Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Business

Blockchain Applications In Higher Education Based On The Nist Cybersecurity Framework, Brady Lund Ph.D. Feb 2024

Blockchain Applications In Higher Education Based On The Nist Cybersecurity Framework, Brady Lund Ph.D.

Journal of Cybersecurity Education, Research and Practice

This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized identity, and smart contracts, and examines the application of secure blockchain across various educational functions such as enrollment management, degree auditing, and award processing. Each facet of the NIST Framework is utilized to explore the integration of blockchain technology and address persistent security concerns. The paper contributes to the literature by defining blockchain technology applications and opportunities within …


"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Security Awareness Campaign, Rachael L. Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky J. Jenkins Jul 2018

"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Security Awareness Campaign, Rachael L. Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky J. Jenkins

Journal of Cybersecurity Education, Research and Practice

This article discusses the lessons learned after implementing a successful university-wide cyber security campaign. The Cyber Security Awareness Committee (CyberSAC), a group comprised of diverse units across campus, collaborated together on resources, talent, people, equipment, technology, and assessment practices to meet strategic goals for cyber safety and education. The project involves assessing student learning and behavior changes after participating in a Cyber Security Password Awareness event that was run as a year-long campaign targeting undergraduate students. The results have implications for planning and implementing university-wide initiatives in the field of cyber security, and more broadly, higher education at large.


Identifying Critical Success Factors: The Case Of Erp Systems In Higher Education, Billy Mathias Bm Kalema Dr, Oludayo O. Olugbara Prof, Ray M. Kekwaletswe Prof Jul 2014

Identifying Critical Success Factors: The Case Of Erp Systems In Higher Education, Billy Mathias Bm Kalema Dr, Oludayo O. Olugbara Prof, Ray M. Kekwaletswe Prof

The African Journal of Information Systems

This paper reports on a study that uses a combination of techniques to formally characterize and determine the critical success factors influencing the effective usage of enterprise resource planning (ERP) systems, with special reference to higher education institutions. The thirty-seven ERP success factors identified from the literature are classified into: Critical, Active, Reactive and Inert categories. The classification of decision factors can generally support organizations to explore their current challenges and to adequately prepare decisions in a more participatory way for future endeavors. This study suggests a possible alternative that decision makers should take when a factor or a set …


Towards A Shared Understanding Of Emerging Technologies: Experiences In A Collaborative Research Project In South Africa, Daniela Gachago, Eunice Ivala, Judy Backhouse, Jan Petrus Bosman, Vivienne Bozalek, Dick Ng’Ambi Jul 2013

Towards A Shared Understanding Of Emerging Technologies: Experiences In A Collaborative Research Project In South Africa, Daniela Gachago, Eunice Ivala, Judy Backhouse, Jan Petrus Bosman, Vivienne Bozalek, Dick Ng’Ambi

The African Journal of Information Systems

While the practice of using educational technologies in Higher Education is increasingly common among educators, there is a paucity of research on innovative uses of emerging technologies to transform teaching and learning. This paper draws on data collected as part of a larger study aimed at investigating emerging technologies and their use in South African Higher Education Institutions (HEIs) to improve teaching and learning. The research employed a mixed method research design, using both qualitative and quantitative data collection methods—quantitative data from a survey of 262 respondents from 22 public HEIs in South Africa and qualitative data gathered from 16 …


Database Security: What Students Need To Know, Meg C. Murray Jan 2010

Database Security: What Students Need To Know, Meg C. Murray

Faculty and Research Publications

Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of Defense (2004), in its Database Security Technical Implementation Guide, states that database security should provide controlled, protected access to the contents of a database as well as preserve the integrity, consistency, and overall quality of the data. Students in the computing disciplines must develop an …