Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 181 - 184 of 184

Full-Text Articles in Business

Developing A Metrics Framework For The Federal Government In Computer Security Incident Response, Vincent Sritapan, Walter Stewart, Jake Zhu, C.E. Tapie Rohm Jr. Jun 2014

Developing A Metrics Framework For The Federal Government In Computer Security Incident Response, Vincent Sritapan, Walter Stewart, Jake Zhu, C.E. Tapie Rohm Jr.

Communications of the IIMA

As technology advances and society becomes more dependent on information technology (IT), the exposure to vulnerabilities and threats increases. These threats pertain to industry as well as government information systems. There is, however, a lack in how we measure the performance and create accountability for computer security incident response (CSIR) capabilities. Many government organizations still struggle to determine what security metrics to use and how to find value within these metrics. To fill this apparent gap, a metrics framework has been developed for incident response to serve as an internal analysis, supporting continuous improvement in incident reporting and strengthening the …


Discovering A Joomla Exploit For Possible Malware: Social Engineering And A Php Base64 Gif Exploit, M.S. Terrell Rohm, C.E. Tapie Rohm Jr., Haakon Brown Jun 2014

Discovering A Joomla Exploit For Possible Malware: Social Engineering And A Php Base64 Gif Exploit, M.S. Terrell Rohm, C.E. Tapie Rohm Jr., Haakon Brown

Communications of the IIMA

his article discusses the importance of Joomla as a Content Management System that is used by 2.7% of the web and how a possible new malware exploit has been discovered. The PHP BASE64 malware exploit is a well-documented exploit of PHP but the implementation of this exploit as it relates to Joomla is a very ingenious method not previously used before, as far as the authors were able to discover. In this particularly case, PHP code is embedded in a GIF file to produce a very sophisticated and unique malware exploit to Joomla.


Digital Media Dependency, Relational Orientation And Socaial Networking Among College Students, C. Mo Bahk, Astrid Sheil, C.E. Taipe Rohm Jr., Frank Lin Jun 2014

Digital Media Dependency, Relational Orientation And Socaial Networking Among College Students, C. Mo Bahk, Astrid Sheil, C.E. Taipe Rohm Jr., Frank Lin

Communications of the IIMA

This study focused on digital media dependency, relational orientation, and demographic variables as potential factors that were relevant to the usage of social networking websites (e.g., MySpace and Facebook) among college students. A total of 258 (101 male and 157 female) students completed the questionnaire that contains the measures of digital media dependency, relational orientation, social networking media usage, and demographic characteristics. The respondents also indicated specific types of things that they disclose (post) on their social media websites. The results showed that relational orientation is positively correlated with the disclosure (posting) of family photos, friends’ photos, and travel photos …


Intelligent Web User Interfaces, Myron Sheu, Xin James He May 2014

Intelligent Web User Interfaces, Myron Sheu, Xin James He

Communications of the IIMA

This paper investigates the key components of an intelligent web user interface to facilitate online investment as a novel approach to compensating for the impersonality of e-commerce. By analyzing challenges to online brokerage services and evaluating key criteria for a viable intelligence system, we develop a decision tree based intelligent web user interfaces model. The resulting intelligent model is intended to help online shoppers avoid common mistakes by means of implicit reasoning, flexible knowledge granularity, and effective reasoning-by-exception, which is significantly different from the traditional approaches that largely rely on assistance from remote control knowledge engines. One of the key …