Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Business and Corporate Communications

Stephen F. Austin State University

2011

Articles 1 - 2 of 2

Full-Text Articles in Business

An Examination Of College Students’ Computer Self-Efficacy As Related To Various Demographic Characteristics, Debbie D. Dufrene, Timothy W. Clipson, S. Ann Wilson Apr 2011

An Examination Of College Students’ Computer Self-Efficacy As Related To Various Demographic Characteristics, Debbie D. Dufrene, Timothy W. Clipson, S. Ann Wilson

Faculty Publications

Despite extensive computer exposure, today’s students vary in their judgments of their capabilities in using technology, referred to as computer self-efficacy (CSE). A survey of university students revealed highest CSE in word processing skills followed closely by file management and presentation skills. Students reported moderate ability levels in spreadsheet skills and less than moderate skill levels in database management, webpage design, and computer programming. Females tended to report higher CSE in file management and word processing applications, whereas males indicated higher CSE in web page development. Students whose parents did not attend college were likely to have lower CSE in …


Perceived Or Real Risks Using Smartphones, S. Ann Wilson, Michael York Mar 2011

Perceived Or Real Risks Using Smartphones, S. Ann Wilson, Michael York

Faculty Publications

Smartphones have blurred the line of capability usually prescribed to traditional telephones by their becoming the premier multi-tasking devices of today‘s world. Since current smartphones have their own dedicated operating system, Bluetooth capabilities, and constant network connection, PC connectivity, and internet capability, smartphones are experiencing security risks just as computer systems have done for many years. This paper will examine the history of mobile technology and its integration into people‘s daily lives. Furthermore, smartphone capabilities will be investigated for their potential vulnerabilities due to lack of consumers‘ precautions and smartphone usage.