Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Entire DC Network

Heed The Warning Signs: The Effectiveness Of Message Popup Warnings For Deterring The Spread Of Misinformation, Hollis Greenberg Jan 2024

Heed The Warning Signs: The Effectiveness Of Message Popup Warnings For Deterring The Spread Of Misinformation, Hollis Greenberg

CCE Theses and Dissertations

As false news can propagate to others rapidly, social media platforms employ multiple methods to combat misinformation. Debunking techniques are warning features embedded into a platform’s interface that alert readers of misinformation. These warnings have two goals: to “debunk” false information and to prevent the further spread of misinformation. Researchers have evaluated the effectiveness of debunking techniques to understand how users increase their awareness of misinformation, and what users do with the information given in warning messages. Message popup warnings are a newer and understudied type of debunking technique.

The overarching research question of this study was: Are message popup …


Student Attitudes And Intentions To Use Continuous Authentication Methods Applied To Mitigate Impersonation Attacks During E-Assessments, Andrea E. Green Jan 2024

Student Attitudes And Intentions To Use Continuous Authentication Methods Applied To Mitigate Impersonation Attacks During E-Assessments, Andrea E. Green

CCE Theses and Dissertations

No solution can ultimately eliminate cheating in online courses. However, universities reserve funding for authentication systems to minimize the threat of cheating in online courses. Most higher education institutions use a combination of authentication methods to secure systems against impersonation attacks during online examinations. Authentication technologies ensure that an online course is protected from impersonation attacks. However, it is important that authentication methods secure systems against impersonation attacks with minimal disruption during an examination. Authentication methods applied to secure e-assessments against impersonation attacks may impact a student’s attitude and intentions to use the e-examination system.

In this regard, the research …


Assessing Organizational Investments In Cybersecurity And Financial Performance Before And After Data Breach Incidents Of Cloud Saas Platforms, Munther B. Ghazawneh Jan 2024

Assessing Organizational Investments In Cybersecurity And Financial Performance Before And After Data Breach Incidents Of Cloud Saas Platforms, Munther B. Ghazawneh

CCE Theses and Dissertations

Prior research indicated that providing inappropriate investment in organizations for Information Technology (IT) security makes these organizations suffer from IT security issues that may cause data breach incidents. Data breaches in cloud Software as a Service (SaaS) platforms lead to the disclosure of sensitive information, which causes disruption of services, damage to the organizational image, or financial losses. Massive data breaches still exist in cloud SaaS platforms which result in data leaks and data theft of customers in organizations.

IT security risks and vulnerabilities cost organizations millions of dollars a year as organizations may face an increase in cybersecurity challenges. …


Understanding The Role Of Tacit And Explicit Knowledge Hiding In Organizations, Darren Wiggins Jan 2024

Understanding The Role Of Tacit And Explicit Knowledge Hiding In Organizations, Darren Wiggins

CCE Theses and Dissertations

Knowledge Hiding (KHi) is the deliberate act of withholding knowledge from others, driven by distrust. This distrust stems from three key factors: rationalized hiding, evasive hiding, and playing dumb. The latter two, evasive hiding and playing dumb, are particularly detrimental as they foster a cycle of mutual distrust within the workplace. To counteract this, organizations have significantly invested in promoting Tacit Knowledge (TK) and Explicit Knowledge (EK) sharing. These initiatives aimed to facilitate knowledge transfer, foster collaboration, enhance problem-solving capabilities, and strengthen social and interpersonal relationships.

Recent studies highlighted the importance of understanding the attributes linked to TK and EK. …


Empirical Assessment Of Remote Workers’ Cyberslacking And Computer Security Posture To Assess Organizational Cybersecurity Risks, Ariel Luna Jan 2024

Empirical Assessment Of Remote Workers’ Cyberslacking And Computer Security Posture To Assess Organizational Cybersecurity Risks, Ariel Luna

CCE Theses and Dissertations

No abstract provided.