Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Business

Percepción Del Director Escolar Sobre El Liderazgo Servidor En Las Escuelas Cinco Estrellas En Arecibo, Puerto Rico, Enrique Antonio Cordero Soto Jan 2021

Percepción Del Director Escolar Sobre El Liderazgo Servidor En Las Escuelas Cinco Estrellas En Arecibo, Puerto Rico, Enrique Antonio Cordero Soto

Theses and Dissertations

El propósito de la investigación fue Indagar la percepción de los directores escolares de las escuelas cinco estrellas sobre el liderazgo servidor. Los mismos tendrán una evaluación sobre su liderazgo en sus entornos escolares y si ellos son partes de sus logros, tanto en lo administrativo, clima escolar y aprovechamiento académico de los estudiantes. Los propósitos del estudio fueron determinar si existía una relación entre su liderazgo como directores escolares y el líder servidor, el reconocimiento de las cualidades y ventajas sobre el liderazgo de servicio y como relaciona el impacto de servicio en la clasificación de las escuelas y …


An Information Privacy Examination Of The Practices Of Pharmaceutical Companies Regarding Use Of Information Collected Through Their Websites, Shonda Dellena Brown May 2015

An Information Privacy Examination Of The Practices Of Pharmaceutical Companies Regarding Use Of Information Collected Through Their Websites, Shonda Dellena Brown

CCE Theses and Dissertations

Consumers have begun to take a more proactive approach to their healthcare by accessing pharmaceutical companies Websites to obtain health and drug information, support groups, rebates, coupons, as well as free drug trials. In exchange for these benefits, companies require consumers to voluntarily disclose information. However, research has shown that consumers continue to be concerned about how their information is managed, used, and distributed by companies, especially if accessed via the Web. To date, there has been limited empirical research to examine the actual online practices of companies when it comes to privacy, especially those of pharmaceutical companies. Using Delphi …


Designing An Effective Information Security Policy For Exceptional Situations In An Organization: An Experimental Study, George S. Antoniou Jan 2015

Designing An Effective Information Security Policy For Exceptional Situations In An Organization: An Experimental Study, George S. Antoniou

CCE Theses and Dissertations

An increasing number of researchers are recognizing the importance of the role played by employees in maintaining the effectiveness of an information security policy. Currently, little research exists to validate the relationship between the actions (behaviors) taken by employees in response to exceptional situations (antecedents) regarding an organization’s information security policy, the impact (consequences) those actions have on an organization, and the motives that prompt those actions. When these exceptional situations occur, employees may feel compelled to engage in behaviors that violate the terms of an information security policy because strict compliance with the policy could cause the organization to …


Virtue Ethics: Examining Influences On The Ethical Commitment Of Information System Workers In Trusted Positions, John Max Gray Jan 2015

Virtue Ethics: Examining Influences On The Ethical Commitment Of Information System Workers In Trusted Positions, John Max Gray

CCE Theses and Dissertations

Despite an abundance of research on the problem of insider threats, only limited success has been achieved in preventing trusted insiders from committing security violations. Virtue ethics may be an approach that can be utilized to address this issue. Human factors such as moral considerations impact Information System (IS) design, use, and security; consequently they affect the security posture and culture of an organization. Virtue ethics based concepts have the potential to influence and align the moral values and behavior of information systems workers with those of an organization in order to provide increased protection of IS assets. An individual’s …