Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 37

Full-Text Articles in Business

The Potential Of Neuroscience For Human-Computer Interaction Research, René Riedl, Adriane B. Randolph, Jan Vom Brocke, Pierre-Majorique Léger, Angelika Dimoka Aug 2014

The Potential Of Neuroscience For Human-Computer Interaction Research, René Riedl, Adriane B. Randolph, Jan Vom Brocke, Pierre-Majorique Léger, Angelika Dimoka

Adriane B. Randolph

Due to the increased availability of both neuroscience methods and theories, Information Systems (IS) scholars have begun to investigate the potential of neuroscience for IS research. This new field of research is referred to as NeuroIS. Moreover, large technology companies (e.g., Microsoft and Philips) started research programs to evaluate the potential of neuroscience for their business. The application of neuroscientific approaches is also expected to significantly contribute to advancements in human-computer interaction (HCI) research. Against this background, a panel debate is organized to discuss the potential of neuroscience for HCI studies. The panel hosts an intellectual debate from different perspectives, …


User Profiles For Facilitating Conversations With Locked-In Users, Melody Moore, Veda Storey, Adriane Randolph Aug 2014

User Profiles For Facilitating Conversations With Locked-In Users, Melody Moore, Veda Storey, Adriane Randolph

Adriane B. Randolph

The loss of communication is one of the most profound disabilities a human being can experience, inhibiting social contact and complicating medical and personal care. Locked-in patients are paralyzed and unable to speak, but cognitively intact. Developments in biometric technology provide non-muscular channels of control and provide opportunities to restore some communication for people with little or no muscle movement. Although these biometric devices have been effective, the input rate is very slow for the requirements of interactive communication. Prediction techniques increase the speed of communication in assistive technology. However, the user’s context (time of day, location, presence of conversational …


Towards Predicting Control Of A Brain-Computer Interface, Adriane Randolph, Saurav Karmakar, Melody Jackson Aug 2014

Towards Predicting Control Of A Brain-Computer Interface, Adriane Randolph, Saurav Karmakar, Melody Jackson

Adriane B. Randolph

Individuals suffering from locked-in syndrome are completely paralyzed and unable to speak but otherwise cognitively intact. Traditional assistive technology is ineffective for this population of users due to the physical nature of input devices. Brain-computer and biometric interfaces offer users with severe motor disabilities a non-muscular input channel for communication and control, but require that users be able to harness their appropriate electrophysiological responses for effective use of the interface. There is currently no formalized process for determining a user’s aptitude for control of various biometric interfaces without testing on an actual system. This study presents how basic information captured …


Using Neural Input To Control Google Glass, Adriane Randolph, Benjamin Warren, Stephen Krontz, Joshua Pate May 2014

Using Neural Input To Control Google Glass, Adriane Randolph, Benjamin Warren, Stephen Krontz, Joshua Pate

Adriane B. Randolph

No abstract provided.


Developing And Implementing Information Security Programs: Amcis 2005 Workshop Proposal, Michael E. Whitman, Herbert J. Mattord May 2014

Developing And Implementing Information Security Programs: Amcis 2005 Workshop Proposal, Michael E. Whitman, Herbert J. Mattord

Herbert J. Mattord

One of the continuing challenges facing industry is the security and protection of information. Advances in information security have been unable to keep pace with advances in computing in general. One of the recognized ways to combat the threat to information security is education needed to prepare students to create a secure and ethical computing environment.


Transparency In Infosec Design , Herbert Mattord, Michael Whitman May 2014

Transparency In Infosec Design , Herbert Mattord, Michael Whitman

Herbert J. Mattord

Information system capabilities continue to expand. In two particular areas, that of the surveillance records and personal data, a public policy debate is underway. This debate regards the relationship between the rights of the individual to freedom from unwanted observation and the rights of the organization to collect and use data for its own legitimate purposes. This discussion encompasses privacy as well as a broader concern with what life could be like in a surveillance-based society. The fundamental question facing information systems designers is whether or not to use the contemporary approach of striving for secrecy, or to look for …


Improving Information Security Through Policy Implementation, Herbert J. Mattord, Michael E. Whitman May 2014

Improving Information Security Through Policy Implementation, Herbert J. Mattord, Michael E. Whitman

Herbert J. Mattord

Information security policy is essential to the success of any information security program because it is the primary process used by organizations to influence the performance of personnel in ways that enhance the information security of the organization’s information assets. Whereas computer security can be thought of as the processes and techniques of securing IT hardware, software and data (including networks), information security is a broader concept. The processes of information security are concerned with the protection of the confidentiality, integrity and availability of information within systems comprising hardware, software, networks, data, procedures and personnel. As organizations change through evolution …


A Draft Model Curriculum For Programs Of Study In Information Security And Assurance, Michael E. Whitman, Herbert J. Mattord May 2014

A Draft Model Curriculum For Programs Of Study In Information Security And Assurance, Michael E. Whitman, Herbert J. Mattord

Herbert J. Mattord

With the dramatic increase in threats to information security, there is a clear need for a corresponding increase in the number of information security professional. With a lack of formal curriculum models, many academic institutions are unprepared to implement the courses and laboratories needed to prepare this special class of information technologist. This paper provides an overview of lessons learned in the implementation of both individual courses and a degree concentration in information security. It refers to a more comprehensive document, available on the Web, which includes the methodology used in developing the curriculum, individual course syllabi for recommended components, …


Defending Cyber Terrorism - A Game Theoretic Modeling Approach, Tridib Bandyopadhyay, Herbert J. Mattord May 2014

Defending Cyber Terrorism - A Game Theoretic Modeling Approach, Tridib Bandyopadhyay, Herbert J. Mattord

Herbert J. Mattord

In this work we attempt to develop a game theoretic model that can indicate the nuances of strategic investments in the face of possible cyber terrorist attacks. First, we briefly review the literature on terrorism. Second, we identify the „cyber‟ factors in terrorism, and how this new mode of attack alters the general scenario. Then, beginning with a naïve counter terrorism model, we incrementally incorporate the factors of cyber terrorism to develop our game theoretic model. Our current work is geared towards developing a model that can adequately incorporate the cyber factors of today‟s networked economy. In this report, we …


Regulatory Compliance In Information Technology And Information Security, Herbert Mattord, Michael Whitman May 2014

Regulatory Compliance In Information Technology And Information Security, Herbert Mattord, Michael Whitman

Herbert J. Mattord

No abstract provided.


The Applicability Of Neurally-Controlled Devices In Business: A Student Perspective, Adriane Randolph Dec 2013

The Applicability Of Neurally-Controlled Devices In Business: A Student Perspective, Adriane Randolph

Adriane B. Randolph

No abstract provided.


Exploring Sales Techniques Through The Minds Of Novice And Expert Salespersons, Adriane Randolph, A. Leila Borders, Terry Loe May 2013

Exploring Sales Techniques Through The Minds Of Novice And Expert Salespersons, Adriane Randolph, A. Leila Borders, Terry Loe

Adriane B. Randolph

No abstract provided.


An Investigation Of Brain Games As A Potential Non-Pharmaceutical Alternative For The Treatment Of Adhd, Adriane Randolph, Stacy Wegrzyn, Doug Hearrington, Tim Martin Jan 2012

An Investigation Of Brain Games As A Potential Non-Pharmaceutical Alternative For The Treatment Of Adhd, Adriane Randolph, Stacy Wegrzyn, Doug Hearrington, Tim Martin

Adriane B. Randolph

No abstract provided.


Not All Created Equal: The Individual-Technology Fit Of Brain-Computer Interfaces, Adriane Randolph Dec 2011

Not All Created Equal: The Individual-Technology Fit Of Brain-Computer Interfaces, Adriane Randolph

Adriane B. Randolph

No abstract provided.


The Aha Moment: Using Psychophysiological Measures To Identify It Entrepreneurial Epiphanies, Adriane Randolph, Gaëtan Mourmant Apr 2011

The Aha Moment: Using Psychophysiological Measures To Identify It Entrepreneurial Epiphanies, Adriane Randolph, Gaëtan Mourmant

Adriane B. Randolph

No abstract provided.


Is This What I Think It Is? The Frontal Lobe And Influences On Taste, Adriane Randolph, Charnetta Brown, Janée Burkhalter Apr 2011

Is This What I Think It Is? The Frontal Lobe And Influences On Taste, Adriane Randolph, Charnetta Brown, Janée Burkhalter

Adriane B. Randolph

No abstract provided.


I’Ve Got The Feeling: A Consumer’S Psychophysiological Responses To Brand Placement, Adriane Randolph, Janée Burkhalter Jan 2011

I’Ve Got The Feeling: A Consumer’S Psychophysiological Responses To Brand Placement, Adriane Randolph, Janée Burkhalter

Adriane B. Randolph

No abstract provided.


The Enemy At The Gates Ii: The Enemy Within, Herbert Mattord, M. Whitman Dec 2010

The Enemy At The Gates Ii: The Enemy Within, Herbert Mattord, M. Whitman

Herbert J. Mattord

No abstract provided.


Brain-Computer Interfaces As Child's Play: Using Mental Training To Improve Motor Skills In Children, Adriane Randolph, Ashley Ingraham Mar 2010

Brain-Computer Interfaces As Child's Play: Using Mental Training To Improve Motor Skills In Children, Adriane Randolph, Ashley Ingraham

Adriane B. Randolph

No abstract provided.


The Enemy Is Still At The Gates, Threats To Information Security Revisited, M. Whitman, Herbert Mattord Dec 2009

The Enemy Is Still At The Gates, Threats To Information Security Revisited, M. Whitman, Herbert Mattord

Herbert J. Mattord

No abstract provided.


Case Study: The Development Of An Alternative School In Honduras, Adriane Randolph, Arjan Raven, Miriam Hanson May 2009

Case Study: The Development Of An Alternative School In Honduras, Adriane Randolph, Arjan Raven, Miriam Hanson

Adriane B. Randolph

No abstract provided.


Welcome To The Isa Club! Strategies For Recruiting And Retaining Women In Isa, Proceedings, A. Woszczynski, Sherri Shade Dec 2008

Welcome To The Isa Club! Strategies For Recruiting And Retaining Women In Isa, Proceedings, A. Woszczynski, Sherri Shade

Sherri Shade

No abstract provided.


Diversity Issues In It For Women In India, Proceedings, A. Woszczynski, P. Dembla, Sherri Shade Dec 2008

Diversity Issues In It For Women In India, Proceedings, A. Woszczynski, P. Dembla, Sherri Shade

Sherri Shade

No abstract provided.


Dealing With Trouble In Paradise: Sustainable Educational Projects In Roatan, Honduras, Adriane Randolph, Arjan Raven, Shelli Heil May 2008

Dealing With Trouble In Paradise: Sustainable Educational Projects In Roatan, Honduras, Adriane Randolph, Arjan Raven, Shelli Heil

Adriane B. Randolph

No abstract provided.


An Expert System For Matching Individual Characteristics And Features Of Brain-Computer Interface Technologies With Performance, Adriane Randolph Apr 2008

An Expert System For Matching Individual Characteristics And Features Of Brain-Computer Interface Technologies With Performance, Adriane Randolph

Adriane B. Randolph

No abstract provided.


The Southeast Collegiate Cyber Defense Competition, Herbert Mattord, M. Whiteman Dec 2007

The Southeast Collegiate Cyber Defense Competition, Herbert Mattord, M. Whiteman

Herbert J. Mattord

No abstract provided.


Controllability Of Galvanic Skin Response, Adriane Randolph, Luke Mccampbell, Melody Moore, Steven Mason Jun 2005

Controllability Of Galvanic Skin Response, Adriane Randolph, Luke Mccampbell, Melody Moore, Steven Mason

Adriane B. Randolph

No abstract provided.


Leveraging Academic Resources To Improve Information Assurance On Your Campus, Herbert Mattord, M. Whitman Dec 2004

Leveraging Academic Resources To Improve Information Assurance On Your Campus, Herbert Mattord, M. Whitman

Herbert J. Mattord

No abstract provided.


Opportunities For Women In It Security, Proceedings, M. Myers, A. Woszczynski, Sherri Shade Dec 2004

Opportunities For Women In It Security, Proceedings, M. Myers, A. Woszczynski, Sherri Shade

Sherri Shade

No abstract provided.


Deriving User Profiles For Augmentative Communication, Adriane Randolph, Melody Moore, Veda Storey, Nannette Napier Jul 2004

Deriving User Profiles For Augmentative Communication, Adriane Randolph, Melody Moore, Veda Storey, Nannette Napier

Adriane B. Randolph

No abstract provided.