Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 6 of 6
Full-Text Articles in Business
An Identification And Evaluation Of Information Security And Assurance Research Outlets, Michael Whitman, Humayun Zafar, Herbert J. Mattord
An Identification And Evaluation Of Information Security And Assurance Research Outlets, Michael Whitman, Humayun Zafar, Herbert J. Mattord
Faculty and Research Publications
The purpose of this study is to identify and comparatively assess the quality of information security specific publishing venues. Past studies in information systems and computer science have shown that information security-focused research can be published in mainstream information systems- and computer science-centric periodicals; however no studies to date have been found that specifically compared venues focused primarily on information security. Therefore the results of this study, when combined with assessments of publishing venues from those disciplines, can provide a more comprehensive perspective on publishing opportunities for academic authors in information security. Faculty members seeking research recognition should strive to …
Perception Of African Youth On Personal Computer Utilization: The Case Of Ethiopia And Rwanda, S. Negash
Perception Of African Youth On Personal Computer Utilization: The Case Of Ethiopia And Rwanda, S. Negash
Faculty and Research Publications
The tendency to pursue innovativeness and adopt new technologies has been found more likely with younger individuals and a strong relationship between attitude and personal computer (PC) utilization has been found. However, research in these areas is mainly focused on high-income countries. Do these findings hold for low-income countries? What are the perceptions of African youth on the factors that impact PC use? There is a dearth of micro-level studies that promote understanding about the behavior of individuals in low-income countries. This study looked at demographic data including age, gender, grade level, region, and prior experience among 228 youth from …
Threats To Information Security Revisited, Michael Whitman, Herbert J. Mattord
Threats To Information Security Revisited, Michael Whitman, Herbert J. Mattord
Faculty and Research Publications
The battle for the protection of information assets continues to rage at all organizations, big and small. In the ever-changing world of information security, new threats emerge, and old threats remain potent risks to poorly prepared organizations. It is critical to the ongoing protection of valuable information assets to understand these threats, new and old. This study seeks to inform organizations and researchers about the characteristics of specific threat categories and the relative dangers they pose. In addition, the study provides updated findings of a study conducted in 2002. New findings reveal the more things change, the more they stay …
An Exploration Of Human Resource Management Information Systems Security, Humayun Zafar, Jan Guynes Clark, Myung Ko
An Exploration Of Human Resource Management Information Systems Security, Humayun Zafar, Jan Guynes Clark, Myung Ko
Faculty and Research Publications
In this exploratory study we investigate differences in perception between management and staff with regard to overall information security risk management and human resources security risk management at two Fortune 500 companies. This study is part of a much larger study with regard to organizational information security issues. To our knowledge, this is the first time the issue of security risk management has been discussed in the context of human resource systems. We found significant differences between management and staff perceptions regarding overall security risk management and human resources security risk management. Our findings lay the ground work for future …
Japan’S Model Of Mobile Ecosystem Success: The Case Of Ntt Docomo, D. Amoroso, M. Ogawa
Japan’S Model Of Mobile Ecosystem Success: The Case Of Ntt Docomo, D. Amoroso, M. Ogawa
Faculty and Research Publications
This research looks at the adoption of Internet and mobile applications in the United States and Japan. It is the intent ofthis meta-exploratory study to examine factors of success with Japan’s mobile industry over the past decade. Takeshi Natsuno defined the ecosystem as a collection of roles in a collaborative balance. It is here that we began to search for the factors that have had an impact on the success of the mobile industry in Japan over the past two decades. It is the intent of this study to identify and discuss those factors to validate the ecosystem research model …
Cultural And Diversity Perceptions Of It Workers Of Indian Descent, Amy B. Woszcznyski, P. Dembla, Sherri Shade
Cultural And Diversity Perceptions Of It Workers Of Indian Descent, Amy B. Woszcznyski, P. Dembla, Sherri Shade
Faculty and Research Publications
Globalization has led to increased use of international work teams comprised of individuals from diverse backgrounds. Beliefs and values of individuals affect the working of such groups, so it is important to understand these differences. The aim of this paper is to understand the cultural and diversity perceptions of IT workers specifically of Indian descent. Two instruments, namely the Diversity Perceptions Index and Hofstede Value survey, were used to collect data. One hundred and eleven respondents of Indian descent working in the IT field completed the survey. Descriptive statistics provided initial results and discussion. The respondents valued diversity, although they …