Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Management Information Systems (17)
- Physical Sciences and Mathematics (12)
- Computer Sciences (11)
- Databases and Information Systems (10)
- OS and Networks (8)
-
- Social and Behavioral Sciences (7)
- Economics (4)
- Management Sciences and Quantitative Methods (4)
- Technology and Innovation (4)
- Business Administration, Management, and Operations (3)
- Education (3)
- Engineering (3)
- Higher Education (3)
- Arts and Humanities (2)
- Computer Engineering (2)
- Labor Economics (2)
- Law (2)
- Public Affairs, Public Policy and Public Administration (2)
- Science and Technology Studies (2)
- Accounting (1)
- Administrative Law (1)
- Agriculture Law (1)
- Animal Sciences (1)
- Antitrust and Trade Regulation (1)
- Aquaculture and Fisheries (1)
- Artificial Intelligence and Robotics (1)
- Business Analytics (1)
- Business Intelligence (1)
- Business Law, Public Responsibility, and Ethics (1)
- Institution
-
- Selected Works (12)
- California State University, San Bernardino (4)
- University of Nebraska - Lincoln (4)
- Lindenwood University (2)
- Southern Methodist University (2)
-
- University of Texas at El Paso (2)
- Georgia Southern University (1)
- Institute of Business Administration (1)
- Kansas State University Libraries (1)
- Kennesaw State University (1)
- University of Colorado Law School (1)
- University of Pennsylvania Carey Law School (1)
- University of Windsor (1)
- W.E. Upjohn Institute for Employment Research (1)
- Publication Year
- Publication
-
- Herbert J. Mattord (10)
- Journal of International Information Management (3)
- Historical Working Papers (2)
- IPED Technical Reports (2)
- School of Computing: Faculty Publications (2)
-
- Theses (2)
- All Faculty Scholarship (1)
- Honors Theses (1)
- Innovations in Managing Western Water: New Approaches for Balancing Environmental, Social and Economic Outcomes (Martz Summer Conference, June 11-12) (1)
- Institute for Student Learning Assessment (1)
- International Conference on Information and Communication Technologies (1)
- Journal of International Technology and Information Management (1)
- Legacy ETDs (1)
- Library Philosophy and Practice (e-journal) (1)
- Odette School of Business Publications (1)
- Susan N. Houseman (1)
- The African Journal of Information Systems (1)
- Timothy J. Bartik (1)
- Upjohn Institute Working Papers (1)
- Publication Type
Articles 1 - 30 of 34
Full-Text Articles in Business
Society Dilemma Of Computer Technology Management In Today's World, Iwasan D. Kejawa Ed.D
Society Dilemma Of Computer Technology Management In Today's World, Iwasan D. Kejawa Ed.D
School of Computing: Faculty Publications
Abstract - Is it true that some of the inhabitants of the world’s today are still hesitant in using computers? Research has shown that today many people are still against the use of computers. Computer technology management can be said to be obliterated by security problems. Research shows that some people in society feel reluctant or afraid to use computers because of errors and exposure of their privacy and their sophistication, which sometimes are caused by computer hackers and malfunction of the computers. The dilemma of not utilizing computer technology at all or, to its utmost, by certain people in …
Regulating New Tech: Problems, Pathways, And People, Cary Coglianese
Regulating New Tech: Problems, Pathways, And People, Cary Coglianese
All Faculty Scholarship
New technologies bring with them many promises, but also a series of new problems. Even though these problems are new, they are not unlike the types of problems that regulators have long addressed in other contexts. The lessons from regulation in the past can thus guide regulatory efforts today. Regulators must focus on understanding the problems they seek to address and the causal pathways that lead to these problems. Then they must undertake efforts to shape the behavior of those in industry so that private sector managers focus on their technologies’ problems and take actions to interrupt the causal pathways. …
The Impact Of Ict Projects On Developing Economies: The Case Of People With Physical Disabilities In Nigeria, Abdulrashid Abubakar Iliya, Chidi Gerald Ononiwu, Muhammadou M.O Kah, Olumide Babatope Longe Prof
The Impact Of Ict Projects On Developing Economies: The Case Of People With Physical Disabilities In Nigeria, Abdulrashid Abubakar Iliya, Chidi Gerald Ononiwu, Muhammadou M.O Kah, Olumide Babatope Longe Prof
The African Journal of Information Systems
This study investigates the use of computers by People with Disabilities (PWDs) and whether it improves capability and human development in sub-Saharan Africa. Based on a case study’s findings and interviews with PWDs, we build on the Technology-Augment Capability Approach to show how computers as technical objects and caregivers as non-technical objects facilitate four key capabilities for PWDs, namely (1) Capability to education, (2) Capability to socio-economic activities, (3) Capability to social relations, (4) Informational capabilities and capability to employment. However, PWDs’ ability to convert the use of computers into capabilities is influenced by conversion factors, such as personal, social, …
A Strategic Audit Of Microsoft, Alexander Eitzman
A Strategic Audit Of Microsoft, Alexander Eitzman
Honors Theses
This paper provides an analysis of Microsoft’s current market placement and performance, based off external and internal factors, as well as tools such as SWOT analysis. The goal of this audit is to provide an understanding of Microsoft’s current positioning and strategy, as well as a look into possible paths going forward. Additionally, alternative strategies are discussed, and a recommendation is made to which Microsoft should pursue to continue its success. The recommendation reached is that Microsoft should focus on keeping numbers of active Windows users up, as well as pursue a subscription-based model for Windows updates and pricing. The …
Assessing The Use Of Information And Communication Technology In Teaching And Learning In Secondary Schools, De-Graft Johnson Dei
Assessing The Use Of Information And Communication Technology In Teaching And Learning In Secondary Schools, De-Graft Johnson Dei
Library Philosophy and Practice (e-journal)
Information and Communication Technology (ICT) has become a force that has changed many aspects of the way we live and every aspect of human endeavor such as education, medicine, business, law and engineering. Education is a socially oriented activity and quality education has traditionally been associated with teachers having high degrees of personal and face-to-face contact with students. But with the world moving rapidly into digital media and information, the role of ICT in education is becoming more and more important. However, indicators on technology uptake and use in education in the secondary schools in Ghana are missing and most …
Computer Science Technology Education: An Incredible Explosion, Iwasan D. Kejawa
Computer Science Technology Education: An Incredible Explosion, Iwasan D. Kejawa
School of Computing: Faculty Publications
This paper explore what computers are, their usages and their functionalities. Computers can be used to learn or comprehend the understanding of all subjects, be it physics aerobics, swimming, biology, mathematics, agriculture, chemistry, business administration or commerce, just to name a few. In education, computers are used to project information to individuals in the classrooms or anywhere education is taking place, in churches, homes, schools, conference halls and so on. It is also used to convey the logic of a subject or behind a topic. Computers play an important role in educating our mind. With the usage of computers, we …
K‐State Polytechnic Diversity Assignment & Project Showcase, William Genereux, Becky Lynn Degreeff
K‐State Polytechnic Diversity Assignment & Project Showcase, William Genereux, Becky Lynn Degreeff
Institute for Student Learning Assessment
On the K-State Polytechnic campus in Salina, KS, five faculty members have identified a project or assignment having a connection with human diversity in a course they teach. These projects and assignments were originally presented in a panel session at the 2013 American Society of Engineering Education (ASEE) – Midwest conference.
The panelists were the following faculty members:
Becky DeGreeff (Communication), Fred Guzek (Marketing & Business), Jung Oh (Chemistry), Greg Stephens (Business), and Bill Genereux (Computer Technology). The assignments presented included an activity in speech class that addresses racial and economic privilege, an international marketing exercise that follows a French …
Slides: Ag Water Sharing: Legal Challenges And Considerations, Peter D. Nichols
Slides: Ag Water Sharing: Legal Challenges And Considerations, Peter D. Nichols
Innovations in Managing Western Water: New Approaches for Balancing Environmental, Social and Economic Outcomes (Martz Summer Conference, June 11-12)
Presenter: Peter D. Nichols, Esq., Partner, Berg, Hill, Greenleaf and Ruscitti, Boulder, CO
25 slides
Measuring Manufacturing: How The Computer And Semiconductor Industries Affect The Numbers And Perceptions, Susan N. Houseman, Timothy J. Bartik, Timothy J. Sturgeon
Measuring Manufacturing: How The Computer And Semiconductor Industries Affect The Numbers And Perceptions, Susan N. Houseman, Timothy J. Bartik, Timothy J. Sturgeon
Susan N. Houseman
Growth in U.S. manufacturing’s real value-added has exceeded that of aggregate GDP, except during recessions, leading many to conclude that the sector is healthy and that the 30 percent decline in manufacturing employment since 2000 is largely the consequence of automation. The robust growth in real manufacturing GDP, however, is driven by one industry segment: computers and electronic products. In most of manufacturing, real GDP growth has been weak or negative and productivity growth modest. The extraordinary real GDP growth in computer-related industries reflects prices for computers and semiconductors that, when adjusted for product quality improvements, are falling rapidly. Productivity …
Measuring Manufacturing: How The Computer And Semiconductor Industries Affect The Numbers And Perceptions, Susan N. Houseman, Timothy J. Bartik, Timothy J. Sturgeon
Measuring Manufacturing: How The Computer And Semiconductor Industries Affect The Numbers And Perceptions, Susan N. Houseman, Timothy J. Bartik, Timothy J. Sturgeon
Timothy J. Bartik
Growth in U.S. manufacturing’s real value-added has exceeded that of aggregate GDP, except during recessions, leading many to conclude that the sector is healthy and that the 30 percent decline in manufacturing employment since 2000 is largely the consequence of automation. The robust growth in real manufacturing GDP, however, is driven by one industry segment: computers and electronic products. In most of manufacturing, real GDP growth has been weak or negative and productivity growth modest. The extraordinary real GDP growth in computer-related industries reflects prices for computers and semiconductors that, when adjusted for product quality improvements, are falling rapidly. Productivity …
Factors Influencing Students’ Attitudes To Computer Utilization In Tertiary Institutions: An Exploratory Study, Samuel A. Ejiaku
Factors Influencing Students’ Attitudes To Computer Utilization In Tertiary Institutions: An Exploratory Study, Samuel A. Ejiaku
Journal of International Technology and Information Management
Students today need to have computer knowledge and skills to enable them perform their task at school and their jobs. This presents a challenge to universities on how to provide computer education to their students. This challenge is even more critical for students in developing countries. Few studies have been done on attitude of students’ use of computers in a university environment using a well-grounded technology acceptance mode. The purpose of this study is to find the factors that influence student attitude in the acceptance and use of computers in tertiary institutions in emerging economies using the Theory of Planned …
Principles Of Incident Response And Disaster Recovery, Michael Whitman, Herbert Mattord
Principles Of Incident Response And Disaster Recovery, Michael Whitman, Herbert Mattord
Herbert J. Mattord
Are you ready to respond to an unauthorized intrusion to your computer network or server? Principles of Incident Response and Disaster Recovery presents methods to identify vulnerabilities and take appropriate countermeasures to prevent and mitigate failure risks for an organization. Not only does book present a foundation in disaster recovery principles and planning, but it also emphasizes the importance of incident response minimizing prolonged downtime that can potentially lead to irreparable loss. This book is the first of its kind to address the overall problem of contingency planning rather than focusing on specific tasks of incident response or disaster recovery.
Readings And Cases In Information Security: Law & Ethics, Michael Whitman, Herbert Mattord
Readings And Cases In Information Security: Law & Ethics, Michael Whitman, Herbert Mattord
Herbert J. Mattord
Readings and Cases in Information Security: Law & Ethics provides a depth of content and analytical viewpoint not found in many other books. Designed for use with any Cengage Learning security text or as a standalone professional reference, this book offers readers a real-life view of information security management, including the ethical and legal issues associated with various on-the-job experiences. Included are a wide selection of foundational readings and scenarios from a variety of experts to give the reader the most realistic perspective of a career in information security.
Management Of Information Security, 1st Edition, Michael Whitman, Herbert Mattord
Management Of Information Security, 1st Edition, Michael Whitman, Herbert Mattord
Herbert J. Mattord
Management of Information Security is designed for senior and graduate-level business and information systems students who want to learn the management aspects of information security. This text takes a "view from the top" and presents important information for future managers regarding information security. The material covered in this text is often part of a capstone course in an information security.
Management Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord
Management Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord
Herbert J. Mattord
Information security-driven topic coverage is the basis for this updated book that will benefit readers in the information technology and business fields alike. Management of Information Security, provides an overview of information security from a management perspective, as well as a thorough understanding of the administration of information security. Written by two Certified Information Systems Security Professionals (CISSP), this book has the added credibility of incorporating the CISSP Common Body of Knowledge (CBK), especially in the area of information security management. The second edition has been updated to maintain the industry currency and academic relevance that made the previous edition …
Guide To Firewalls And Network Security: Intrusion Detection And Vpns, 2nd Edition, Michael Whitman, Herbert Mattord, Richard Austin, Greg Holden
Guide To Firewalls And Network Security: Intrusion Detection And Vpns, 2nd Edition, Michael Whitman, Herbert Mattord, Richard Austin, Greg Holden
Herbert J. Mattord
Firewalls are among the best-known security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when they are backed by effective security planning, a well-designed security policy, and when they work in concert with anti-virus software, intrusion detection systems, and other tools. This book aims to explore firewalls in the context of these other elements, providing readers with a solid, in-depth introduction to firewalls that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file …
Principles Of Information Security, 3rd Edition, Michael Whitman, Herbert Mattord
Principles Of Information Security, 3rd Edition, Michael Whitman, Herbert Mattord
Herbert J. Mattord
Explore the field of information security and assurance with this valuable resource that focuses on both the managerial and technical aspects of the discipline. Principles of Information Security, Third Edition builds on internationally recognized standards and bodies of knowledge to provide the knowledge and skills that information systems students need for their future roles as business decision-makers. Coverage includes key knowledge areas of the CISSP (Certified Information Systems Security Professional), as well as risk management, cryptography, physical security, and more. The third edition has retained the real-world examples and scenarios that made previous editions so successful, but has updated the …
Management Of Information Security, 3rd Edition, Michael Whitman, Herbert Mattord
Management Of Information Security, 3rd Edition, Michael Whitman, Herbert Mattord
Herbert J. Mattord
Management of Information Security, Third Edition focuses on the managerial aspects of information security and assurance. Topics covered include access control models, information security governance, and information security program assessment and metrics. Coverage on the foundational and technical components of information security is included to reinforce key concepts. This new edition includes up-to-date information on changes in the field such as revised sections on national and international laws and international standards like the ISO 27000 series. With these updates, Management of Information Security continues to offer a unique overview of information security from a management perspective while maintaining a finger …
Principles Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord
Principles Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord
Herbert J. Mattord
Principles of Information Security examines the field of information security to prepare information systems students for their future roles as business decision-makers. This textbook presents a balance of the managerial and the technical aspects of the discipline and addresses knowledge areas of the CISSP (Certified Information Systems Security Professional) certification throughout. The authors discuss information security within a real-world context, by including examples of issues faced by today's professionals and by including tools, such as an opening vignette and "Offline" boxes with interesting sidebar stories in each chapter. Principles of Information Security also offers extensive opportunities for hands-on work.
Roadmap To Information Security: For It And Infosec Managers, Michael Whitman, Herbert Mattord
Roadmap To Information Security: For It And Infosec Managers, Michael Whitman, Herbert Mattord
Herbert J. Mattord
Roadmap to Information Security: For IT and Infosec Managers provides a solid overview of information security and its relationship to the information needs of an organization. Content is tailored to the unique needs of information systems professionals who find themselves brought in to the intricacies of information security responsibilities. The book is written for a wide variety of audiences looking to step up to emerging security challenges, ranging from students to experienced professionals. This book is designed to guide the information technology manager in dealing with the challenges associated with the security aspects of their role, providing concise guidance on …
Principles Of Information Security, 4th Edition, Michael Whitman, Herbert Mattord
Principles Of Information Security, 4th Edition, Michael Whitman, Herbert Mattord
Herbert J. Mattord
The fourth edition of Principles of Information Security explores the field of information security and assurance with updated content including new innovations in technology and methodologies. Students will revel in the comprehensive coverage that includes a historical overview of information security, discussions on risk management and security technology, current certification information, and more. The text builds on internationally-recognized standards and bodies of knowledge to provide the knowledge and skills students need for their future roles as business decision-makers. Information security in the modern organization is a management issue which technology alone cannot answer; it is a problem that has important …
Measuring Manufacturing: How The Computer And Semiconductor Industries Affect The Numbers And Perceptions, Susan N. Houseman, Timothy J. Bartik, Timothy Sturgeon
Measuring Manufacturing: How The Computer And Semiconductor Industries Affect The Numbers And Perceptions, Susan N. Houseman, Timothy J. Bartik, Timothy Sturgeon
Upjohn Institute Working Papers
Growth in U.S. manufacturing’s real value-added has exceeded that of aggregate GDP, except during recessions, leading many to conclude that the sector is healthy and that the 30 percent decline in manufacturing employment since 2000 is largely the consequence of automation. The robust growth in real manufacturing GDP, however, is driven by one industry segment: computers and electronic products. In most of manufacturing, real GDP growth has been weak or negative and productivity growth modest. The extraordinary real GDP growth in computer-related industries reflects prices for computers and semiconductors that, when adjusted for product quality improvements, are falling rapidly. Productivity …
Bounding The Inefficiency Of Logit-Based Stochastic User Equilibrium, Xiaolei Guo, Hai Yang, Tian-Liang Liu
Bounding The Inefficiency Of Logit-Based Stochastic User Equilibrium, Xiaolei Guo, Hai Yang, Tian-Liang Liu
Odette School of Business Publications
Bounding the inefficiency of selfish routing has become an emerging research subject. A central result obtained in the literature is that the inefficiency of deterministic User Equilibrium (UE) is bounded and the bound is independent of network topology. This paper makes a contribution to the literature by bounding the inefficiency of the logit-based Stochastic User Equilibrium (SUE). In a stochastic environment there are two different definitions of system optimization: one is the traditional System Optimum (SO) which minimizes the total actual system travel time, and the other is the Stochastic System Optimum (SSO) which minimizes the total perceived travel time …
Application Of Ict Iii: Use Of Information And Mobile Computing Technologies In Healthcare Facilities Of Saudi Arabia, Abdul Ahad Siddiqi, Munir Ahmed, Yasser M. Alginahi, Abdulrahman Alharby
Application Of Ict Iii: Use Of Information And Mobile Computing Technologies In Healthcare Facilities Of Saudi Arabia, Abdul Ahad Siddiqi, Munir Ahmed, Yasser M. Alginahi, Abdulrahman Alharby
International Conference on Information and Communication Technologies
Information technology forms an important part of the healthcare solution. Accurate and up-to-date information is essential to continuous quality improvement in any organization, and particularly so in an area as complex as healthcare. Therefore, diverse information systems must be integrated across the healthcare enterprise. The knowledge base in the medical field is large, complex, and growing rapidly. It includes scientific knowledge, as well as familiarity with the day-to-day business of providing healthcare. It is crucial to identify the processes in the healthcare sector that would most benefit from the support of information technology. This study is focused on the analysis …
El Paso's Digital Divide: A Multivariate Analysis Of Computer Ownership And Internet Access From Home In El Paso County, Mathew Mcelroy, Dennis L. Soden
El Paso's Digital Divide: A Multivariate Analysis Of Computer Ownership And Internet Access From Home In El Paso County, Mathew Mcelroy, Dennis L. Soden
IPED Technical Reports
No abstract provided.
Survey Of Technology Use In El Paso County, Mathew Mcelroy, Dennis L. Soden
Survey Of Technology Use In El Paso County, Mathew Mcelroy, Dennis L. Soden
IPED Technical Reports
No abstract provided.
Windows95: Is It The Bargain It Was Supposed To Be?, Conrad Shayo
Windows95: Is It The Bargain It Was Supposed To Be?, Conrad Shayo
Journal of International Information Management
Whereas a critical mass of computer users has migrated to Windows95, some are still using Windows 3.1 and DOS. There is concern that the benefits of installing Windows95 may not outweigh the costs.
Development Of Effective Computer Tutorial Documentation, Sheryl L. Fields
Development Of Effective Computer Tutorial Documentation, Sheryl L. Fields
Theses
This thesis will focus on the study of developing effective tutorial documentation.
In the past, computer documentation was written almost exclusively by engineers and programmers (or other highly trained personnel). Because of this, it was referential rather than tutorial, and it tended to assume the audience had a high level of technical knowledge and expertise. People using computers today come from a wide variety of backgrounds, many of them not technical. These users need tutorial manuals that are written in every day language and that emphasize what the user does, not what the machine or the program does.
The instructions …
Computers And Schools, Larry Arnoldsen
Computers And Schools, Larry Arnoldsen
Journal of International Information Management
In an elementary school in a small Idaho town in 1969 a ten-year-old boy suggested the use of a computer to answer a difficult historical question: What was the major cause of the American Civil War?
Personal Computers And Powerful Preseritations, J. Douglas Gibb
Personal Computers And Powerful Preseritations, J. Douglas Gibb
Journal of International Information Management
Some of the best public speakers use personal computers to prepare their talks. They keep a file of speaking materials: quotations, examples, statistics, stories, poems, visual aids, and structured experiences. These items which they keep ori a disk become nuggets of thought and are like money in the bank—always ready when theiy need them. Speaking is not communicating unless some of these materials are used.