Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Theses/Dissertations

Nova Southeastern University

Articles 1 - 17 of 17

Full-Text Articles in Library and Information Science

A Study Of The Effect Of Types Of Organizational Culture On Information Security Procedural Countermeasures, Sheri James Jan 2023

A Study Of The Effect Of Types Of Organizational Culture On Information Security Procedural Countermeasures, Sheri James

CCE Theses and Dissertations

This study examined the impact of specific organizational cultures on information security procedural countermeasures (ISPC). With increasing security incidents and data breaches, organizations acknowledge that people are their greatest asset as well as a vulnerability. Previous research into information security procedural controls has centered on behavioral, cognitive, and social theories; some literature incorporates general notions of organization culture yet there is still an absence in socio-organizational studies dedicated to elucidating how information security policy (ISP) compliance can be augmented by implementing comprehensive security education, training, and awareness (SETA) programs focusing on education, training, and awareness initiatives.

A theoretical model was …


A Universal Cybersecurity Competency Framework For Organizational Users, Patricia A. Baker Jan 2022

A Universal Cybersecurity Competency Framework For Organizational Users, Patricia A. Baker

CCE Theses and Dissertations

The global reliance on the Internet to facilitate organizational operations necessitates further investments in organizational information security. Such investments hold the potential for protecting information assets from cybercriminals. To assist organizations with their information security, The National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (NCWF) was created. The framework referenced the cybersecurity work, knowledge, and skills required to competently complete the tasks that strengthen their information security. Organizational users’ limited cybersecurity competency contributes to the financial and information losses suffered by organizations year after year. While most organizational users may be able to respond positively to a cybersecurity threat, …


Factors Affecting Customers’ Decision To Share Personal Data With Mobile Operators, Ammar Ali Qaffaf Jan 2022

Factors Affecting Customers’ Decision To Share Personal Data With Mobile Operators, Ammar Ali Qaffaf

CCE Theses and Dissertations

Companies that personalize their services based on users’ specific needs have increased sales and customer satisfaction. Personalization requires analyzing the user’s behavior and correlating the action with other pieces of information. The information available for cellular service providers has grown substantially as connectivity becomes ubiquitous. Customers are unknowingly sharing their locations, habits, activities, and preferences in real-time with their service providers. Although cellular service providers state that they share personal data with external entities in their publicly available privacy policies, users have limited control over who can access their personal information. Users have no, or suboptimal, control to manage their …


Exploring The Existing And Unknown Side Effects Of Privacy Preserving Data Mining Algorithms, Hima Bindu Sadashiva Reddy Jan 2022

Exploring The Existing And Unknown Side Effects Of Privacy Preserving Data Mining Algorithms, Hima Bindu Sadashiva Reddy

CCE Theses and Dissertations

The data mining sanitization process involves converting the data by masking the sensitive data and then releasing it to public domain. During the sanitization process, side effects such as hiding failure, missing cost and artificial cost of the data were observed. Privacy Preserving Data Mining (PPDM) algorithms were developed for the sanitization process to overcome information loss and yet maintain data integrity. While these PPDM algorithms did provide benefits for privacy preservation, they also made sure to solve the side effects that occurred during the sanitization process. Many PPDM algorithms were developed to reduce these side effects. There are several …


Orientation And Social Influences Matter: Revisiting Neutralization Tendencies In Information Systems Security Violation, Frank Curtis King Jan 2021

Orientation And Social Influences Matter: Revisiting Neutralization Tendencies In Information Systems Security Violation, Frank Curtis King

CCE Theses and Dissertations

It is estimated that over half of all information systems security breaches are due directly or indirectly to the poor security practices of an organization’s employees. Previous research has shown neutralization techniques as having influence on the intent to violate information security policy. In this study, we proposed an expansion of the neutralization model by including the effects of business and ethical orientation of individuals on their tendencies to neutralize and compromise with information security policy. Additionally, constructs from social influences and pressures have been integrated into this model to measure the impact on the intent to violate information security …


An Empirical Examination Of The Computer Security Behaviors Of Telecommuters Working With Confidential Data Through Leveraging The Factors From Fear Appeals Model (Fam), Titus Dohnfon Fofung Jan 2021

An Empirical Examination Of The Computer Security Behaviors Of Telecommuters Working With Confidential Data Through Leveraging The Factors From Fear Appeals Model (Fam), Titus Dohnfon Fofung

CCE Theses and Dissertations

Computer users’ security compliance behaviors can be better understood by devising an experimental study to examine how fear appeals might impact users’ security behavior. Telecommuter security behavior has become very relevant in information systems (IS) research with the growing number of individuals working from home. The increasing dependence on telecommuting to enhance the viability and convenience has created an urgency with the advent of the COVID-19 pandemic to examine the behavior of users working at home across a corporate network. The home networks are usually not as secure as those in corporate settings. There is seldom a firewall setting and …


An Assessment Of The Impacts Of Social Media Inputs And Court Case Information On Mitigating Insider Threats, Robert Jones Jan 2021

An Assessment Of The Impacts Of Social Media Inputs And Court Case Information On Mitigating Insider Threats, Robert Jones

CCE Theses and Dissertations

The insider threat is a global problem that impacts organizations and produces a gamut of undesired outcomes. Businesses often experience lost revenue and stolen trade secrets, which can leave a tarnished reputation. Insider threats can also cause harm to individuals and national security. Past efforts have not mitigated the problem in its entirety. Documented instances of insider threats are as recent as March 2020. Many researchers have focused on monitoring technologies and relying on human monitoring in a reactive posture. An ideal solution would scrutinize an individual’s character and ascertain whether unique traits associated with actors of insider threats are …


Enterprise Social Network Systems Implementation Model For Knowledge Sharing Among Supply Chain It Professionals, Edgardo Luis Velez-Mandes Jan 2021

Enterprise Social Network Systems Implementation Model For Knowledge Sharing Among Supply Chain It Professionals, Edgardo Luis Velez-Mandes

CCE Theses and Dissertations

With the increased use of social network technologies in organizational environments, there is a need to understand how these technologies facilitate organizational knowledge management, particularly knowledge sharing. Prior research has focused on the relationship between knowledge management and enterprise social networking systems (ESNS), but little research has been conducted relating to how organizations implement and use ESNS for knowledge sharing. The goal was to construct and validate internally a model that offers guidance for the successful implementation and use of ESNS for knowledge sharing and building successful virtual communities of practice (vCoPs) among IT supply chain professionals in a healthcare …


Improving Employees’ Compliance With Password Policies, Enas Albataineh Jan 2021

Improving Employees’ Compliance With Password Policies, Enas Albataineh

CCE Theses and Dissertations

Employees’ lack of compliance with password policies increases password susceptibility, which leads to financial damages to the organizations as a result of information disclosure, fraud, and unauthorized transactions. However, few studies have examined what motivates employees to comply with password policies.

The purpose of this quantitative cross-sectional study was to examine what factors influence employees’ compliance with password policies. A theoretical model was developed based on Protection Motivation Theory (PMT), General Deterrence Theory (GDT), Theory of Reasoned Action (TRA), and Psychological Ownership Theory to explain employees’ compliance with password policies.

A non-probability convenience sample was employed. The sample consisted of …


Human Errors In Data Breaches: An Exploratory Configurational Analysis, Gabriel A. Cornejo Jan 2021

Human Errors In Data Breaches: An Exploratory Configurational Analysis, Gabriel A. Cornejo

CCE Theses and Dissertations

Information Systems (IS) are critical for employee productivity and organizational success. Data breaches are on the rise—with thousands of data breaches accounting for billions of records breached and annual global cybersecurity costs projected to reach $10.5 trillion by 2025. A data breach is the unauthorized disclosure of sensitive information—and can be achieved intentionally or unintentionally. Significant causes of data breaches are hacking and human error; in some estimates, human error accounted for about a quarter of all data breaches in 2018. Furthermore, the significance of human error on data breaches is largely underrepresented, as hackers often capitalize on organizational users’ …


Self-Service Technology In A Library System: An Examination Of Potential Library Member Adoption Of Self-Service Checkout At A Southeastern County Library System, Grace Keisha Phillips-Daley Jan 2020

Self-Service Technology In A Library System: An Examination Of Potential Library Member Adoption Of Self-Service Checkout At A Southeastern County Library System, Grace Keisha Phillips-Daley

Theses and Dissertations

This applied dissertation examined potential library member adoption of self-service technology (SST) in a southeastern county library system. The research framework of this study was based on the Technology Acceptance Model (TAM). More distinctively, this study explored the significance of motivation factors, to include both intrinsic and extrinsic factors, for choosing to use SST in a library environment as the reasonable effect of familiarity in influencing the possibility of its adoption.

The researcher used a non-probability sampling method to identify participants for the study. Edmonds and Kennedy (2013) suggested that surveys were primarily utilized to observe trends, personal attitudes, or …


An Investigation Into The Impact Of Social Networking On Knowledge Sharing, James Harold Gorham Jan 2019

An Investigation Into The Impact Of Social Networking On Knowledge Sharing, James Harold Gorham

CCE Theses and Dissertations

Today we are experiencing a rapidly increasing trend to use social networking in ways that dramatically affect both our personal and our public lives. This is a global phenomenon being experienced around the world. Exactly how this technology is being used and by whom is of great interest. The problem is that not a lot of research has been conducted to investigate the role social networking sites play to influence a person’s attitude toward sharing knowledge at work. In light of the marked increase in the use of social networking sites and how it is changing the way we live, …


The Influence Of Identifiable Personality Traits On Nurses’ Intention To Use Wireless Implantable Medical Devices, Vincent Molosky Jan 2019

The Influence Of Identifiable Personality Traits On Nurses’ Intention To Use Wireless Implantable Medical Devices, Vincent Molosky

CCE Theses and Dissertations

Technically-driven medical devices such as wireless implantable medical devices (WIMD) have become ubiquitous within healthcare. The use of these devices has changed the way nurses administer patient care. Consequently, the nursing workforce is large and diverse, and with it comes an expected disparity in personalities. Research involving human factors and technology acceptance in healthcare is not new. Yet due to the changing variables in the manner of which patient care is being administered, both in person and in the mechanism of treatment, recent research suggests that individual human factors such as personality traits may hold unknown implications involving more successful …


Citationally Enhanced Semantic Literature Based Discovery, John David Fleig Jan 2019

Citationally Enhanced Semantic Literature Based Discovery, John David Fleig

CCE Theses and Dissertations

We are living within the age of information. The ever increasing flow of data and publications poses a monumental bottleneck to scientific progress as despite the amazing abilities of the human mind, it is woefully inadequate in processing such a vast quantity of multidimensional information. The small bits of flotsam and jetsam that we leverage belies the amount of useful information beneath the surface. It is imperative that automated tools exist to better search, retrieve, and summarize this content. Combinations of document indexing and search engines can quickly find you a document whose content best matches your query - if …


Examining Task Conflict And Team Atmosphere In Virtual Teams Engaged In Outsourced Project Work, Harold Carr Osborn Jan 2019

Examining Task Conflict And Team Atmosphere In Virtual Teams Engaged In Outsourced Project Work, Harold Carr Osborn

CCE Theses and Dissertations

Global teams have become commonplace. As teams have become more dispersed, leveraging outsourced resources has gained popularity. Outsourcing can be a prudent move financially; however, when it is inappropriately applied, the damage it produces can easily overshadow any financial gains. Such ill effects can include impaired employee performance and morale caused by decreased job security. Moreover, it can lead to a less favorable team atmosphere and increased task conflict.

This study examined the effects of team virtuality along with the strategic alignment of outsourcing on team performance. The research utilized the intervening processes theory (IPT). The IPT posits that the …


A Bibliometric Analysis Of The Proceedings Of The Association For Educational Communications And Technology (Aect) For The 1979-2009 Period, Vandy L. Pacetti-Donelson Jan 2018

A Bibliometric Analysis Of The Proceedings Of The Association For Educational Communications And Technology (Aect) For The 1979-2009 Period, Vandy L. Pacetti-Donelson

Theses and Dissertations

Traditional journal analysis for the identification of disciplines is limited in developing areas of study due to the lack of journals specific to that area of study. Identifying knowledge domains worthy of study for the identification of developing disciplines has been difficult.

Conferences are at the forefront of building knowledge in scientific communities, particularly in technology related sectors, but less than 10% of conference proceedings are available in conventional knowledge databases. As a result, conference proceedings as a previously unconsidered knowledge domain, may provide the knowledge domain worthy of analysis to identify developmental and incremental change within developing areas of …


Librarians’ Use Of Instructional Design Methods In Creating Information Literacy Instruction, Michael W. Wilson Jan 2016

Librarians’ Use Of Instructional Design Methods In Creating Information Literacy Instruction, Michael W. Wilson

Theses and Dissertations

The purpose of this sequential explanatory mixed methods study was to determine whether instruction librarians in the United States and Canada were using instructional design (ID) methods, and to identify potential explanations for their adoption or rejection of those methods. The theory of planned behavior (Ajzen, 1985) served as the theoretical framework for the study. Research questions examined the relationship between respondents’ reported use of ID methods and the following factors: (a) behavioral, normative, and control beliefs, (b) demographic factors, and (c) professional identity as teachers. A survey adapted from Ajjan and Hartshorne (2008) and from Julien and Genuis (2011) …