Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Management Information Systems

An Evaluation Of Perceived Safety Of Free Software: The Brafs Model, Will Pepper Jan 2014

An Evaluation Of Perceived Safety Of Free Software: The Brafs Model, Will Pepper

Electronic Theses and Dissertations

This dissertation explores the perceived safety of free software and its relationship with the intention to use this technology in a business setting. The newly created construct of perceived safety is developed out of the theory of planned behavior. It is researched, scrutinized, and refined according to academic guidelines and two different environmental settings. The constructs that impact perceived safety and its relationship with intention to use consist of technology perceived risk, technology trusting beliefs, expected financial utility, and perceived adverse impact on professional reputation. Each construct consists of multiple operationalized elements. To explore this empirically, beneficial and risk measurements …


Mr Hyde Or Dr. Jekyll? Characteristics Of The Information Systems Security Mindset, David Pumphrey Jan 2014

Mr Hyde Or Dr. Jekyll? Characteristics Of The Information Systems Security Mindset, David Pumphrey

Electronic Theses and Dissertations

Information security professionals have a unique challenge in today's connected world. They are charged with protecting digital assets from individuals, groups, and even foreign governments with little or no restrictions limiting their behavior. To be successful, security experts must have the mindset and skills of those who seek to harm their organization, but most are not alloto retaliate, in kind. Instead, they must use these skills only to predict and to prevent future attacks; thus using their technical prowess for good and not for evil. In a survey of 330 information security professionals, the data reveals six mindsets of security …


A Federated Architecture For Heuristics Packet Filtering In Cloud Networks, Ibrahim M. Waziri Jr Jan 2014

A Federated Architecture For Heuristics Packet Filtering In Cloud Networks, Ibrahim M. Waziri Jr

Electronic Theses and Dissertations

The rapid expansion in networking has provided tremendous opportunities to access an unparalleled amount of information. Everyone connects to a network to gain access and to share this information. However when someone connects to a public network, his private network and information becomes vulnerable to hackers and all kinds of security threats. Today, all networks needs to be secured, and one of the best security policies is firewall implementation.

Firewalls can be hardware or cloud based. Hardware based firewalls offer the advantage of faster response time, whereas cloud based firewalls are more flexible. In reality the best form of firewall …


Initial Online Consumer Trust (Ioct): The Influence Of Third-Party Service Provider Reputation, Website Utility, Electronic Word-Of-Mouth, And Previous Experience With Similar Websites, Surma Mukhopadhyay Jan 2014

Initial Online Consumer Trust (Ioct): The Influence Of Third-Party Service Provider Reputation, Website Utility, Electronic Word-Of-Mouth, And Previous Experience With Similar Websites, Surma Mukhopadhyay

Electronic Theses and Dissertations

Objectives: The objectives of the study were 1) to conceptualize Initial Online Consumer Trust (IOCT) and 2) to examine the effects of website utility, electronic word-of-mouth, consumer past experiences with similar websites, and third-party service providers' reputation on the development of IOCT. Methods: To explore the research objectives, the study deployed a 2X3 experimental design that involved six experimental groups. Subjects were recruited from the undergraduate student pool at the University of Mississippi, School of Business. The vignettes used in the study was hypothetical book selling websites, one with the presence of third-party service providers and the other without any …