Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 20 of 20

Full-Text Articles in Entire DC Network

Assessing Employees’ Cybersecurity Attitude Based On Working And Cybersecurity Threat Experience, Norshima Humaidi, Melissa Shahrom Oct 2023

Assessing Employees’ Cybersecurity Attitude Based On Working And Cybersecurity Threat Experience, Norshima Humaidi, Melissa Shahrom

The African Journal of Information Systems

Many cybersecurity problems are caused by human error, which is a worry in the commercial sector. Due to their attitude towards cybersecurity, many employees in the firm do not work in a way that safeguards data. This study seeks to examine employees' cybersecurity attitudes with a focus on their work experience and exposure to cybersecurity threats. Data were gathered through a survey conducted in targeted business firms located in the Klang Valley area, Malaysia. Utilizing ANOVA and two-sample tests, the study analysed 245 data samples to evaluate the hypotheses. The results show significant distinctions in employees' cybersecurity attitudes in relation …


Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo Jan 2023

Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo

Walden Dissertations and Doctoral Studies

Supply chain managers face challenges when adopting new technologies to remain competitive and satisfy consumer demands involving expedited delivery of food and services. Supply chain managers who fail to adopt new technology have a decreased propensity to stay competitive. Grounded in the transformation leadership theory, the purpose of this qualitative multiple-case study was to explore leadership strategies supply chain managers use in adopting innovative technology. Participants were six supply chain managers who successfully used leadership strategies to adopt new innovative technology. Sources for data collection were semistructured interviews, company archival documents, and field notes. Research data were analyzed via thematic …


Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda Jan 2023

Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda

Walden Dissertations and Doctoral Studies

All internet connected organizations are becoming increasingly vulnerable to cyberattacks due to information security policy noncompliance of personnel. The problem is important to information technology (IT) firms, organizations with IT integration, and any consumer who has shared personal information online, because noncompliance is the single greatest threat to cybersecurity, which leads to expensive breaches that put private information in danger. Grounded in the protection motivation theory, the purpose of this quantitative study was to use multiple regression analysis to examine the relationship between perceived importance, organizational compliance, management involvement, seeking guidance, and rate of cybersecurity attack. The research question for …


Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda Jan 2023

Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda

Walden Dissertations and Doctoral Studies

All internet connected organizations are becoming increasingly vulnerable to cyberattacks due to information security policy noncompliance of personnel. The problem is important to information technology (IT) firms, organizations with IT integration, and any consumer who has shared personal information online, because noncompliance is the single greatest threat to cybersecurity, which leads to expensive breaches that put private information in danger. Grounded in the protection motivation theory, the purpose of this quantitative study was to use multiple regression analysis to examine the relationship between perceived importance, organizational compliance, management involvement, seeking guidance, and rate of cybersecurity attack. The research question for …


Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo Jan 2023

Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo

Walden Dissertations and Doctoral Studies

Supply chain managers face challenges when adopting new technologies to remain competitive and satisfy consumer demands involving expedited delivery of food and services. Supply chain managers who fail to adopt new technology have a decreased propensity to stay competitive. Grounded in the transformation leadership theory, the purpose of this qualitative multiple-case study was to explore leadership strategies supply chain managers use in adopting innovative technology. Participants were six supply chain managers who successfully used leadership strategies to adopt new innovative technology. Sources for data collection were semistructured interviews, company archival documents, and field notes. Research data were analyzed via thematic …


Comparison Of The Mental Burden On Nursing Care Providers With And Without Mat-Type Sleep State Sensors At A Nursing Home In Tokyo, Japan: Quasi-Experimental Study, Sakiko Itoh, Hwee-Pink Tan, Kenichi Kudo, Yasuko Ogata Jan 2022

Comparison Of The Mental Burden On Nursing Care Providers With And Without Mat-Type Sleep State Sensors At A Nursing Home In Tokyo, Japan: Quasi-Experimental Study, Sakiko Itoh, Hwee-Pink Tan, Kenichi Kudo, Yasuko Ogata

Research Collection School Of Computing and Information Systems

Background: Increasing need for nursing care has led to the increased burden on formal caregivers, with those in nursing homes having to deal with exhausting labor. Although research activities on the use of internet of things devices to support nursing care for older adults exist, there is limited evidence on the effectiveness of these interventions among formal caregivers in nursing homes. Objective: This study aims to investigate whether mat-type sleep state sensors for supporting nursing care can reduce the mental burden of formal caregivers in a nursing home. Methods: This was a quasi-experimental study at a nursing home in Tokyo, …


Controversial And Global Issues Fantasy Sports' Outcomes, Amber A. Smith-Ditizio, Alan D. Smith, Walter Kendall Feb 2019

Controversial And Global Issues Fantasy Sports' Outcomes, Amber A. Smith-Ditizio, Alan D. Smith, Walter Kendall

Atlantic Marketing Association Proceedings

No abstract provided.


Technology Advancement Influence In Accounting And Information System Fields, Shannon Gordon May 2018

Technology Advancement Influence In Accounting And Information System Fields, Shannon Gordon

Accounting Undergraduate Honors Theses

This research serves to relate the accounting and information technology fields. The information in the research documents changes in the accounting and information technology fields, and how the fields are expected to change in the coming years. The research also discuss the relationship between the accounting and information technology fields. The topics on the ideal accounting candidates for employers and the expectation gap between graduates skills and employers’ expectations are also discussed. Careers in accounting and information systems and also similar and different basic skills of both fields are documented in the research.

The changes in accounting are influenced by …


A Qualitative Exploration Of The Security Practices Of Registered Nurses, Beth Ann Savage Jan 2017

A Qualitative Exploration Of The Security Practices Of Registered Nurses, Beth Ann Savage

Walden Dissertations and Doctoral Studies

Increased breach occurrences in healthcare cause concern for health information as reported by the Federal Government. Significant effort, regulations, and safeguards are in place to protect the systems used in the healthcare industry. Employee handling of security remains an area of vulnerability related to security protocols. The unified theory of acceptance and usage of technology (UTAUT) served as the model for this qualitative exploratory study with the purpose of understanding registered nurse (RN) perceptions and lived experiences related to IT security. Face-to-face interviews were conducted with 20 participants from the Three Rivers Chapter American Association Critical Care Nurses. Transcribed data …


Strategies To Manage Enterprise Information Technology Projects, Mario West Jan 2017

Strategies To Manage Enterprise Information Technology Projects, Mario West

Walden Dissertations and Doctoral Studies

Since 2005, most midsize company information technology (IT) projects had a 62.4% failure rate because of wrong project team communication skills or cost overruns. IT leaders expect negative IT project outcomes will cost over $2 billion by 2020. Using the actor-network theory, the purpose of this single case study was to explore strategies used by IT leaders from a midsize IT company in Washington, D.C. to plan and execute projects under budget and on time. Using purposeful sampling, 5 IT leaders were selected for this study because of their experience in implementing successful strategies for projects. Data were collected using …


An Analysis Of Faculty And Staff's Identification Of Malware Threats, Malora Quesinberry Aug 2016

An Analysis Of Faculty And Staff's Identification Of Malware Threats, Malora Quesinberry

Electronic Theses and Dissertations

This document presents findings related to faculty and staff member’s ability to identify malware threats. This study involved discovering the most common incidents of malware threats to higher education systems. From this research, eight categories of malware were identified to be the most common threats to higher education systems. This document also describes the impact of malware intrusions on higher education systems to emphasis the importance of recognizing malware threats. Faculty and staff members at a midsize southeastern university were presented with realistic scenarios to determine the ability to identify malware threats. The results indicate malware categories such as virus, …


Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig Jan 2016

Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig

CCE Theses and Dissertations

Hackers external to the organization continue to wreak havoc upon the information systems infrastructure of firms through breaches of security defenses, despite constant development of and continual investment in new IS security countermeasures by security professionals and vendors. These breaches are exceedingly costly and damaging to the affected organizations. The continued success of hackers in the face of massive amounts of security investments suggests that the defenders are losing and that the hackers can innovate at a much faster pace.

Underground hacker communities have been shown to be an environment where attackers can learn new techniques and share tools pertaining …


Designing An Effective Information Security Policy For Exceptional Situations In An Organization: An Experimental Study, George S. Antoniou Jan 2015

Designing An Effective Information Security Policy For Exceptional Situations In An Organization: An Experimental Study, George S. Antoniou

CCE Theses and Dissertations

An increasing number of researchers are recognizing the importance of the role played by employees in maintaining the effectiveness of an information security policy. Currently, little research exists to validate the relationship between the actions (behaviors) taken by employees in response to exceptional situations (antecedents) regarding an organization’s information security policy, the impact (consequences) those actions have on an organization, and the motives that prompt those actions. When these exceptional situations occur, employees may feel compelled to engage in behaviors that violate the terms of an information security policy because strict compliance with the policy could cause the organization to …


Virtue Ethics: Examining Influences On The Ethical Commitment Of Information System Workers In Trusted Positions, John Max Gray Jan 2015

Virtue Ethics: Examining Influences On The Ethical Commitment Of Information System Workers In Trusted Positions, John Max Gray

CCE Theses and Dissertations

Despite an abundance of research on the problem of insider threats, only limited success has been achieved in preventing trusted insiders from committing security violations. Virtue ethics may be an approach that can be utilized to address this issue. Human factors such as moral considerations impact Information System (IS) design, use, and security; consequently they affect the security posture and culture of an organization. Virtue ethics based concepts have the potential to influence and align the moral values and behavior of information systems workers with those of an organization in order to provide increased protection of IS assets. An individual’s …


Boon Or Bane: Business And The Anti-Cybercrime Law, Atty. James Keith C. Heffron Feb 2014

Boon Or Bane: Business And The Anti-Cybercrime Law, Atty. James Keith C. Heffron

Center for Business Research and Development

“The Internet is the first thing that humanity has built that humanity doesn't understand, the largest experiment in anarchy that we have ever had.” – Eric Schmidt, Executive Chairman, Google.


Cloud Computing Providers And Data Security Law: Building Trust With United States Companies, Jared A. Harshbarger Esq. Nov 2011

Cloud Computing Providers And Data Security Law: Building Trust With United States Companies, Jared A. Harshbarger Esq.

Jared A. Harshbarger

Cloud computing and software-as-a-service (SaaS) models are revolutionizing the information technology industry. As these services become more prevalent, data security and privacy concerns will also rise among consumers and the companies who consider using them. Cloud computing providers must establish a sufficient level of trust with their potential customers in order to ease initial fears - and ensure certain compliance obligations will be met - at least to the extent that any such inquiring customer will feel comfortable enough to ultimately take the irreversible step of releasing their sensitive data and personal information into the cloud.


The Effects Of The Attacks Of 9/11 On Organizational Policies, Employee Attitudes And Workers’ Psychological States, Amy E. Hurley-Hanson, Cristina M. Giannantonio, Heidi Carlos, Jessica Harnett, Melanie Jetta, Madeline Mercier Jan 2011

The Effects Of The Attacks Of 9/11 On Organizational Policies, Employee Attitudes And Workers’ Psychological States, Amy E. Hurley-Hanson, Cristina M. Giannantonio, Heidi Carlos, Jessica Harnett, Melanie Jetta, Madeline Mercier

Business Faculty Articles and Research

Problem statement: The attacks of September 11, 2001 (9/11) on the United States have had a profound effect on organizations and their employees. These effects occurred in the days and weeks immediately following the attacks, as well as in the years since the attacks occurred. In commemoration of the tenth anniversary of 9/11, this study focuses on the impact that the attacks of September 11, 2001 have had on organizational policies, employee attitudes and workers’ psychological states. Approach: Managers were surveyed regarding the effects of 9/11 on these issues. Results: The results of the study indicate that …


Consumer Subjectivity In The Age Of Internet: The Radical Concept Of Marketing Control Through Customer Relationship Management, Detlev Zwick, Nikhilesh Dholakia Jul 2004

Consumer Subjectivity In The Age Of Internet: The Radical Concept Of Marketing Control Through Customer Relationship Management, Detlev Zwick, Nikhilesh Dholakia

College of Business Faculty Publications

In this paper, we present a poststructuralist analysis of customer database technology. This approach allows us to regard customer databases as configurations of language that produce new and significant discursive effects. In particular, we focus on the role of databases and related technologies such as customer relationship management (CRM) in the discursive construction of both customers and customer relationships. First, we argue that organizations become the authors of customer identities, using the language of the database to configure customer representation. From this perspective, we can see the radical innovation that the customer database brings to the organizational construction of its …


Cultural Contradictions Of The Anytime, Anywhere Economy: Reframing Communication Technology, Nikhilesh Dholakia, Detlev Zwick May 2004

Cultural Contradictions Of The Anytime, Anywhere Economy: Reframing Communication Technology, Nikhilesh Dholakia, Detlev Zwick

College of Business Faculty Publications

Technology-aided ubiquity and instantaneity have emerged as major goals of most information technology providers and of certain classes of users such as “road warriors”. New mobile technologies promise genie-in-a-bottle type near-magical qualities with anytime, anywhere access to information and services. While the complex science, systems, and economics of such technologies receive considerable attention from industry executives and researchers, the social and cultural aspects of these technologies attract less attention. This paper explores the oft-contradictory promises and pitfalls of anytime, anywhere technologies from a cultural standpoint. It makes suggestions for reinterpreting these technologies for greater human good.


Privacy And Consumer Agency In The Information Age: Between Prying Profilers And Preening Webcams, Nikhilesh Dholakia, Detlev Zwick Jan 2001

Privacy And Consumer Agency In The Information Age: Between Prying Profilers And Preening Webcams, Nikhilesh Dholakia, Detlev Zwick

College of Business Faculty Publications

This article is about the ability of the consumer to control his or her destiny in the new electronic marketspace. Two seemingly opposite phenomena – the need for privacy and the desire for exhibitionism and voyeurism – are vying for attention on the media landscape. We believe the simultaneous occurrence of privacy concerns and ultraexhibitionism is not coincidental. Indeed, exhibitionism and voyeurism seem to offer new tools for consumer resistance against the electronic surveillance systems in networked markets and are inextricably linked to consumers’ desire for control over their intimate personal information.