Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Business

Blockchain Applications In Higher Education Based On The Nist Cybersecurity Framework, Brady Lund Ph.D. Feb 2024

Blockchain Applications In Higher Education Based On The Nist Cybersecurity Framework, Brady Lund Ph.D.

Journal of Cybersecurity Education, Research and Practice

This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized identity, and smart contracts, and examines the application of secure blockchain across various educational functions such as enrollment management, degree auditing, and award processing. Each facet of the NIST Framework is utilized to explore the integration of blockchain technology and address persistent security concerns. The paper contributes to the literature by defining blockchain technology applications and opportunities within …


An Evaluation Of Security In Blockchain-Based Sharing Of Student Records In Higher Education, Timothy Arndt, Angela Guercio, Yonghun Chae May 2022

An Evaluation Of Security In Blockchain-Based Sharing Of Student Records In Higher Education, Timothy Arndt, Angela Guercio, Yonghun Chae

Information Systems

Blockchain has recently taken off as a disruptive technology, from its initial use in cryptocurrencies to wider applications in areas such as property registration and insurance due to its characteristic as a distributed ledger which can remove the need for a trusted third party to facilitate transactions. This spread of the technology to new application areas has been driven by the development of smart contracts – blockchain-based protocols which can automatically enforce a contract by executing code based on the logic expressed in the contract. One exciting area for blockchain is higher education. Students in higher education are ever more …


Determining Critical Success Factors For Realizing Innovative It Solutions In Higher Education, Anton Meijer Jan 2021

Determining Critical Success Factors For Realizing Innovative It Solutions In Higher Education, Anton Meijer

Journal of International Technology and Information Management

There is much research on Critical Success Factors when implementing novel IT solutions in different industries and contexts. However, for the domain of higher education the amount of studies is limited. This is partially due to the fact that what is considered higher education is different across countries. Universities, Universities of Applied Science, Vocational Universities, Polytechnics and related (research) institutes both have similarities and differences. However, one commonality is that institutions in higher education are not sufficiently capable of supporting the development(s) and requirements of educational processes with adequate (innovative) IT. Therefore the purpose of this study is to determine …


Creating Accountability And Increasing Efficiency By Implementing An It Service Management Solution, Priscilla Leon Jun 2020

Creating Accountability And Increasing Efficiency By Implementing An It Service Management Solution, Priscilla Leon

Electronic Theses, Projects, and Dissertations

Creating a culture that values accountability and efficiency is a difficult task for any organization. Without metrics or systems in place to help with these problems, the task becomes nearly impossible. The focus shifts from accountability to covering your tracks and decreased efficiency are usually blamed on external factors. In higher education, the problem is far more severe. Management leadership and staff are accountable to the stakeholders of higher education, such as the students, community, and faculty. A lack of accountability and a decrease in efficiency, in the Education Department, have led to a need for a technological solution that …


The Difficulty Of Transfer And Academic Engagement Of Further Education Students When Progressing To Higher Education Environments, Glenn Affleck Sep 2019

The Difficulty Of Transfer And Academic Engagement Of Further Education Students When Progressing To Higher Education Environments, Glenn Affleck

Communications of the IIMA

The difficulty of students transferring from Further Education Colleges and progressing to Higher Education Universities in the United Kingdom is a well-known problem. The study presented here focuses on the ability of students to begin to engage with the subject of computer programming on transferring after 2 years of study at a further education college into a 3rd year of a university programme. There is an assumption that there are environmental factors within the change that cause the problems of student engagement with their studies. The findings of this study concurs with difficulties for many students with beginning to …


Factors Affecting Perceptions Of Cybersecurity Readiness Among Workgroup It Managers, Thomas A. Chapman Jan 2019

Factors Affecting Perceptions Of Cybersecurity Readiness Among Workgroup It Managers, Thomas A. Chapman

Electronic Theses and Dissertations

The last decade has seen a dramatic increase in the number, frequency, and scope of cyberattacks, both in the United States and abroad. This upward trend necessitates that a significant aspect of any organization’s information systems strategy involves having a strong cybersecurity profile. Inherent in such a posture is the need to have IT managers who are experts in their field and who are willing and able to employ best practices and educate their users. Furthermore, IT managers need to have awareness of the technology landscape in and around their organizations. After many years of cybersecurity research, large corporations have …


"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Security Awareness Campaign, Rachael L. Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky J. Jenkins Jul 2018

"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Security Awareness Campaign, Rachael L. Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky J. Jenkins

Journal of Cybersecurity Education, Research and Practice

This article discusses the lessons learned after implementing a successful university-wide cyber security campaign. The Cyber Security Awareness Committee (CyberSAC), a group comprised of diverse units across campus, collaborated together on resources, talent, people, equipment, technology, and assessment practices to meet strategic goals for cyber safety and education. The project involves assessing student learning and behavior changes after participating in a Cyber Security Password Awareness event that was run as a year-long campaign targeting undergraduate students. The results have implications for planning and implementing university-wide initiatives in the field of cyber security, and more broadly, higher education at large.


Becoming Sustainable In Our Own Way: Sustainability At The Flagship Massachusetts Public University, Ludmilla Pavlova-Gillham, Dennis Swinford Jan 2016

Becoming Sustainable In Our Own Way: Sustainability At The Flagship Massachusetts Public University, Ludmilla Pavlova-Gillham, Dennis Swinford

Campus Planning Community and Conference Presentations

This presentation was delivered at the 2016 World Symposium on Sustainable Development at Universities . It outlines a case study of the comprehensive sustainability efforts undertaken by the University of Massachusetts Amherst and evaluates its progress by applying Kotter’s 8-step approach to change management to multiple phases of the campus development efforts. Emphasis is placed on efforts to integrate sustainability goals with campus master planning, facility plans, green building policies, governance and educational and operations teaching and research initiatives. The presentation also outlines concrete steps for comprehensive physical planning that universities may consider as they integrate change management practices for …


Identifying Critical Success Factors: The Case Of Erp Systems In Higher Education, Billy Mathias Bm Kalema Dr, Oludayo O. Olugbara Prof, Ray M. Kekwaletswe Prof Jul 2014

Identifying Critical Success Factors: The Case Of Erp Systems In Higher Education, Billy Mathias Bm Kalema Dr, Oludayo O. Olugbara Prof, Ray M. Kekwaletswe Prof

The African Journal of Information Systems

This paper reports on a study that uses a combination of techniques to formally characterize and determine the critical success factors influencing the effective usage of enterprise resource planning (ERP) systems, with special reference to higher education institutions. The thirty-seven ERP success factors identified from the literature are classified into: Critical, Active, Reactive and Inert categories. The classification of decision factors can generally support organizations to explore their current challenges and to adequately prepare decisions in a more participatory way for future endeavors. This study suggests a possible alternative that decision makers should take when a factor or a set …


Towards A Shared Understanding Of Emerging Technologies: Experiences In A Collaborative Research Project In South Africa, Daniela Gachago, Eunice Ivala, Judy Backhouse, Jan Petrus Bosman, Vivienne Bozalek, Dick Ng’Ambi Jul 2013

Towards A Shared Understanding Of Emerging Technologies: Experiences In A Collaborative Research Project In South Africa, Daniela Gachago, Eunice Ivala, Judy Backhouse, Jan Petrus Bosman, Vivienne Bozalek, Dick Ng’Ambi

The African Journal of Information Systems

While the practice of using educational technologies in Higher Education is increasingly common among educators, there is a paucity of research on innovative uses of emerging technologies to transform teaching and learning. This paper draws on data collected as part of a larger study aimed at investigating emerging technologies and their use in South African Higher Education Institutions (HEIs) to improve teaching and learning. The research employed a mixed method research design, using both qualitative and quantitative data collection methods—quantitative data from a survey of 262 respondents from 22 public HEIs in South Africa and qualitative data gathered from 16 …


Database Security: What Students Need To Know, Meg C. Murray Jan 2010

Database Security: What Students Need To Know, Meg C. Murray

Faculty and Research Publications

Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of Defense (2004), in its Database Security Technical Implementation Guide, states that database security should provide controlled, protected access to the contents of a database as well as preserve the integrity, consistency, and overall quality of the data. Students in the computing disciplines must develop an …