Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

2021

Computer Sciences

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 34

Full-Text Articles in Management Information Systems

Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim Dec 2021

Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim

Electronic Theses, Projects, and Dissertations

Automobile collisions occur daily. We now live in an information-driven world, one where technology is quickly evolving. Blockchain technology can change the automotive industry, the safety of the motoring public and its surrounding environment by incorporating this vast array of information. It can place safety and efficiency at the forefront to pedestrians, public establishments, and provide public agencies with pertinent information securely and efficiently. Other industries where Blockchain technology has been effective in are as follows: supply chain management, logistics, and banking. This paper reviews some statistical information regarding automobile collisions, Blockchain technology, Smart Contracts, Smart Cities; assesses the feasibility …


Integration Of Internet Of Things And Health Recommender Systems, Moonkyung Yang Dec 2021

Integration Of Internet Of Things And Health Recommender Systems, Moonkyung Yang

Electronic Theses, Projects, and Dissertations

The Internet of Things (IoT) has become a part of our lives and has provided many enhancements to day-to-day living. In this project, IoT in healthcare is reviewed. IoT-based healthcare is utilized in remote health monitoring, observing chronic diseases, individual fitness programs, helping the elderly, and many other healthcare fields. There are three main architectures of smart IoT healthcare: Three-Layer Architecture, Service-Oriented Based Architecture (SoA), and The Middleware-Based IoT Architecture. Depending on the required services, different IoT architecture are being used. In addition, IoT healthcare services, IoT healthcare service enablers, IoT healthcare applications, and IoT healthcare services focusing on Smartwatch …


Emotional Analysis Of Learning Cybersecurity With Games Using Iot, Maria Valero, Md Jobair Hossain, Shahriar Sobhan Oct 2021

Emotional Analysis Of Learning Cybersecurity With Games Using Iot, Maria Valero, Md Jobair Hossain, Shahriar Sobhan

KSU Proceedings on Cybersecurity Education, Research and Practice

The constant rise of cyber-attacks poses an increasing demand for more qualified people with cybersecurity knowledge. Games have emerged as a well-fitted technology to engage users in learning processes. In this paper, we analyze the emotional parameters of people while learning cybersecurity through computer games. The data are gathered using a non-invasive Brain-Computer Interface (BCI) to study the signals directly from the users’ brains. We analyze six performance metrics (engagement, focus, excitement, stress, relaxation, and interest) of 12 users while playing computer games to measure the effectiveness of the games to attract the attention of the participants. Results show participants …


Resilience Vs. Prevention. Which Is The Better Cybersecurity Practice?, Frank Katz Oct 2021

Resilience Vs. Prevention. Which Is The Better Cybersecurity Practice?, Frank Katz

KSU Proceedings on Cybersecurity Education, Research and Practice

Students in multiple cohorts of our 3000 level Fundamentals of Information Systems Security course were given a discussion question where they had to either agree or disagree with the premise that given all the constant threats to our systems, we should dedicate more of our efforts to quickly repairing the damage of an attack rather than dedicate more of our time and energies to preventing such attacks. They were required to give their reasoning and provide sources to back up their analysis of his comment.

This paper will describe and explain the concept of cyber resiliency. It will then evaluate …


Warshipping: Hacking The Mailroom, Jackson Szwast, Bryson Payne Oct 2021

Warshipping: Hacking The Mailroom, Jackson Szwast, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

Everyone knows what package shipping is, but not everyone knows what warshipping is. Corporate mailrooms are rarely considered as part of the cybersecurity attack surface of most organizations, but they offer physical access to millions of uninspected packages daily. UPS shipped 5.5 billion items last year, with their daily average being 21.9 million items and operating through 1,800 locations in 2020. FedEx shipped 6.5 million packages daily and operates 2,150 locations. The United States Postal Service delivered 143 billion pieces of mail in 2019. Increasingly the world’s consumers are relying on e-commerce, and during the recent COVID-19 pandemic, package deliveries …


Towards Assessing Password Workarounds And Perceived Risk To Data Breaches For Organizational Cybersecurity Risk Management Taxonomy, Michael J. Rooney, Yair Levy, Wei Li, Ajoy Kumar Oct 2021

Towards Assessing Password Workarounds And Perceived Risk To Data Breaches For Organizational Cybersecurity Risk Management Taxonomy, Michael J. Rooney, Yair Levy, Wei Li, Ajoy Kumar

KSU Proceedings on Cybersecurity Education, Research and Practice

Cybersecurity involves a broad range of techniques, including cyber-physical, managerial, and technical, while authentication provides a layer of protection for Information Systems (IS) against data breaches. The recent COVID-19 pandemic brought a tsunami of data breach incidents worldwide. Authentication serves as a mechanism for IS against unauthorized access utilizing various defense techniques, with the most popular and frequently used technique being passwords. However, the dramatic increase of user accounts over the past few decades has exposed the realization that technological measures alone cannot ensure high level of IS security; this leaves the end-users holding a critical role in protecting their …


Analyzing Robotics Software Vulnerabilities, Hossain Shahriar, Md Jobair Hossain Faruk, Shahriar Sobhan, Mohammad Nazim Oct 2021

Analyzing Robotics Software Vulnerabilities, Hossain Shahriar, Md Jobair Hossain Faruk, Shahriar Sobhan, Mohammad Nazim

KSU Proceedings on Cybersecurity Education, Research and Practice

Robots are widely used in our day-to-day life in various domains. For example, eldercare robots, such as CareO-Bots [1]are used to perform household tasks and provide mobility assistance [2]. Amazon uses manufacturing robots to accomplish manufacturing labor activities, such as welding and assembling equipment [2]. According to the International Data Corporation, spending on robotics is expected to reach USD 241.4 billion by the end of 2023 [4].

However, malicious users can exploit security vulnerabilities in hardware and software components of robotics systems to conduct security attacks and cause malfunction, i.e., deviate robots from their expected behaviors. Security attacks on robots …


A Taxonomy Of Cyberattacks Against Critical Infrastructure, Miloslava Plachkinova, Ace Vo Oct 2021

A Taxonomy Of Cyberattacks Against Critical Infrastructure, Miloslava Plachkinova, Ace Vo

KSU Proceedings on Cybersecurity Education, Research and Practice

The current study proposes a taxonomy to organize existing knowledge on cybercrimes against critical infrastructure such as power plants, water treatment facilities, dams, and nuclear facilities. Routine Activity Theory is used to inform a three-dimensional taxonomy with the following dimensions: hacker motivation (likely offender), cyber, physical, and cyber-physical components of any cyber-physical system (suitable target), and security (capable guardian). The focus of the study is to develop and evaluate the classification tool using Design Science Research (DSR) methodology. Publicly available data was used to evaluate the utility and usability of the proposed artifact by exploring three possible scenarios – Stuxnet, …


Using Role Play To Develop An Empathetic Mindset In Executive Education, Siu Loon Hoe, Tamsin Greulich-Smith Oct 2021

Using Role Play To Develop An Empathetic Mindset In Executive Education, Siu Loon Hoe, Tamsin Greulich-Smith

Research Collection School Of Computing and Information Systems

The purpose of this article is to discuss the importance of a role play activity as part of an experiential instructional strategy to develop an empathetic mindset among professionals, managers, and executives (PMEs) attending an executive education program in change management. This article provides an approach and process for management educators and facilitators of executive education programs to introduce and teach role play for the busy executives to learn about empathy. Role play is a useful teaching method that helps adult learners understand the importance of seeing things from another person’s point of view especially within a short period of …


Robust And Ethical Data Governance Critical To Growth In Digital Age, Themin Suwardy, Melvin Yong Sep 2021

Robust And Ethical Data Governance Critical To Growth In Digital Age, Themin Suwardy, Melvin Yong

Research Collection School Of Accountancy

With increasing digitalisation, and companies collecting an ever-increasing amount of their customer and business data, organisations have to become more accountable to stakeholders such as regulators, customers and investors on the issue of data. Observers say expectations are also increasing, with incidents of data breaches capturing much media attention. Just as corporate governance encompasses more than just compliance, experts say data governance is more than just data protection and security but also about creating value.


Exploring, Understanding, Then Designing: Twitter Users’ Sharing Behavior For Minor Safety Incidents, Mashael Yousef Almoqbel Aug 2021

Exploring, Understanding, Then Designing: Twitter Users’ Sharing Behavior For Minor Safety Incidents, Mashael Yousef Almoqbel

Dissertations

Social media has become an integral part of human lives. Social media users resort to these platforms for various reasons. Users of these platforms spend a lot of time creating, reading, and sharing content, therefore, providing a wealth of available information for everyone to use. The research community has taken advantage of this and produced many publications that allow us to better understand human behavior. An important subject that is sometimes discussed and shared on social media is public safety. In the past, Twitter users have used the platform to share incidents, share information about incidents, victims and perpetrators, and …


Participatory Learning: Measuring Learning And Educational Technology Acceptance, Erick Sanchez Suasnabar Aug 2021

Participatory Learning: Measuring Learning And Educational Technology Acceptance, Erick Sanchez Suasnabar

Dissertations

Participatory Learning (PL) integrates several learning approaches, engaging students throughout the entire assignment process for both online and face-to-face courses. Beyond simply providing a solution, students also craft a problem (problem-based learning), grade each other (peer assessment and feedback), evaluate themselves (self-assessment), and can view others’ work (learning by example). This dissertation research explores the resulting learning effects. Contributions to both educational and Information Systems research include extending an early PL model and experiments that applied the PL approach to examinations, by validating and testing new constructs based on user activity and critical thinking. In addition, the study explores a …


Inter-Retailer Channel Competition: Empirical Analyses Of Store Entry Effects On Online Purchases, Qian Tang, Mei Lin, Youngsoo Kim Aug 2021

Inter-Retailer Channel Competition: Empirical Analyses Of Store Entry Effects On Online Purchases, Qian Tang, Mei Lin, Youngsoo Kim

Research Collection School Of Computing and Information Systems

This study empirically examines the effect of offline store entry on a competing online retailer in the footwear industry and investigates how this effect depends on the relative product assortment and price between the offline store and the online retailer. Using transaction data from a large online footwear retailer and offline store entry data from 19 major shoe retail chains and 3 department store chains, we quantify the entry effect of offline stores. Categorizing offline stores by assortment and price, we find that the entry of regular-price narrow-assortment stores generates a complementary effect that increases online purchases, while the entry …


Secure Coding In Five Steps, Mini Zeng, Feng Zhu Jul 2021

Secure Coding In Five Steps, Mini Zeng, Feng Zhu

Journal of Cybersecurity Education, Research and Practice

Software vulnerabilities have become a severe cybersecurity issue. There are numerous resources of industry best practices available, but it is still challenging to effectively teach secure coding practices. The resources are not designed for classroom usage because the amount of information is overwhelming for students. There are efforts in academia to introduce secure coding components into computer science curriculum, but a big gap between industry best practices and workforce skills still exists. Unlike many existing efforts, we focus on both the big picture of secure coding and hands-on projects. To achieve these two goals, we present five learning steps that …


Observations, Evaluations, And Recommendations For Deterlab From An Educational Perspective, Ahmed Ibrahim, Vitaly Ford Jul 2021

Observations, Evaluations, And Recommendations For Deterlab From An Educational Perspective, Ahmed Ibrahim, Vitaly Ford

Journal of Cybersecurity Education, Research and Practice

DETERLab is a cluster environment that provides a set of virtual machines that can be used by researchers and teachers to run cybersecurity experiments and competitions, and where it is possible to deploy different network configurations to research attack and defense mechanisms in the cyber world. While we were working to develop a pathway for producing more usable and effective cybersecurity educational resources by investigating and examining several projects, we examined DETERLab as a prospective platform to use in the classroom. Throughout our experimentation, we faced challenges that we decided to document in order to help other educators use the …


An Exploratory Study Of Mode Efficacy In Cybersecurity Training, Michael D. Workman Jul 2021

An Exploratory Study Of Mode Efficacy In Cybersecurity Training, Michael D. Workman

Journal of Cybersecurity Education, Research and Practice

Cybersecurity capabilities in organizations and governmental agencies continue to lag behind the threats. Given the current environment, these entities have placed renewed emphasis on cybersecurity education. However, education appears to lack its full potential in most settings. Few empirical studies have systematically tested the efficacy of various training methods and modes, and those that have been conducted have yielded inconsistent findings. Recent literature on the use of gamified simulations have suggested that they may improve cybersecurity behaviors. Similarly, live activities such as hackathons and capture the flag events have been surmised to augment learning and capabilities. We conducted an exploratory …


Teaching Coding In A Virtual Environment: Overcoming Challenges, Marion S. Smith Jun 2021

Teaching Coding In A Virtual Environment: Overcoming Challenges, Marion S. Smith

Southwestern Business Administration Journal

Educational research suggests that teaching techniques are subject matter specific. Teaching techniques in introductory programming classes are centered around two approaches used by students in learning. One approach is where students develop a thorough understanding of what they are learning. This is referred to as “deep learning”. Other students use a “surface approach” where they perform the tasks required from them. The persona of the instructor and the choice of instructional materials used within a class determines which approach the student will adopt. Active teaching techniques fosters “deep learning”. With the need to adapt active teaching techniques to a virtual …


Examining Dimensions Of Patient Satisfaction With Telemedicine, Robert Garcia Jun 2021

Examining Dimensions Of Patient Satisfaction With Telemedicine, Robert Garcia

College of Computing and Digital Media Dissertations

During the outbreak of the novel coronavirus (COVID-19) medical institutions and practitioners have drastically increased their adoption of telemedicine. The proliferation of telemedicine systems has sparked renewed interest among IS researchers in evaluating its usage. One of the main indicators used to measure the success of telemedicine services is patient satisfaction. Yet several problems exist with current methods used to evaluate telemedicine satisfaction. Patient satisfaction with telemedicine is frequently evaluated using either single question items or handmade instruments that are seldom assessed for validity. While telemedicine satisfaction is typically evaluated through single measures, satisfaction is considered a complex and multidimensional …


Capstone Case Study Guide Mapfre, Apoorva Arbooj, Ahamad Waqas, K C Prabhat, Manju Jayam, Rashmi Sakleshpur Rajashekar Jun 2021

Capstone Case Study Guide Mapfre, Apoorva Arbooj, Ahamad Waqas, K C Prabhat, Manju Jayam, Rashmi Sakleshpur Rajashekar

School of Professional Studies

Mapfre is a Top-Notch insurer and a competitive and fast-evolving insurance company. Clark team will help Mapfre to organize to secure systems availability and resilience to support the business process. Assist and recommend the IT team for further analysis and identify data, trends, and patterns and come up with to improve the services


How Social Media And Embedded Recommender Algorithm Fostered Political Issues, Yan Shi Jun 2021

How Social Media And Embedded Recommender Algorithm Fostered Political Issues, Yan Shi

School of Professional Studies

Social media plays a significant role in social communication and interaction, connecting people from different continents and facilitating information flaws worldwide. Meanwhile, along with the evolution of embedded recommender algorithms that clustering people with similar demographic features, social media has become the most important means of communication for modern society. However, the prosper of interconnecting platforms also have potential flows alongside. One of the major issues is the unexpected political consequence. This paper delivers the first comprehensive analysis of the political impacts posed by social media and embedded recommending algorithms. The article identifies three major political concerns through literature review, …


Challenges And Success Factors Of Scaled Agile Adoption – A South African Perspective, Lucas Khoza, Carl Marnewick May 2021

Challenges And Success Factors Of Scaled Agile Adoption – A South African Perspective, Lucas Khoza, Carl Marnewick

The African Journal of Information Systems

Agile methods and Agile scaling frameworks have become a solution for software-developing organizations striving to improve the success of software projects. Agile methods were developed for small projects, but due to their benefits, even large software-developing organizations have adopted them to scale their software projects. This quantitative study was undertaken to deepen the researchers’ understanding of the critical success factors and challenges of Scaled Agile from the South African perspective. A simple random sampling method was used. Data was collected with the use of an online structured questionnaire and the response rate was 70%. The results reveal that customer satisfaction …


Broadband In Rhode Island, Deborah Ruggiero May 2021

Broadband In Rhode Island, Deborah Ruggiero

School of Professional Studies

Broadband is the 21st century fiber-optic highway in our technology and information economy. The need for high-speed fiber-optic connectivity is critical for economic development, education, business, e-learning, and telehealth


Sports Data Analysis – Application Of Sports Data In Athletics, Zhong Zhuang May 2021

Sports Data Analysis – Application Of Sports Data In Athletics, Zhong Zhuang

School of Professional Studies

No abstract provided.


An Analysis Of The Applications Of Technology To Health Care Within The Caribbean And Latin America, Chineme Ezema May 2021

An Analysis Of The Applications Of Technology To Health Care Within The Caribbean And Latin America, Chineme Ezema

School of Professional Studies

This project aims to investigate and document the evolution of health technology applications and uses within the regions of Latin America and the Caribbean. Originally inspired by the Cayman Islands’ thus far successful handling of the Coronavirus pandemic, I was eager to explore how the applications of technology to the field of healthcare have existed within the region currently and over time. With this foundation, I then explored the regions’ trajectory in terms of technological growth and what the future may hold for these countries and communities.


Happening In Plain Sight: An Evaluation Of Sexual Harassment In Municipal Government Through A Case Study Of Newark, New Jersey, Hoween R. A. Flexer, Caitlin R. Louie May 2021

Happening In Plain Sight: An Evaluation Of Sexual Harassment In Municipal Government Through A Case Study Of Newark, New Jersey, Hoween R. A. Flexer, Caitlin R. Louie

School of Professional Studies

In the city of Newark, New Jersey, Sebrevious Scott, a participant in the New Jersey Reentry program was hired as part-time office assistant in the city's re-entry office. After being transferred to the city’s Parks and Grounds Departments, she started being sexually harassed, inappropriately touched and propositioned by her supervisor, Richard Kirkland. Scott made repeated attempts to report these actions through the appropriate channels. She was met with dismissal, resistance, and later retaliation. While working in this hostile environment she was also pursuing a full-time employment opportunity with the city upon the completion of the reentry program. Unfortunately, this never …


Employee Retention Rate, Lila Sorenson May 2021

Employee Retention Rate, Lila Sorenson

School of Professional Studies

This paper addresses the following problem regarding low employee retention rates in non-profit mental health organizations, specifically at NFI. The problem at hand is that majority of staff at NFI have an average length of stay of one year or less. The purpose of this paper is to address the current problem and hypothesize factors that could impact the low retention rates. Additionally, the purpose of the paper is to brainstorm potential solutions regarding the low retention rates and suggestions of how to implement the solutions. The documents contained in this paper include data analysis of employee average length of …


How Do Monetary Incentives Influence Giving? An Empirical Investigation Of Matching Subsidies On Kiva, Zhiyuan Gao, Zhiling Guo, Qian Tang Mar 2021

How Do Monetary Incentives Influence Giving? An Empirical Investigation Of Matching Subsidies On Kiva, Zhiyuan Gao, Zhiling Guo, Qian Tang

Research Collection School Of Computing and Information Systems

Matching subsidies, through which third-party institutions provide a dollar-for-dollar match of private contributions made through selected campaigns, have served as effective tools to boost fundraising. We utilize a quasi-experiment on a prosocial crowdfunding platform to examine the effectiveness of matching subsidies in shaping funding outcomes and lender behaviors. Although matching subsidies offer matched loans competitive advantages over unmatched loans, we find that total private contributions made to both matched and unmatched loans increase compared to their prematching counterparts, suggesting a positive spillover effect on unmatched loans. However, matching subsidies lead to decreased private contributions made on the platform after a …


Can We Classify Cashless Payment Solution Implementations At The Country Level?, Dennis Ng, Robert J. Kauffman, Paul Robert Griffin Mar 2021

Can We Classify Cashless Payment Solution Implementations At The Country Level?, Dennis Ng, Robert J. Kauffman, Paul Robert Griffin

Research Collection School Of Computing and Information Systems

This research commentary proposes a 3-D implementation classification framework to assist service providers and business leaders in understanding the kinds of contexts in which more or less successful cashless payment solutions are observed at point-of-sale (PoS) settings. Three constructs characterize the framework: the digitalization of the local implementation environment; the relative novelty of a given payment technology solution in a country at a specific point in time; and the development status of the country’s national infrastructure. The framework is motivated by a need to support cross-country research in this domain. We analyze eight country mini-cases based on an eight-facet (2 …


Gophish: Implementing A Real-World Phishing Exercise To Teach Social Engineering, Andy Luse, Jim Burkman Jan 2021

Gophish: Implementing A Real-World Phishing Exercise To Teach Social Engineering, Andy Luse, Jim Burkman

Journal of Cybersecurity Education, Research and Practice

Social engineering is a large problem in our modern technological world, but while conceptually understood, it is harder to teach compared to traditional pen testing techniques. This research details a class project where students implemented a phishing exercise against real-world targets. Through cooperation with an external corporate partner, students learned the legal, technical, behavioral, analysis, and reporting aspects of social engineering. The outcome provided both usable data for a real-world corporation as well as valuable educational experience for the students.


Applying High Impact Practices In An Interdisciplinary Cybersecurity Program, Brian K. Payne, Lisa Mayes, Tisha Paredes, Elizabeth Smith, Hongyi Wu, Chunsheng Xin Jan 2021

Applying High Impact Practices In An Interdisciplinary Cybersecurity Program, Brian K. Payne, Lisa Mayes, Tisha Paredes, Elizabeth Smith, Hongyi Wu, Chunsheng Xin

Journal of Cybersecurity Education, Research and Practice

The Center for Cybersecurity Education and Research at Old Dominion University has expanded its use of high impact practices in the university’s undergraduate cybersecurity degree program. Strategies developed to promote student learning included learning communities, undergraduate research, a robust internship program, service learning, and electronic portfolios. This paper reviews the literature on these practices, highlights the way that they were implemented in our cybersecurity program, and discusses some of the challenges encountered with each practice. Although the prior literature on high impact practices rarely touches on cybersecurity coursework, the robust evidence of the success of those practices provides a sound …