Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 22 of 22

Full-Text Articles in Management Information Systems

Survival Of The Safest: Examining Organization Risk Factors For Cybersecurity Incidents, Rachel Whitman, Ana Kriletic, Thomas Wilmore, Kate Conkey, Daniel Svyantek Oct 2019

Survival Of The Safest: Examining Organization Risk Factors For Cybersecurity Incidents, Rachel Whitman, Ana Kriletic, Thomas Wilmore, Kate Conkey, Daniel Svyantek

River Cities Industrial and Organizational Psychology Conference

[Invited adaptation from presentation proposal, "A Matter of Time: Exploring Survival Analysis Through Cybersecurity] Given that employees pose a large threat to organizational cybersecurity, much research attention has been directed to identifying individual risk factors for cybersecurity noncompliance and misbehavior at the cost of examining broad organizational risk factors. However, no study to date has formally examined how the risk of organizational cybersecurity incident changes over time, or how organizational characteristics affect this risk. The proposed study aims to conduct a survival analysis (SA) of cybersecurity events across the past decade, examining broad factors that impact the changing probability of …


A Matter Of Time: Exploring Survival Analysis Through Cybersecurity, Rachel Whitman, Ana Kriletic, Daniel Svyantek Oct 2019

A Matter Of Time: Exploring Survival Analysis Through Cybersecurity, Rachel Whitman, Ana Kriletic, Daniel Svyantek

River Cities Industrial and Organizational Psychology Conference

Despite the impact of employee behavior on organizational security, the topic of cybersecurity historically remains the responsibility of Information Security Management researchers and Information Technology professionals. However, the exponential increase in the prevalence and repercussions of cyber-related incidents invites collaboration between the fields of I-O Psychology and cybersecurity. The proposed presentation discusses the potential for I-O Psychology to contribute to cybersecurity efforts while demonstrating the fundamentals and applicability of survival analysis.


International Conference On Mechatronics, System Engineering And Robotics & Information System And Engineering, University For Business And Technology - Ubt Oct 2019

International Conference On Mechatronics, System Engineering And Robotics & Information System And Engineering, University For Business And Technology - Ubt

UBT International Conference

UBT Annual International Conference is the 8th international interdisciplinary peer reviewed conference which publishes works of the scientists as well as practitioners in the area where UBT is active in Education, Research and Development. The UBT aims to implement an integrated strategy to establish itself as an internationally competitive, research-intensive university, committed to the transfer of knowledge and the provision of a world-class education to the most talented students from all background. The main perspective of the conference is to connect the scientists and practitioners from different disciplines in the same place and make them be aware of the recent …


Effectiveness Of Tools In Identifying Rogue Access Points On A Wireless Network, Ryan Vansickle, Tamirat Abegaz, Bryson Payne Oct 2019

Effectiveness Of Tools In Identifying Rogue Access Points On A Wireless Network, Ryan Vansickle, Tamirat Abegaz, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

Wireless access points have greatly improved users' ability to connect to the Internet. However, they often lack the security mechanisms needed to protect users. Malicious actors could create a rogue access point (RAP), using a device such as the WiFi Pineapple Nano, that could trick users into connecting to an illegitimate access point (AP). To make them look legitimate, adversaries tend to setup RAPs to include a captive portal. This is very effective, since most public networks use captive portals as a means to provide genuine access. The objective of this study is to examine the effectiveness of RAP identification …


Automatic Security Bug Detection With Findsecuritybugs Plugin, Hossain Shahriar, Kmarul Riad, Arabin Talukder, Hao Zhang, Zhuolin Li Oct 2019

Automatic Security Bug Detection With Findsecuritybugs Plugin, Hossain Shahriar, Kmarul Riad, Arabin Talukder, Hao Zhang, Zhuolin Li

KSU Proceedings on Cybersecurity Education, Research and Practice

The security threats to mobile application are growing explosively. Mobile app flaws and security defects could open doors for hackers to easily attack mobile apps. Secure software development must be addressed earlier in the development lifecycle rather than fixing the security holes after attacking. Early eliminating against possible security vulnerability will help us increase the security of software and mitigate the consequence of damages of data loss caused by potential malicious attacking. In this paper, we present a static security analysis approach with open source FindSecurityBugs plugin for Android StThe security threats to mobile application are growing explosively. Mobile app …


Automated Reverse Engineering Of Automotive Can Bus Controls, Charles Barron Kirby, Bryson Payne Oct 2019

Automated Reverse Engineering Of Automotive Can Bus Controls, Charles Barron Kirby, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

This research provides a means of automating the process to reverse engineer an automobile’s CAN Bus to quickly recover CAN IDs and message values to control the various systems in a modern automobile. This approach involved the development of a Python script that uses several open-source tools to interact with the CAN Bus, and it takes advantage of several vulnerabilities associated with the CAN protocol. These vulnerabilities allow the script to conduct replay attacks against the CAN Bus and affect various systems in an automobile without the operator’s knowledge or interaction.

These replay attacks can be accomplished by capturing recorded …


A World Of Cyber Attacks (A Survey), Mubarak Banisakher, Marwan Omar Oct 2019

A World Of Cyber Attacks (A Survey), Mubarak Banisakher, Marwan Omar

KSU Proceedings on Cybersecurity Education, Research and Practice

The massive global network that connects billions of humans and millions of devices and allow them to communicate with each other is known as the internet. Over the last couple of decades, the internet has grown expeditiously and became easier to use and became a great educational tool. Now it can used as a weapon that can steal someone’s identity, expose someone’s financial information, or can destroy your networking devices. Even in the last decade, there have been more cyber attacks and threats destroying major companies by breaching the databases that have millions of personal information that can be sold …


An Exploratory Analysis Of Mobile Security Tools, Hossain Shahriar, Md Arabin Talukder, Md Saiful Islam Oct 2019

An Exploratory Analysis Of Mobile Security Tools, Hossain Shahriar, Md Arabin Talukder, Md Saiful Islam

KSU Proceedings on Cybersecurity Education, Research and Practice

The growing market of the mobile application is overtaking the web application. Mobile application development environment is open source, which attracts new inexperienced developers to gain hands on experience with applicationn development. However, the security of data and vulnerable coding practice is an issue. Among all mobile Operating systems such as, iOS (by Apple), Android (by Google) and Blackberry (RIM), Android dominates the market. The majority of malicious mobile attacks take advantage of vulnerabilities in mobile applications, such as sensitive data leakage via the inadvertent or side channel, unsecured sensitive data storage, data transition and many others. Most of these …


Iot: Challenges In Information Security Training, Lech J. Janczewski, Gerard Ward Oct 2019

Iot: Challenges In Information Security Training, Lech J. Janczewski, Gerard Ward

KSU Proceedings on Cybersecurity Education, Research and Practice

Both consumers and businesses are rapidly adopting IoT premised on convenience and control. Industry and academic literature talk about billions of embedded IoT devices being implemented with use-cases ranging from smart speakers in the home, to autonomous trucks, and trains operating in remote industrial sites. Historically information systems supporting these disparate use-cases have been categorised as Information Technology (IT) or Operational Technology (OT), but IoT represents a fusion between these traditionally distinct information security models.

This paper presents a review of IEEE and Elsevier peer reviewed papers that identifies the direction in IoT education and training around information security. It …


Internet Core Functions: Security Today And Future State, Jeffrey Jones Oct 2019

Internet Core Functions: Security Today And Future State, Jeffrey Jones

KSU Proceedings on Cybersecurity Education, Research and Practice

Never in the history of the world has so much trust been given to something that so few understand. Jeff reviews three core functions of the Internet along with recent and upcoming changes that will impact security and the world.


Preparing For Tomorrow By Looking At Yesterday, Peter Dooley Oct 2019

Preparing For Tomorrow By Looking At Yesterday, Peter Dooley

KSU Proceedings on Cybersecurity Education, Research and Practice

Why do we learn? Why do we study history? Why do we research the work of others? The answer is that there is value today in what was already learned and experienced, successes and failures. Mr. Dooley, a 25-year security professional and 20-year hospitality executive, will share his experiences and how our history in security will help us in thinking about our future.


Technology Media, Service Innovation And The Shaping Of Executive Cognition, Gamel O. Wiredu, Kofi A. Boateng, John K. Effah Aug 2019

Technology Media, Service Innovation And The Shaping Of Executive Cognition, Gamel O. Wiredu, Kofi A. Boateng, John K. Effah

African Conference on Information Systems and Technology

The upsurge of information and communication technology innovations around the world has induced the establishment of many technology enterprises, mostly small-medium, that focus on service innovation. Due to the materiality of technology to this enterprise genre, its executive is significantly shaped by technology media, but explanations of technological shaping are low. This paper seeks to address this gap through a study informed by critical realism and media ecology. It argues that executive cognition is shaped because ICT media and service innovation imperatives combine to generate executive internalizations; and it is shaped by service innovation driven internalizations of technology media functions. …


Closing Keynote, Theresa Coleman-Kaiser May 2019

Closing Keynote, Theresa Coleman-Kaiser

Annual Copper Country Lean Conference

No abstract provided.


Track A: Building Your House Of Lean: Standard Work And Effective Communication - Active Learning Session, Laurie Stark, Annelise Doll May 2019

Track A: Building Your House Of Lean: Standard Work And Effective Communication - Active Learning Session, Laurie Stark, Annelise Doll

Annual Copper Country Lean Conference

This session will introduce the concept of standard work through a hands-on activity. Attendees will learn the importance of clear communication and language choices in growing a sustainable Lean environment. Presenters will share their experiences regarding how the Van Pelt and Opie Library has grown Lean through the use of standard work and effective communication.


Track B: Growing Continuous Improvement: An Example Of Pdca On Student Employee Visual Management Boards - Case Study, Dominique Aleo May 2019

Track B: Growing Continuous Improvement: An Example Of Pdca On Student Employee Visual Management Boards - Case Study, Dominique Aleo

Annual Copper Country Lean Conference

Visual Management and the Plan, Do, Check, Act (PDCA) Cycle are well known Lean methods. The Student Process Improvement Coordinators in the Office of Continuous Improvement at Michigan Technological University use white boards to track progress on recurring performance duties.These boards cover multiple areas of work and showcase how many students with different schedules keep track of their workload within the office. This case study examines how the Visual Management boards have changed through multiple cycles of PDCA, in pursuit of perfect visual communication between the students who work in the office, and also perfect performance. Specifically, this presentation will …


1st Annual Conference Program, Michigan Technological University May 2019

1st Annual Conference Program, Michigan Technological University

Annual Copper Country Lean Conference

Full conference program, including presenter bios and presentation descriptions.


Business Value Creation Through Open Source Engagement, Vinod Kumar Ahuja Mar 2019

Business Value Creation Through Open Source Engagement, Vinod Kumar Ahuja

UNO Student Research and Creative Activity Fair

In open source software development, individuals voluntarily contribute to the development of software. Recently, corporations like Microsoft, IBM, and others invest in open source by making their proprietary software freely available, by providing funding, and by dedicating their full-time employees to work in open source projects. This raises questions such as: Why do corporations dedicate money and resources to open source? What do they gain from it? How does this add value for their business? In sum, how do they make money engaging in open source? Literature provides various business models that companies adopted for their engagement in open source, …


The Suitability Of Agile Principles In Iot Development, Wouter Moedt, Margeret Hall, Sachin Pawaskar, Reinhard Bernsteiner, Ann Fruhling Mar 2019

The Suitability Of Agile Principles In Iot Development, Wouter Moedt, Margeret Hall, Sachin Pawaskar, Reinhard Bernsteiner, Ann Fruhling

UNO Student Research and Creative Activity Fair

Agile software development is a popular approach which focuses on creating (small) working pieces of software in iterations. One of the major benefits is that it allows the customer to provide feedback and change requirements during the development phase. The enhanced and transparent collaboration with the customer therefore leads to outcomes that better match their specifications, which can save time and money when compared to traditional approaches, such as plan-driven development.

Another new paradigm is the Internet of Things (IoT), which is starting to become one of the largest technological industry segments worldwide. With the rise of agile software development, …


Cloud Control And Monitoring: Personal Food Computer Version 2.0, Deepika Angelene Jantz Mar 2019

Cloud Control And Monitoring: Personal Food Computer Version 2.0, Deepika Angelene Jantz

UNO Student Research and Creative Activity Fair

Trends in Agricultural development and growth rates in crop yields have slowed down due to harsh weather conditions. Also, use of pesticides, fertilizers and genetically modified organisms in food(GM0) has caused attenuation of nutrition, thus giving rise to Food Crisis. To address this concern, Caleb Harper, Principal Research Scientist at MIT shares his vision of “Food Computer” through an initiative called OpenAg, that dwells upon the concept of Controlled Environment for the growth of the plant. The objective of this research is to bring awareness in the young minds – the kids at K12 level to get familiar with current …


Use Of Exploratory Data Analysis And Visualization In Identification Of Commingled Human Remains, Vivek Bhat Hosmat Mar 2019

Use Of Exploratory Data Analysis And Visualization In Identification Of Commingled Human Remains, Vivek Bhat Hosmat

UNO Student Research and Creative Activity Fair

The field of Exploratory data analysis and Visualization is revolutionizing the way we perceive things. At times, Visualization is seen as a subset of Exploratory data analysis and then there are branches in Visualization, types, technologies, tools which makes one feel that Visualization is a standalone pillar. Either way, they both work well together to extract meaningful information from almost any kind of data. These fields can very well be the stepping stone for in-depth or conclusive research. They can direct research based on facts and observations rather than one’s intuition or even a brute force technique. This project was …


Utilizing Technology To Empower Girls, Kelleyanne Jensen, Kent Campbell, Shamrose Makandar Mar 2019

Utilizing Technology To Empower Girls, Kelleyanne Jensen, Kent Campbell, Shamrose Makandar

UNO Student Research and Creative Activity Fair

As early as 10 years of age, girls begin to become more sedentary, their activity levels drop as much as 83 percent as they transition through adolescence. By age 14, only 1 in 10 girls are doing enough physical activity to benefit their health, compared with roughly twice the number of boys of the same age. The mission of FITGirl, Inc. is to empower young girls as they develop and mature by demonstrating positive lifestyle choices; physical, mental, relational and nutritional. The Spring 2019 (Section 1) MIS Capstone class is working with FITGirl, Inc. to enhance the EmpowerU web application …


Community Partnership Initiative (Cpi), Deepika Angelene Jantz, Joseph Nabiry, Doris Uwaezuoke Mar 2019

Community Partnership Initiative (Cpi), Deepika Angelene Jantz, Joseph Nabiry, Doris Uwaezuoke

UNO Student Research and Creative Activity Fair

UNO is committed to community involvement. The Community Partnership Initiative (CPI) was created with the goal of combining community partners with campus groups in order to work together to serve communities nationwide. The CPI application was designed to give partners and users a way to create and manage their projects online. Additionally, the tool was designed as a way for the CPI office to highlight the ways they are working to benefit the community and create a more dynamic way to analyze, track, and display the projects, partners, and communities they are working in. The CPI application is currently being …