Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Engineering (5)
- Computer Sciences (5)
- Physical Sciences and Mathematics (5)
- Library and Information Science (2)
- Social and Behavioral Sciences (2)
-
- Biochemistry, Biophysics, and Structural Biology (1)
- Business (1)
- Business Administration, Management, and Operations (1)
- Communication Sciences and Disorders (1)
- Databases and Information Systems (1)
- Education (1)
- Environmental Microbiology and Microbial Ecology (1)
- Life Sciences (1)
- Materials Science and Engineering (1)
- Medicine and Health Sciences (1)
- Microbiology (1)
- Molecular Biology (1)
- Special Education and Teaching (1)
- Speech Pathology and Audiology (1)
- Structural Materials (1)
- Keyword
-
- Cybersecurity (2)
- 16S rRNA (1)
- Articulated Concrete Block Mattresses (1)
- Augmentative and alternative communication devices (1)
- Autism spectrum disorder (1)
-
- Computer engineering (1)
- ECOncrete ® (1)
- Employees (1)
- Iconicity (1)
- Illumina (1)
- Information science (1)
- Information security (1)
- Information systems (1)
- Information systems security (1)
- Microbiome (1)
- Mobile (1)
- Neutralization (1)
- Organizations (1)
- Partial least square (1)
- Password policies (1)
- Phishing (1)
- Port Everglades Inlet (1)
- Protection motivation theory (1)
- Social engineering (1)
- Social influences (1)
- Social pressures (1)
- Speech therapy (1)
- Timers (1)
- Usability (1)
- User behavior (1)
Articles 1 - 6 of 6
Full-Text Articles in Engineering
A Temporal Analysis Of The Microbiota And Biofouling Development On Artificial Substrates In The Port Everglades Inlet, Florida, Denise Swack
All HCAS Student Capstones, Theses, and Dissertations
A pilot project was deployed in Port Everglades Inlet, Florida that aimed to evaluate the biofilm composing the microbiome on ecologically engineered artificial substrates used to build Coastal Marine Infrastructure. In April of 2017, an Articulated Concrete Block Mattress comprised of an ecological engineered concrete substrate and a standard smooth surface control substrates were compared. This study will provide a profile on the microbiome community on artificial substrates within Port Everglades Inlet on bio-enhancing concrete-based solutions in our Coastal Marine Infrastructure. To study the microbial community, the 16s rRNA technology was used in Illumina’s high-throughput DNA sequencing. Samples were collected …
Orientation And Social Influences Matter: Revisiting Neutralization Tendencies In Information Systems Security Violation, Frank Curtis King
Orientation And Social Influences Matter: Revisiting Neutralization Tendencies In Information Systems Security Violation, Frank Curtis King
CCE Theses and Dissertations
It is estimated that over half of all information systems security breaches are due directly or indirectly to the poor security practices of an organization’s employees. Previous research has shown neutralization techniques as having influence on the intent to violate information security policy. In this study, we proposed an expansion of the neutralization model by including the effects of business and ethical orientation of individuals on their tendencies to neutralize and compromise with information security policy. Additionally, constructs from social influences and pressures have been integrated into this model to measure the impact on the intent to violate information security …
Pause For A Cybersecurity Cause: Assessing The Influence Of A Waiting Period On User Habituation In Mitigation Of Phishing Attacks, Amy Antonucci
Pause For A Cybersecurity Cause: Assessing The Influence Of A Waiting Period On User Habituation In Mitigation Of Phishing Attacks, Amy Antonucci
CCE Theses and Dissertations
Social engineering costs organizations billions of dollars a year. Social engineering exploits the weakest link of information security systems, the people who are using them. Phishing is a form of social engineering in which the perpetrator depends on the victim’s instinctual thinking towards an email designed to create a fear or excitement response. It is well-documented in literature that users continue to click on phishing emails costing them and their employers significant monetary resources and data loss. Training does not appear to mitigate the effects of phishing much; other solutions are necessary to mitigate phishing.
Kahneman introduced the concepts of …
Improving Employees’ Compliance With Password Policies, Enas Albataineh
Improving Employees’ Compliance With Password Policies, Enas Albataineh
CCE Theses and Dissertations
Employees’ lack of compliance with password policies increases password susceptibility, which leads to financial damages to the organizations as a result of information disclosure, fraud, and unauthorized transactions. However, few studies have examined what motivates employees to comply with password policies.
The purpose of this quantitative cross-sectional study was to examine what factors influence employees’ compliance with password policies. A theoretical model was developed based on Protection Motivation Theory (PMT), General Deterrence Theory (GDT), Theory of Reasoned Action (TRA), and Psychological Ownership Theory to explain employees’ compliance with password policies.
A non-probability convenience sample was employed. The sample consisted of …
An Empirical Assessment Of Users' Information Security Protection Behavior Towards Social Engineering Breaches, Nisha Jatin Patel
An Empirical Assessment Of Users' Information Security Protection Behavior Towards Social Engineering Breaches, Nisha Jatin Patel
CCE Theses and Dissertations
User behavior is one of the most significant information security risks. Information Security is all about being aware of who and what to trust and behaving accordingly. Due to technology becoming an integral part of nearly everything in people's daily lives, the organization's need for protection from security threats has continuously increased. Social engineering is the act of tricking a user into revealing information or taking action. One of the riskiest aspects of social engineering is that it depends mainly upon user errors and is not necessarily a technology shortcoming. User behavior should be one of the first apprehensions when …
A Study Of Factors That Influence Symbol Selection On Augmentative And Alternative Communication Devices For Individuals With Autism Spectrum Disorder, William Todd Dauterman
A Study Of Factors That Influence Symbol Selection On Augmentative And Alternative Communication Devices For Individuals With Autism Spectrum Disorder, William Todd Dauterman
CCE Theses and Dissertations
According to the American Academy of Pediatrics (AAP), 1 in 59 children are diagnosed with Autism Spectrum Disorder (ASD) each year. Given the complexity of ASD and how it is manifested in individuals, the execution of proper interventions is difficult. One major area of concern is how individuals with ASD who have limited communication skills are taught to communicate using Augmentative and Alternative Communication devices (AAC). AACs are portable electronic devices that facilitate communication by using audibles, signs, gestures, and picture symbols. Traditionally, Speech-Language Pathologists (SLPs) are the primary facilitators of AAC devices and help establish the language individuals with …