Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Business

Risk Perception In Online Communities, Jason R. Couraud May 2014

Risk Perception In Online Communities, Jason R. Couraud

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Online communities have become a part of everyday life for many people. The members of the communities use them to keep in touch with family and friends, do business, look for jobs, play games, and more, both savory and unsavory. The ease of sharing personal information comes with the subsequent risk of having that information exposed publically or even stolen. The purpose of this study was to explore how much awareness of the risks affects a person’s decision to post personal information to an online community.

Chapter I introduces the concepts and issues that will be investigated by this paper. …


The Chain-Link Fence Model: A Framework For Creating Security Procedures, Robert F. Houghton May 2013

The Chain-Link Fence Model: A Framework For Creating Security Procedures, Robert F. Houghton

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Information technology security professionals are facing an ever growing threat to the networks that they defend. The process for creating procedures to help stem this threat is very difficult for security professionals. The Chain-Link Fence Model helps security professionals by guiding them through the process of creating and implementing new security procedures.


Undergraduate Information Systems (Is) Curriculum And Career Track Development In United States Colleges And Universities: Assessment Of Adherence To Is 2010 Curriculum Guidelines, Corbin Christopher Bell May 2012

Undergraduate Information Systems (Is) Curriculum And Career Track Development In United States Colleges And Universities: Assessment Of Adherence To Is 2010 Curriculum Guidelines, Corbin Christopher Bell

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

The objective of this study was to survey IS curriculum in AACSB-accredited Information Systems programs across the United States, to evaluate current adherence to the IS 2010 Curriculum Guidelines, and to assess the number and type of career track developments initiated as a result of less stringent requirements in the new curriculum guidelines. In addition, an analysis was conducted to see if curriculum in AACSB-accredited Information Systems programs across the United States changed significantly since other similar evaluations reported in 1996, and 2006, and whether it is closer in adherence to the IS 2010 curriculum guidelines.

The findings of this …


The Impact Of Team-Based Learning’S Readiness Assurance Process On Virtually Isolated Adults, Matthew W. Barclay Aug 2011

The Impact Of Team-Based Learning’S Readiness Assurance Process On Virtually Isolated Adults, Matthew W. Barclay

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

The purpose of this study was to test the effectiveness of the readiness assurance process of team-based learning (TBL) in virtually isolated settings. Many Internet sites offer courses for adults to use on their own without access to mentors or other learners. However, educational theory suggests that people learn better with others than by themselves. The focus of this investigation was whether the inclusion of the readiness assurance process would increase participants’ levels of learning based on Bloom’s revised taxonomy within the limits of virtual isolation.

In this study an experimental pretest-posttest design was employed. Using a 2- day mini-course …


The Adoption Of Computer Security: An Analysis Of Home Personal Computer User Behavior Using The Health Belief Model, Chester L. Claar May 2011

The Adoption Of Computer Security: An Analysis Of Home Personal Computer User Behavior Using The Health Belief Model, Chester L. Claar

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

The primary purpose of this research was to examine the adoption of computer security software in the home computer environment. The use of the Health Belief Model as a framework to design a model to examine home user adoption of computer security provided the basis for this research.

The method of the investigation was a cross-sectional study using a self-reported web-based survey to test the theoretical model derived from the Health Belief Model. The survey targeted individuals who are responsible for the selection, installation, and maintenance of software on their home computers. The data collection relied on a snowball sampling …


Information Retrieval Using The Constructivist's Approach To Get The Most Out Of The Internet, Ishani Shukla Dec 2009

Information Retrieval Using The Constructivist's Approach To Get The Most Out Of The Internet, Ishani Shukla

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

The constructivist's theory and its application to information retrieval from the Internet was reviewed. The main aim of the study was to devise and test an approach with which the most relevant information could be easily and efficiently extracted from the Internet. The impact of a judicious choice of the keywords to retrieve information, according to the particular approach to be implemented as well as the importance of speed reading as an additional technique to improve information retrieval, was compared and critically analyzed. The study was based on information retrieval from www.google.com and www.images.google.com and focused on real-life examples and …