Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California State University, San Bernardino (21)
- Kennesaw State University (10)
- Embry-Riddle Aeronautical University (3)
- Gettysburg College (3)
- Vocational Training Council (3)
-
- Brigham Young University (2)
- Walden University (2)
- Colby College (1)
- Edith Cowan University (1)
- Fordham Law School (1)
- Illinois State University (1)
- Maurer School of Law: Indiana University (1)
- Murray State University (1)
- Pepperdine University (1)
- The University of Notre Dame Australia (1)
- Western Michigan University (1)
- Keyword
-
- Technology (7)
- Innovation (4)
- Privacy (3)
- Africa (2)
- America Invents Act (2)
-
- Communication (2)
- Design (2)
- Editorial (2)
- Nigeria (2)
- Policy (2)
- Security (2)
- Social media (2)
- Training (2)
- 9/11 (1)
- A Model for Disclosure (1)
- AI (1)
- AIA (1)
- Adoption (1)
- Advanced tooling technology (1)
- Airbus 300 (1)
- Aircraft accident propensity (1)
- Airline (1)
- Airline business (1)
- Airline safety (1)
- Al Qaeda (1)
- Analysis (1)
- And skills development. (1)
- Apple iPad (1)
- Apps (1)
- Attitude (1)
- Publication
-
- Journal of International Technology and Information Management (21)
- Journal of Cybersecurity Education, Research and Practice (9)
- Gettysburg Economic Review (3)
- SIGNED: The Magazine of The Hong Kong Design Institute (3)
- International Journal of Applied Management and Technology (2)
-
- International Journal of Aviation, Aeronautics, and Aerospace (2)
- Marriott Student Review (2)
- Australian Journal of Teacher Education (1)
- Colby Magazine (1)
- Fordham Journal of Corporate & Financial Law (1)
- Indiana Law Journal (1)
- International Journal for Business Education (1)
- International Journal of African Development (1)
- Journal of Aviation/Aerospace Education & Research (1)
- Steeplechase: An ORCA Student Journal (1)
- The African Journal of Information Systems (1)
- The Journal of Entrepreneurial Finance (1)
- eJournal of Catholic Education in Australasia (1)
Articles 1 - 30 of 53
Full-Text Articles in Business
Social Media Risk Perceptions Of Human Resource Professionals: Issues Undergraduate Students Should Consider, Julio C. Rivera, Jack Howard, Samuel Goh, James L. Worrell, Paul Di Gangi
Social Media Risk Perceptions Of Human Resource Professionals: Issues Undergraduate Students Should Consider, Julio C. Rivera, Jack Howard, Samuel Goh, James L. Worrell, Paul Di Gangi
Journal of Cybersecurity Education, Research and Practice
This study contrasts the social media risk perceptions of undergraduate students, versus those of certified Human Resource professionals. Social media is widely used by most segments of the population, and particularly among the age group that includes most undergraduate students. Organizations hiring employees are increasingly examining job applicant's social media postings as part of the applicant screening process. In this study we examine how these groups differ in their perceptions of the risks inherent in using social media, and what these differences may mean for students seeking employment. Recommendations are made for raising undergraduate student awareness of these risks.
A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland
A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland
Journal of Cybersecurity Education, Research and Practice
In today’s business environment where all operations are enabled by technology, information security has become an established discipline as more and more businesses realize its value. The human component has been recognized to have an important role in information security since the only way to reduce security risks is through making employees more information security aware. Towards this goal the research will appreciate the importance of information security awareness by illustrating the need for more effective user training. Further to that it proposes and develops an information security toolkit as a prototype awareness raising initiative. Apart from the elements of …
A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard K. Nilsen, Yair Levy, Steven R. Terrell Ph.D., Dawn Beyer
A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard K. Nilsen, Yair Levy, Steven R. Terrell Ph.D., Dawn Beyer
Journal of Cybersecurity Education, Research and Practice
Organizational information system users (OISUs) that are open to cyber threats vectors are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, technical cybersecurity controls may be rendered useless due to a lack of cybersecurity competency of OISUs. The main goal of this research study was to propose and validate, using subject matter experts (SMEs), a reliable hands-on assessment prototype tool for measuring the knowledge, skills, and abilities (KSAs) that comprise the cybersecurity competency of an OISU. Primarily using the Delphi methodology, this study implemented four phases of data collection using cybersecurity SMEs for proposing and …
Synergistic Security: A Work System Case Study Of The Target Breach, Martha Nanette Harrell
Synergistic Security: A Work System Case Study Of The Target Breach, Martha Nanette Harrell
Journal of Cybersecurity Education, Research and Practice
Recent publicized security breaches can be used to evaluate information security programs. The processes and procedures that allowed the event to occur can be examined in a case study and then be used to find methods for future mitigation of risk. The Target security breach is used in this study to examine the organization’s information security program using a macro-ergonomic model. This research posits that an information security program should consider the work system design, based in macro-ergonomics, to help mitigate information security risk to the organization and ensure an efficient and effective information security program. Based on a seminal …
From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth
From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth
Journal of Cybersecurity Education, Research and Practice
No abstract provided.
A Framework Towards Technology Creation In Africa: Focusing On Ghana, Martin Yao Donani, Hannatu Abue Kugblenu, Azindow Bawa Fuseini
A Framework Towards Technology Creation In Africa: Focusing On Ghana, Martin Yao Donani, Hannatu Abue Kugblenu, Azindow Bawa Fuseini
International Journal of African Development
Underdevelopment in Africa has been historical and a global concern coupled with the quest for good governance. Several efforts have been made in academia, national governments, the international community, and other institutional arrangements to reverse the trend. These efforts however are yet to produce a lasting result as Africa is still characterized by low productivity output, poverty and a widening technology gap when compared to other developing regions of the world. Conventional approaches used to address the African problem have consistently been devoid of indigenous technology development. Technology is here seen as paramount to every form of production on which …
Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr
Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr
Journal of International Technology and Information Management
The discovery of useful or worthwhile process models must be performed with due regards to the transformation that needs to be achieved. The blend of the data representations (i.e data mining) and process modelling methods, often allied to the field of Process Mining (PM), has proven to be effective in the process analysis of the event logs readily available in many organisations information systems. Moreover, the Process Discovery has been lately seen as the most important and most visible intellectual challenge related to the process mining. The method involves automatic construction of process models from event logs about any domain …
An Integrative Model Of Managing Software Security During Information Systems Development, Vijay Raghavan, Xiaoni Zhang
An Integrative Model Of Managing Software Security During Information Systems Development, Vijay Raghavan, Xiaoni Zhang
Journal of International Technology and Information Management
This study investigates the critical relationship between organizational system development policies, procedures and processes and the resulting security quality of the systems developed. We draw from a general software quality model to provide a theoretical foundation for testing this relationship. We used paper-based survey as well as online surveys to collect data from software developers and project managers. Our results revealed a significant relationship between management support and security policies and development process control. We also found significant relationships between development-process control and security quality, attitude and security quality, and the interaction between value congruence and commitment to provide security …
Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele
Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele
Journal of International Technology and Information Management
This paper provides an overview of the current state of privacy and data protection policies and regulations in Nigeria. The paper contends that the extant legal regime in Nigeria is patently inadequate to effectively protect individuals against abuse resulting from the processing of their personal data. The view is based on the critical analysis of the current legal regime in Nigeria vis-à-vis the review of some vital data privacy issues. The paper makes some recommendations for the reform of the law.
Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar
Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar
Journal of International Technology and Information Management
mHealth (Mobile Health) applications (apps) have transformed the doctor-patient relationship. They help users with varied functionalities such as monitoring their health, understanding specific health conditions, consulting doctors online and achieving fitness goals. Whilst these apps provide an option of equitable and convenient access to healthcare, a lot of personal and sensitive data about users is collected, stored and shared to achieve these functionalities. Little is known about the privacy and security concerns these apps address. Based on literature review, this paper identifies the privacy risks and security features for evaluating thirty apps in the Medical category across two app distribution …
Developing A Digital Contents Valuing Model: How Users Appreciate Their Values, Changsu Kim, Jongheon Kim
Developing A Digital Contents Valuing Model: How Users Appreciate Their Values, Changsu Kim, Jongheon Kim
Journal of International Technology and Information Management
The principal objective of this paper was to propose and verify a digital content valuing model, which is expected to perform a significant role in future research, and provide novel and practical implications. For the efficacy of a model for the evaluation of digital content value, this study reviewed digital content value and categorized it into intrinsic, interaction, and business value. Based on the research model, we attempted to identify and assess the effects of intrinsic digital content value on digital content interaction value, and to characterize the relationship between digital content interaction value and digital content business value. Consequently, …
Table Of Contents Jitim Vol 26 Issue 4, 2017
Table Of Contents Jitim Vol 26 Issue 4, 2017
Journal of International Technology and Information Management
Table of Contents
Electronic Flight Bag Policies At Collegiate Aviation Programs, Tyler A. Babb
Electronic Flight Bag Policies At Collegiate Aviation Programs, Tyler A. Babb
International Journal of Aviation, Aeronautics, and Aerospace
Electronic Flight Bags (EFBs) are now standard in the commercial aviation industry. Air carriers must implement and maintain EFB training and policies according to FAA regulations. Pilots are also using EFBs at collegiate aviation programs.This study investigated EFB practices at collegiate aviation programs, and how well these practices complied with FAA recommendations. Specifically, the research investigated whether or not the presence of an official EFB policy at a flight program had any relation to the quality of the EFB program. Results indicated that most programs somewhat conform to FAA policies, and in some cases, programs without policies had more effective …
Understanding The Determinants Affecting The Continuance Intention To Use Cloud Computing, Shailja Tripathi Dr.
Understanding The Determinants Affecting The Continuance Intention To Use Cloud Computing, Shailja Tripathi Dr.
Journal of International Technology and Information Management
Cloud computing has been progressively implemented in the organizations. The purpose of the paper is to understand the fundamental factors influencing the senior manager’s continuance intention to use cloud computing in organizations. A conceptual framework was developed by using the Technology Acceptance Model (TAM) as a base theoretical model. A questionnaire was used to collect the data from several companies in IT, manufacturing, finance, pharmaceutical and retail sectors in India. The data analysis was done using structural equation modeling technique. Perceived usefulness and perceived ubiquity are identified as important factors that affect continuance intention to use cloud computing. In addition, …
Developing Ict Skills Of Stem Teachers In Mexico: The Key Role Of The Tutorial Function, Alexander N. Chen, David Mccalman, Mark E. Mcmurtrey, J. Gabriel Domínguez Castillo, Víctor Manuel Cab Pech
Developing Ict Skills Of Stem Teachers In Mexico: The Key Role Of The Tutorial Function, Alexander N. Chen, David Mccalman, Mark E. Mcmurtrey, J. Gabriel Domínguez Castillo, Víctor Manuel Cab Pech
Journal of International Technology and Information Management
It is well documented in distance education literature that one of the factors that are considered essential to the success of an online course is the tutorial function. The role of counselor consists of assisting and encouraging students, building learning activities, and developing support strategies for the use of technology. The tutor thus was assessed as one element of great importance in on-line education, and, to some, an essential feature of this mode. In this paper, the importance of the tutorial function and its effect on the development of skills for using information and communication technology (ICT) in science, technology, …
Table Of Contents Jitim Vol 26 Issue 3, 2017
Table Of Contents Jitim Vol 26 Issue 3, 2017
Journal of International Technology and Information Management
Table of Contents
Five Cities Where 'Tesign' Is Creating Happiness
Five Cities Where 'Tesign' Is Creating Happiness
SIGNED: The Magazine of The Hong Kong Design Institute
Around the world, cities are implementing policies that create happiness through the application of good "tesign"
Happiness: A 'Tesign' For Life
Happiness: A 'Tesign' For Life
SIGNED: The Magazine of The Hong Kong Design Institute
Happiness can be hard to come by. Since Aristotle walked the streets of ancient Athens preaching the good life, the search for happiness has fed the imagination and driven innovation. Can our contemporary world of high-tech connectivity provide the satisfaction we have always sought? "Tesign" -- the combination of technology and design -- is here to help.
Market Analysis, Management Consulting, And Miscommunication, Brian W. Stout
Market Analysis, Management Consulting, And Miscommunication, Brian W. Stout
Marriott Student Review
This article attempts to inform the audience of the importance of market analysis in management consulting. The article states that consulting firms can utilize the power of market analysis as they commit to understand technology, collaborate with researchers to conduct action research, and align market strategies within the consulting firm. This article concludes that by doing these steps consulting firms will lead in their market.
From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord
From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord
Journal of Cybersecurity Education, Research and Practice
Welcome to the third issue of the Journal of Cybersecurity Education, Research and Practice (JCERP).
How Much Should We Teach The Enigma Machine?, Jeffrey A. Livermore
How Much Should We Teach The Enigma Machine?, Jeffrey A. Livermore
Journal of Cybersecurity Education, Research and Practice
Developing courses and programs in Information Assurance can feel like trying to force ten pounds of flour into a five pound sack. We want to pack more into our courses than we have time to teach. As new technologies develop, we often find it necessary to drop old technologies out of the curriculum and our students miss out on the historical impacts the old technologies had. The discipline is so broad and deep that we have to carefully choose what concepts and technologies we study in depth, what we mention in passing, and what we leave out. Leaving out important …
Pedagogical Resources For Industrial Control Systems Security: Design, Implementation, Conveyance, And Evaluation, Guillermo A. Francia Iii, Greg Randall, Jay Snellen
Pedagogical Resources For Industrial Control Systems Security: Design, Implementation, Conveyance, And Evaluation, Guillermo A. Francia Iii, Greg Randall, Jay Snellen
Journal of Cybersecurity Education, Research and Practice
Industrial Control Systems (ICS), which are pervasive in our nation’s critical infrastructures, are becoming increasingly at risk and vulnerable to internal and external threats. It is imperative that the future workforce be educated and trained on the security of such systems. However, it is equally important that careful and deliberate considerations must be exercised in designing and implementing the educational and training activities that pertain to ICS. To that end, we designed and implemented pedagogical materials and tools to facilitate the teaching and learning processes in the area of ICS security. In this paper, we describe those resources, the professional …
Cyber Security For Everyone: An Introductory Course For Non-Technical Majors, Marc J. Dupuis
Cyber Security For Everyone: An Introductory Course For Non-Technical Majors, Marc J. Dupuis
Journal of Cybersecurity Education, Research and Practice
In this paper, we describe the need for and development of an introductory cyber security course. The course was designed for non-technical majors with the goal of increasing cyber security hygiene for an important segment of the population—college undergraduates. While the need for degree programs that focus on educating and training individuals for occupations in the ever-growing cyber security field is critically important, the need for improved cyber security hygiene from the average everyday person is of equal importance. This paper discusses the approach used, curriculum developed, results from two runs of the course, and frames the overall structure of …
Game Changers, Leece Sharon
Game Changers, Leece Sharon
SIGNED: The Magazine of The Hong Kong Design Institute
What does it take for an innovative design to become an influential one? We take a look at how and why some designs have the power to shape culture and reality and, in so doing, become defining points of our time.
Table Of Contents Jitim Vol 26 Issue 2, 2017
Table Of Contents Jitim Vol 26 Issue 2, 2017
Journal of International Technology and Information Management
Table of Contents JITIM vol 26 issue 2, 2017
Comparative Analysis Of Big Data Analytics Software In Assessing Sample Data, Soly Mathew Biju, Alex Mathew
Comparative Analysis Of Big Data Analytics Software In Assessing Sample Data, Soly Mathew Biju, Alex Mathew
Journal of International Technology and Information Management
Over the last few years, big data has emerged as an important topic of discussion in most firms owing to its ability of creation, storage and processing of content at a reasonable price. Big data consists of advanced tools and techniques to process large volumes of data in organisations. Investment in big data analytics has almost become a necessity in large-sized firms, particularly multinational companies, for its unique benefits, particularly in prediction and identification of various trends. Some of the most popular big data analytics software used today are MapReduce, Hive, Tableau and Hive, while the framework Hadoop enables easy …
Collegiate Media Literacy On The Muslim Community, Tori Wood, Victoria Lanaghan, Abeer Anwaar, Rochele Rosa
Collegiate Media Literacy On The Muslim Community, Tori Wood, Victoria Lanaghan, Abeer Anwaar, Rochele Rosa
Steeplechase: An ORCA Student Journal
A research report measuring the media perception of the average college student in the context of the muslim community and religion. By using a media clip from CNN and distributing a survey on the prior and post watching viewpoints, the perceptions of the muslim community and religion by a college student were analyzed. This report evaluates the accuracy of the media's portrayal of the muslim community and college student's media literacy on the topic in America. Results depict that college students have a deeper understanding of the muslim community that goes beyond the American media portrayal. The report concludes that …
Byu Tech Club: At The Base Of Silicon Slopes, William R. Adams
Byu Tech Club: At The Base Of Silicon Slopes, William R. Adams
Marriott Student Review
As technology continues to drive Utah's economic growth, Brigham Young University students have launchd the BYU Tech Club to inform their peers with technical and non-technical degrees of career opportunities in technology, build the skills and knowledge to be attractive job candidates, and earn internship and full-time offers from high-grow startups and leading technology companies.
Trust: A Model For Disclosure In Patent Law, Ari Ezra Waldman
Trust: A Model For Disclosure In Patent Law, Ari Ezra Waldman
Indiana Law Journal
How to draw the line between public and private is a foundational, first-principles question of privacy law, but the answer has implications for intellectual property, as well. This project is one in a series of papers about first-person disclosures of information in the privacy and intellectual property law contexts, and it defines the boundary between public and nonpublic information through the lens of social science —namely, principles of trust.
Patent law’s public use bar confronts the question of whether legal protection should extend to information previously disclosed to a small group of people. I present evidence that shows that current …
2017 Ijbe Front Matter, Tamra Connor
2017 Ijbe Front Matter, Tamra Connor
International Journal for Business Education
- Editorial Board
- President's Letter
- SIEC-ISBE International