Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Physical Sciences and Mathematics

Which Organisational Model Meets Best Practice Criterion For Critical Infrastructure Providers: An Examination Of The Australian Perspective Based On Case Studies, Andrew Woodward, Craig Valli Aug 2010

Which Organisational Model Meets Best Practice Criterion For Critical Infrastructure Providers: An Examination Of The Australian Perspective Based On Case Studies, Andrew Woodward, Craig Valli

International Cyber Resilience conference

While it is recognised that there must be segregation between corporate and process control networks in order to achieve a higher level of security, there is evidence that this is not occurring. Computer and network vulnerability assessments were carried out on three Australian critical infrastructure providers to determine their level of security. The security measures implemented by each organisation have been mapped against best practice recommendations for achieving segregation between process control and corporate networks. One of the organisations used a model which provided a dedicated information security team for provision of security for the process control networks. One of …


A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade Jul 2010

A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade

Faculty and Research Publications

Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the perceptions of women in IT within the context of information security and assurance. This paper describes results from a study of a relatively new career path to see if there are female-friendly opportunities that have not existed in previous IT career paths. Research methodology focuses on a qualitative analysis of in-depth interviews with women who are self-described information security professionals. A primary goal of the study is to understand the perceptions of women in information security and determine …


Integrating Environmental Science Into Information Technology Content To Generate Student Interest, Rondalynne Mcclintock '13, Yoonmi Lee '12, June Hilton '04, Brian Hilton, Gondy Leroy Jan 2010

Integrating Environmental Science Into Information Technology Content To Generate Student Interest, Rondalynne Mcclintock '13, Yoonmi Lee '12, June Hilton '04, Brian Hilton, Gondy Leroy

CGU Faculty Publications and Research

In an effort to increase female student interest in computing we applied and evaluated an interdisciplinary approach at a suburban high school in eastern Los Angeles County, California. Three classes, an IB Environmental Science class, an AP Environmental Science class, and a Computer Science were surveyed to assess attitude changes toward information technology. Results indicated gender differences between the participating classes, and differences before and after the project. Although the project did not uniformly impact the attitude of female high school students, it impacted teachers who are adjusting their teaching methods, an outcome that has a long-term positive influence.


Information Technology Adoption In Latin American Microenterprises, Travis Good, Mehruz Kamal, Sajda Qureshi, Nancy Jimenez Jan 2010

Information Technology Adoption In Latin American Microenterprises, Travis Good, Mehruz Kamal, Sajda Qureshi, Nancy Jimenez

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

The majority of businesses in developing regions across the world are microenterprises. In recent years, this form of business has been particularly resilient to economic downturns. While microenterprises are the least likely to succeed, when they do, their growth increases by a factor of 3.4% when they adopt technology. However, the challenges faced by microenterprises make it very difficult for them to adopt technology successfully. Existing theoretical models of ICT adoption have centered on intent to adopt in large organizations, and thus lack applicability to microenterprises, wherein the intent to adopt is an individual decision. This paper builds on prior …