Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Business

An Analysis Of The Relationship Between Security Information Technology Enhancements And Computer Security Breaches And Incidents, Linda Betz Jan 2016

An Analysis Of The Relationship Between Security Information Technology Enhancements And Computer Security Breaches And Incidents, Linda Betz

CCE Theses and Dissertations

Financial services institutions maintain large amounts of data that include both intellectual property and personally identifiable information for employees and customers. Due to the potential damage to individuals, government regulators hold institutions accountable for ensuring that personal data are protected and require reporting of data security breaches. No company wants a data breach, but finding a security incident or breach early in the attack cycle may decrease the damage or data loss a company experiences. In multiple high profile data breaches reported in major news stories over the past few years, there is a pattern of the adversary being inside …


An Investigation Of Socio-Technical Components Of Knowledge Management System (Kms) Usage, Noel Wint Jr. Jan 2016

An Investigation Of Socio-Technical Components Of Knowledge Management System (Kms) Usage, Noel Wint Jr.

CCE Theses and Dissertations

Existing literature indicates that although both academics and practitioners recognize knowledge management (KM) as a source of competitive advantage, users are not always willing to use a knowledge management system (KMS). Because of the social nature of knowledge transfer, a KMS can be considered a socio-technical system. Many explanations have been presented for this failure to utilize the KMS. These explanations include a number of the socio-technical factors relating to people, processes, and technologies. While these factors may have significant explanatory power when examined independently, existing studies have not sufficiently addressed the interactions among all three socio-technical factors or their …


Patient Portals: Achieving Technology Acceptance And Meaningful Use In Independent Physician-Managed Practices, Kimberly W. Bartholomew Jan 2016

Patient Portals: Achieving Technology Acceptance And Meaningful Use In Independent Physician-Managed Practices, Kimberly W. Bartholomew

CCE Theses and Dissertations

As the bulk of medical health records shift from paper-based file systems to electronic formats, the promise of the transformation process called healthcare reform included adding efficiencies to medical practice workflows, lower costs, improved quality of care and most important, and the freeing of patient information from traditional propriety silos. With this incoming largess of protected health information data now viewable through online patient portals, patients can be empowered to become educated and active in their own health care decisions, but only if they have admission to their information. A digital divide currently exists in many medical practices where only …


Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig Jan 2016

Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig

CCE Theses and Dissertations

Hackers external to the organization continue to wreak havoc upon the information systems infrastructure of firms through breaches of security defenses, despite constant development of and continual investment in new IS security countermeasures by security professionals and vendors. These breaches are exceedingly costly and damaging to the affected organizations. The continued success of hackers in the face of massive amounts of security investments suggests that the defenders are losing and that the hackers can innovate at a much faster pace.

Underground hacker communities have been shown to be an environment where attackers can learn new techniques and share tools pertaining …