Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Management Information Systems

A Language Designed For Programming I, Ben A. Blake Aug 2010

A Language Designed For Programming I, Ben A. Blake

Business Faculty Publications

The process of comprehending a problem, strategically developing a solution and translating the solution into an algorithm is arguably the single most important series of skills acquired during the education of an undergraduate computer science or information technology major. With this in mind, much care should be taken when choosing a programming language to deploy in the first University programming course. BLAKE, Beginners Language for Acquiring Key programming Essentials, is designed specifically for use in a Programming I class. BLAKE aids in enforcing fundamental object-oriented practices while simultaneously facilitating the transition to subsequent programming languages. BLAKE’s major features include; consistent …


The Shaping Of Managers’ Security Objectives Through Information Security Awareness Training, Mark Harris Jun 2010

The Shaping Of Managers’ Security Objectives Through Information Security Awareness Training, Mark Harris

Theses and Dissertations

Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition, managers creating security policies rely heavily on security guidelines, which are also technically oriented. This study created a series of information security training videos that were viewed by four groups of managers. One video discussed the socio-technical aspects of security, another discussed only the social aspects of security, the third detailed only the technical aspects …


Buyer Perceptions Of Supply Disruption Risk: A Behavioral View And Empirical Assessment, Scott C. Ellis, Raymond M. Henry, Jeff Shockley Jan 2010

Buyer Perceptions Of Supply Disruption Risk: A Behavioral View And Empirical Assessment, Scott C. Ellis, Raymond M. Henry, Jeff Shockley

Business Faculty Publications

As supply chains become more complex, firms face increasing risks of supply disruptions. The process through which buyers make decisions in the face of these risks, however, has not been explored. Despite research highlighting the importance of behavioral approaches to risk, there is limited research that applies these views of risk in the supply chain literature. This paper addresses this gap by drawing on behavioral risk theory to investigate the causal relationships amongst situation, representations of risk, and decision-making within the purchasing domain. We operationalize and explore the relationship between three representations of supply disruption risk: magnitude of supply disruption, …


Building Applications For The Android Os Mobile Platform: A Primer And Course Materials, Victor Matos, Rebecca Grasser Jan 2010

Building Applications For The Android Os Mobile Platform: A Primer And Course Materials, Victor Matos, Rebecca Grasser

Business Faculty Publications

No abstract provided.


Database Security: What Students Need To Know, Meg C. Murray Jan 2010

Database Security: What Students Need To Know, Meg C. Murray

Faculty Articles

Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of Defense (2004), in its Database Security Technical Implementation Guide, states that database security should provide controlled, protected access to the contents of a database as well as preserve the integrity, consistency, and overall quality of the data. Students in the computing disciplines must develop an …