Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Business

An Identification And Evaluation Of Information Security And Assurance Research Outlets, Michael Whitman, Humayun Zafar, Herbert J. Mattord Dec 2013

An Identification And Evaluation Of Information Security And Assurance Research Outlets, Michael Whitman, Humayun Zafar, Herbert J. Mattord

Faculty and Research Publications

The purpose of this study is to identify and comparatively assess the quality of information security specific publishing venues. Past studies in information systems and computer science have shown that information security-focused research can be published in mainstream information systems- and computer science-centric periodicals; however no studies to date have been found that specifically compared venues focused primarily on information security. Therefore the results of this study, when combined with assessments of publishing venues from those disciplines, can provide a more comprehensive perspective on publishing opportunities for academic authors in information security. Faculty members seeking research recognition should strive to …


Perception Of African Youth On Personal Computer Utilization: The Case Of Ethiopia And Rwanda, S. Negash Nov 2012

Perception Of African Youth On Personal Computer Utilization: The Case Of Ethiopia And Rwanda, S. Negash

Faculty and Research Publications

The tendency to pursue innovativeness and adopt new technologies has been found more likely with younger individuals and a strong relationship between attitude and personal computer (PC) utilization has been found. However, research in these areas is mainly focused on high-income countries. Do these findings hold for low-income countries? What are the perceptions of African youth on the factors that impact PC use? There is a dearth of micro-level studies that promote understanding about the behavior of individuals in low-income countries. This study looked at demographic data including age, gender, grade level, region, and prior experience among 228 youth from …


Threats To Information Security Revisited, Michael Whitman, Herbert J. Mattord Jan 2012

Threats To Information Security Revisited, Michael Whitman, Herbert J. Mattord

Faculty and Research Publications

The battle for the protection of information assets continues to rage at all organizations, big and small. In the ever-changing world of information security, new threats emerge, and old threats remain potent risks to poorly prepared organizations. It is critical to the ongoing protection of valuable information assets to understand these threats, new and old. This study seeks to inform organizations and researchers about the characteristics of specific threat categories and the relative dangers they pose. In addition, the study provides updated findings of a study conducted in 2002. New findings reveal the more things change, the more they stay …


An Exploration Of Human Resource Management Information Systems Security, Humayun Zafar, Jan Guynes Clark, Myung Ko Nov 2011

An Exploration Of Human Resource Management Information Systems Security, Humayun Zafar, Jan Guynes Clark, Myung Ko

Faculty and Research Publications

In this exploratory study we investigate differences in perception between management and staff with regard to overall information security risk management and human resources security risk management at two Fortune 500 companies. This study is part of a much larger study with regard to organizational information security issues. To our knowledge, this is the first time the issue of security risk management has been discussed in the context of human resource systems. We found significant differences between management and staff perceptions regarding overall security risk management and human resources security risk management. Our findings lay the ground work for future …


Japan’S Model Of Mobile Ecosystem Success: The Case Of Ntt Docomo, D. Amoroso, M. Ogawa Jan 2011

Japan’S Model Of Mobile Ecosystem Success: The Case Of Ntt Docomo, D. Amoroso, M. Ogawa

Faculty and Research Publications

This research looks at the adoption of Internet and mobile applications in the United States and Japan. It is the intent ofthis meta-exploratory study to examine factors of success with Japan’s mobile industry over the past decade. Takeshi Natsuno defined the ecosystem as a collection of roles in a collaborative balance. It is here that we began to search for the factors that have had an impact on the success of the mobile industry in Japan over the past two decades. It is the intent of this study to identify and discuss those factors to validate the ecosystem research model …


Cultural And Diversity Perceptions Of It Workers Of Indian Descent, Amy B. Woszcznyski, P. Dembla, Sherri Shade Jan 2009

Cultural And Diversity Perceptions Of It Workers Of Indian Descent, Amy B. Woszcznyski, P. Dembla, Sherri Shade

Faculty and Research Publications

Globalization has led to increased use of international work teams comprised of individuals from diverse backgrounds. Beliefs and values of individuals affect the working of such groups, so it is important to understand these differences. The aim of this paper is to understand the cultural and diversity perceptions of IT workers specifically of Indian descent. Two instruments, namely the Diversity Perceptions Index and Hofstede Value survey, were used to collect data. One hundred and eleven respondents of Indian descent working in the IT field completed the survey. Descriptive statistics provided initial results and discussion. The respondents valued diversity, although they …