Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Developing countries (3)
- Cybersecurity (2)
- Cybersecurity education (2)
- Information technology (2)
- South Africa (2)
-
- Sub-Saharan Africa (2)
- Academic writing (1)
- African psychology (1)
- Artificial intelligence (1)
- Belonging (1)
- Business (1)
- Business management (1)
- Business-IT Alignment (1)
- Center for Academic Excellence (CAE) (1)
- Community (1)
- Community Needs (1)
- Computer crimes (1)
- Connectedness (1)
- Consumer attitudes (1)
- Covid-19 (1)
- Criminal justice (1)
- Critical ethnography (1)
- Cyber intelligence (1)
- Cyber threat (1)
- Cybersecurity attitude (1)
- Cybersecurity threat (1)
- Cybersecurity threat knowledge (1)
- Dark net (1)
- Dark web (1)
- Deception (1)
- Publication Year
- Publication
- Publication Type
Articles 1 - 28 of 28
Full-Text Articles in Management Information Systems
Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger
Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger
Journal of Cybersecurity Education, Research and Practice
This article explores the results of a project aimed at supporting community college students in their academic pursuit of an Associate of Applied Science (AAS) degree in Cybersecurity through mentorship, collaboration, skill preparation, and other activities and touch points to increase students’ sense of belonging and connectedness in the cybersecurity profession. The goal of the project was focused on developing diverse, educated, and skilled cybersecurity personnel for employment within local industry and government to help curtail the current regional cybersecurity workforce gap that is emblematic of the lack of qualified cybersecurity personnel that presently exists nationwide. Emphasis throughout the project …
Assessing Employees’ Cybersecurity Attitude Based On Working And Cybersecurity Threat Experience, Norshima Humaidi, Melissa Shahrom
Assessing Employees’ Cybersecurity Attitude Based On Working And Cybersecurity Threat Experience, Norshima Humaidi, Melissa Shahrom
The African Journal of Information Systems
Many cybersecurity problems are caused by human error, which is a worry in the commercial sector. Due to their attitude towards cybersecurity, many employees in the firm do not work in a way that safeguards data. This study seeks to examine employees' cybersecurity attitudes with a focus on their work experience and exposure to cybersecurity threats. Data were gathered through a survey conducted in targeted business firms located in the Klang Valley area, Malaysia. Utilizing ANOVA and two-sample tests, the study analysed 245 data samples to evaluate the hypotheses. The results show significant distinctions in employees' cybersecurity attitudes in relation …
Leading K-12 Community Responsiveness To Cyber Threats Via Education Of School Community, Michele Kielty, A. Renee Staton
Leading K-12 Community Responsiveness To Cyber Threats Via Education Of School Community, Michele Kielty, A. Renee Staton
Journal of Cybersecurity Education, Research and Practice
Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic and educational perspective when such challenges arise in their school buildings. This article explains the cyber threats that are looming large for K-12 systems and provides concrete tools for school leaders to employ in order to provide preventive education to their school communities.
What You See Is Not What You Know: Studying Deception In Deepfake Video Manipulation, Cathryn Allen, Bryson R. Payne, Tamirat Abegaz, Chuck Robertson
What You See Is Not What You Know: Studying Deception In Deepfake Video Manipulation, Cathryn Allen, Bryson R. Payne, Tamirat Abegaz, Chuck Robertson
Journal of Cybersecurity Education, Research and Practice
Research indicates that deceitful videos tend to spread rapidly online and influence people’s opinions and ideas. Because of this, video misinformation via deepfake video manipulation poses a significant online threat. This study aims to discover what factors can influence viewers’ capability to distinguish deepfake videos from genuine video footage. This work focuses on exploring deepfake videos’ potential use for deception and misinformation by exploring people’s ability to determine whether videos are deepfakes in a survey consisting of deepfake videos and original unedited videos. The participants viewed a set of four videos and were asked to judge whether the videos shown …
Privacy And Security Information Awareness And Disclosure Of Private Information By Users Of Online Social Media In The Ibadan Metropolis, Nigeria, Funmilola Olubunmi Omotayo, Joy Oluwabukola Olayiwola
Privacy And Security Information Awareness And Disclosure Of Private Information By Users Of Online Social Media In The Ibadan Metropolis, Nigeria, Funmilola Olubunmi Omotayo, Joy Oluwabukola Olayiwola
The African Journal of Information Systems
The purpose of this paper is to investigate information privacy and security awareness among online social media (OSM) users in the Ibadan metropolis, Nigeria. Building upon the social exchange theory, some factors that could influence the disclosure of private information on social media were identified. Findings from the analysis of data of 255 respondents revealed that most were aware of information privacy and security measures available on OSM, and the risks associated with the disclosure of private information on OSM. Privacy and security awareness, the perception of benefits associated with the use of OSM, the perception of risks associated with …
Modelling Online Advertising Design Quality Influences On Millennial Consumer Attitudes In South Africa, Rodney G. Duffett Dr, Natassha V. Miller Ms
Modelling Online Advertising Design Quality Influences On Millennial Consumer Attitudes In South Africa, Rodney G. Duffett Dr, Natassha V. Miller Ms
The African Journal of Information Systems
Millennials’ advanced knowledge and exposure to product experiences, and irrelevant placement of online advertising has led to an increase of online advertising avoidance. However, effective online advertising design may assist in establishing more positive sentiments towards digital forms of marketing communication. The study used the visual rhetoric theory as the theoretical basis to examine millennial consumer attitudes. The main research aims were to propose an online advertising design quality model, and to ascertain the influence of online advertising design quality on millennial consumer attitudes. The study employed a quantitative research design via an empirical online survey. Online advertising design quality …
The Acceptance And Use Of Online Learning By Law Students In A South African University: An Application Of The Utaut2 Model, Jameson Goto, Anzanilufuno Munyai
The Acceptance And Use Of Online Learning By Law Students In A South African University: An Application Of The Utaut2 Model, Jameson Goto, Anzanilufuno Munyai
The African Journal of Information Systems
COVID-19 forced many universities to shift from traditional face-to-face or blended learning, to full online learning. The sudden shift was not easy for both students and lecturers, who had to adapt to the new learning mode. This study aimed to evaluate the acceptance and use of online learning of university students in the law faculty at a South African university during the COVID-19 pandemic. The study employs the extended unified theory of acceptance and use of technology (UTAUT2) model particularised to the online learning context in a country with a developing economy. An online survey was administered to the student …
Government Workspace Digitalization And Socioeconomic Development Outcomes In Ghana, Winfred Ofoe Larkotey, John Effah, Richard Boateng
Government Workspace Digitalization And Socioeconomic Development Outcomes In Ghana, Winfred Ofoe Larkotey, John Effah, Richard Boateng
The African Journal of Information Systems
The study sought to understand how the structurational environment shapes socioeconomic outcomes of government workspace digitalization in Ghana based on a qualitative, interpretive case study and the structurational model of technology as a theoretical lens. The findings show how the availability of electronic transactions law, government borrowing, and extendable system design can positively influence socioeconomic outcomes of government workspace digitalization. However, use of multiple system development environments, bureaucracy, a within-country digital divide, and a persistent physical signature and letterhead culture can negatively influence the socioeconomic development goals of government workspace digitalization.
A Serious Game For Social Engineering Awareness Creation, Fabian Muhly, Philipp Leo, Stefano Caneppele
A Serious Game For Social Engineering Awareness Creation, Fabian Muhly, Philipp Leo, Stefano Caneppele
Journal of Cybersecurity Education, Research and Practice
Social engineering is a method used by offenders to deceive their targets utilizing rationales of human psychology. Offenders aim to exploit information and use them for intelligence purposes or financial gains. Generating resilience against these malicious methods is still challenging. Literature shows that serious gaming learning approaches are used more frequently to instill lasting retention effects. Serious games are interactive, experiential learning approaches that impart knowledge about rationales and concepts in a way that fosters retention. In three samples and totally 97 participants the study at hand evaluated a social engineering serious game for participants’ involvement and instruction compliance during …
A Coordinated Communication & Awareness Approach For Information Security Incident Management: An Empirical Study On Ethiopian Organizations, Keshnee Padayachee, Elias Worku
A Coordinated Communication & Awareness Approach For Information Security Incident Management: An Empirical Study On Ethiopian Organizations, Keshnee Padayachee, Elias Worku
The African Journal of Information Systems
The coordination of communication and awareness efforts in the process of Information Security Incident Management (ISIM) has been identified as a critical means of enhancing information security protection in organizations. This paper aims to explore the nuances of organizational information security with respect to the coordination of communication and awareness efforts among organizational stakeholders towards achieving a shared, interactive, and participatory ISIM. According to the findings of the study in the organizations sampled, it has been identified that reporting, communication, and awareness efforts within ISIM were found to be largely uncoordinated. The exploratory findings provided a rationale for the proposal …
Teaching About The Dark Web In Criminal Justice Or Related Programs At The Community College And University Levels., Scott H. Belshaw, Brooke Nodeland, Lorrin Underwood, Alexandrea Colaiuta
Teaching About The Dark Web In Criminal Justice Or Related Programs At The Community College And University Levels., Scott H. Belshaw, Brooke Nodeland, Lorrin Underwood, Alexandrea Colaiuta
Journal of Cybersecurity Education, Research and Practice
Increasingly, criminal justice practitioners have been called on to help solve breaches in cyber security. However, while the demand for criminal justice participation in cyber investigations increases daily, most universities are lagging in their educational and training opportunities for students entering the criminal justice fields. This article discusses the need to incorporate courses discussing the Dark Web in criminal justice. A review of existing cyber-criminal justice programs in Texas and nationally suggests that most community colleges and 4-year universities have yet to develop courses/programs in understanding and investigating the Dark Web on the internet. The Dark Web serves as the …
Investigating Usage Of Social Media Platforms In South Africa, Adheesh Budree, Kaja Fietkiewicz, Elmar Lins
Investigating Usage Of Social Media Platforms In South Africa, Adheesh Budree, Kaja Fietkiewicz, Elmar Lins
The African Journal of Information Systems
This study investigated the differences in usage of different social media platforms within the South African context, broken down by user characteristics, specifically gender and age, in addition to investigating the correlation between usage of differing social media platforms. This was carried out to determine which social media needs do the different population groups aim to fulfill when using different social media platforms. Based on the results, the study confirmed the existence of preferences between types of social media platforms and groups of social media platforms in South Africa, based on frequency of use by age group and gender. Social …
Cybersecurity Education: The Need For A Top-Driven, Multidisciplinary, School-Wide Approach, Lucy Tsado
Cybersecurity Education: The Need For A Top-Driven, Multidisciplinary, School-Wide Approach, Lucy Tsado
Journal of Cybersecurity Education, Research and Practice
The human resource skills gap in cybersecurity has created an opportunity for educational institutions interested in cybersecurity education. The current number of schools designated by the Department of Homeland Security (DHS) and National Security Agency (NSA) as Centers of Academic Excellence (CAE) to train cybersecurity experts are not sufficient to meet the shortfall in the industry. The DHS has clearly mapped out knowledge areas for cybersecurity education for both technical and non-technical disciplines; it is therefore possible for institutions not yet designated CAEs to generate cybersecurity experts, with the long-term goal of attaining the CAE designation. The purpose of this …
External Actors In Forming National Ict Policy In Malawi: A Cause For Concern In Low-Income Countries?, Gregory Kunyenje 4928781, Wallace Chigona
External Actors In Forming National Ict Policy In Malawi: A Cause For Concern In Low-Income Countries?, Gregory Kunyenje 4928781, Wallace Chigona
The African Journal of Information Systems
The paper examines external actors in the formulation of national Information and Communication Technology (ICT) policies. It questions how external actors overtly or covertly influence formulation of national ICT policies following that, of the nearly 84% of the countries in Africa that have formulated national ICT policies, most of which have been influenced by external actors. The paper uses Bourdieu’s Theory of Practice to analyze the effects of external actors’ influences in developing countries by using Malawi as a case study. Document analysis is used to analyse external actors’ influences in policy documents, the minutes of policy actors’ meetings, and …
Information Privacy Concerns In The Age Of Internet Of Things, Madhav Sharma, David Biros
Information Privacy Concerns In The Age Of Internet Of Things, Madhav Sharma, David Biros
KSU Proceedings on Cybersecurity Education, Research and Practice
Internet of things (IoT) offer new opportunities for advancement in many domains including healthcare, home automation, manufacturing and transportation. In recent years, the number of IoT devices have exponentially risen and this meteoric rise is poised to continue according to the industry. Advances in the IoT integrated with ambient intelligence are intended to make our lives easier. Yet for all these advancements, IoT also has a dark side. Privacy and security were already priorities when personal computers, devices and work stations were the only point of vulnerability to personal information, however, with the ubiquitous nature of smart technologies has increased …
Mobile Bullying Among Rural South African Students: Examining The Applicability Of Existing Theories, Michael Eddie Kyobe Prof., Lucas Mimbi Dr, Phillimom Nembandona, Sive Mtshazi
Mobile Bullying Among Rural South African Students: Examining The Applicability Of Existing Theories, Michael Eddie Kyobe Prof., Lucas Mimbi Dr, Phillimom Nembandona, Sive Mtshazi
The African Journal of Information Systems
Mobile bullying, which is one form of cyberbullying, is escalating in schools in South Africa. Research can contribute to better understanding of the nature of this aggression, and provide guidance in determining appropriate interventions and administration of justice. However, studies into cyberbullying tend to focus mainly on the urban environment. Rural South Africa involves a large percentage of mobile phone users and experiences in relatively different cultural and social-economic conditions. Lack of research on rural mobile bullying calls into question the applicability of existing theories of crime and cyberbullying to the rural context and their effectiveness in guiding legal and …
Reflections Of A Doctoral Research On Knowledge Management (Km) Through An Afrocentric Lens In A Nigerian Oil Corporation, Okeoma John-Paul Okeke
Reflections Of A Doctoral Research On Knowledge Management (Km) Through An Afrocentric Lens In A Nigerian Oil Corporation, Okeoma John-Paul Okeke
The African Journal of Information Systems
This paper focuses on the reflections of a doctoral research that evaluated the challenges of the adoption and implementation of a knowledge management (KM) initiative through the experiences of the knowledge champions. The African/Nigerian socio-cultural view was used to explore the narrative accounts of the knowledge champions. A case study research was carried out using qualitative approaches. Interpretative phenomenological analysis (IPA) was used in data analysis. The findings demonstrated the ability to ground KM adoption within a socio-cultural specific context helped in making sense of the organizational KM experience. The paper serves as an academic expression to the current generation …
An Evaluation Of Educational Values Of Youtube Videos For Academic Writing, Gbolahan Olasina
An Evaluation Of Educational Values Of Youtube Videos For Academic Writing, Gbolahan Olasina
The African Journal of Information Systems
The aim is to assess the impact of YouTube videos about academic writing and its skills on the writing performance of students. Theoretical perspectives from constructivism and associated learning models are used to inform the purpose of the research. The contextual setting is matriculation students awaiting admission to higher institutions. The population is 40 students belonging to a class aimed at assisting disadvantaged students in their academic writing in Scottsville, Province of KwaZulu-Natal, South Africa. The students are broken into two groups – control/traditional teaching and the treatment/YouTube facilitated groups. Consequently, a dominant qualitative approach is adopted using focus group …
Role Of Trust And Involvement In The Effectiveness Of Digital Third-Party Organization Endorsement, Liming Guan, Vishal Lala
Role Of Trust And Involvement In The Effectiveness Of Digital Third-Party Organization Endorsement, Liming Guan, Vishal Lala
Atlantic Marketing Journal
In this research, an online experiment was conducted to investigate the effect of the mere presence of digital third-party organization (TPO) endorsement and the quality of information conveyed by a digital TPO, referred to as the endorsement information value effect. Involvement and institution-based trust were tested as moderators of the endorsement information value effect. The results confirm the intuitive belief of managers that the mere presence of a digital TPO endorsement benefits websites by reducing risk perceptions, improving attitudes and increasing choice likelihood. The findings from this research revealed that effectiveness of digital TPO endorsement information value was contingent upon …
A Needs-Ictd Strategy Alignment Foundation For The Measurement Of Ictd Impact: Three Case Studies In South Africa, Gugulethu Q. Baduza, Caroline P. Khene
A Needs-Ictd Strategy Alignment Foundation For The Measurement Of Ictd Impact: Three Case Studies In South Africa, Gugulethu Q. Baduza, Caroline P. Khene
The African Journal of Information Systems
Access to ICTD projects has increased over the years; however, they have not significantly changed the lives of the targeted communities. This discrepancy relates to the gap that exists between the reality of the community, its needs and the ICTD strategy of the project. This research paper presents a Needs-ICTD strategy alignment framework to support the alignment of ICTD strategy, and the development and promotion of contextual needs of marginalized areas. The framework also contributes to the identification of preliminary impact indicators, which can support impact assessment. Through a multi-case study investigation of the Siyakhula Living Lab and the SAP …
User Privacy Suffers At The Hands Of Access Controls, Chad N. Hoye
User Privacy Suffers At The Hands Of Access Controls, Chad N. Hoye
KSU Proceedings on Cybersecurity Education, Research and Practice
With advancements in personal hand held devices, smaller more mobile computers, tablets, and the world’s population connected with social media the threat to the user’s privacy has been diminished. I will look at how access control policies have opened the proverbial door to user’s privacy being attacked and threatened. You will see examples of how users have to divulge personal information to get better service and even be monitored while at work to prevent intrusions in to the company.
Brain Betrayal: A Neuropsychological Categorization Of Insider Attacks, Rachel L. Whitman
Brain Betrayal: A Neuropsychological Categorization Of Insider Attacks, Rachel L. Whitman
KSU Proceedings on Cybersecurity Education, Research and Practice
Thanks to an abundance of highly publicized data breaches, Information Security (InfoSec) is taking a larger place in organizational priorities. Despite the increased attention, the threat posed to employers by their own employees remains a frightening prospect studied mostly in a technical light. This paper presents a categorization of insider deviant behavior and misbehavior based off of the neuropsychological foundations of three main types of insiders posing a threat to an organization: accidental attackers; neurologically “hot” malcontents, and neurologically “cold” opportunists.
Holistic Approach: Paradigm Shift In The Research Agenda For Digitalisation Of Healthcare In Sub-Saharan Africa, Tadeusz K. Bara-Slupski
Holistic Approach: Paradigm Shift In The Research Agenda For Digitalisation Of Healthcare In Sub-Saharan Africa, Tadeusz K. Bara-Slupski
The African Journal of Information Systems
Despite significant resources employed in the digitalisation agenda in the healthcare sector in Sub-Saharan Africa, the transformative impact of information and communication technologies has not been realised. This article makes two contributions towards developing an understanding of this failure. First, it provides a review of a rich body of academic literature and practitioner accounts regarding barriers to digitalisation and organises them using an established framework. Second, recognising the continuing struggle that digitalisation presents, it proposes a paradigmatic shift in thinking about barriers to digitalisation and suggests the existence of a more fundamental barrier related to inappropriate incentives within the international …
The Impact Of Mobile Technology On Micro And Small Enterprises In Zimbabwe In The Post-Hyperinflation Economic Era, Gamuchirai B. Perekwa, Tania Prinsloo, Jp Van Deventer
The Impact Of Mobile Technology On Micro And Small Enterprises In Zimbabwe In The Post-Hyperinflation Economic Era, Gamuchirai B. Perekwa, Tania Prinsloo, Jp Van Deventer
The African Journal of Information Systems
This paper investigates the impact of mobile technology on Micro and Small Enterprises (MSEs) in the developing world in the post-hyperinflation era. Data was collected from a multi-staged sample of 114 MSE owners within the capital province of Zimbabwe, namely Harare. The data was collected and analysed using descriptive quantitative survey methods, which comprised of hard-copy questionnaires, structured interviews and online questionnaires.
The findings suggest that mobile technology has incremental, transformational and production influence on MSEs in Zimbabwe. The findings show that mobile technology amplifies communication and relations with customers, MSE’s productivity and MSE’s revenues. Mobile technology is also spurring …
Exploring The Impact Of Information And Communication Technology (Ict) On Intermediation Market Structure In The Microfinance Industry, Frederick Riggins, David Weber
Exploring The Impact Of Information And Communication Technology (Ict) On Intermediation Market Structure In The Microfinance Industry, Frederick Riggins, David Weber
The African Journal of Information Systems
The microfinance industry provides financial services to the world’s poor in hopes of moving individuals and families out of poverty. In 2013 there were 4.7 million active microfinance borrowers in Africa. This represents a smaller percentage of the population compared to other regions of the world, indicating the potential for rapid growth of microfinance in Africa. However, microfinance is maturing, in part due to the adoption of information and communication technologies (ICTs). This research examines how ICTs are changing the microfinance industry given recent advancements in mobile banking, Internet usage, and connectivity. By examining the microfinance market structure, we determine …
Towards Self-Emancipation In Ict For Development Research: Narratives About Respect, Traditional Leadership And Building Networks Of Friendships In Rural South Africa, Kirstin Krauss
The African Journal of Information Systems
In this paper, the author contends that if the outsider-researcher involved in Information and Communication Technology for Development really wants to make a difference and honestly address the emancipatory interests of the developing community, social transformation will have to occur on both sides of the “development divide.” This statement implies both an understanding of the researcher’s own ethnocentrism, prejudice, assumptions and inabilities as well as local concerns, needs, expectations and realities. Using critical social theory as a position of inquiry and learning from the enculturation phases of critical ethnographic fieldwork in a deep rural part of South Africa, the paper …
Accessing Ict Enabled Content In Low-Income Countries: Think Big, Start Small, And Scale Up, Solomon Negash
Accessing Ict Enabled Content In Low-Income Countries: Think Big, Start Small, And Scale Up, Solomon Negash
Faculty and Research Publications
While the digital revolution has transformed the way many of us work and live, more than half the world's population lives in rural areas that have been shut-out of the digital transformation. Low-income countries have yet to realize the benefits from the digital revolution; therefore, a need exists for innovative and alternative models to overcome the lack of access to knowledge and learning. This paper examines the challenges faced by low-income countries in accessing ICT enabled content and proposes a Big-Small model where low-income countries can harness the ICT revolution. This paper concludes with a discussion on sustainability and future …
Considerations For An Effective Telecommunications-Use Policy, Michael E. Whitman, Anthony M. Townsend, Robert J. Aalberts
Considerations For An Effective Telecommunications-Use Policy, Michael E. Whitman, Anthony M. Townsend, Robert J. Aalberts
Faculty and Research Publications
Recent changes in federal telecommunications legislation have underscored the importance of an up-to-date and effective telecommunications-use policy in business organizations. With the proliferation of the Internet, intranets, and email as commonplace business tools, the potential for misuse and subsequent liability has become an increasing concern. Even though the recent Supreme Court decision struck down the obscenity provisions of the Communications Decency Act (CDA), it left intact legislation that effectively mandates development of a sound telecommunications-use policy. In addition to potential liability for systems misuse, organizations have also had to address issues of individual employee privacy within the new systems.
This …