Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Library and Information Science

A Study Of The Effect Of Types Of Organizational Culture On Information Security Procedural Countermeasures, Sheri James Jan 2023

A Study Of The Effect Of Types Of Organizational Culture On Information Security Procedural Countermeasures, Sheri James

CCE Theses and Dissertations

This study examined the impact of specific organizational cultures on information security procedural countermeasures (ISPC). With increasing security incidents and data breaches, organizations acknowledge that people are their greatest asset as well as a vulnerability. Previous research into information security procedural controls has centered on behavioral, cognitive, and social theories; some literature incorporates general notions of organization culture yet there is still an absence in socio-organizational studies dedicated to elucidating how information security policy (ISP) compliance can be augmented by implementing comprehensive security education, training, and awareness (SETA) programs focusing on education, training, and awareness initiatives.

A theoretical model was …


Analyzing Small Business Strategies To Prevent External Cybersecurity Threats, Dr. Kevin E. Moore Jan 2023

Analyzing Small Business Strategies To Prevent External Cybersecurity Threats, Dr. Kevin E. Moore

Walden Dissertations and Doctoral Studies

Some small businesses’ cybersecurity analysts lack strategies to prevent their organizations from compromising personally identifiable information (PII) via external cybersecurity threats. Small business leaders are concerned, as they are the most targeted critical infrastructures in the United States and are a vital part of the economic system as data breaches threaten the viability of these organizations. Grounded in routine activity theory, the purpose of this pragmatic qualitative inquiry was to explore strategies small business organizations utilize to prevent external cybersecurity threats. The participants were nine cybersecurity analysts who utilized strategies to defend small businesses from external threats. Data were collected …


Analyzing Small Business Strategies To Prevent External Cybersecurity Threats, Dr. Kevin E. Moore Jan 2023

Analyzing Small Business Strategies To Prevent External Cybersecurity Threats, Dr. Kevin E. Moore

Walden Dissertations and Doctoral Studies

Some small businesses’ cybersecurity analysts lack strategies to prevent their organizations from compromising personally identifiable information (PII) via external cybersecurity threats. Small business leaders are concerned, as they are the most targeted critical infrastructures in the United States and are a vital part of the economic system as data breaches threaten the viability of these organizations. Grounded in routine activity theory, the purpose of this pragmatic qualitative inquiry was to explore strategies small business organizations utilize to prevent external cybersecurity threats. The participants were nine cybersecurity analysts who utilized strategies to defend small businesses from external threats. Data were collected …


Modeling Deception: A Case Study Of Email Phishing, Abdullah Almoqbil, Brian C. O'Connor, Richard Anderson, Jibril Shittu, Patrick Mcleod Dec 2021

Modeling Deception: A Case Study Of Email Phishing, Abdullah Almoqbil, Brian C. O'Connor, Richard Anderson, Jibril Shittu, Patrick Mcleod

Proceedings from the Document Academy

Information manipulation for deception continues to evolve at a remarkable rate. Artificial intelligence has greatly reduced the burden of combing through documents for evidence of manipulation; but it has also enabled the development of clever modes of deception.

In this study, we modeled deception attacks by examining phishing emails that successfully evaded detection by the Microsoft 365 filtering system. The sample population selected for this study was the University of North Texas students, faculty, staff, alumni and retirees who maintain their university email accounts. The model explains why certain individuals and organizations are selected as targets, and identifies potential counter …


Exploring The Information Security Practices On The Smartphone By The Postgraduate Students Of University Of Calicut, Vysakh C, Amina Jasmina K V Feb 2021

Exploring The Information Security Practices On The Smartphone By The Postgraduate Students Of University Of Calicut, Vysakh C, Amina Jasmina K V

Library Philosophy and Practice (e-journal)

This paper aims to report on the information security practices on the smartphone by the students of the University of Calicut, Kerala. Data were gathered by using a survey questionnaire which was administered to 344 smartphone cohorts at the postgraduate level. The study findings reported the scanty knowledge of the participants regarding the issues and risks associated with smartphones even though most of the respondents were aware of the information security practices available in the smartphones. The data analysis delineated the habit of students storing secret and sensitive information like ATM password, bank or credit card account details and personal …


An Empirical Examination Of The Computer Security Behaviors Of Telecommuters Working With Confidential Data Through Leveraging The Factors From Fear Appeals Model (Fam), Titus Dohnfon Fofung Jan 2021

An Empirical Examination Of The Computer Security Behaviors Of Telecommuters Working With Confidential Data Through Leveraging The Factors From Fear Appeals Model (Fam), Titus Dohnfon Fofung

CCE Theses and Dissertations

Computer users’ security compliance behaviors can be better understood by devising an experimental study to examine how fear appeals might impact users’ security behavior. Telecommuter security behavior has become very relevant in information systems (IS) research with the growing number of individuals working from home. The increasing dependence on telecommuting to enhance the viability and convenience has created an urgency with the advent of the COVID-19 pandemic to examine the behavior of users working at home across a corporate network. The home networks are usually not as secure as those in corporate settings. There is seldom a firewall setting and …


Designing And Psychometric Evaluation Of Questionnaire Of Human Factors Affecting Information Security In Libraries, Masoumeh Amini, Hossein Vakilimofrad, Mohammad Karim Saberi Aug 2020

Designing And Psychometric Evaluation Of Questionnaire Of Human Factors Affecting Information Security In Libraries, Masoumeh Amini, Hossein Vakilimofrad, Mohammad Karim Saberi

Library Philosophy and Practice (e-journal)

Background and Purpose: Information security is the use of a set of policies, solutions, tools, hardware, and software to provide a threat-free environment in the generation, refinement, transmission, and distribution of information. The purpose of this study was to assess the validity and reliability of the Human Factors Inventory affecting libraries' information security.

Materials and methods: The present study was a cross-sectional study conducted for designing and psychometric evaluation for the inventory. After designing the initial list of inventory items, the opinion of expert lecturers and senior managers of Iranian libraries was used to evaluate face and content validity using …


Technology Safety Audit In Computer Laboratories Using Iso/Iec 17799 : 2005 (Case Study: Ftk Uin Sunan Ampel Surabaya), Muqoffi Khosyatulloh, Nurul Fariidhotun Nisaa, Ilham, M. Kom Dec 2019

Technology Safety Audit In Computer Laboratories Using Iso/Iec 17799 : 2005 (Case Study: Ftk Uin Sunan Ampel Surabaya), Muqoffi Khosyatulloh, Nurul Fariidhotun Nisaa, Ilham, M. Kom

Library Philosophy and Practice (e-journal)

Management audit is very important for assessment of their information technology management to gain efficient and effective business running process. Information technology security as an effort of internal controlling for risk and threat security minimization, is mainly considered due to all learning and lecturing administration activities use information technology. Allso, the implementation of a number of computer labs to facilitate learning processes and access to information in order to support the lectures and personal development of students To find out how secure technology information is, it is then requiring an audit to make sure everything run based on procedure. Management …


Computational Environment For Modeling And Analysing Network Traffic Behaviour Using The Divide And Recombine Framework, Ashrith Barthur Dec 2016

Computational Environment For Modeling And Analysing Network Traffic Behaviour Using The Divide And Recombine Framework, Ashrith Barthur

Open Access Dissertations

There are two essential goals of this research. The first goal is to design and construct a computational environment that is used for studying large and complex datasets in the cybersecurity domain. The second goal is to analyse the Spamhaus blacklist query dataset which includes uncovering the properties of blacklisted hosts and understanding the nature of blacklisted hosts over time.

The analytical environment enables deep analysis of very large and complex datasets by exploiting the divide and recombine framework. The capability to analyse data in depth enables one to go beyond just summary statistics in research. This deep analysis is …


Enhancing Key Digital Literacy Skills: Information Privacy, Information Security, And Copyright/Intellectual Property, Jacquelyn A. Burkell, Alexandre Fortier, Lisa Di Valentino, Sarah T. Roberts Oct 2015

Enhancing Key Digital Literacy Skills: Information Privacy, Information Security, And Copyright/Intellectual Property, Jacquelyn A. Burkell, Alexandre Fortier, Lisa Di Valentino, Sarah T. Roberts

FIMS Publications

Key Messages

Background

  • Knowledge and skills in the areas of information security, information privacy, and copyright/intellectual property rights and protection are of key importance for organizational and individual success in an evolving society and labour market in which information is a core resource.
  • Organizations require skilled and knowledgeable professionals who understand risks and responsibilities related to the management of information privacy, information security, and copyright/intellectual property.
  • Professionals with this expertise can assist organizations to ensure that they and their employees meet requirements for the privacy and security of information in their care and control, and in order to ensure that …


Behavioral Information Security Item Ratings, Jeffrey M. Stanton Jan 2002

Behavioral Information Security Item Ratings, Jeffrey M. Stanton

School of Information Studies - Faculty Scholarship

Item rating data from behavioral information security project.


Isr@Bucknell, Information Services And Resources, Bucknell University Oct 1999

Isr@Bucknell, Information Services And Resources, Bucknell University

ISR @ Bucknell

isr@bucknell was a newsletter published by Bucknell University's Information Services and Resources department (later Library and Information Technology). The publication served the community by providing software, project, and service updates. Regular features included a letter from the Associate Vice President for Information Services and Resources, the "Ask ISR" column, and featured ISR web pages. This issue includes the following articles: "New Staff," "C-D Rom Burning," "Student Voicemail," "Optimize with Opscan," "Tolhurst Butler's Gift," "The Tortoise and the Hare," and "JSTOR."