Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Information technology (2)
- Access to Information (1)
- Accounting firms (1)
- Compliance (Legal) (1)
- Computer Security (1)
-
- Confidentiality (1)
- Courseware (1)
- Data security (1)
- Database Design (1)
- Database Management Systems (1)
- Developing countries (1)
- Diversity (1)
- Diversity in the workplace (1)
- Educational Needs (1)
- Extensible Business Reporting Language (1)
- Financial reporting (1)
- Higher Education (1)
- Human Factors Engineering (1)
- Information Management (1)
- Information Policy (1)
- Information Systems (1)
- Information Technology (1)
- Information security (1)
- Integrity (1)
- LDCs (1)
- Models (1)
- Perceptions (1)
- Rural areas (1)
- Stereotypes (1)
- Studies (1)
Articles 1 - 4 of 4
Full-Text Articles in Business
Accessing Ict Enabled Content In Low-Income Countries: Think Big, Start Small, And Scale Up, Solomon Negash
Accessing Ict Enabled Content In Low-Income Countries: Think Big, Start Small, And Scale Up, Solomon Negash
Faculty and Research Publications
While the digital revolution has transformed the way many of us work and live, more than half the world's population lives in rural areas that have been shut-out of the digital transformation. Low-income countries have yet to realize the benefits from the digital revolution; therefore, a need exists for innovative and alternative models to overcome the lack of access to knowledge and learning. This paper examines the challenges faced by low-income countries in accessing ICT enabled content and proposes a Big-Small model where low-income countries can harness the ICT revolution. This paper concludes with a discussion on sustainability and future …
A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade
A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade
Faculty and Research Publications
Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the perceptions of women in IT within the context of information security and assurance. This paper describes results from a study of a relatively new career path to see if there are female-friendly opportunities that have not existed in previous IT career paths. Research methodology focuses on a qualitative analysis of in-depth interviews with women who are self-described information security professionals. A primary goal of the study is to understand the perceptions of women in information security and determine …
Analysis Of Xbrl Literature: A Decade Of Progress And Puzzle, Saeed Roohani, Zhao Xianming, Ernest Capozzoli, Barbara Lamberton
Analysis Of Xbrl Literature: A Decade Of Progress And Puzzle, Saeed Roohani, Zhao Xianming, Ernest Capozzoli, Barbara Lamberton
Faculty and Research Publications
XBRL (eXtensible Business Reporting language) was recently, in 2008, in its 10th year. The concept was articulated in 1998 by Charles Hoffman, known as XFRML (eXtensible Financial Reporting Mark Up Language) to facilitate the business reporting process and improve financial reporting. The objective of this paper is to examine a decade (1998-2008) of XBRL articles published in various publications including trade, practitioner and academic journals to identify trends and patterns, milestones, and organizations actively contributed to this development. Another goal is to assess public perceptions of XBRL, its capabilities and its future. We examined published articles where XBRL appeared either …
Database Security: What Students Need To Know, Meg C. Murray
Database Security: What Students Need To Know, Meg C. Murray
Faculty and Research Publications
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of Defense (2004), in its Database Security Technical Implementation Guide, states that database security should provide controlled, protected access to the contents of a database as well as preserve the integrity, consistency, and overall quality of the data. Students in the computing disciplines must develop an …