Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Information Security

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 271 - 283 of 283

Full-Text Articles in Management Information Systems

Dod Cyber Technology Policies To Secure Automated Information Systems, Maurice E. Dawson Jr., Miguel Crespo, Stephen Brewster Dec 2012

Dod Cyber Technology Policies To Secure Automated Information Systems, Maurice E. Dawson Jr., Miguel Crespo, Stephen Brewster

Maurice Dawson

Availability, integrity, and confidentiality (AIC) is a key theme everywhere as cyber security has become more than an emerging topic. The Department of Defense (DoD) has implemented multiple processes such as the Department of Defense information assurance certification and accreditation process (DIACAP), common criteria (CC), and created proven baselines to include information assurance (IA) controls to protect information system (IS) resources. The aim of this research study shall provide insight to the applicable processes, IA controls, and standards to include providing a method for selecting necessary government models and for system development.


Corporate Security: Using Knowledge Construction To Define A Practising Body Of Knowledge, David Brooks Jan 2012

Corporate Security: Using Knowledge Construction To Define A Practising Body Of Knowledge, David Brooks

Research outputs 2012

Security is a multidimensional concept, with many meanings, practising domains, and heterogeneous occupations. Therefore, it is difficult to define security as a singular concept, although understanding may be achieved by its applied context in presenting a domicile body of knowledge. There have been studies that have presented a number of corporate security bodies of knowledge; however, there is still restricted consensus. From these past body of knowledge studies, and supported by multidimensional scaling knowledge mapping, a body of knowledge framework is put forward, integrating core and allied knowledge categories. The core knowledge categories include practise areas such as risk management, …


Cyber Security And Mobile Threats: The Need For Antivirus Applications For Smart Phones, Jorja Wright, Maurice E. Dawson Jr., Marwan Omar Dec 2011

Cyber Security And Mobile Threats: The Need For Antivirus Applications For Smart Phones, Jorja Wright, Maurice E. Dawson Jr., Marwan Omar

Maurice Dawson

Smartphones are becoming a vehicle to provide an efficient and convenient way toaccess, find and share information; however, the availability of this information hascaused an increase in cyber attacks. Currently, cyber threats range from Trojans andviruses to botnets and toolkits. Presently, 96% of smartphones do not have pre-installedsecurity software. This lack in security is an opportunity for malicious cyber attackers to hackinto the various devices that are popular (i.e. Android, iPhone and Blackberry). Traditionalsecurity software found in personal computers (PCs), such as firewalls, antivirus, andencryption, is not currently available in smartphones. Moreover, smartphones are even morevulnerable than personal computers because …


Information Risk And Underwriter Switching In Seos: Evidence From China, Wei Luo, Pingui Rao, Heng Yue Jun 2010

Information Risk And Underwriter Switching In Seos: Evidence From China, Wei Luo, Pingui Rao, Heng Yue

Research Collection School Of Accountancy

In this paper we examine whether information risk affects underwriter switching in a seasoned equity offering (SEO) process. Building on previous research, we hypothesize that SEO firms and underwriters associate with one another by mutual choice, and firms with a low degree of information risk tend to match up with prestigious underwriters. Using a sample of SEO firms in China and employing accruals quality as a proxy of information risk, we find evidence consistent with our hypothesis: the information risk and the initial public offering (IPO) underwriters’ reputation at the time of the SEO jointly determine the probability that the …


An Information-Sharing Based Anti-Phishing System, Yueqing Cheng, Zhen Yuan, Lei Ma, Robert H. Deng Nov 2007

An Information-Sharing Based Anti-Phishing System, Yueqing Cheng, Zhen Yuan, Lei Ma, Robert H. Deng

Research Collection School Of Computing and Information Systems

This paper presents the design of an informationsharing based or server-assisted anti-phishing system. The system follows a client-server architecture and makes decision based on not only client side heuristics but also collective information from multiple clients. When visiting a web site, a client side proxy, installed as a plug-in to a browser, decides on the legitimacy of the web site based on a combination of white list, black list and heuristics. In case the client side proxy does not have sufficient information to make a clear judgment, it reports the suspicious site to a central server which has access to …


Control Of The Electronic Management Of Information, A. Boone, R. Szatmary Jr. Apr 2007

Control Of The Electronic Management Of Information, A. Boone, R. Szatmary Jr.

Publications (YM)

This procedure establishes the responsibilities and provides direction for developing and evaluating the adequacy of process controls on specific uses of electronically stored information. These uses include, but are not limited to, information used in design input, developed as design output, or developed as input to or output from scientific investigation or performance assessment modeling and analysis. This pertains to information that resides in an electronic information management system or on electronic media.


Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara May 2006

Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara

Qing Hu

With billions of dollars being spent on information security related products and services each year, the economics of information security investment has become an important area of research, with significant implications for management practices. Drawing on recent studies that examine optimal security investment levels under various attack scenarios, we propose an economic model that considers simultaneous attacks from multiple external agents with distinct characteristics, and derive optimal investments based on the principle of benefit maximization. The relationships among the major variables, such as systems vulnerability, security breach probability, potential loss of security breach, and security investment levels, are investigated via …


Factors Impacting Key Management Effectiveness In Secured Wireless Networks, Yongjoo Shin Mar 2006

Factors Impacting Key Management Effectiveness In Secured Wireless Networks, Yongjoo Shin

Theses and Dissertations

The use of a Public Key Infrastructure (PKI) offers a cryptographic solution that can overcome many, but not all, of the MANET security problems. One of the most critical aspects of a PKI system is how well it implements Key Management. Key Management deals with key generation, key storage, key distribution, key updating, key revocation, and certificate service in accordance with security policies over the lifecycle of the cryptography. The approach supported by traditional PKI works well in fixed wired networks, but it may not appropriate for MANET due to the lack of fixed infrastructure to support the PKI. This …


Biometric Security: Are Inexpensive Biometric Devices Reliable Enough To Gain Wide-Spread Security Usage?, Brian Thanh Tran Jan 2006

Biometric Security: Are Inexpensive Biometric Devices Reliable Enough To Gain Wide-Spread Security Usage?, Brian Thanh Tran

Inquiry: The University of Arkansas Undergraduate Research Journal

The ever growing need for security in today' s world requires exploring the feasibility of various security methods to ensure the safety of the world's population. With the tremendous growth of technology, e-commerce, and business globalization, society implements new methods to try to battle security problems. Technology advances has resulted in a number of inexpensive biometric devices to the marketplace. Two questions surface regarding this devices-are they reliable enough for general usage and will people be willing to use them? This research conducted a repeated design experiment to determine the effectiveness of four inexpensive biometric devices-three fingerprint readers and an …


Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara Dec 2005

Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara

Qing Hu

With billions of dollars being spent on information security related products and services each year, the economics of information security investment has become an important area of research, with significant implications for management practices. Drawing on recent studies that examine optimal security investment levels under various attack scenarios, we propose an economic model that considers simultaneous attacks from multiple external agents with distinct characteristics, and derive optimal investments based on the principle of benefit maximization. The relationships among the major variables, such as systems vulnerability, security breach probability, potential loss of security breach, and security investment levels, are investigated via …


Using Prospect Theory To Investigate Decision-Making Bias Within An Information Security Context, Neil J. Schroeder Dec 2005

Using Prospect Theory To Investigate Decision-Making Bias Within An Information Security Context, Neil J. Schroeder

Theses and Dissertations

Information security is an issue that has increased in importance over the past decade. In this time both practitioner and academic circles have researched and developed practices and process to more effectively handle information security. Even with growth in these areas there has been little research conducted into how decision makers actually behave. This is problematic because decision makers in the Department of Defense have been observed exhibiting risk seeking behavior when making information security decisions that seemingly violate accepted norms. There are presently no models in the literature that provide sufficient insight into this phenomenon. This study used Prospect …


The Centrality Of Awareness In The Formation Of User Behavioral Intention Toward Preventive Technologies In The Context Of Voluntary Use, Tamara Dinev, Qing Hu Nov 2005

The Centrality Of Awareness In The Formation Of User Behavioral Intention Toward Preventive Technologies In The Context Of Voluntary Use, Tamara Dinev, Qing Hu

Qing Hu

Little is known about user behavior toward what we call preventive computer technologies that have become increasingly important in the networked economy and society to secure data and systems from viruses, unauthorized access, disruptions, spyware, and similar harmful technologies. We present the results of a study of user behavior toward preventive technologies based on the frameworks of theory of planned behavior in the context of anti-spyware technologies. We find that the user awareness of the issues and threats from harmful technologies is a strong predictor of user behavioral intention toward the use of preventive technologies. In the presence of awareness, …


Technology Competition And Optimal Investment Timing: A Real Options Perspective, Robert J. Kauffman, X. Li Jan 2005

Technology Competition And Optimal Investment Timing: A Real Options Perspective, Robert J. Kauffman, X. Li

Research Collection School Of Computing and Information Systems

Companies often choose to defer irreversible investments to maintain valuable managerial flexibility in an uncertain world. For some technology-intensive projects, technology uncertainty plays a dominant role in affecting investment timing. This article analyzes the investment timing strategy for a firm that is deciding about whether to adopt one or the other of two incompatible and competing technologies.We develop a continuous-time stochastic model that aids in the determination of optimal timing for managerial adoption within the framework of real options theory. The model captures the elements of the decision-making process in such a way so as to provide managerial guidance in …