Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 31

Full-Text Articles in Business

Synergistic Security: A Work System Case Study Of The Target Breach, Martha Nanette Harrell Dec 2017

Synergistic Security: A Work System Case Study Of The Target Breach, Martha Nanette Harrell

Journal of Cybersecurity Education, Research and Practice

Recent publicized security breaches can be used to evaluate information security programs. The processes and procedures that allowed the event to occur can be examined in a case study and then be used to find methods for future mitigation of risk. The Target security breach is used in this study to examine the organization’s information security program using a macro-ergonomic model. This research posits that an information security program should consider the work system design, based in macro-ergonomics, to help mitigate information security risk to the organization and ensure an efficient and effective information security program. Based on a seminal …


A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard K. Nilsen, Yair Levy, Steven R. Terrell Ph.D., Dawn Beyer Dec 2017

A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard K. Nilsen, Yair Levy, Steven R. Terrell Ph.D., Dawn Beyer

Journal of Cybersecurity Education, Research and Practice

Organizational information system users (OISUs) that are open to cyber threats vectors are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, technical cybersecurity controls may be rendered useless due to a lack of cybersecurity competency of OISUs. The main goal of this research study was to propose and validate, using subject matter experts (SMEs), a reliable hands-on assessment prototype tool for measuring the knowledge, skills, and abilities (KSAs) that comprise the cybersecurity competency of an OISU. Primarily using the Delphi methodology, this study implemented four phases of data collection using cybersecurity SMEs for proposing and …


Social Media Risk Perceptions Of Human Resource Professionals: Issues Undergraduate Students Should Consider, Julio C. Rivera, Jack Howard, Samuel Goh, James L. Worrell, Paul Di Gangi Dec 2017

Social Media Risk Perceptions Of Human Resource Professionals: Issues Undergraduate Students Should Consider, Julio C. Rivera, Jack Howard, Samuel Goh, James L. Worrell, Paul Di Gangi

Journal of Cybersecurity Education, Research and Practice

This study contrasts the social media risk perceptions of undergraduate students, versus those of certified Human Resource professionals. Social media is widely used by most segments of the population, and particularly among the age group that includes most undergraduate students. Organizations hiring employees are increasingly examining job applicant's social media postings as part of the applicant screening process. In this study we examine how these groups differ in their perceptions of the risks inherent in using social media, and what these differences may mean for students seeking employment. Recommendations are made for raising undergraduate student awareness of these risks.


A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland Dec 2017

A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland

Journal of Cybersecurity Education, Research and Practice

In today’s business environment where all operations are enabled by technology, information security has become an established discipline as more and more businesses realize its value. The human component has been recognized to have an important role in information security since the only way to reduce security risks is through making employees more information security aware. Towards this goal the research will appreciate the importance of information security awareness by illustrating the need for more effective user training. Further to that it proposes and develops an information security toolkit as a prototype awareness raising initiative. Apart from the elements of …


From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth Dec 2017

From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth

Journal of Cybersecurity Education, Research and Practice

No abstract provided.


Getting Girls In Stem & The Dangers Of Forgetting That Science Is Art - Someone Made It Up, Heidi Therese Dangelmaier, Camilla Hermann Dec 2017

Getting Girls In Stem & The Dangers Of Forgetting That Science Is Art - Someone Made It Up, Heidi Therese Dangelmaier, Camilla Hermann

The STEAM Journal

Encouraging girls to participate in STEM is a hot topic that has captured the concern of the world’s academic, business and scientific communities. The intention is noble, however the strategies being deployed are reinforcing the very bias society seeks to eliminate. If we wish to advance our evolutionary journey as a species, a shift from “feeling sorry for disadvantaged girls” to “fearing STEM without girls’ reformation” is imperative. This piece discusses the rise to an initiative to redesign culture: Girlapproved.


The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson Dec 2017

The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson

International Journal of Nuclear Security

Planning for the future of nuclear security is a vital and complex task, requiring cooperation and contribution from many disciplines and industries. This diversity of expertise should include the medical sector, which faces many of the same challenges as the nuclear industry: controlling access to dangerous material, creating a strong security culture, cooperating with the wider world and engaging the public.

Medical physicists, of which the author is one, oversee all aspects of small-scale radiation use. This paper discusses three key areas increasingly important to both medical and nuclear uses of radioactive materials: public engagement, prevention of nuclear and radiological …


Assessing And Enhancing Nuclear Safety And Security Culture For Small Facilities That Handle Radioactive Material, Solymosi Máté Dec 2017

Assessing And Enhancing Nuclear Safety And Security Culture For Small Facilities That Handle Radioactive Material, Solymosi Máté

International Journal of Nuclear Security

The use of radioactive sources is expanding all over the world and abreast the necessity of the enhancement of its safe and secure application is increasing too. In the nuclear industry, the safety and security are top priorities since decades. They share the same goal, to protect humans from the negative affect of the ionizing radiation. The human component of them is a significant factor and technical solutions can protect us so far and thus the culture for safety and security become a major focus. On the other hand, there are still some contradiction between recommendations and international guidance of …


The Future Of Nuclear Security In Moroccan Territory After The Creation Of The New Moroccan Agency Of Nuclear And Radiological Safety And Security: Opportunities And Challenges, Amal Touarsi, Amina Kharchaf Dec 2017

The Future Of Nuclear Security In Moroccan Territory After The Creation Of The New Moroccan Agency Of Nuclear And Radiological Safety And Security: Opportunities And Challenges, Amal Touarsi, Amina Kharchaf

International Journal of Nuclear Security

Nowadays, a security regime for protecting nuclear and radiological material—providing an intelligent national regulatory institution and establishing national security laws—is necessary in order for a state to ensure security of nuclear and radiological materials used within its borders.

This paper focuses on discussing the opportunities and challenges facing the future of nuclear security after the creation of the new Moroccan Agency of Nuclear and Radiological Safety and Security.


Minerva 2017, The Honors College Dec 2017

Minerva 2017, The Honors College

Minerva

This issue of Minerva includes a feature on Honors College research collaboratives; an article on Honors students studying abroad in Singapore and Chile; an article reflecting upon the 15-year anniversary of the Honors College and the importance of mentorship; and articles on Honors students Isaiah Mansour and Aliya Uteova.


Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr Dec 2017

Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr

Journal of International Technology and Information Management

The discovery of useful or worthwhile process models must be performed with due regards to the transformation that needs to be achieved. The blend of the data representations (i.e data mining) and process modelling methods, often allied to the field of Process Mining (PM), has proven to be effective in the process analysis of the event logs readily available in many organisations information systems. Moreover, the Process Discovery has been lately seen as the most important and most visible intellectual challenge related to the process mining. The method involves automatic construction of process models from event logs about any domain …


Perfect Ratings With Negative Comments: Learning From Contradictory Patient Survey Responses, Andrew S. Gallan, Marina Girju, Roxana Girju Nov 2017

Perfect Ratings With Negative Comments: Learning From Contradictory Patient Survey Responses, Andrew S. Gallan, Marina Girju, Roxana Girju

Patient Experience Journal

This research explores why patients give perfect domain scores yet provide negative comments on surveys. In order to explore this phenomenon, vendor-supplied in-patient survey data from eleven different hospitals of a major U.S. health care system were utilized. The dataset included survey scores and comments from 56,900 patients, collected from January 2015 through October 2016. Of the total number of responses, 30,485 (54%) contained at least one comment. For our analysis, we use a two-step approach: a quantitative analysis on the domain scores augmented by a qualitative text analysis of patients’ comments. To focus the research, we start by building …


Why We Should Have Seen That Coming: Comments On Microsoft’S Tay “Experiment,” And Wider Implications, K. W. Miller, Marty J. Wolf, Frances S. Grodzinsky Oct 2017

Why We Should Have Seen That Coming: Comments On Microsoft’S Tay “Experiment,” And Wider Implications, K. W. Miller, Marty J. Wolf, Frances S. Grodzinsky

School of Computer Science & Engineering Faculty Publications

In this paper we examine the case of Tay, the Microsoft AI chatbot that was launched in March, 2016. After less than 24 hours, Microsoft shut down the experiment because the chatbot was generating tweets that were judged to be inappropriate since they included racist, sexist, and anti-Semitic language. We contend that the case of Tay illustrates a problem with the very nature of learning software (LS is a term that describes any software that changes its program in response to its interactions) that interacts directly with the public, and the developer’s role and responsibility associated with it. We make …


Accessibility And Usability Of Government Websites In Tanzania, Joel S. Mtebe, Aron W. Kondoro Sep 2017

Accessibility And Usability Of Government Websites In Tanzania, Joel S. Mtebe, Aron W. Kondoro

The African Journal of Information Systems

The government of Tanzania has been embracing information systems specifically websites in order to widen access to government services, lower administrative costs, and to increase public participation in decision making. As a result, almost every ministry, department, and agency (MDA) has developed a website of different kind. However, the majority of existing websites were developed without sufficiently considering user needs which indicates that they do have some usability and accessibility problems. This study used SortSite tool to evaluate accessibility and usability of government websites taking a sample of 22 websites. The report from the SortSite tool was then checked against …


How To Enhance Interdisciplinary Competence—Interdisciplinary Problem-Based Learning Versus Interdisciplinary Project-Based Learning, Mirjam Brassler, Jan Dettmers Jul 2017

How To Enhance Interdisciplinary Competence—Interdisciplinary Problem-Based Learning Versus Interdisciplinary Project-Based Learning, Mirjam Brassler, Jan Dettmers

Interdisciplinary Journal of Problem-Based Learning

Interdisciplinary competence is important in academia for both employability and sustainable development. However, to date, there are no specific interdisciplinary education models and, naturally, no empirical studies to assess them. Since problem-based learning (PBL) and project-based learning (PjBL) are learning approaches that emphasize students’ collaboration, both pedagogies seem suitable to enhance students’ interdisciplinary competence. Based on the principle of constructive alignment and four instructional principles on interdisciplinary learning, this paper proposes that students profit more from interdisciplinary PBL (iPBL) than interdisciplinary PjBL (iPjBL). A pre-post study was conducted with a sample of 95 students participating in iPBL and 183 students …


How Much Should We Teach The Enigma Machine?, Jeffrey A. Livermore Jun 2017

How Much Should We Teach The Enigma Machine?, Jeffrey A. Livermore

Journal of Cybersecurity Education, Research and Practice

Developing courses and programs in Information Assurance can feel like trying to force ten pounds of flour into a five pound sack. We want to pack more into our courses than we have time to teach. As new technologies develop, we often find it necessary to drop old technologies out of the curriculum and our students miss out on the historical impacts the old technologies had. The discipline is so broad and deep that we have to carefully choose what concepts and technologies we study in depth, what we mention in passing, and what we leave out. Leaving out important …


From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord Jun 2017

From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord

Journal of Cybersecurity Education, Research and Practice

Welcome to the third issue of the Journal of Cybersecurity Education, Research and Practice (JCERP).


Pedagogical Resources For Industrial Control Systems Security: Design, Implementation, Conveyance, And Evaluation, Guillermo A. Francia Iii, Greg Randall, Jay Snellen Jun 2017

Pedagogical Resources For Industrial Control Systems Security: Design, Implementation, Conveyance, And Evaluation, Guillermo A. Francia Iii, Greg Randall, Jay Snellen

Journal of Cybersecurity Education, Research and Practice

Industrial Control Systems (ICS), which are pervasive in our nation’s critical infrastructures, are becoming increasingly at risk and vulnerable to internal and external threats. It is imperative that the future workforce be educated and trained on the security of such systems. However, it is equally important that careful and deliberate considerations must be exercised in designing and implementing the educational and training activities that pertain to ICS. To that end, we designed and implemented pedagogical materials and tools to facilitate the teaching and learning processes in the area of ICS security. In this paper, we describe those resources, the professional …


Cyber Security For Everyone: An Introductory Course For Non-Technical Majors, Marc J. Dupuis Jun 2017

Cyber Security For Everyone: An Introductory Course For Non-Technical Majors, Marc J. Dupuis

Journal of Cybersecurity Education, Research and Practice

In this paper, we describe the need for and development of an introductory cyber security course. The course was designed for non-technical majors with the goal of increasing cyber security hygiene for an important segment of the population—college undergraduates. While the need for degree programs that focus on educating and training individuals for occupations in the ever-growing cyber security field is critically important, the need for improved cyber security hygiene from the average everyday person is of equal importance. This paper discusses the approach used, curriculum developed, results from two runs of the course, and frames the overall structure of …


2016 "Meeting Of The Minds" Research Symposium Abstracts May 2017

2016 "Meeting Of The Minds" Research Symposium Abstracts

OSR Journal of Student Research

No abstract provided.


Artificial Islands In The South China Sea, Aaron Holmes May 2017

Artificial Islands In The South China Sea, Aaron Holmes

OSR Journal of Student Research

The purpose of this study was to understand the value and implications of artificial islands constructed by the People's Republic of China (PRC) in the South China Sea. Qualitative analysis was used with the available literature, sources, and treaties of the topics concerned. The paper concludes that the PRC gains many benefits primarily within the realm of energy security and explores what effects they may


The Face That Launched A Thousand Ships: Helen Of Troy In The Poetry Of Atwood And Tufts, Alea Walstrom May 2017

The Face That Launched A Thousand Ships: Helen Of Troy In The Poetry Of Atwood And Tufts, Alea Walstrom

OSR Journal of Student Research

This paper considers the transformation of Greek myth over time, how character’s attributes change over time, and ultimately how contemporary poets employ these myths. The myth of focus in the paper is that of Helen of Troy and the depiction of her character throughout the many years and variations of the myth. Her character is then considered in the contemporary feminist poetry of Carol Tufts and Margaret Atwood.


Facilitating Pre-Service Teachers To Learn The Mathematical Practices And Engage English Language Learners, Jim Ewing May 2017

Facilitating Pre-Service Teachers To Learn The Mathematical Practices And Engage English Language Learners, Jim Ewing

Journal of Multicultural Affairs

A methods course attempted to help pre-service teachers facilitate the engagement of English language learners (ELLs) in Mathematical Practices from the Common Core State Standards. When 22 elementary pre-service teachers were taught a mathematics lesson in Spanish, most were unable to make sense of the lesson. This made them more aware of challenges ELLs may face when they attempt to engage in Mathematical Practices. The pre-service teachers developed their own strategies to facilitate ELLs. The findings suggest that pre-service teachers not only better empathized with ELLs after being taught in another language, they also learned Mathematical Practices more deeply.


“Cultures As Toolboxes”: An Introduction To The Special Issue Focused On Stem, Anita L. Bright May 2017

“Cultures As Toolboxes”: An Introduction To The Special Issue Focused On Stem, Anita L. Bright

Journal of Multicultural Affairs

The Journal of Multicultural Affairs welcomes Dr. Anita Bright as a guest editor to lead a special issue on Science, Engineering, Technology, and Mathematics (STEM). Dr. Bright centers this special issue around one particularly simple, yet complex question, Is the teaching of science, technology, engineering, and mathematics multicultural?


Becoming Women Engineers: Dismantled Notions And Distorted Perspectives, Lisa Zagumny, Holly Garrett Anthony, Sally J. Pardue May 2017

Becoming Women Engineers: Dismantled Notions And Distorted Perspectives, Lisa Zagumny, Holly Garrett Anthony, Sally J. Pardue

Journal of Multicultural Affairs

In an investigation of (non-international) undergraduate students’ experiences with their engineering major, we interviewed 10 young women asking questions about their interactions with instructors, academic successes/struggles, and any challenges they felt they had faced as women/girls in engineering. Initial findings echoed those in previous research serving to affirm held notions of interventions that would improve women/girls’ experiences in engineering. In reflecting on the research methods and troubling its design, we realized that we had approached the data with limited perspectives. A new approach to analysis opened up concepts and yielded findings that offer a different course of action for abating …


Dispositions Of First Year Teachers Who Teach Mathematics For Social Justice, Kyndall A. Brown May 2017

Dispositions Of First Year Teachers Who Teach Mathematics For Social Justice, Kyndall A. Brown

Journal of Multicultural Affairs

For over 10 years, mathematics educators have sought to use mathematics tasks with social justice contexts to engage students. While student teachers in the UCLA Teacher Education Program (TEP) engage in social justice tasks in their secondary mathematics method classes, very few teachers use these types of tasks with students in the classrooms. The master’s inquiry projects of three TEP students who engaged their students in social justice tasks are analyzed to determine how their backgrounds and positionality influenced their instructional decision making. Results show that personal experiences in the teachers’ lives, as well as a desire to increase motivation …


When Teachers Get It Right: Voices Of Black Girls’ Informal Stem Learning Experiences, Natalie S. King May 2017

When Teachers Get It Right: Voices Of Black Girls’ Informal Stem Learning Experiences, Natalie S. King

Journal of Multicultural Affairs

This paper is a part of a larger research study exploring the STEM learning experiences of Black girls who participated in an informal STEM program – I AM STEM. Through the process of reflection and co-construction of counterstories, Black girls reclaimed authorship of their lives. They identified three major attributes of teachers who promoted their academic success and engagement in STEM learning as ones who (a) responded to their needs and built a community of learners, (b) interacted with their parents in a professional manner, and (c) encouraged them to think critically and creatively during the lessons. Excerpts of their …


Volume 3, Full Contents Apr 2017

Volume 3, Full Contents

Butler Journal of Undergraduate Research

No abstract provided.


Table Of Contents Apr 2017

Table Of Contents

Butler Journal of Undergraduate Research

Front cover, a list of the article contents in this issue, and editorial information.


Proceedings (Abstracts) From The 2nd Annual Student Research Symposium “Meeting Of The Minds” And The 27th Annual Csusb Student Research Competition Feb 2017

Proceedings (Abstracts) From The 2nd Annual Student Research Symposium “Meeting Of The Minds” And The 27th Annual Csusb Student Research Competition

OSR Journal of Student Research

No abstract provided.