Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Information technology (6)
- Information science (5)
- Breach (2)
- Computer science (2)
- Management (2)
-
- Appreciative Inquiry (1)
- Business (1)
- Business Strategy (1)
- CIO (1)
- Chief Information Officer (1)
- Classification (1)
- Community of practice (1)
- Compliance (1)
- Countermeasures (1)
- Cyber (1)
- Data Mining (1)
- Decision-Support Systems (1)
- Design (1)
- Effectiveness (1)
- Exceptional (1)
- Experimental (1)
- Externalization (1)
- Feature Selection (1)
- Financial services (1)
- Hacker (1)
- Health care management (1)
- IS Strategy (1)
- Information System Strategy (1)
- Information systems (1)
- Innovation (1)
Articles 1 - 8 of 8
Full-Text Articles in Entire DC Network
An Analysis Of The Relationship Between Security Information Technology Enhancements And Computer Security Breaches And Incidents, Linda Betz
CCE Theses and Dissertations
Financial services institutions maintain large amounts of data that include both intellectual property and personally identifiable information for employees and customers. Due to the potential damage to individuals, government regulators hold institutions accountable for ensuring that personal data are protected and require reporting of data security breaches. No company wants a data breach, but finding a security incident or breach early in the attack cycle may decrease the damage or data loss a company experiences. In multiple high profile data breaches reported in major news stories over the past few years, there is a pattern of the adversary being inside …
Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig
Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig
CCE Theses and Dissertations
Hackers external to the organization continue to wreak havoc upon the information systems infrastructure of firms through breaches of security defenses, despite constant development of and continual investment in new IS security countermeasures by security professionals and vendors. These breaches are exceedingly costly and damaging to the affected organizations. The continued success of hackers in the face of massive amounts of security investments suggests that the defenders are losing and that the hackers can innovate at a much faster pace.
Underground hacker communities have been shown to be an environment where attackers can learn new techniques and share tools pertaining …
An Investigation Of Socio-Technical Components Of Knowledge Management System (Kms) Usage, Noel Wint Jr.
An Investigation Of Socio-Technical Components Of Knowledge Management System (Kms) Usage, Noel Wint Jr.
CCE Theses and Dissertations
Existing literature indicates that although both academics and practitioners recognize knowledge management (KM) as a source of competitive advantage, users are not always willing to use a knowledge management system (KMS). Because of the social nature of knowledge transfer, a KMS can be considered a socio-technical system. Many explanations have been presented for this failure to utilize the KMS. These explanations include a number of the socio-technical factors relating to people, processes, and technologies. While these factors may have significant explanatory power when examined independently, existing studies have not sufficiently addressed the interactions among all three socio-technical factors or their …
Patient Portals: Achieving Technology Acceptance And Meaningful Use In Independent Physician-Managed Practices, Kimberly W. Bartholomew
Patient Portals: Achieving Technology Acceptance And Meaningful Use In Independent Physician-Managed Practices, Kimberly W. Bartholomew
CCE Theses and Dissertations
As the bulk of medical health records shift from paper-based file systems to electronic formats, the promise of the transformation process called healthcare reform included adding efficiencies to medical practice workflows, lower costs, improved quality of care and most important, and the freeing of patient information from traditional propriety silos. With this incoming largess of protected health information data now viewable through online patient portals, patients can be empowered to become educated and active in their own health care decisions, but only if they have admission to their information. A digital divide currently exists in many medical practices where only …
Designing An Effective Information Security Policy For Exceptional Situations In An Organization: An Experimental Study, George S. Antoniou
Designing An Effective Information Security Policy For Exceptional Situations In An Organization: An Experimental Study, George S. Antoniou
CCE Theses and Dissertations
An increasing number of researchers are recognizing the importance of the role played by employees in maintaining the effectiveness of an information security policy. Currently, little research exists to validate the relationship between the actions (behaviors) taken by employees in response to exceptional situations (antecedents) regarding an organization’s information security policy, the impact (consequences) those actions have on an organization, and the motives that prompt those actions. When these exceptional situations occur, employees may feel compelled to engage in behaviors that violate the terms of an information security policy because strict compliance with the policy could cause the organization to …
Motivating The Solicited And Unsolicited Sharing Of Tacit Knowledge Through The Process Of Externalization, Sheila Yvonne Sorensen
Motivating The Solicited And Unsolicited Sharing Of Tacit Knowledge Through The Process Of Externalization, Sheila Yvonne Sorensen
CCE Theses and Dissertations
While several U. S. firms have invested in Knowledge Management (KM) tools and software, it has become apparent that investments must be made in additional facets of KM, such as knowledge sharing (KS), thought by many researchers to be the most important component of KM. Of the two types of KS, explicit and tacit, the sharing of tacit knowledge has been shown to contribute the most to an organization’s performance. However, since tacit knowledge is difficult to both convey and acquire, this unshared tacit knowledge may ultimately harm an organization when, without the appropriate knowledge, individuals cannot effectively perform their …
Feature Selection And Classification Methods For Decision Making: A Comparative Analysis, Osiris Villacampa
Feature Selection And Classification Methods For Decision Making: A Comparative Analysis, Osiris Villacampa
CCE Theses and Dissertations
The use of data mining methods in corporate decision making has been increasing in the past decades. Its popularity can be attributed to better utilizing data mining algorithms, increased performance in computers, and results which can be measured and applied for decision making. The effective use of data mining methods to analyze various types of data has shown great advantages in various application domains. While some data sets need little preparation to be mined, whereas others, in particular high-dimensional data sets, need to be preprocessed in order to be mined due to the complexity and inefficiency in mining high dimensional …
An Investigation Of The Factors Contributing To The Development Of Poorly Defined Is Strategies For Firms In The United States, Karen B. Lacaden
An Investigation Of The Factors Contributing To The Development Of Poorly Defined Is Strategies For Firms In The United States, Karen B. Lacaden
CCE Theses and Dissertations
Although empirical research has shown that a clearly defined information system (IS) strategy has a positive impact to a firm’s performance and a poorly defined IS strategy has a negative impact to a firms’ performance, firms still develop poorly defined IS strategies. Further compounding the problem, research has revealed that 87% of the business executives believe information systems are a critical enabler to their firms' strategic realization, yet only 33% of business executives involve the Chief Information Officer (CIO) in their firm’s business strategy development. The main goal of this research study is to empirically identify factors which impact development …