Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems

Kennesaw State University

Information technology

Articles 1 - 6 of 6

Full-Text Articles in Business

Assessing Employees’ Cybersecurity Attitude Based On Working And Cybersecurity Threat Experience, Norshima Humaidi, Melissa Shahrom Oct 2023

Assessing Employees’ Cybersecurity Attitude Based On Working And Cybersecurity Threat Experience, Norshima Humaidi, Melissa Shahrom

The African Journal of Information Systems

Many cybersecurity problems are caused by human error, which is a worry in the commercial sector. Due to their attitude towards cybersecurity, many employees in the firm do not work in a way that safeguards data. This study seeks to examine employees' cybersecurity attitudes with a focus on their work experience and exposure to cybersecurity threats. Data were gathered through a survey conducted in targeted business firms located in the Klang Valley area, Malaysia. Utilizing ANOVA and two-sample tests, the study analysed 245 data samples to evaluate the hypotheses. The results show significant distinctions in employees' cybersecurity attitudes in relation …


Traditional And Information Technology Anti-Corruption Strategies For Curbing The Public Sector Corruption In Developing Economies Of Sub-Saharan Africa: A Systematic Literature Review, Ibrahim Inuwa, Chidi G. Ononiwu Oct 2020

Traditional And Information Technology Anti-Corruption Strategies For Curbing The Public Sector Corruption In Developing Economies Of Sub-Saharan Africa: A Systematic Literature Review, Ibrahim Inuwa, Chidi G. Ononiwu

The African Journal of Information Systems

The pervasiveness of public sector corruption has been a major concern by successive governments and their citizenry. In order to curb such corruption, previous studies have focused on the anti-corruption strategies adopted by governments in isolation, but little or no study has focused on the interactions of the anti-corruption strategies. Using the concept-centric approach, we reviewed 91 studies systematically to understand the trends of government anti-corruption strategies. From the synthesized studies, we identified three dominant themes of anti-corruption strategies and their associated concepts. In addition, we also identified one dimension that captures information technology (IT) as a vehicle that enhances …


A Comparative Review Of Information Technology Project Management In Private And Public Sector Organization, Muhammad Obeidat, Max North Jan 2014

A Comparative Review Of Information Technology Project Management In Private And Public Sector Organization, Muhammad Obeidat, Max North

Faculty and Research Publications

Both private and public sector organizations tend to recognize the prominence of information technology within project management techniques and practices. The primary objective of this paper is to present a comparative review of information technology within project management in private and public sectors. Moreover, this research provides an extensive review of related topics such as the evolution of information technology, factors contributing to project abandonment, and the tools and techniques of management that effect project success. In conclusion, the authors present a variety of practical and effective guidelines and recommend approaches for the successful deployment of information technology within project …


Audit Committees Oversight Of Information Technology Risk, Linda M. Hadden, Dana Hermanson, F. Todd Dezoort Jun 2011

Audit Committees Oversight Of Information Technology Risk, Linda M. Hadden, Dana Hermanson, F. Todd Dezoort

Faculty and Research Publications

This exploratory study examines the role of the audit committee in overseeing information technology (IT) risk. We address the degree of audit committee oversight of specific IT risks, as well as factors associated with variations in audit committee IT oversight. Based on responses from 39 audit committee members, we found (1) little audit committee emphasis on oversight of IT risks, (2) audit committees involved with IT oversight focus on more traditional risks (e.g., monitoring), while very little attention is devoted to IT acquisition and implementation, and (3) the amount of IT oversight is positively associated with the responding members auditing …


Accessing Ict Enabled Content In Low-Income Countries: Think Big, Start Small, And Scale Up, Solomon Negash Oct 2010

Accessing Ict Enabled Content In Low-Income Countries: Think Big, Start Small, And Scale Up, Solomon Negash

Faculty and Research Publications

While the digital revolution has transformed the way many of us work and live, more than half the world's population lives in rural areas that have been shut-out of the digital transformation. Low-income countries have yet to realize the benefits from the digital revolution; therefore, a need exists for innovative and alternative models to overcome the lack of access to knowledge and learning. This paper examines the challenges faced by low-income countries in accessing ICT enabled content and proposes a Big-Small model where low-income countries can harness the ICT revolution. This paper concludes with a discussion on sustainability and future …


A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade Jul 2010

A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade

Faculty and Research Publications

Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the perceptions of women in IT within the context of information security and assurance. This paper describes results from a study of a relatively new career path to see if there are female-friendly opportunities that have not existed in previous IT career paths. Research methodology focuses on a qualitative analysis of in-depth interviews with women who are self-described information security professionals. A primary goal of the study is to understand the perceptions of women in information security and determine …