Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Nova Southeastern University

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 108

Full-Text Articles in Library and Information Science

A Study Of The Effect Of Types Of Organizational Culture On Information Security Procedural Countermeasures, Sheri James Jan 2023

A Study Of The Effect Of Types Of Organizational Culture On Information Security Procedural Countermeasures, Sheri James

CCE Theses and Dissertations

This study examined the impact of specific organizational cultures on information security procedural countermeasures (ISPC). With increasing security incidents and data breaches, organizations acknowledge that people are their greatest asset as well as a vulnerability. Previous research into information security procedural controls has centered on behavioral, cognitive, and social theories; some literature incorporates general notions of organization culture yet there is still an absence in socio-organizational studies dedicated to elucidating how information security policy (ISP) compliance can be augmented by implementing comprehensive security education, training, and awareness (SETA) programs focusing on education, training, and awareness initiatives.

A theoretical model was …


A Qualitative Study Of The Process Undergraduate Health Professions Students Utilize While Conducting A Scoping Review, Dawn De Vries, Betsy Williams Jun 2022

A Qualitative Study Of The Process Undergraduate Health Professions Students Utilize While Conducting A Scoping Review, Dawn De Vries, Betsy Williams

Internet Journal of Allied Health Sciences and Practice

Purpose: The purpose of this research study was to inform pedagogy on the effectiveness of journaling as a tool to gauge synthesis and application of course content to a scoping review. The research question asked is “Is reflective journaling effective in helping undergraduate health profession students understand and apply course research concepts and ideas directly to an academic project?” The researchers used a reflective journaling activity to enhance student learning and to explore student application of course lectures to a scoping literature review. Method: Students were required to complete the journaling activities as a class assignment. Four journal …


Factors Affecting Customers’ Decision To Share Personal Data With Mobile Operators, Ammar Ali Qaffaf Jan 2022

Factors Affecting Customers’ Decision To Share Personal Data With Mobile Operators, Ammar Ali Qaffaf

CCE Theses and Dissertations

Companies that personalize their services based on users’ specific needs have increased sales and customer satisfaction. Personalization requires analyzing the user’s behavior and correlating the action with other pieces of information. The information available for cellular service providers has grown substantially as connectivity becomes ubiquitous. Customers are unknowingly sharing their locations, habits, activities, and preferences in real-time with their service providers. Although cellular service providers state that they share personal data with external entities in their publicly available privacy policies, users have limited control over who can access their personal information. Users have no, or suboptimal, control to manage their …


Exploring The Existing And Unknown Side Effects Of Privacy Preserving Data Mining Algorithms, Hima Bindu Sadashiva Reddy Jan 2022

Exploring The Existing And Unknown Side Effects Of Privacy Preserving Data Mining Algorithms, Hima Bindu Sadashiva Reddy

CCE Theses and Dissertations

The data mining sanitization process involves converting the data by masking the sensitive data and then releasing it to public domain. During the sanitization process, side effects such as hiding failure, missing cost and artificial cost of the data were observed. Privacy Preserving Data Mining (PPDM) algorithms were developed for the sanitization process to overcome information loss and yet maintain data integrity. While these PPDM algorithms did provide benefits for privacy preservation, they also made sure to solve the side effects that occurred during the sanitization process. Many PPDM algorithms were developed to reduce these side effects. There are several …


A Universal Cybersecurity Competency Framework For Organizational Users, Patricia A. Baker Jan 2022

A Universal Cybersecurity Competency Framework For Organizational Users, Patricia A. Baker

CCE Theses and Dissertations

The global reliance on the Internet to facilitate organizational operations necessitates further investments in organizational information security. Such investments hold the potential for protecting information assets from cybercriminals. To assist organizations with their information security, The National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (NCWF) was created. The framework referenced the cybersecurity work, knowledge, and skills required to competently complete the tasks that strengthen their information security. Organizational users’ limited cybersecurity competency contributes to the financial and information losses suffered by organizations year after year. While most organizational users may be able to respond positively to a cybersecurity threat, …


Halmos College Of Natural Sciences And Oceanography Annual Report: Fiscal Year 2019 And 2020, Keri Baker Oct 2021

Halmos College Of Natural Sciences And Oceanography Annual Report: Fiscal Year 2019 And 2020, Keri Baker

Alvin Sherman Library Brochures, Pamphlets, Reports

This report gathers information about items collected in Nova Southeastern University's institutional repository, NSUWorks, under the Halmos College of Natural Science and Oceanography community during the fiscal years 2019 and 2020. New Collections are highlighted and information about faculty and student scholarship uploaded to the Halmos community section of the repository are discussed. This report represents a subset of NSUWorks and does not reflect the overall body of work contained therein.


Unintended Uses Of A Journal Review System Within A Repository For Digital Tracking Of University Etds, Jaime M. Goldman, Keri Baker Mar 2021

Unintended Uses Of A Journal Review System Within A Repository For Digital Tracking Of University Etds, Jaime M. Goldman, Keri Baker

Staff Presentations, Proceedings, Lectures, and Symposia

The Nova Southeastern University (NSU) Oceanographic Campus Library has always had a unique challenge in that it is the final clearinghouse for student capstone, thesis, and dissertation binding and publication. The library has traditionally been the host of the final print publication and the liaison between the student, university program office, and the bindery. With the launch of NSUWorks, NSU’s institutional repository, 7 years ago, the library worked to develop an innovative and effective start to finish workflow for student Electronic Theses and Dissertations (ETDs) to change the physical lifecycle of NSU’s theses and dissertations into a virtual ETD lifecycle. …


Alsc Intellectual Freedom Programming Toolkit, Association For Library Service To Children (Alsc) Intellectual Freedom Committee Jan 2021

Alsc Intellectual Freedom Programming Toolkit, Association For Library Service To Children (Alsc) Intellectual Freedom Committee

Staff Publications

Meagan Albright co-contributed three sections in this toolkit:

  • Integrating Key Concepts in STORYTIME: Tips and Examples, p. 3
  • Integrating Key Concepts in STEAM: Tips and Examples, p.11
  • Integrating Key Concepts in OUTREACH: Tips and Examples, p.16.


An Assessment Of The Impacts Of Social Media Inputs And Court Case Information On Mitigating Insider Threats, Robert Jones Jan 2021

An Assessment Of The Impacts Of Social Media Inputs And Court Case Information On Mitigating Insider Threats, Robert Jones

CCE Theses and Dissertations

The insider threat is a global problem that impacts organizations and produces a gamut of undesired outcomes. Businesses often experience lost revenue and stolen trade secrets, which can leave a tarnished reputation. Insider threats can also cause harm to individuals and national security. Past efforts have not mitigated the problem in its entirety. Documented instances of insider threats are as recent as March 2020. Many researchers have focused on monitoring technologies and relying on human monitoring in a reactive posture. An ideal solution would scrutinize an individual’s character and ascertain whether unique traits associated with actors of insider threats are …


Orientation And Social Influences Matter: Revisiting Neutralization Tendencies In Information Systems Security Violation, Frank Curtis King Jan 2021

Orientation And Social Influences Matter: Revisiting Neutralization Tendencies In Information Systems Security Violation, Frank Curtis King

CCE Theses and Dissertations

It is estimated that over half of all information systems security breaches are due directly or indirectly to the poor security practices of an organization’s employees. Previous research has shown neutralization techniques as having influence on the intent to violate information security policy. In this study, we proposed an expansion of the neutralization model by including the effects of business and ethical orientation of individuals on their tendencies to neutralize and compromise with information security policy. Additionally, constructs from social influences and pressures have been integrated into this model to measure the impact on the intent to violate information security …


Improving Employees’ Compliance With Password Policies, Enas Albataineh Jan 2021

Improving Employees’ Compliance With Password Policies, Enas Albataineh

CCE Theses and Dissertations

Employees’ lack of compliance with password policies increases password susceptibility, which leads to financial damages to the organizations as a result of information disclosure, fraud, and unauthorized transactions. However, few studies have examined what motivates employees to comply with password policies.

The purpose of this quantitative cross-sectional study was to examine what factors influence employees’ compliance with password policies. A theoretical model was developed based on Protection Motivation Theory (PMT), General Deterrence Theory (GDT), Theory of Reasoned Action (TRA), and Psychological Ownership Theory to explain employees’ compliance with password policies.

A non-probability convenience sample was employed. The sample consisted of …


Enterprise Social Network Systems Implementation Model For Knowledge Sharing Among Supply Chain It Professionals, Edgardo Luis Velez-Mandes Jan 2021

Enterprise Social Network Systems Implementation Model For Knowledge Sharing Among Supply Chain It Professionals, Edgardo Luis Velez-Mandes

CCE Theses and Dissertations

With the increased use of social network technologies in organizational environments, there is a need to understand how these technologies facilitate organizational knowledge management, particularly knowledge sharing. Prior research has focused on the relationship between knowledge management and enterprise social networking systems (ESNS), but little research has been conducted relating to how organizations implement and use ESNS for knowledge sharing. The goal was to construct and validate internally a model that offers guidance for the successful implementation and use of ESNS for knowledge sharing and building successful virtual communities of practice (vCoPs) among IT supply chain professionals in a healthcare …


An Empirical Examination Of The Computer Security Behaviors Of Telecommuters Working With Confidential Data Through Leveraging The Factors From Fear Appeals Model (Fam), Titus Dohnfon Fofung Jan 2021

An Empirical Examination Of The Computer Security Behaviors Of Telecommuters Working With Confidential Data Through Leveraging The Factors From Fear Appeals Model (Fam), Titus Dohnfon Fofung

CCE Theses and Dissertations

Computer users’ security compliance behaviors can be better understood by devising an experimental study to examine how fear appeals might impact users’ security behavior. Telecommuter security behavior has become very relevant in information systems (IS) research with the growing number of individuals working from home. The increasing dependence on telecommuting to enhance the viability and convenience has created an urgency with the advent of the COVID-19 pandemic to examine the behavior of users working at home across a corporate network. The home networks are usually not as secure as those in corporate settings. There is seldom a firewall setting and …


Human Errors In Data Breaches: An Exploratory Configurational Analysis, Gabriel A. Cornejo Jan 2021

Human Errors In Data Breaches: An Exploratory Configurational Analysis, Gabriel A. Cornejo

CCE Theses and Dissertations

Information Systems (IS) are critical for employee productivity and organizational success. Data breaches are on the rise—with thousands of data breaches accounting for billions of records breached and annual global cybersecurity costs projected to reach $10.5 trillion by 2025. A data breach is the unauthorized disclosure of sensitive information—and can be achieved intentionally or unintentionally. Significant causes of data breaches are hacking and human error; in some estimates, human error accounted for about a quarter of all data breaches in 2018. Furthermore, the significance of human error on data breaches is largely underrepresented, as hackers often capitalize on organizational users’ …


Halmos College Of Natural Sciences And Oceanography Annual Report: Fiscal Year 2017 And 2018, Keri Baker Jun 2020

Halmos College Of Natural Sciences And Oceanography Annual Report: Fiscal Year 2017 And 2018, Keri Baker

Alvin Sherman Library Brochures, Pamphlets, Reports

This report gathers information about items collected in Nova Southeastern University's institutional repository, NSUWorks, under the Halmos College of Natural Science and Oceanography community during the fiscal years 2017 and 2018. New Collections are highlighted and information about faculty and student scholarship uploaded to the Halmos community section of the repository are discussed. This report represents a subset of NSUWorks and does not reflect the overall body of work contained therein.


Selected Works Account Creation, Keri Baker Apr 2020

Selected Works Account Creation, Keri Baker

Library Learn - Complete Video Collection

Your Selected Works profile should have already been created for you. If you have not contacted the NSUWorks team about your profile and you have not received an email stating that your profile has been created, please contact nsuworks@nova.edu to have your profile created. Do not attempt to create your own profile.


Self-Service Technology In A Library System: An Examination Of Potential Library Member Adoption Of Self-Service Checkout At A Southeastern County Library System, Grace Keisha Phillips-Daley Jan 2020

Self-Service Technology In A Library System: An Examination Of Potential Library Member Adoption Of Self-Service Checkout At A Southeastern County Library System, Grace Keisha Phillips-Daley

Theses and Dissertations

This applied dissertation examined potential library member adoption of self-service technology (SST) in a southeastern county library system. The research framework of this study was based on the Technology Acceptance Model (TAM). More distinctively, this study explored the significance of motivation factors, to include both intrinsic and extrinsic factors, for choosing to use SST in a library environment as the reasonable effect of familiarity in influencing the possibility of its adoption.

The researcher used a non-probability sampling method to identify participants for the study. Edmonds and Kennedy (2013) suggested that surveys were primarily utilized to observe trends, personal attitudes, or …


Incorporating Intellectual Freedom And Information Literacy Into Programming, Meagan Albright, Ashley J. Brown Jan 2020

Incorporating Intellectual Freedom And Information Literacy Into Programming, Meagan Albright, Ashley J. Brown

Staff Publications

Raising awareness of intellectual freedom and information literacy is important, and not just during Banned Books Week. Just like sneaking healthy food into a kid’s meal, these techniques for incorporating these topics will enrich the work you already do as a librarian without disrupting your programming routine.


Nsuworks Creating A New Account: No Publications In Nsuworks, Keri Baker Jan 2020

Nsuworks Creating A New Account: No Publications In Nsuworks, Keri Baker

Library Learn - Complete Video Collection

If you are completely new to NSUWorks and have never logged in or had any work submitted to the system on your behalf, this tutorial will show you how to create a new account. Once you have an account, you can submit scholarly works, edit existing works, and review documents you’ve been invited to edit.


Currents Of Change Ii: Reshaping The Landscape Of The University Etd Administrative Process, Jaime Goldman, Keri Baker Oct 2019

Currents Of Change Ii: Reshaping The Landscape Of The University Etd Administrative Process, Jaime Goldman, Keri Baker

Staff Presentations, Proceedings, Lectures, and Symposia

The Nova Southeastern University (NSU) Oceanographic Campus Library has always had a unique challenge in that it is the final clearing house for student capstone, thesis, and dissertation binding and publication. The library has traditionally been the host of the final print publication and the liaison between the student, the program office, and the bindery. With the launch of NSUWorks, NSU’s institutional repository, 6 years ago, the library envisioned developing an innovative and effective start to finish workflow for student Electronic Theses and Dissertations (ETDs) and worked to change the physical life cycle of NSU’s theses and dissertations into a …


More Than You Can Be: Unconventional Usage Of An Institutional Repository In Etd Administrative Processes​, Jaime Goldman, Keri Baker Aug 2019

More Than You Can Be: Unconventional Usage Of An Institutional Repository In Etd Administrative Processes​, Jaime Goldman, Keri Baker

Staff Presentations, Proceedings, Lectures, and Symposia

Nova Southeastern University’s (NSU) Oceanographic Campus Library has always had a unique challenge in that it is the final clearing house for student capstone, thesis, and dissertation binding and publication. The library has traditionally been the host of the final print publication and the liaison between the student and the bindery. With the launch of NSUWorks, NSU’s institutional repository, 6 years ago, the library worked to develop an innovative and effective start to finish workflow for student Electronic Theses and Dissertations (ETDs) to change the physical lifecycle of NSU’s theses and dissertations into a virtual ETD lifecycle. Every step of …


A New Way To Look At Old Bones: Launching A Virtual Reality Service At A Health Sciences Library, Tariq Rahaman, Aaron Sager May 2019

A New Way To Look At Old Bones: Launching A Virtual Reality Service At A Health Sciences Library, Tariq Rahaman, Aaron Sager

HPD Library Presentations, Speeches, Lectures, Posters, Events, etc.

Background : This project's primary objective is to establish a sustainable and scalable virtual reality (VR) library service with a focus on virtual anatomy and medical simulation. A secondary objective is to develop inter-professional collaboration within our institution and support VR projects on medical/health sciences education and research initiatives.

Description : This initiative stemmed from an exploration of digital anatomy resources; VR was favored for its three-dimensional, immersive, and gamified approach to educational content. This presentation describes our process of launching and integrating VR as a new resource, including our decisions on hardware and software, staffing/workflow, policy and safety guidelines, …


Piloting The Emerging Technologies Internship At A Health Sciences Library, Tariq Rahaman May 2019

Piloting The Emerging Technologies Internship At A Health Sciences Library, Tariq Rahaman

HPD Library Presentations, Speeches, Lectures, Posters, Events, etc.

Background: The Emerging Technologies Internship program aims to provide 12th grade high school students an opportunity to explore, use and develop unique applications of 3D printing/scanning, virtual reality, and digital devices. The interns work closely with library staff on student and faculty projects, but are also challenged to develop individual projects that can positively impact health sciences and medical education.

Description: The internship was developed in collaboration with a local high school and launched in September 2018. The program components include 1) goals and logistics; 2) marketing; 3) a Learning Lunch presentation for interested students; 4) application & …


How The Nsu Libraries Can Support Faculty Oer Initiatives At Nova Southeastern University, Jaime M. Goldman Mar 2019

How The Nsu Libraries Can Support Faculty Oer Initiatives At Nova Southeastern University, Jaime M. Goldman

Staff Presentations, Proceedings, Lectures, and Symposia

No abstract provided.


From Research Aesthetics To Habits Of Mind: Student Publishing As A Core Competency, Bebe S. Chang Feb 2019

From Research Aesthetics To Habits Of Mind: Student Publishing As A Core Competency, Bebe S. Chang

Staff Presentations, Proceedings, Lectures, and Symposia

Student open access publishing offers a useful avenue for academic information literacy in preparation for real-world experiences. Worthwhile drivers of connected learning, digital research and institutional repositories are practical ecosystems for conveying the complexities of the economics and ethics of information creation, access, and use. Drawing on essential concepts, NSUWorks exemplifies a dynamic tool for learners’ engagement with the research lifecycle and for fostering dispositions of critical thinking, reading, and composing for success and professional development.


Harnessing The Institutional Repository, Gena Meroth, Jaime Goldman, Keri Baker Feb 2019

Harnessing The Institutional Repository, Gena Meroth, Jaime Goldman, Keri Baker

Staff Presentations, Proceedings, Lectures, and Symposia

From data-mining to dissemination, NSUWorks, the institutional repository of Nova Southeastern University, supports the teaching efforts, curriculum goals, and publishing workflow for faculty and students of NSU. The staff of the Alvin Sherman Library and the Halmos College of Natural Sciences and Oceanographic Campus Library would like to highlight how NSUWorks can innovatively bridge between a classroom teaching tool and publishing software, meeting the needs of both faculty and students of the university.


Open Educational Resource (Oer) Adoption In Higher Education: Examining Institutional Perspectives, Rebekah E. Wright Edd, Jaime M. Goldman, Jennifer L. Reeves Phd Feb 2019

Open Educational Resource (Oer) Adoption In Higher Education: Examining Institutional Perspectives, Rebekah E. Wright Edd, Jaime M. Goldman, Jennifer L. Reeves Phd

Staff Presentations, Proceedings, Lectures, and Symposia

This presentation focuses on institutional stakeholders’ perspectives of OER adoption and integration at a state college in east Florida. This session will provide recommendations for an institutional adoption of OERs at Nova Southeastern University and demonstrate how NSU’s librarians and library resources can be leveraged to ensure a successful OER implementation. This session will also discuss the ways in which librarian advocacy helps in the OER adoption process and how building relationships with librarians may help drive a wide-scale OER implementation.


Leveraging Course Material Affordability Options And Library-Subscribed Materials For Classroom Success, Keri Baker, Andy Shaffer, Steaven Nieratka Jan 2019

Leveraging Course Material Affordability Options And Library-Subscribed Materials For Classroom Success, Keri Baker, Andy Shaffer, Steaven Nieratka

Staff Presentations, Proceedings, Lectures, and Symposia

On average 60% of students try to delay or avoid purchasing course materials due to underusage and material costs. Often faculty and administrators try their best to drive student success and affordability through numerous tools and resources available here at NSU. Through the latest trends and opportunities in course materials, and a partnership with the NSU Bookstore and NSU Libraries, ways to drive down cost in materials is a real opportunity. This presentation will discuss the partnership with the NSU Bookstore and NSU libraries to help drive student success, explore opportunities that faculty have to create Open Electronic Resources (OER) …


An Investigation Into The Impact Of Social Networking On Knowledge Sharing, James Harold Gorham Jan 2019

An Investigation Into The Impact Of Social Networking On Knowledge Sharing, James Harold Gorham

CCE Theses and Dissertations

Today we are experiencing a rapidly increasing trend to use social networking in ways that dramatically affect both our personal and our public lives. This is a global phenomenon being experienced around the world. Exactly how this technology is being used and by whom is of great interest. The problem is that not a lot of research has been conducted to investigate the role social networking sites play to influence a person’s attitude toward sharing knowledge at work. In light of the marked increase in the use of social networking sites and how it is changing the way we live, …


The Influence Of Identifiable Personality Traits On Nurses’ Intention To Use Wireless Implantable Medical Devices, Vincent Molosky Jan 2019

The Influence Of Identifiable Personality Traits On Nurses’ Intention To Use Wireless Implantable Medical Devices, Vincent Molosky

CCE Theses and Dissertations

Technically-driven medical devices such as wireless implantable medical devices (WIMD) have become ubiquitous within healthcare. The use of these devices has changed the way nurses administer patient care. Consequently, the nursing workforce is large and diverse, and with it comes an expected disparity in personalities. Research involving human factors and technology acceptance in healthcare is not new. Yet due to the changing variables in the manner of which patient care is being administered, both in person and in the mechanism of treatment, recent research suggests that individual human factors such as personality traits may hold unknown implications involving more successful …