Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Kennesaw State University

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 849

Full-Text Articles in Business

The Need For Green Companies In Nigeria: A Study Of Electronic Invoicing, Sunday Adewale Olaleye, Ismaila Temitayo Sanusi Jan 2019

The Need For Green Companies In Nigeria: A Study Of Electronic Invoicing, Sunday Adewale Olaleye, Ismaila Temitayo Sanusi

The African Journal of Information Systems

Manual invoicing is a major business document that the supplier uses to request payments from a purchaser for services rendered. It contains the contact information of the seller, the list of goods or the services provided and the payment instructions. Attention is being shifted from manual invoicing these days because of some factors like increased man-hours, risks of human error and risks of high carbon footprint. The study applied Unified Theory of Acceptance and Use of Technology (UTAUT) to investigate the need for green Companies in Nigeria. Empirical data were collected from Nigerian companies to measure intention-behavior for electronic invoicing ...


E-Governance As An Alternative Antecedent To A Lean Public Sector : Theory And Evidence, Kennedy Okong'o, Michael Kyobe Jan 2019

E-Governance As An Alternative Antecedent To A Lean Public Sector : Theory And Evidence, Kennedy Okong'o, Michael Kyobe

The African Journal of Information Systems

The ever growing size of the public sector has been a contention in theory and practice. In parallel, the public sector use of Information Communication Technologies (ICTs), otherwise known as Electronic Government has had a transformative potential. Inspired by these competing interests, this paper set out to study the relationship between investments in e-Government and the size of public sector. Informed by Banks-Weingast model of bureaucratic discretion drawn upon political science, the research estimated the linkage. Using a balanced panel data of Kenya’s key ministries for a 10 year period (2004-2014), e-Government expenditure, consumer price indices (CPI) and gross ...


External Actors In Forming National Ict Policy In Malawi: A Cause For Concern In Low-Income Countries?, Gregory Kunyenje 4928781, Wallace Chigona Jan 2019

External Actors In Forming National Ict Policy In Malawi: A Cause For Concern In Low-Income Countries?, Gregory Kunyenje 4928781, Wallace Chigona

The African Journal of Information Systems

The paper examines external actors in the formulation of national Information and Communication Technology (ICT) policies. It questions how external actors overtly or covertly influence formulation of national ICT policies following that, of the nearly 84% of the countries in Africa that have formulated national ICT policies, most of which have been influenced by external actors. The paper uses Bourdieu’s Theory of Practice to analyze the effects of external actors’ influences in developing countries by using Malawi as a case study. Document analysis is used to analyse external actors’ influences in policy documents, the minutes of policy actors’ meetings ...


Mapping Knowledge Units Using A Learning Management System (Lms) Course Framework, Casey Rackley Oct 2018

Mapping Knowledge Units Using A Learning Management System (Lms) Course Framework, Casey Rackley

KSU Proceedings on Cybersecurity Education, Research and Practice

ABSTRACT

The purpose of this paper is to examine the outcomes of using a Learning Management System (LMS) course as a framework for mapping the Centers of Academic Excellence in Cyber Defense (CAE-CD) 2019 Knowledge Units (KU) to college courses. The experience shared herein will be useful to faculty who are interested in performing the mapping and applying for CAE-CDE designation.


Towards A Development Of Predictive Models For Healthcare Hipaa Security Rule Violation Fines, Jim Furstenberg, Yair Levy Oct 2018

Towards A Development Of Predictive Models For Healthcare Hipaa Security Rule Violation Fines, Jim Furstenberg, Yair Levy

KSU Proceedings on Cybersecurity Education, Research and Practice

The Health Insurance Portability and Accountability Act’s (HIPAA) Security Rule (SR) mandate provides a national standard for the protection of electronic protected health information (ePHI). The SR’s standards provide healthcare covered entities (CEs’) flexibility in how to meet the standards because the SR regulators realized that all health care organizations are not the same. However, the SR requires CEs’ to implement reasonable and appropriate safeguards, as well as security controls that protect the confidentiality, integrity, and availability (CIA) of their ePHI data. However, compliance with the HIPAA SR mandates are confusing, complicated, and can be costly to CEs ...


Hijacking Wireless Communications Using Wifi Pineapple Nano As A Rogue Access Point, Shawn J. Witemyre, Tamirat T. Abegaz, Bryson R. Payne, Ash Mady Oct 2018

Hijacking Wireless Communications Using Wifi Pineapple Nano As A Rogue Access Point, Shawn J. Witemyre, Tamirat T. Abegaz, Bryson R. Payne, Ash Mady

KSU Proceedings on Cybersecurity Education, Research and Practice

Wireless access points are an effective solution for building scalable, flexible, mobile networks. The problem with these access points is often the lack of security. Users regularly connect to wireless access points without thinking about whether they are genuine or malicious. Moreover, users are not aware of the types of attacks that can come from “rogue” access points set up by attackers and what information can be captured by them. Attackers use this advantage to gain access to users’ confidential information. The objective of this study is to examine the effectiveness of the WiFi Pineapple NANO used as a rogue ...


Cybersecurity Education Employing Experiential Learning, Travis Lowe, Casey Rackley Oct 2018

Cybersecurity Education Employing Experiential Learning, Travis Lowe, Casey Rackley

KSU Proceedings on Cybersecurity Education, Research and Practice

ABSTRACT

The purpose of this paper is to discuss a curriculum design that employs Kolb’s Experiential Learning Theory stages and Kolb’s Learning Styles in four consecutive class sessions. The challenge each class is to present students with perplexing and often frustrating network problems that someday might be encountered on the job. By using Kolb’s theory, students address those problems from the perspective of each learning style, while passing through each phase of the learning cycle. As a result, students gain stronger cognitive thinking skills and hands-on troubleshooting skills in preparation for work as network administrators or cybersecurity ...


Capturing The Existential Cyber Security Threats From The Sub-Saharan Africa Zone Through Literature Database, Samuel B. Olatunbosun, Nathanial J. Edwards, Cytyra D. Martineau Oct 2018

Capturing The Existential Cyber Security Threats From The Sub-Saharan Africa Zone Through Literature Database, Samuel B. Olatunbosun, Nathanial J. Edwards, Cytyra D. Martineau

KSU Proceedings on Cybersecurity Education, Research and Practice

Abstract - The Internet brought about the phenomenon known as Cyber-space which is boundless in nature. It is one of the fastest-growing areas of technical infrastructure development over the past decade. Its growth has afforded everyone the opportunity to carry out one or more transactions for personal benefits. The African continent; often branded as ‘backward’ by the Western press has been able to make substantial inroads into the works of Information and Computer Technology (ICT). This rapid transition by Africans into ICT power has thus opened up the opportunities for Cybercriminal perpetrators to seek and target victims worldwide including America for ...


Using Project Management Knowledge And Practice To Address Digital Forensic Investigation Challenges, Steven S. Presley, Jeffrey P. Landry, Michael Black Oct 2018

Using Project Management Knowledge And Practice To Address Digital Forensic Investigation Challenges, Steven S. Presley, Jeffrey P. Landry, Michael Black

KSU Proceedings on Cybersecurity Education, Research and Practice

The management of digital forensics investigations represents a unique challenge. The field is relatively new, and combines the technical challenges of Information Systems with the legal challenges of forensics investigations. The challenges for the Digital Forensics Investigators and the organizations they support are many. This research effort examines the characteristics and challenges of Digital Forensics Investigations and compares them with the features and knowledge areas of project management. The goal was to determine if project management knowledge, as defined in a common body of knowledge, would be helpful in addressing digital forensics investigation challenges identified in the literature. The results ...


Laboratory Exercises To Accompany Industrial Control And Embedded Systems Security Curriculum Modules, Gretchen Richards Oct 2018

Laboratory Exercises To Accompany Industrial Control And Embedded Systems Security Curriculum Modules, Gretchen Richards

KSU Proceedings on Cybersecurity Education, Research and Practice

The daily intrusion attempts and attacks on industrial control systems (ICS) and embedded systems (ES) underscore the criticality of the protection of our Critical Infrastructures (CIs). As recent as mid-July 2018, numerous reports on the infiltration of US utility control rooms by Russian hackers have been published. These successful infiltration and possible manipulation of the utility companies could easily translate to a devastating attack on our nation’s power grid and, consequently, our economy and well-being. Indeed, the need to secure the control and embedded systems which operate our CIs has never been so pronounced. In our attempt to address ...


A Blockchain-Based Security-Oriented Framework For Cloud Federation, Ramandeep Kaur Sandhu, Kweku Muata A. Osei-Bryson Oct 2018

A Blockchain-Based Security-Oriented Framework For Cloud Federation, Ramandeep Kaur Sandhu, Kweku Muata A. Osei-Bryson

KSU Proceedings on Cybersecurity Education, Research and Practice

Cloud federations have been formed to share the services, prompt and support cooperation, as well as interoperability among their already deployed cloud systems. However, the creation and management of the cloud federations lead to various security issues such as confidentially, integrity and availability of the data. Despite the access control policies in place, an attacker may compromise the communication channel processing the access requests and the decisions between the access control systems and the members(users) and vice-versa. In cloud federation, the rating of the services offered by different cloud members becomes integral to providing the users with the best ...


Information Privacy Concerns In The Age Of Internet Of Things, Madhav Sharma, David Biros Oct 2018

Information Privacy Concerns In The Age Of Internet Of Things, Madhav Sharma, David Biros

KSU Proceedings on Cybersecurity Education, Research and Practice

Internet of things (IoT) offer new opportunities for advancement in many domains including healthcare, home automation, manufacturing and transportation. In recent years, the number of IoT devices have exponentially risen and this meteoric rise is poised to continue according to the industry. Advances in the IoT integrated with ambient intelligence are intended to make our lives easier. Yet for all these advancements, IoT also has a dark side. Privacy and security were already priorities when personal computers, devices and work stations were the only point of vulnerability to personal information, however, with the ubiquitous nature of smart technologies has increased ...


Car Hacking: Can It Be That Simple?, Bryson Payne Oct 2018

Car Hacking: Can It Be That Simple?, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

The Internet of Things (IoT) has expanded the reach of technology at work, at home, and even on the road. As Internet-connected and self-driving cars become more commonplace on our highways, the cybersecurity of these “data centers on wheels” is of greater concern than ever. Highly publicized hacks against production cars, and a relatively small number of crashes involving autonomous vehicles, have brought the issue of securing smart cars to the forefront as a matter of public and individual safety. This article describes the integration of a module on car hacking into a semester-long ethical hacking cybersecurity course, including full ...


Study Of Physical Layer Security And Teaching Methods In Wireless Communications, Zhijian Xie, Christopher Horne Oct 2018

Study Of Physical Layer Security And Teaching Methods In Wireless Communications, Zhijian Xie, Christopher Horne

KSU Proceedings on Cybersecurity Education, Research and Practice

In most wireless channels, the signals propagate in all directions. For the communication between Alice and Bob, an Eavesdropper can receive the signals from both Alice and Bob as far as the Eavesdropper is in the range determined by the transmitting power. Through phased array antenna with beam tracking circuits or cooperative iteration, the signals are confined near the straight line connecting the positions of Alice and Bob, so it will largely reduce the valid placement of an Eavesdropper. Sometimes, this reduction can be prohibitive for Eavesdropper to wiretap the channel since the reduced space can be readily protected. Two ...


Evaluating Two Hands-On Tools For Teaching Local Area Network Vulnerabilities, Ariana Brown, Jinsheng Xu, Xiaohong Yuan Oct 2018

Evaluating Two Hands-On Tools For Teaching Local Area Network Vulnerabilities, Ariana Brown, Jinsheng Xu, Xiaohong Yuan

KSU Proceedings on Cybersecurity Education, Research and Practice

According to the Verizon’s Data Breach Investigations Report, Local Area Network (LAN) access is the top vector for insider threats and misuses. It is critical for students to learn these vulnerabilities, understand the mechanisms of exploits, and know the countermeasures. The department of Computer Science at North Carolina A&T State University designed two different educational tools that help students learn ARP Spoofing Attacks, which is the most popular attack on LAN. The first tool, called Hacker’s Graphical User Interface (HGUI), is a visualization tool that demonstrates ARP Spoofing Attack with real time animation. The second tool is ...


Towards An Empirical Assessment Of Cybersecurity Readiness And Resilience In Small Businesses, Darrell Eilts, Yair Levy Oct 2018

Towards An Empirical Assessment Of Cybersecurity Readiness And Resilience In Small Businesses, Darrell Eilts, Yair Levy

KSU Proceedings on Cybersecurity Education, Research and Practice

Many small businesses struggle to improve their cybersecurity posture despite the risk to their business. Small businesses lacking adequate protection from cyber threats, or a business continuity strategy to recover from disruptions, have a very high risk of loss due to a cyberattack. These cyberattacks, either deliberate or unintentional, can become costly when a small business is not prepared. This developmental research is focused on the relationship between two constructs that are associated with readiness and resilience of small businesses based on their cybersecurity planning, implementation, as well as response activities. A Cybersecurity Preparedness-Risk Taxonomy (CyPRisT) is proposed using the ...


Digital Identity, Philip Andreae Oct 2018

Digital Identity, Philip Andreae

KSU Proceedings on Cybersecurity Education, Research and Practice

No abstract provided.


Why Managing 3rd Party Cybersecurity Risk Is A Matter Of National Security, Keith Deininger Oct 2018

Why Managing 3rd Party Cybersecurity Risk Is A Matter Of National Security, Keith Deininger

KSU Proceedings on Cybersecurity Education, Research and Practice

No abstract provided.


Six Things I Wish New Employees Knew, Brian Albertson Oct 2018

Six Things I Wish New Employees Knew, Brian Albertson

KSU Proceedings on Cybersecurity Education, Research and Practice

No abstract provided.


Why Networks Still Matter, Tim O'Neill Oct 2018

Why Networks Still Matter, Tim O'Neill

KSU Proceedings on Cybersecurity Education, Research and Practice

No abstract provided.


Beyond The Classroom - What Students Need To Know, Will Alexander Oct 2018

Beyond The Classroom - What Students Need To Know, Will Alexander

KSU Proceedings on Cybersecurity Education, Research and Practice

No abstract provided.


Digital Fluency: Necessary Competence For Teaching And Learning In Connected Classrooms, Agnes Chigona Sep 2018

Digital Fluency: Necessary Competence For Teaching And Learning In Connected Classrooms, Agnes Chigona

The African Journal of Information Systems

Educators’ digital fluency has been noted as one of the most important skill required for effective curriculum delivery in connected classrooms. Research and anecdotal evidence show that even though many Western Cape classrooms have internet connectivity, many of the educators are unable to take advantage of the connectivity for teaching and learning. Hence, this paper focuses on the educators’ digital fluency as a necessary competence for effective curriculum delivery in connected classrooms. The study was done qualitatively. Randomly selected educators from public schools participated in the one-on-one and focus group interviews. Results show that most educators perceive their digital fluency ...


Understanding The Kenya Open Data Initiative Trajectory Based On Callon’S Moments Of Translation, Paul Wando Mungai Dr, Jean-Paul Van Belle Prof. Sep 2018

Understanding The Kenya Open Data Initiative Trajectory Based On Callon’S Moments Of Translation, Paul Wando Mungai Dr, Jean-Paul Van Belle Prof.

The African Journal of Information Systems

This study seeks to understand the existing interactions between actors of the Kenya Open Data Initiative (KODI), and how the actors’ interests are aligning to achieve openness and transparency of government operations. This study is based on the Callon’s moments of translation framework, which helps in describing the interaction between initiators of a network and other involved actors with the aim of aligning their diverse interests in order to achieve a common goal. KODI comprised of a diverse group of stakeholders from government, private sector, inter-governmental organisation, and civil society. KODI has faced various challenges since its inception in ...


Developing And Validating Measurement Items For A Multi-Dimensional Social Network Site Usage Construct, Nugi Nkwe Sep 2018

Developing And Validating Measurement Items For A Multi-Dimensional Social Network Site Usage Construct, Nugi Nkwe

The African Journal of Information Systems

SNS platforms are providing simultaneously for hedonic and utilitarian type uses. However, extant research continues to model the SNS usage construct as a simplistic unidimensional construct that fails to adequately reflect the multi-dimensional nature of SNS usage in workplace contexts. This paper contributes by presenting results of a multi-phase process used to develop and validate measures of the deep structure SNS usage construct from both hedonic and utilitarian perspectives. Psychometric tests were conducted using 124 usable responses, and the results show that deep structure usage is best modelled as a reflective second order construct with three first order dimensions reflecting ...


Collaboration Circles: Empowering Job Seekers To Find Work Using Ad-Hoc Collaboration Networks, Lindani Castro Khanyile, Marijke Coetzee Sep 2018

Collaboration Circles: Empowering Job Seekers To Find Work Using Ad-Hoc Collaboration Networks, Lindani Castro Khanyile, Marijke Coetzee

The African Journal of Information Systems

Recent trends combine smart phones with social networking platforms to bring new opportunities that can enable people to collaborate anywhere and at any time. For example, organisations can be given the opportunity to recruit part-time job seekers such as software developers using social media tools. Previously, collaboration was static in nature, but today loosely enabled collaboration needs to support flexible schedules, ad hoc processes and members that may not be known in advance. Furthermore, current crowdsourcing platforms that enable software developers to contribute their skills to projects do not meet the social needs of participants as they collaborate. This paper ...


Awareness And Preparedness Of It Managers To Digital Disruption: A South African Exploratory Case Study, Mark Prevost, Kevin Allan Johnston Prof, Maureen C. Tanner Sep 2018

Awareness And Preparedness Of It Managers To Digital Disruption: A South African Exploratory Case Study, Mark Prevost, Kevin Allan Johnston Prof, Maureen C. Tanner

The African Journal of Information Systems

Digital disruption is breaking down long established business models. In most organisations, IT managers are charged with management of technology-enabled change. It is therefore important that IT managers understand the opportunities and challenges posed by digital disruption to aid the organisation's response. The purpose of this study was to explore what South African IT managers perceive, and what their responses (or planned responses) to digital disruption within the context of a financial services organisation are. The study is interpretive, exploratory and qualitative, drawing from situational awareness theory to ground the participants’ perception of digital disruption. The study draws on ...


An Organizational Communication Approach To Information Security, Kofi Arhin, Gamel O. Wiredu Sep 2018

An Organizational Communication Approach To Information Security, Kofi Arhin, Gamel O. Wiredu

The African Journal of Information Systems

Organizations thrive on efficient information management systems as they support activities. Hence, these systems need to be protected from attacks that threaten their existence and use. Although non-technical information security ideas have been espoused by researchers, they have excluded the role of organizational communication. As such, this study explains information security from an organizational communication perspective. Drawing upon a framework of discourse and organizational change, we analyze an empirical case of how information security in an organization is implicated by communicative actions, deep structures, and communication traits. The analysis reveals that (1) prevention of security breaches is achieved by structures ...


Experiential Learning Builds Cybersecurity Self-Efficacy In K-12 Students, Abdullah Konak Jul 2018

Experiential Learning Builds Cybersecurity Self-Efficacy In K-12 Students, Abdullah Konak

Journal of Cybersecurity Education, Research and Practice

In recent years, there have been increased efforts to recruit talented K-12 students into cybersecurity fields. These efforts led to many K-12 extracurricular programs organized by higher education institutions. In this paper, we first introduce a weeklong K-12 program focusing on critical thinking, problem-solving, and igniting interest in information security through hands-on activities performed in a state-of-the-art virtual computer laboratory. Then, we present an inquiry-based approach to design hands-on activities to achieve these goals. We claim that hands-on activities designed based on this inquiry-based framework improve K-12 students’ self-efficacy in cybersecurity as well as their problem-solving skills. The evaluation of ...


Student Misconceptions About Cybersecurity Concepts: Analysis Of Think-Aloud Interviews, Julia D. Thompson, Geoffrey L. Herman, Travis Scheponik, Linda Oliva, Alan Sherman, Ennis Golaszewski, Dhananjay Phatak, Kostantinos Patsourakos Jul 2018

Student Misconceptions About Cybersecurity Concepts: Analysis Of Think-Aloud Interviews, Julia D. Thompson, Geoffrey L. Herman, Travis Scheponik, Linda Oliva, Alan Sherman, Ennis Golaszewski, Dhananjay Phatak, Kostantinos Patsourakos

Journal of Cybersecurity Education, Research and Practice

We conducted an observational study to document student misconceptions about cybersecurity using thematic analysis of 25 think-aloud interviews. By understanding patterns in student misconceptions, we provide a basis for developing rigorous evidence-based recommendations for improving teaching and assessment methods in cybersecurity and inform future research. This study is the first to explore student cognition and reasoning about cybersecurity. We interviewed students from three diverse institutions. During these interviews, students grappled with security scenarios designed to probe their understanding of cybersecurity, especially adversarial thinking. We analyzed student statements using a structured qualitative method, novice-led paired thematic analysis, to document patterns in ...


A Case Study In The Implementation Of A Human-Centric Higher Education Cybersecurity Program, John W. Coffey, Melanie Haveard, Geissler Golding Jul 2018

A Case Study In The Implementation Of A Human-Centric Higher Education Cybersecurity Program, John W. Coffey, Melanie Haveard, Geissler Golding

Journal of Cybersecurity Education, Research and Practice

This article contains a description of the implementation of a comprehensive cyber security program at a regional comprehensive university. The program was designed to create an effective cyber security management infrastructure and to train end users and other categories of security management personnel in data protection and cyber security. This work addresses the impetus for the program, the rather extensive planning and development that went into the program, its implementation, and insights gleaned from the experience. The paper concludes with a summary of the strengths and weaknesses of the initiative.