Open Access. Powered by Scholars. Published by Universities.®
- Institution
Articles 1 - 6 of 6
Full-Text Articles in Business
Conceptualizing The Regulation Of Virtual Currencies And Providers: Friction Points In State And Federal Approaches To Regulating Providers Of Payments Execution And Custody Services And Products In The United States, Sarah J. Hughes
Cleveland State Law Review
This essay evaluates the state of regulation by the United States government and State legislatures of participants in emerging virtual-currency businesses. It points to friction points as both the federal government and the States experiment with their own regulatory authority over virtual-currency businesses and provides a taxonomy of differing approaches to regulating such businesses. The essay takes the position that the States need to act in the near term if they wish to maintain their longstanding role as regulators of non-depository providers of financial products and services—or they risk being preempted by Congress or federal regulatory actions. This essay also …
An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris
An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris
Journal of International Technology and Information Management
The explosive growth and rapid proliferation of smartphones and other mobile
devices that access data over communication networks has necessitated advocating
and implementing security constraints for the purpose of abetting safe computing.
Remote data access using mobile devices is particularly popular among students at
institutions of higher education. To ensure safe harbor for constituents, it is
imperative for colleges and universities to establish, disseminate, and enforce
mobile device security artifacts, where artifacts is defined as policies, procedures,
guidelines or other documented or undocumented protocols. The purpose of this
study is to explore the existence of, specific content of, and the …
Security Risk And Social Presence In E-Commerce, Amy I. Wright
Security Risk And Social Presence In E-Commerce, Amy I. Wright
Butler Journal of Undergraduate Research
The object is to investigate the relationship between consumers’ sense of security of a store and their purchasing intention from the store. This was investigated by evaluating how perceptions of security vary among pure play websites with no social presence on the one hand and with social presence on the other; and click and mortar websites with no social presence on the one hand, and social presence on the other. It was also investigated by evaluating how social presence might mitigate the risk of security perceived by consumers. The research method included a scenario given to each participant which requires …
More Secure Passwords, Scott Magruder, Stanley X. Lewis Jr
More Secure Passwords, Scott Magruder, Stanley X. Lewis Jr
Journal of International Technology and Information Management
Passwords are often the first line of defense against hackers trying to logon to a user’s account. Due to this, the password that a user selects for protection of their account is critical. These passwords must be “good” passwords that are not easily cracked. However, how does the network administrator enforce this? A simple change to the login process can make the passwords chosen by users much more secure. A description of this simple process is given in this paper. The normal login process is described. A description of the how hackers attempt to crack passwords is given. The simple …
Improving The Judicial System To Handle Computer Crime, Gerald V. Post, Albert Kagan
Improving The Judicial System To Handle Computer Crime, Gerald V. Post, Albert Kagan
Journal of International Technology and Information Management
This paper asked professionals in the legal system to evaluate the current state and effectiveness of laws to identify and deter computer crime. Responses were evaluated with a formal structural equation model. The results generally show that legal professionals believe potential jurors have minimal knowledge of computer crime issues. More importantly, they also believe that judges have little knowledge or experience. A similar lack of knowledge by defense attorneys indicates that it could be difficult for a person accused of computer related infractions to find adequate representation. On the other hand, more experienced participants do not believe computer laws present …
The Role Of Quantitative Analysis In The Information Security Systems Development Lifecycle, Stephen R. Rosenkranz, Michael E. Busing, Faye P. Teer, Karen A. Forcht
The Role Of Quantitative Analysis In The Information Security Systems Development Lifecycle, Stephen R. Rosenkranz, Michael E. Busing, Faye P. Teer, Karen A. Forcht
Journal of International Technology and Information Management
Today’s numerous Quantitative Analysis (QA) tools have been successfully utilized to solve business problems in diverse applications. However, the application of QA tools in solving information security problems has been sparse. Devising the means and ways to use QA tools in resolving industry-wide security problems has the potential to yield enormous global economic benefit. The purpose of this paper is to explore the use of QA tools as a means of improving the processes involved in the Information Security Systems Development Lifecycle (SecSDL). Information security professionals use the SecSDL as a guide for formulating a comprehensive information security program. The …