Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Interpretive case study (2)
- Action analysis (1)
- Anonymous (1)
- Assimilation (1)
- Case study (1)
-
- Cognitive Information Model (1)
- Commercial open-source ERP software (1)
- Contextualism (1)
- Cultural analysis (1)
- Data Mining (1)
- ERP (1)
- Electronic Medical Records System (1)
- Information Systems (1)
- Information security governance (1)
- Information systems (1)
- Information systems security (1)
- Internal audit (1)
- Internal control (1)
- Knowledge Discovery (1)
- Motivated reasoning (1)
- OWL (1)
- Ontologies (1)
- Organizational power (1)
- Power structure (1)
- Process Model (1)
- SWRL (1)
- Security policy (1)
- Small-medium enterprises (1)
- Structuration theory (1)
- Technology Acceptance (1)
Articles 1 - 8 of 8
Full-Text Articles in Entire DC Network
Defining Value Based Information Security Governance Objectives, Sushma Mishra
Defining Value Based Information Security Governance Objectives, Sushma Mishra
Theses and Dissertations
This research argues that the information security governance objectives should be grounded in the values of organizational members. Research literature in decision sciences suggest that individual values play an important role in developing decision objectives. Information security governance objectives, based on values of the stakeholders, are essential for a comprehensive security control program. The study uses Value Theory as a theoretical basis and value focused thinking as a methodology to develop 23 objectives for information security governance. A case study was conducted to reexamine and interpret the significance of the proposed objectives in an organizational context. The results suggest three …
Why Do People Use Or Not Use An Information Technology: An Interpretive Investigation On The Adoption And Use Of An Electronic Medical Records System, Li Long
Theses and Dissertations
In the literature of information technology acceptance, much empirical evidence exists that is inconsistent with Technology Acceptance (TA) Models. The purpose of this study is to find out why the extant TA models fail to predict in reality as they purport to in theory. This research argues that the extant literature has not been able to explain how individuals actually form their perceptions about using an information technology. Since past research attempting to do this has been unsuccessful or empirically refuted, this research uses an interpretive case study to investigate the experiences of professionals’ adoption and use of an information …
An Integrated Knowledge Discovery And Data Mining Process Model, Sumana Sharma
An Integrated Knowledge Discovery And Data Mining Process Model, Sumana Sharma
Theses and Dissertations
Enterprise decision making is continuously transforming in the wake of ever increasing amounts of data. Organizations are collecting massive amounts of data in their quest for knowledge nuggets in form of novel, interesting, understandable patterns that underlie these data. The search for knowledge is a multi-step process comprising of various phases including development of domain (business) understanding, data understanding, data preparation, modeling, evaluation and ultimately, the deployment of the discovered knowledge. These phases are represented in form of Knowledge Discovery and Data Mining (KDDM) Process Models that are meant to provide explicit support towards execution of the complex and iterative …
The Effects Of Reputation Threat And Whistle-Blowing Report Source On Chief Audit Executives' Investigation Decisions, Cynthia Guthrie
The Effects Of Reputation Threat And Whistle-Blowing Report Source On Chief Audit Executives' Investigation Decisions, Cynthia Guthrie
Theses and Dissertations
This study examines the effects of reputation threats and anonymous whistle-blowing channels on Chief Audit Executives’ (CAEs) decisions to investigate whistle-blowing allegations. Participants were 94 CAEs and Deputy CAEs from publicly traded companies in the eastern half of the United States. Participants received whistle-blowing reports from either an anonymous or a non-anonymous source. In the high reputation threat condition the whistle-blowing report alleged that the wrongdoing was perpetrated by the exploitation of substantial weaknesses in internal controls that had been previously evaluated by external auditors and the internal audit function. The report in the lower threat condition alleged that the …
The Performance Effects Of Latent Factors On Assimilation Of Commercial Open-Source Erp Software On Small-Medium Enterprises, Sandra Cereola
The Performance Effects Of Latent Factors On Assimilation Of Commercial Open-Source Erp Software On Small-Medium Enterprises, Sandra Cereola
Theses and Dissertations
This study tests a theoretical model developed to investigate the impact of assimilation of commercial open source enterprise resource planning software (COSES) in small and medium sized enterprises (SMEs). Specifically, the model explains how the top management team’s (TMT’s) information technology (IT) knowledge and experience impact both assimilation and firm performance. The hypotheses were tested using survey data from SMEs that have implemented COSES. Results from structural equation modeling suggest that SMEs benefit, through higher levels of assimilation and performance, from adopting innovative enterprise resource planning (ERP) systems such as COSES when they have a TMT that has experience with …
Shaping Strategic Information Systems Security Initiatives In Organizations, Gurvirender Tejay
Shaping Strategic Information Systems Security Initiatives In Organizations, Gurvirender Tejay
Theses and Dissertations
Strategic information systems security initiatives have seldom been successful. The increasing complexity of the business environment in which organizational security must be operationalized presents challenges. There has also been a problem with understanding the patterns of interactions among stakeholders that lead to instituting such an initiative. The overall aim of this research is to enhance understanding of the issues and concerns in shaping strategic information systems security initiative. To be successful, a proper undertaking of the content, context and process of the formulation and institutionalization of a security initiative is essential. It is also important to align the interconnections between …
An Ontology Centric Architecture For Mediating Interactions In Semantic Web-Based E-Commerce Environments, Manoj Thomas
An Ontology Centric Architecture For Mediating Interactions In Semantic Web-Based E-Commerce Environments, Manoj Thomas
Theses and Dissertations
Information freely generated, widely distributed and openly interpreted is a rich source of creative energy in the digital age that we live in. As we move further into this irrevocable relationship with self-growing and actively proliferating information spaces, we are also finding ourselves overwhelmed, disheartened and powerless in the presence of so much information. We are at a point where, without domain familiarity or expert guidance, sifting through the copious volumes of information to find relevance quickly turns into a mundane task often requiring enormous patience. The realization of accomplishment soon turns into a matter of extensive cognitive load, serendipity …
Power Relationships In Information Systems Security Policy Formulation And Implementation, Michael Stephen Lapke
Power Relationships In Information Systems Security Policy Formulation And Implementation, Michael Stephen Lapke
Theses and Dissertations
This thesis argues that organizational power impacts the development and implementation of Information Systems (IS) Security policy. The motivation for this research stems from the continuing concern of ineffective security in organizations, leading to significant monetary losses. IS researchers have contended that ineffective IS Security policy is a precursor to ineffective IS Security (Loch et al. 1992; Whitman et al. 2001; David 2002; Solms and Solms 2004). Beyond this pragmatic aspect, there is a gap in the literature concerning power relationships and IS Security policy. This research intends to bridge the gap. The dissertation is a two phased study whereby …