Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Business

Preparing Uk Students For The Workplace: The Acceptability Of A Gamified Cybersecurity Training, Oliver J. Mason, Siobhan Collman, Stella Kazamia, Ioana Boureanu Nov 2023

Preparing Uk Students For The Workplace: The Acceptability Of A Gamified Cybersecurity Training, Oliver J. Mason, Siobhan Collman, Stella Kazamia, Ioana Boureanu

Journal of Cybersecurity Education, Research and Practice

This pilot study aims to assess the acceptability of Open University’s training platform called Gamified Intelligent Cyber Aptitude and Skills Training course (GICAST), as a means of improving cybersecurity knowledge, attitudes, and behaviours in undergraduate students using both quantitative and qualitative methods. A mixed-methods, pre-post experimental design was employed. 43 self-selected participants were recruited via an online register and posters at the university (excluding IT related courses). Participants completed the Human Aspects of Information Security Questionnaire (HAIS-Q) and Fear of Missing Out (FoMO) Scale. They then completed all games and quizzes in the GICAST course before repeating the HAIS-Q and …


How Effective Are Seta Programs Anyway: Learning And Forgetting In Security Awareness Training, David Sikolia, David Biros, Tianjian Zhang Jul 2023

How Effective Are Seta Programs Anyway: Learning And Forgetting In Security Awareness Training, David Sikolia, David Biros, Tianjian Zhang

Journal of Cybersecurity Education, Research and Practice

Prevalent security threats caused by human errors necessitate security education, training, and awareness (SETA) programs in organizations. Despite strong theoretical foundations in behavioral cybersecurity, field evidence on the effectiveness of SETA programs in mitigating actual threats is scarce. Specifically, with a broad range of cybersecurity knowledge crammed into in a single SETA session, it is unclear how effective different types of knowledge are in mitigating human errors in a longitudinal setting. his study investigates how knowledge gained through SETA programs affects human errors in cybersecurity to fill the longitudinal void. In a baseline experiment, we establish that SETA programs reduce …


More Than Just A Workplace: A Case Study Of Diversity, Equity, And Inclusion In Marriott International Inc. Hotels, Julia Selin Mar 2022

More Than Just A Workplace: A Case Study Of Diversity, Equity, And Inclusion In Marriott International Inc. Hotels, Julia Selin

Experience Industry Management

Diversity, equity, and inclusion practices are essential for a hotel to function. Having diversity is an important aspect of a company because it allows for multiple perspectives that bring new ideas together, and most importantly multiculturalism. The purpose of this study was to examine the diversity, equity, and inclusion practices in the workplaces of Marriott International Inc. Hotels. Research for this study was conducted using a case study. The results indicated that Marriott values diversity, which is seen though corporate programs and global initiatives. Marriott is an international company that helps create job opportunities around the world and forms mentor …


An Exploratory Study Of Mode Efficacy In Cybersecurity Training, Michael D. Workman Jul 2021

An Exploratory Study Of Mode Efficacy In Cybersecurity Training, Michael D. Workman

Journal of Cybersecurity Education, Research and Practice

Cybersecurity capabilities in organizations and governmental agencies continue to lag behind the threats. Given the current environment, these entities have placed renewed emphasis on cybersecurity education. However, education appears to lack its full potential in most settings. Few empirical studies have systematically tested the efficacy of various training methods and modes, and those that have been conducted have yielded inconsistent findings. Recent literature on the use of gamified simulations have suggested that they may improve cybersecurity behaviors. Similarly, live activities such as hackathons and capture the flag events have been surmised to augment learning and capabilities. We conducted an exploratory …


The Effects Of It-Related Attributional Style In Voluntary Technology Training, Stanislav Mamonov, Marios Koufaris Jul 2018

The Effects Of It-Related Attributional Style In Voluntary Technology Training, Stanislav Mamonov, Marios Koufaris

Department of Information Management and Business Analytics Faculty Scholarship and Creative Works

IT training is firmly established as a key condition that influences successful technology adoption, yet little is known about factors that can affect voluntary training participation. We evaluate the predictive value of IT-related attributional style in relation to the intention to participate in voluntary training in the context of a mandatory enterprise resource planning system rollout. We find that individual IT-related attributional style is highly predictive of the intention to participate.


Impact Of Motivation On Project Teams’ Performance In Information Technology, Ramu Karanam Mar 2018

Impact Of Motivation On Project Teams’ Performance In Information Technology, Ramu Karanam

Dissertations and Theses

Sufficient motivation is a critical ingredient for any organization to derive optimal performances from their workforce. Project teams are an integral part of the efficient conduction of an information and communication technology company’s core operations. This study is dictated towards the evaluation of the main factors that influence the level of motivation portrayed by team members of information technology project teams. Through a comprehensive literature review, the research was able to uncover insightful trends in motivation patterns among project team members that might be useful to project managers. The findings of this research conclude that a project team manager can …


Cyber Security For Everyone: An Introductory Course For Non-Technical Majors, Marc J. Dupuis Jun 2017

Cyber Security For Everyone: An Introductory Course For Non-Technical Majors, Marc J. Dupuis

Journal of Cybersecurity Education, Research and Practice

In this paper, we describe the need for and development of an introductory cyber security course. The course was designed for non-technical majors with the goal of increasing cyber security hygiene for an important segment of the population—college undergraduates. While the need for degree programs that focus on educating and training individuals for occupations in the ever-growing cyber security field is critically important, the need for improved cyber security hygiene from the average everyday person is of equal importance. This paper discusses the approach used, curriculum developed, results from two runs of the course, and frames the overall structure of …


Essays On Technology-Mediated Training: Implications For Design And Evaluation, Vishal Satyapal Shah Dec 2015

Essays On Technology-Mediated Training: Implications For Design And Evaluation, Vishal Satyapal Shah

Graduate Theses and Dissertations

Information technology (IT) is increasingly used to impart a variety training skills, and these skills may range from specific software application operations and computer programming to learning about generic business processes. Using IT to assist training is broadly termed “Technology-Mediated Learning” (TML). Following the three essay model, this dissertation examines training interventions in the context of TML. In Essay 1, a thorough literature survey of technology training in Information Systems (IS) was conducted, resulting in clarification of the nomenclature used in TML. Essay 1 also identified of two leading theories used in TML research: (a) Social cognitive theory (SCT) (b) …


Soft-Skills Training And Cultural Sensitization Of Indian Bpo Workers: A Qualitative Study, Ramesh Subramanian Jan 2015

Soft-Skills Training And Cultural Sensitization Of Indian Bpo Workers: A Qualitative Study, Ramesh Subramanian

Communications of the IIMA

This paper describes a study of soft-skills training at a large Business Process Outsourcing Firm located in Bangalore, India. Soft-skills training pertains to social and customer handling skills in addition to cultural sensitization of Indians to other cultures. Soft-skills are very important for the success of BPO firms, yet there is not much in the literature that addresses soft-skills training of BPO workers. This study attempts to bridge the gap. It adopts a qualitative approach using a combination of methods such as the long interview, secondary sources research and actual observation. The results are used to develop a framework for …


A Model Of Jordanian Firm’S Trainees’ Acceptance Of A Web-Based Training, Amin A. Shaqrah, Al Hareth Abu Husain Jan 2014

A Model Of Jordanian Firm’S Trainees’ Acceptance Of A Web-Based Training, Amin A. Shaqrah, Al Hareth Abu Husain

Journal of International Technology and Information Management

This study investigates E-learning technologies such as web based training “WBT” as a one of many products which wide used in all corporate training for delivering educational content to their employees. In order to achieve a better view and validate the study, researcher attempts to give details of how technology acceptance models help Jordanian trainees firms in accepting e- learning technology, and how if applied will result more attention to usage behavior. The empirical examination of study model which developed based on Unified Theory of Acceptance and Use of Technology ”UTAUT” which indicates that the Jordanian trainees’ firms’ usage behavior …


Cultural Issues In Software Estimation: From Intuition To Model Based Estimation In Upgrade Projects, Sanjay Mohapatra Jan 2009

Cultural Issues In Software Estimation: From Intuition To Model Based Estimation In Upgrade Projects, Sanjay Mohapatra

Journal of International Technology and Information Management

This paper discusses issues related to change in culture that happens when software estimation becomes scientific, methodical and predictive. From a person based intuitive approach to model based estimation techniques, the approach necessitates a change in mindset and culture. This change in culture has been noticed in upgrade projects. Upgrades play an important role in product life cycle. A product is released with required features to meet immediate requirements of the customers. Any additional or modifications to features are carried through upgrade projects. These upgrades planned well in advance by the product developing organizations are made available to customers through …