Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Science and Technology Studies

Social Grief: A Grounded Theory Of Utilizing Status Updates On Facebook As A Contemporary Ritual, Celese Catania-Opris Jan 2016

Social Grief: A Grounded Theory Of Utilizing Status Updates On Facebook As A Contemporary Ritual, Celese Catania-Opris

Department of Family Therapy Dissertations and Applied Clinical Projects

The popular Social Networking Site, Facebook, offers its users the ability tocommunicate with others from all over the globe. Individuals can create a virtual identity for themselves enabling members to call, message, and locate others in a matter of seconds. The number of Facebook users appears to increase; yet, the number of members who die daily is not normally accounted. Facebook now permits the memorialization ofthe deceased’s profile. This allows members to continue commenting, sharing photos and videos, and visiting the deceased’s Facebook page. This trend led to the central question of this study, “What benefits, if any, are individuals …


Empirical Analysis Of Socio-Cognitive Factors Affecting Security Behaviors And Practices Of Smartphone Users, Joseph P. Simpson Jan 2016

Empirical Analysis Of Socio-Cognitive Factors Affecting Security Behaviors And Practices Of Smartphone Users, Joseph P. Simpson

CCE Theses and Dissertations

The overall security posture of information systems (IS) depends on the behaviors of the IS users. Several studies have shown that users are the greatest vulnerability to IS security. The proliferation of smartphones is introducing an entirely new set of risks, threats, and vulnerabilities. Smartphone devices amplify this data exposure problem by enabling instantaneous transmission and storage of personally identifiable information (PII) by smartphone users, which is becoming a major security risk. Moreover, companies are also capitalizing on the availability and powerful computing capabilities of these smartphone devices and developing a bring-your-own-device (BYOD) program, which makes companies susceptible to divulgence …