Open Access. Powered by Scholars. Published by Universities.®
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Technology and Innovation (951)
- Physical Sciences and Mathematics (817)
- Computer Sciences (771)
- Social and Behavioral Sciences (675)
- Management Sciences and Quantitative Methods (621)
-
- Business Administration, Management, and Operations (598)
- E-Commerce (473)
- Engineering (427)
- Communication (298)
- Databases and Information Systems (297)
- Information Security (282)
- Computer Engineering (267)
- Business Intelligence (260)
- Operations Research, Systems Engineering and Industrial Engineering (245)
- Operations and Supply Chain Management (242)
- Library and Information Science (239)
- Education (234)
- Business and Corporate Communications (217)
- Organizational Behavior and Theory (213)
- Marketing (212)
- Entrepreneurial and Small Business Operations (190)
- Business Analytics (186)
- Social Media (184)
- Medicine and Health Sciences (182)
- Other Business (182)
- Computer and Systems Architecture (174)
- Operational Research (172)
- Human Resources Management (170)
- Institution
-
- California State University, San Bernardino (867)
- Kennesaw State University (377)
- Selected Works (374)
- SelectedWorks (243)
- Singapore Management University (221)
-
- Universitas Indonesia (169)
- Wright State University (137)
- New Jersey Institute of Technology (125)
- University of Nebraska - Lincoln (111)
- Air Force Institute of Technology (81)
- Clark University (75)
- Georgia State University (75)
- San Jose State University (62)
- The University of San Francisco (53)
- Harrisburg University of Science and Technology (52)
- Illinois State University (52)
- Missouri University of Science and Technology (48)
- Boise State University (44)
- Virginia Commonwealth University (38)
- Santa Clara University (37)
- Montclair State University (35)
- Marshall University (34)
- University of Arkansas, Fayetteville (32)
- Butler University (27)
- Brigham Young University (26)
- Claremont Colleges (26)
- University of Texas at Arlington (26)
- University of Massachusetts Boston (25)
- University of Dayton (24)
- Utah State University (23)
- Keyword
-
- Information (332)
- Computer (235)
- Information management (226)
- Evolution (220)
- Technology (147)
-
- Information systems (71)
- Management (66)
- Business (62)
- IT (61)
- Information technology (52)
- Internet (49)
- Refereed Articles (47)
- Cybersecurity (46)
- Innovation (45)
- Knowledge management (43)
- Information Systems (42)
- Social media (42)
- Systems (41)
- Wissenschaftliche Zeitschriften (37)
- Privacy (36)
- System (36)
- Security (35)
- Trust (35)
- Communication (34)
- Information Technology (34)
- Collaboration (33)
- Healthcare (33)
- MPA (33)
- Education (32)
- Information security (32)
- Publication Year
- Publication
-
- Journal of International Technology and Information Management (407)
- Journal of International Information Management (243)
- Communications of the IIMA (187)
- The South East Asian Journal of Management (165)
- Research Collection School Of Computing and Information Systems (154)
-
- The African Journal of Information Systems (148)
- Theses and Dissertations (130)
- Dissertations (104)
- Journal of Cybersecurity Education, Research and Practice (91)
- Hubert Oesterle (83)
- KSU Proceedings on Cybersecurity Education, Research and Practice (82)
- School of Professional Studies (74)
- Dissertations and Theses (52)
- International Journal for Business Education (52)
- Computer Information Systems Faculty Publications (50)
- ISSCM Faculty Publications (50)
- Extension Farm and Ranch Management News (46)
- Business and Information Technology Faculty Research & Creative Works (44)
- IT and Supply Chain Management Faculty Publications and Presentations (43)
- Theses (38)
- Information Systems and Analytics (37)
- ISSCM Newsletters (35)
- Business Analytics and Information Systems (34)
- Faculty Publications (32)
- Department of Information Management and Business Analytics Faculty Scholarship and Creative Works (31)
- Library Philosophy and Practice (e-journal) (29)
- Master of Information Systems Capstone Executive Summary (29)
- Faculty Publications, Information Systems & Technology (27)
- Electronic Theses and Dissertations (26)
- Research Collection Lee Kong Chian School Of Business (26)
Articles 31 - 60 of 4242
Full-Text Articles in Management Information Systems
External Adverse Neighborhood Factors Influence On Students' Grades 3-6 Schooling Success, Chloe Marie Janssen
External Adverse Neighborhood Factors Influence On Students' Grades 3-6 Schooling Success, Chloe Marie Janssen
Undergraduate Honors Thesis Collection
As education evolves with the growth of technology, it is crucial to study the impacts of external challenges on student outcomes within the classroom. The goal of the present cross-sectional study is to investigate the relationship between a student’s environmental factors and student-peer relationships, academic performance, and engagement, specifically within urban, low-income schools that exist in underserved areas of the community. The following research question is posed: How do external adversities in one’s neighborhood impact a student’s relationship to their peers and success in school? To learn more about this question, we conducted research in partnership with Butler University, the …
What Drives A Firm To Implement Environmental Sustainability Practices?, Julia Elisabeth Suess
What Drives A Firm To Implement Environmental Sustainability Practices?, Julia Elisabeth Suess
Undergraduate Honors Capstone Projects
This literature review investigates the motivations that leads firms to implement environmental sustainability practices (EMPs). The research focuses on understanding how business strategy emphasizes sustainable firms and successfully managing their responsibility to employees, the natural environment, and shareholders to protect natural resources. The review answered questions in regard to the motivations to adopt EMPs, differences in proactive and reactive approaches, and environmental sustainability from an industry and country perspective. In addition, the business case demonstrates the cost and the benefits of environmental sustainability practices. The results stem from the motivations to adopt EMPs included external (consumers, competitors, regulators) and internal …
Impact Of Leadership In Project Management, Ian Wegh
Impact Of Leadership In Project Management, Ian Wegh
Information Systems Undergraduate Honors Theses
Today’s business environment demands effective project management for enterprises to meet their goals and continue to be innovative. Inherently, this also means that project managers must have strong leadership skills. Project management provides a framework of techniques that provides a symbiotic relationship between both the framework and the leader. The idea behind project management is to complete objectives efficiently within a certain time period given a restricted number of resources. This means project management is a process of principles, tools, and methodologies used to effectively manage a team through the System Development Life Cycle. The System Development Life Cycle (SDLC) …
Balancing Perspectives: Assessing The Integration Of Ai In Academic Support Within Higher Education, Sami Ali
Balancing Perspectives: Assessing The Integration Of Ai In Academic Support Within Higher Education, Sami Ali
2024 Spring Honors Capstone Projects
The rapid advancement of A The rapid proliferation of Artificial Intelligence (AI) across various sectors highlights its transformative potential, yet its integration into educational settings raises ethical concerns, particularly regarding its misuse by students. This study conducts a detailed sentiment analysis and systematic literature review to examine the diverse perspectives on AI within education, from both academic and non-academic viewpoints. Utilizing advanced data mining tools to analyze sentiments and trends, this research reveals a complex landscape where optimism about AI’s capabilities is tempered by concerns over ethical implications and potential misuse. The findings contribute to the dialogue on leveraging AI …
Data-Driven Forecasting For Effective Demand Management In The E-Commerce Ecosystem, Chirag Pandey
Data-Driven Forecasting For Effective Demand Management In The E-Commerce Ecosystem, Chirag Pandey
Electronic Theses, Projects, and Dissertations
This culmination project investigated and analyzed the impact of factors influencing sales forecasting models in the e-commerce ecosystem. The research questions are: Q1) To what extent are sales forecasting models in the e-commerce ecosystems influenced by customer demographic variables such as gender, age, and geographic locations? Q2) To what extent are sales forecasting models in the e-commerce ecosystems influenced by product specific factors? The datasets used were from Kaggle, and the Worldometer websites. The findings are: Q1) Individuals aged '55 or over' significantly impact total sales in both the USA and Brazil. Male consumers consistently accounted for a higher proportion …
An Exploration Of Synergy Evaluation Application Model To Support Implementation On Merger And Acquisition, Jieping Mei
An Exploration Of Synergy Evaluation Application Model To Support Implementation On Merger And Acquisition, Jieping Mei
Electronic Theses, Projects, and Dissertations
ABSTRACT
The project focuses on a comprehensive system’s analysis and design of the front-end of the Synergy Evaluation Application Model (SEAM) system for mergers and acquisitions (M&As). The research questions asked are: Q1. How did the SEAM system incorporate the system requirements and design that incorporated the strategic goals and priorities of both the acquirer and the acquiree? Q2. What data sources will the SEAM system rely on, and how does it overcome data integration, automation, visualization challenges? Q3. How will the model identify build in potential synergies, both quantitative and qualitative? The research questions were analyzed through the SEAM …
The Impact Of Using Standard Quality Measures Such As Iso 9001:2015 On Emerging Software Companies Created With Agile Methodologies., Elisa Orillac
The Impact Of Using Standard Quality Measures Such As Iso 9001:2015 On Emerging Software Companies Created With Agile Methodologies., Elisa Orillac
Harrisburg University Dissertations and Theses
This qualitative research aimed to analyze the impact of applying quality measure standards, specifically ISO 9001:2015, in emerging software companies that have decided to manage their projects through Agile methodologies. While Agile methodologies are well known for their continuous delivery of software, the quality that results from these projects is not always guaranteed. This research aimed to evaluate what benefits in terms of cost, timely delivery of working software, and production have companies who already applied QMS had. Or, if applying the QMS had a negative result, why was this the case? The hypothesis for the research was that those …
Examining Bgsu's Degree Audit And How To Make It More Effective, Ella Delzeith
Examining Bgsu's Degree Audit And How To Make It More Effective, Ella Delzeith
Honors Projects
The purpose of this project is to better help students at BGSU schedule their classes throughout their four years while also making sure they are following along with their degree audit. Why are degree audits seen as confusing? Is there a better way to navigate the degree audit? How are students affected by an ineffective degree audit? Can a schedule be produced alongside the degree audit? Why is organization crucial in a degree audit? These are the guiding research questions for my project to help achieve my goal of creating a tool to help students navigate the degree audit in …
Factors Influencing The Perceptions Of Human-Computer Interaction Curriculum Developers In Higher Education Institutions During Curriculum Design And Delivery, Cynthia Augustine, Salah Kabanda
Factors Influencing The Perceptions Of Human-Computer Interaction Curriculum Developers In Higher Education Institutions During Curriculum Design And Delivery, Cynthia Augustine, Salah Kabanda
The African Journal of Information Systems
Computer science (CS) and information systems students seeking to work as software developers upon graduating are often required to create software that has a sound user experience (UX) and meets the needs of its users. This includes addressing unique user, context, and infrastructural requirements. This study sought to identify the factors that influence the perceptions of human-computer interaction (HCI) curriculum developers in higher education institutions (HEIs) in developing economies of Africa when it comes to curriculum design and delivery. A qualitative enquiry was conducted and consisted of fourteen interviews with HCI curriculum developers and UX practitioners in four African countries. …
Exploring Entrepreneurial Intention And Subjective Beliefs: A Comparative Analysis Of General Education Schools And Commercial Schools, Julia Riess, Bettina Fuhrmann, Gerhard Geissler
Exploring Entrepreneurial Intention And Subjective Beliefs: A Comparative Analysis Of General Education Schools And Commercial Schools, Julia Riess, Bettina Fuhrmann, Gerhard Geissler
International Journal for Business Education
This study examines the entrepreneurial intentions of Austrian secondary school students, specifically comparing students from commercial schools with those from general education schools. We analyzed 2,329 data sets and found that subjective beliefs, primarily behavioral and control beliefs, significantly influence entrepreneurial intentions. In addition, demographic factors such as gender, language, acquaintance with entrepreneurs, and school type play a significant role in explaining the variance in entrepreneurial intentions.
Our detailed analysis shows that students from commercial schools have stronger entrepreneurial intentions and subjective beliefs. Particularly notable are the differences in behavioral beliefs, where students from commercial schools find all aspects of …
Comparing Cognitive Theories Of Learning Transfer To Advance Cybersecurity Instruction, Assessment, And Testing, Daniel T. Hickey Ph.D., Ronald J. Kantor
Comparing Cognitive Theories Of Learning Transfer To Advance Cybersecurity Instruction, Assessment, And Testing, Daniel T. Hickey Ph.D., Ronald J. Kantor
Journal of Cybersecurity Education, Research and Practice
The cybersecurity threat landscape evolves quickly, continually, and consequentially. This means that the transfer of cybersecurity learning is crucial. We compared how different recognized “cognitive” transfer theories might help explain and synergize three aspects of cybersecurity education. These include teaching and training in diverse settings, assessing learning formatively & summatively, and testing & measuring achievement, proficiency, & readiness. We excluded newer sociocultural theories and their implications for inclusion as we explore those theories elsewhere. We first summarized the history of cybersecurity education and proficiency standards considering transfer theories. We then explored each theory and reviewed the most relevant cybersecurity education …
Understanding Global Attitudes Towards Artificial Intelligence In The Workplace, William Medeiros
Understanding Global Attitudes Towards Artificial Intelligence In The Workplace, William Medeiros
Honors Projects in Business
Artificial Intelligence (AI) has rapidly evolved over the years, emerging as a transformative technology with the potential to revolutionize various industries as well as the way humans work and live. With its ability to mimic human cognitive processes and perform complex tasks, this technology is becoming a powerful tool for automation, decision-making, and problem-solving. Despite these major advancements, several challenges still exist which need to be addressed in order to unlock its full potential. The goal of this research is to gain a better understanding of global attitudes towards AI in the workplace. The purpose is to expand upon existing …
Optimizing Oncological Care: The Influence Of Ai On Insurance Approvals, Brian Cox, Alberto Coustasse
Optimizing Oncological Care: The Influence Of Ai On Insurance Approvals, Brian Cox, Alberto Coustasse
Management Faculty Research
Within the United States, oncological treatments represent a considerable portion of the health care landscape, in terms of both their prevalence and associated costs. The year 2022 witnessed 1.9 million new cancer cases and over 600,000 cancer-related deaths, signaling the pressing need for efficient strategies in managing and addressing challenges in oncology. Studies suggest that using AI-based systems to standardize clinical data submissions and integrate electronic health records using the Fast Healthcare Interoperability Resources data standard can optimize these processes further.
The Important Role Of System Dynamics Investigation On Business Model, Industry And Performance Management, Lina Gozali, Teuku Yuri M. Zagloel, Togar Mangihut Simatupang, Wahyudi Sutopo, Aldy Gunawan, Yun-Chia Liang, Bernardo Nugroho Yahya, Jose Arturo Garza-Reyes, Agustinus Purna Irawan, Yuliani Suseno
The Important Role Of System Dynamics Investigation On Business Model, Industry And Performance Management, Lina Gozali, Teuku Yuri M. Zagloel, Togar Mangihut Simatupang, Wahyudi Sutopo, Aldy Gunawan, Yun-Chia Liang, Bernardo Nugroho Yahya, Jose Arturo Garza-Reyes, Agustinus Purna Irawan, Yuliani Suseno
Research Collection School Of Computing and Information Systems
Purpose: This research studies the development of the evolving dynamic system model and explores the important elements or factors and what detailed attributes are the main influences model in achieving the success of a business, industry and management. It also identifies the real and major differences between static and dynamic business management models and the detailed factors that influence them. Later, this research investigates the benefits/advantages and limitations/disadvantages of some research studies. The studies conducted in this research put more emphasis on the capabilities of system dynamics (SD) in modeling and the ability to measure, analyse and capture problems in …
Impact Of Government Outsourcing Contracts On High-Tech Vendors: An Empirical Study, Yi Dong, Nan Hu, Yonghua Ji, Chenkai Ni, Jing Xie
Impact Of Government Outsourcing Contracts On High-Tech Vendors: An Empirical Study, Yi Dong, Nan Hu, Yonghua Ji, Chenkai Ni, Jing Xie
Research Collection School Of Computing and Information Systems
Outsourcing is an important strategic decision of high-tech firms. However, while the research has extensively studied the implications of outsourcing to high-tech clients, its impact on high-tech vendors remains underexplored. This study empirically estimates the impact of government outsourcing contracts on high-tech vendors. Employing the earnings-return analyses framework, we find that, for high-tech vendors engaged in government outsourcing contracts, the stock market places a higher value on each unit of unexpected earnings compared to other firms. Additionally, this impact becomes stronger for contracts with longer terms, for contracts outsourced by the U.S. government or by countries with better political and …
Leading Horses To Water During A Pandemic: Assuring Communication Learning For "Quants", Thomas Hall
Leading Horses To Water During A Pandemic: Assuring Communication Learning For "Quants", Thomas Hall
International Journal for Business Education
Students who are attracted to quantitative disciplines of study can be reluctant to devote much attention to the important task of communicating, and previous research (Hostager, 2018) has identified statistically significant differences in learning approaches by major among undergraduate business students. This paper presents results of learning assurance for writing skills (direct measures) even when the content of the course relates to the highly quantitative topics of data analytics and finance. The approach combines various pedagogical methods in an undergraduate, writing-intensive setting: traditional testing but in an iterative framework, “flipped classroom” intensive work using spreadsheet software, repeated submission of brief …
Unraveling Biases And Customer Heterogeneity In E-Commerce Recommendation Systems, Sachin Sharma
Unraveling Biases And Customer Heterogeneity In E-Commerce Recommendation Systems, Sachin Sharma
Dissertations
This research explores the biases present in AI algorithms within e-commerce recommendation systems, focusing on how these biases prioritize popular, sponsored, and private-label products over actual customer preferences. We extend the responsible AI discourse by critically examining these biases and their implications for fairness in e-commerce. To strengthen the current understanding of AI fairness in the fields of information systems and computer science, we aim to challenge the assumption that AI fairness is objective and the same for everyone. We examine how individual differences, such as equity sensitivity and exchange ideology, contribute to users' varied perceptions of AI fairness. Through …
Creativity In Information Systems Research: A Systematic Literature Review, Mojca Simonovič, Aleš Popovič, Matej Černe
Creativity In Information Systems Research: A Systematic Literature Review, Mojca Simonovič, Aleš Popovič, Matej Černe
Economic and Business Review
For more than six decades, creativity has been the cornerstone of diverse scientific disciplines, including psychology, sociology, and organizational behavior (OB) studies. Its fundamental role in guiding business prospects, driving development, and fueling economic growth has made it an essential research theme in many fields. Yet, despite its importance, scholars within the information systems (IS) discipline have highlighted the significant lack of attention paid to this concept in their research. The transformative role creativity plays in contemporary business environments, along with the ever-present need to innovate, compete, and grow, sparked our curiosity. Is creativity still an understudied area in the …
Service Transformation That Will Boost Your Business, Neeta Lachmandas-Sakellariou
Service Transformation That Will Boost Your Business, Neeta Lachmandas-Sakellariou
Asian Management Insights
Focus on your customers to catapult your company to success. However, leaders must drive a culture change to make it happen.
Non-Monotonic Generation Of Knowledge Paths For Context Understanding, Pei-Chi Lo, Ee-Peng Lim
Non-Monotonic Generation Of Knowledge Paths For Context Understanding, Pei-Chi Lo, Ee-Peng Lim
Research Collection School Of Computing and Information Systems
Knowledge graphs can be used to enhance text search and access by augmenting textual content with relevant background knowledge. While many large knowledge graphs are available, using them to make semantic connections between entities mentioned in the textual content remains to be a difficult task. In this work, we therefore introduce contextual path generation (CPG) which refers to the task of generating knowledge paths, contextual path, to explain the semantic connections between entities mentioned in textual documents with given knowledge graph. To perform CPG task well, one has to address its three challenges, namely path relevance, incomplete knowledge graph, and …
It Deployment And Integration – An Assessment Of Enabling And Inhibiting Factors, Lesley Matshwane, Carl Marnewick
It Deployment And Integration – An Assessment Of Enabling And Inhibiting Factors, Lesley Matshwane, Carl Marnewick
The African Journal of Information Systems
Although delivery of services in South Africa is the responsibility of all spheres of government, the provision of basic services lies at the doorstep of local municipalities. Local municipalities have, for many reasons, frequently been unable to live up to this mandate despite the fact that some of the challenges that they face can be addressed by using IT. This paper assesses factors enabling and inhibiting the efficient deployment and integration of IT in local municipalities. The technological, organizational and environmental (TOE) framework was deployed to assess the factors. A multiple case study in which semi-structured interviews were conducted produced …
Blockchain Applications In Higher Education Based On The Nist Cybersecurity Framework, Brady Lund Ph.D.
Blockchain Applications In Higher Education Based On The Nist Cybersecurity Framework, Brady Lund Ph.D.
Journal of Cybersecurity Education, Research and Practice
This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized identity, and smart contracts, and examines the application of secure blockchain across various educational functions such as enrollment management, degree auditing, and award processing. Each facet of the NIST Framework is utilized to explore the integration of blockchain technology and address persistent security concerns. The paper contributes to the literature by defining blockchain technology applications and opportunities within …
Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger
Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger
Journal of Cybersecurity Education, Research and Practice
This article explores the results of a project aimed at supporting community college students in their academic pursuit of an Associate of Applied Science (AAS) degree in Cybersecurity through mentorship, collaboration, skill preparation, and other activities and touch points to increase students’ sense of belonging and connectedness in the cybersecurity profession. The goal of the project was focused on developing diverse, educated, and skilled cybersecurity personnel for employment within local industry and government to help curtail the current regional cybersecurity workforce gap that is emblematic of the lack of qualified cybersecurity personnel that presently exists nationwide. Emphasis throughout the project …
University Of Johannesburg Institutional Repository Cybersecurity Output: 2015-2021 Interdisciplinary Study, Mancha J. Sekgololo
University Of Johannesburg Institutional Repository Cybersecurity Output: 2015-2021 Interdisciplinary Study, Mancha J. Sekgololo
Journal of Cybersecurity Education, Research and Practice
This study examines cybersecurity awareness in universities by analyzing related research output across different disciplines at the University of Johannesburg. The diffusion of innovation theory is used in this study as a theoretical framework to explain how cybersecurity awareness diffuses across disciplines. The University of Johannesburg Institutional Repository database was the data source for this study. Variations in cybersecurity keyword searches and topic modeling techniques were used to identify the frequency and distribution of research output across different disciplines. The study reveals that cybersecurity awareness has diffused across various disciplines, including non-computer science disciplines such as business, accounting, and social …
Privacy Principles And Harms: Balancing Protection And Innovation, Samuel Aiello
Privacy Principles And Harms: Balancing Protection And Innovation, Samuel Aiello
Journal of Cybersecurity Education, Research and Practice
In today's digitally connected world, privacy has transformed from a fundamental human right into a multifaceted challenge. As technology enables the seamless exchange of information, the need to protect personal data has grown exponentially. Privacy has emerged as a critical concern in the digital age, as technological advancements continue to reshape how personal information is collected, stored, and utilized. This paper delves into the fundamental principles of privacy and explores the potential harm that can arise from the mishandling of personal data. It emphasizes the delicate balance between safeguarding individuals' privacy rights and fostering innovation in a data-driven society. By …
Board Of Directors Role In Data Privacy Governance: Making The Transition From Compliance Driven To Good Business Stewardship, David Warner, Lisa Mckee
Board Of Directors Role In Data Privacy Governance: Making The Transition From Compliance Driven To Good Business Stewardship, David Warner, Lisa Mckee
Journal of Cybersecurity Education, Research and Practice
Data collection, use, leveraging, and sharing as a business practice and advantage has proliferated over the past decade. Along with this proliferation of data collection is the increase in regulatory activity which continues to morph exponentially around the globe. Adding to this complexity are the increasing business disruptions, productivity and revenue losses, settlements, fines, and penalties which can amount to over $15 million, with many penalties now being ascribed to the organization’s leadership, to include the Board of Directors (BoD), the CEO and members of the senior leadership team (SLT). Thus, boards of directors can no longer ignore and in …
Investigation Of Algorithmic Nudging On Decision Quality: Evidence From Randomized Experiments In Online Recommendation Settings, Yuxiao Luo
Dissertations, Theses, and Capstone Projects
Most recently, academic research has started to address the relationship between nudges and Artificial Intelligence/Machine Learning (AI/ML) and found that personalized targeting algorithms can influence individual and collective behaviors in ways that may lead to undesired consequences for both end-users and firms. This dissertation investigates the effects of digital nudging, particularly algorithmic nudging, on user’s decision quality in online badge recommendations in the e-commerce context. Nudge is a choice architecture that alters individual’s behavior in a predictable way while preserving all available options and keeping the same economic incentives. In this dissertation, I conducted three independent and relevant studies and …
Towards Assessing Cybersecurity Posture Of Manufacturing Companies: Review And Recommendations, John Del Vecchio, Yair Levy, Ling Wang, Ajoy Kumar
Towards Assessing Cybersecurity Posture Of Manufacturing Companies: Review And Recommendations, John Del Vecchio, Yair Levy, Ling Wang, Ajoy Kumar
KSU Proceedings on Cybersecurity Education, Research and Practice
With the continued changes in the way businesses work, cyber-attack targets are in a constant state of flux between organizations, individuals, as well as various aspects of the supply chain of interconnected goods and services. As one of the 16 critical infrastructure sectors, the manufacturing sector is known for complex integrated Information Systems (ISs) that are incorporated heavily into production operations. Many of these ISs are procured and supported by third parties, also referred to as interconnected entities in the supply chain. Disruptions to manufacturing companies would not only have significant financial losses but would also have economic and safety …
Quantum Computing: Computing Of The Future Made Reality, Janelle Mathis
Quantum Computing: Computing Of The Future Made Reality, Janelle Mathis
KSU Proceedings on Cybersecurity Education, Research and Practice
Abstract—Quantum computing is an emerging new area focused on technology consisting of quantum theory aspects such as electrons, sub-atomic particles, and other materials engineered using quantum mechanics. Through quantum mechanics, these computers can solve problems that classical computers deem too complex. Today the closest computing technology compared to quantum computers are supercomputers, but similarly to classical computers, supercomputers also have faults. With supercomputers, when a problem is deemed too complex, it is due to the classical machinery components within the computer, thus causing a halt in solving the task or problem. In contrast, these problems could be solved with a …
Rfid Key Fobs In Vehicles: Unmasking Vulnerabilities & Strengthening Security, Devon Magda, Bryson R. Payne
Rfid Key Fobs In Vehicles: Unmasking Vulnerabilities & Strengthening Security, Devon Magda, Bryson R. Payne
KSU Proceedings on Cybersecurity Education, Research and Practice
No abstract provided.