Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 37 of 37

Full-Text Articles in Physical Sciences and Mathematics

Examining Task Conflict And Team Atmosphere In Virtual Teams Engaged In Outsourced Project Work, Harold Carr Osborn Jan 2019

Examining Task Conflict And Team Atmosphere In Virtual Teams Engaged In Outsourced Project Work, Harold Carr Osborn

CCE Theses and Dissertations

Global teams have become commonplace. As teams have become more dispersed, leveraging outsourced resources has gained popularity. Outsourcing can be a prudent move financially; however, when it is inappropriately applied, the damage it produces can easily overshadow any financial gains. Such ill effects can include impaired employee performance and morale caused by decreased job security. Moreover, it can lead to a less favorable team atmosphere and increased task conflict.

This study examined the effects of team virtuality along with the strategic alignment of outsourcing on team performance. The research utilized the intervening processes theory (IPT). The IPT posits that the …


The Factors That Impact Patient Portal Utilization, William Carroll Reed Jan 2019

The Factors That Impact Patient Portal Utilization, William Carroll Reed

CCE Theses and Dissertations

Spawned by legislative mandates, such as the American Recovery and Reinvestment Act of 2009’s Health Information Technology for Economic and Clinical Health Act, and individuals desiring to have more personal accountability for their health and healthcare, the introduction and use of electronic personal health information (ePHI) has grown substantially. Given that most ePHI is maintained within the healthcare delivery system, an information portal is required for individuals to have access to the ePHI. As a result, the legislation required the introduction and use of patient portals to grant such access.

Despite substantial financial incentives and disincentives for healthcare organizations to …


An Examination Of User Detection Of Business Email Compromise Amongst Corporate Professionals, Shahar Sean Aviv Jan 2019

An Examination Of User Detection Of Business Email Compromise Amongst Corporate Professionals, Shahar Sean Aviv

CCE Theses and Dissertations

With the evolution in technology and increase in utilization of the public Internet, Internet-based mobile applications, and social media, security risks for organizations have greatly increased. While corporations leverage social media as an effective tool for customer advertisements, the abundance of information available via public channels along with the growth in Internet connections to corporate networks including mobile applications, have made cyberattacks attractive for cybercriminals. Cybercrime against organizations is a daily threat and targeting companies of all sizes. Cyberattacks are continually evolving and becoming more complex that make it difficult to protect against with traditional security methods. Cybercriminals utilize email …


Motivation Factors For Using Mobile Information Systems In M-Learning, Neelima Bhatnagar Jan 2019

Motivation Factors For Using Mobile Information Systems In M-Learning, Neelima Bhatnagar

CCE Theses and Dissertations

Organizations of all types have benefited from the development and use of information systems. With the explosion of mobile applications, also known as mobile information systems, new uses are emerging. One such application of mobile information systems is mobile learning, referred to as m-learning hereafter. M-learning has found its ways in the corporate world for employee training and development, and in higher education for teaching and student learning. However, m-learning has not seen the same extent of usage as distance learning and e-learning, often attributed to technological limitations. Motivational factors, though, may also contribute to the slow adoption of m-learning. …


Information Systems Security Leadership: An Empirical Study Of Behavioral Influences Of Leaders On Employees’ Security Compliance, Marcus Alan Winkfield Jan 2019

Information Systems Security Leadership: An Empirical Study Of Behavioral Influences Of Leaders On Employees’ Security Compliance, Marcus Alan Winkfield

CCE Theses and Dissertations

This empirical study examined the behavioral influences of leaders on employees’ security compliance. Organizations can use leadership concepts in the field of Information Systems (IS) security. Despite the adoption of technical and managerial approaches, organizations still face issues motivating employee IS security compliance. This dissertation argued that organizations need strong leadership to encourage employees. Using the expectancy theory, this paper created a theoretical model to help understand the influence of task and relationship-oriented leadership behaviors on nontechnical controls IS security compliance. The conceptual underpinnings translated into perceived security effort, perceived security performance, and expected security outcomes. The theoretical model was …


Cyber Situational Awareness And Cyber Curiosity Taxonomy For Understanding Susceptibility Of Social Engineering Attacks In The Maritime Industry, Guillermo Francisco Perez Jan 2019

Cyber Situational Awareness And Cyber Curiosity Taxonomy For Understanding Susceptibility Of Social Engineering Attacks In The Maritime Industry, Guillermo Francisco Perez

CCE Theses and Dissertations

The maritime information system (IS) user has to be prepared to deal with a potential safety and environmental risk that can be caused by an unanticipated failure to a cyber system used onboard a vessel. A hacker leveraging a maritime IS user’s Cyber Curiosity can lead to a successful cyber-attack by enticing a user to click on a malicious Web link sent through an email and/or posted on a social media website. At worst, a successful cyber-attack can impact the integrity of a ship’s cyber systems potentially causing disruption or human harm. A lack of awareness of social engineering attacks …


An Investigation Of Factors Motivating Employee Attitudes And Intentions To Share Knowledge In Homeland Security, Evette Maynard-Noel Jan 2019

An Investigation Of Factors Motivating Employee Attitudes And Intentions To Share Knowledge In Homeland Security, Evette Maynard-Noel

CCE Theses and Dissertations

The terrorist events of September 11, 2001, highlighted the inability of federal employees and officials to collaborate and share actionable knowledge-based information with the right people at the right time. However, much of the literature on knowledge sharing provided insight into knowledge sharing in private sector organizations and foreign public-sector organizations, instead of domestic public sectors or the United States federal government. While the importance of knowledge sharing for homeland security has been documented in the literature, there are no established frameworks that evaluate knowledge sharing motive and intentions in this context. The main goal of this research was to …