from a cultural standpoint. It makes suggestions for reinterpreting these technologies for greater human good.
Privacy And Consumer Agency In The Information Age: Between Prying Profilers And Preening Webcams, Nikhilesh Dholakia, Detlev Zwick
Privacy And Consumer Agency In The Information Age: Between Prying Profilers And Preening Webcams, Nikhilesh Dholakia, Detlev Zwick
College of Business Faculty Publications
This article is about the ability of the consumer to control his or her destiny in the new electronic marketspace. Two seemingly opposite phenomena – the need for privacy and the desire for exhibitionism and voyeurism – are vying for attention on the media landscape. We believe the simultaneous occurrence of privacy concerns and ultraexhibitionism is not coincidental. Indeed, exhibitionism and voyeurism seem to offer new tools for consumer resistance against the electronic surveillance systems in networked markets and are inextricably linked to consumers’ desire for control over their intimate personal information.