Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Entire DC Network

Defining Value Based Information Security Governance Objectives, Sushma Mishra Dec 2008

Defining Value Based Information Security Governance Objectives, Sushma Mishra

Theses and Dissertations

This research argues that the information security governance objectives should be grounded in the values of organizational members. Research literature in decision sciences suggest that individual values play an important role in developing decision objectives. Information security governance objectives, based on values of the stakeholders, are essential for a comprehensive security control program. The study uses Value Theory as a theoretical basis and value focused thinking as a methodology to develop 23 objectives for information security governance. A case study was conducted to reexamine and interpret the significance of the proposed objectives in an organizational context. The results suggest three …


Why Do People Use Or Not Use An Information Technology: An Interpretive Investigation On The Adoption And Use Of An Electronic Medical Records System, Li Long Dec 2008

Why Do People Use Or Not Use An Information Technology: An Interpretive Investigation On The Adoption And Use Of An Electronic Medical Records System, Li Long

Theses and Dissertations

In the literature of information technology acceptance, much empirical evidence exists that is inconsistent with Technology Acceptance (TA) Models. The purpose of this study is to find out why the extant TA models fail to predict in reality as they purport to in theory. This research argues that the extant literature has not been able to explain how individuals actually form their perceptions about using an information technology. Since past research attempting to do this has been unsuccessful or empirically refuted, this research uses an interpretive case study to investigate the experiences of professionals’ adoption and use of an information …


An Integrated Knowledge Discovery And Data Mining Process Model, Sumana Sharma Sep 2008

An Integrated Knowledge Discovery And Data Mining Process Model, Sumana Sharma

Theses and Dissertations

Enterprise decision making is continuously transforming in the wake of ever increasing amounts of data. Organizations are collecting massive amounts of data in their quest for knowledge nuggets in form of novel, interesting, understandable patterns that underlie these data. The search for knowledge is a multi-step process comprising of various phases including development of domain (business) understanding, data understanding, data preparation, modeling, evaluation and ultimately, the deployment of the discovered knowledge. These phases are represented in form of Knowledge Discovery and Data Mining (KDDM) Process Models that are meant to provide explicit support towards execution of the complex and iterative …


The Effects Of Reputation Threat And Whistle-Blowing Report Source On Chief Audit Executives' Investigation Decisions, Cynthia Guthrie Sep 2008

The Effects Of Reputation Threat And Whistle-Blowing Report Source On Chief Audit Executives' Investigation Decisions, Cynthia Guthrie

Theses and Dissertations

This study examines the effects of reputation threats and anonymous whistle-blowing channels on Chief Audit Executives’ (CAEs) decisions to investigate whistle-blowing allegations. Participants were 94 CAEs and Deputy CAEs from publicly traded companies in the eastern half of the United States. Participants received whistle-blowing reports from either an anonymous or a non-anonymous source. In the high reputation threat condition the whistle-blowing report alleged that the wrongdoing was perpetrated by the exploitation of substantial weaknesses in internal controls that had been previously evaluated by external auditors and the internal audit function. The report in the lower threat condition alleged that the …


The Performance Effects Of Latent Factors On Assimilation Of Commercial Open-Source Erp Software On Small-Medium Enterprises, Sandra Cereola Sep 2008

The Performance Effects Of Latent Factors On Assimilation Of Commercial Open-Source Erp Software On Small-Medium Enterprises, Sandra Cereola

Theses and Dissertations

This study tests a theoretical model developed to investigate the impact of assimilation of commercial open source enterprise resource planning software (COSES) in small and medium sized enterprises (SMEs). Specifically, the model explains how the top management team’s (TMT’s) information technology (IT) knowledge and experience impact both assimilation and firm performance. The hypotheses were tested using survey data from SMEs that have implemented COSES. Results from structural equation modeling suggest that SMEs benefit, through higher levels of assimilation and performance, from adopting innovative enterprise resource planning (ERP) systems such as COSES when they have a TMT that has experience with …


Shaping Strategic Information Systems Security Initiatives In Organizations, Gurvirender Tejay May 2008

Shaping Strategic Information Systems Security Initiatives In Organizations, Gurvirender Tejay

Theses and Dissertations

Strategic information systems security initiatives have seldom been successful. The increasing complexity of the business environment in which organizational security must be operationalized presents challenges. There has also been a problem with understanding the patterns of interactions among stakeholders that lead to instituting such an initiative. The overall aim of this research is to enhance understanding of the issues and concerns in shaping strategic information systems security initiative. To be successful, a proper undertaking of the content, context and process of the formulation and institutionalization of a security initiative is essential. It is also important to align the interconnections between …


An Ontology Centric Architecture For Mediating Interactions In Semantic Web-Based E-Commerce Environments, Manoj Thomas Mar 2008

An Ontology Centric Architecture For Mediating Interactions In Semantic Web-Based E-Commerce Environments, Manoj Thomas

Theses and Dissertations

Information freely generated, widely distributed and openly interpreted is a rich source of creative energy in the digital age that we live in. As we move further into this irrevocable relationship with self-growing and actively proliferating information spaces, we are also finding ourselves overwhelmed, disheartened and powerless in the presence of so much information. We are at a point where, without domain familiarity or expert guidance, sifting through the copious volumes of information to find relevance quickly turns into a mundane task often requiring enormous patience. The realization of accomplishment soon turns into a matter of extensive cognitive load, serendipity …


Power Relationships In Information Systems Security Policy Formulation And Implementation, Michael Stephen Lapke Jan 2008

Power Relationships In Information Systems Security Policy Formulation And Implementation, Michael Stephen Lapke

Theses and Dissertations

This thesis argues that organizational power impacts the development and implementation of Information Systems (IS) Security policy. The motivation for this research stems from the continuing concern of ineffective security in organizations, leading to significant monetary losses. IS researchers have contended that ineffective IS Security policy is a precursor to ineffective IS Security (Loch et al. 1992; Whitman et al. 2001; David 2002; Solms and Solms 2004). Beyond this pragmatic aspect, there is a gap in the literature concerning power relationships and IS Security policy. This research intends to bridge the gap. The dissertation is a two phased study whereby …