Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Institution
- Publication Type
Articles 1 - 5 of 5
Full-Text Articles in Management Information Systems
A Language Designed For Programming I, Ben A. Blake
A Language Designed For Programming I, Ben A. Blake
Business Faculty Publications
The process of comprehending a problem, strategically developing a solution and translating the solution into an algorithm is arguably the single most important series of skills acquired during the education of an undergraduate computer science or information technology major. With this in mind, much care should be taken when choosing a programming language to deploy in the first University programming course. BLAKE, Beginners Language for Acquiring Key programming Essentials, is designed specifically for use in a Programming I class. BLAKE aids in enforcing fundamental object-oriented practices while simultaneously facilitating the transition to subsequent programming languages. BLAKE’s major features include; consistent …
The Shaping Of Managers’ Security Objectives Through Information Security Awareness Training, Mark Harris
The Shaping Of Managers’ Security Objectives Through Information Security Awareness Training, Mark Harris
Theses and Dissertations
Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition, managers creating security policies rely heavily on security guidelines, which are also technically oriented. This study created a series of information security training videos that were viewed by four groups of managers. One video discussed the socio-technical aspects of security, another discussed only the social aspects of security, the third detailed only the technical aspects …
Buyer Perceptions Of Supply Disruption Risk: A Behavioral View And Empirical Assessment, Scott C. Ellis, Raymond M. Henry, Jeff Shockley
Buyer Perceptions Of Supply Disruption Risk: A Behavioral View And Empirical Assessment, Scott C. Ellis, Raymond M. Henry, Jeff Shockley
Business Faculty Publications
As supply chains become more complex, firms face increasing risks of supply disruptions. The process through which buyers make decisions in the face of these risks, however, has not been explored. Despite research highlighting the importance of behavioral approaches to risk, there is limited research that applies these views of risk in the supply chain literature. This paper addresses this gap by drawing on behavioral risk theory to investigate the causal relationships amongst situation, representations of risk, and decision-making within the purchasing domain. We operationalize and explore the relationship between three representations of supply disruption risk: magnitude of supply disruption, …
Building Applications For The Android Os Mobile Platform: A Primer And Course Materials, Victor Matos, Rebecca Grasser
Building Applications For The Android Os Mobile Platform: A Primer And Course Materials, Victor Matos, Rebecca Grasser
Business Faculty Publications
No abstract provided.
Database Security: What Students Need To Know, Meg C. Murray
Database Security: What Students Need To Know, Meg C. Murray
Faculty Articles
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of Defense (2004), in its Database Security Technical Implementation Guide, states that database security should provide controlled, protected access to the contents of a database as well as preserve the integrity, consistency, and overall quality of the data. Students in the computing disciplines must develop an …