Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Social media

CCE Theses and Dissertations

Publication Year

Articles 1 - 6 of 6

Full-Text Articles in Physical Sciences and Mathematics

An Assessment Of The Impacts Of Social Media Inputs And Court Case Information On Mitigating Insider Threats, Robert Jones Jan 2021

An Assessment Of The Impacts Of Social Media Inputs And Court Case Information On Mitigating Insider Threats, Robert Jones

CCE Theses and Dissertations

The insider threat is a global problem that impacts organizations and produces a gamut of undesired outcomes. Businesses often experience lost revenue and stolen trade secrets, which can leave a tarnished reputation. Insider threats can also cause harm to individuals and national security. Past efforts have not mitigated the problem in its entirety. Documented instances of insider threats are as recent as March 2020. Many researchers have focused on monitoring technologies and relying on human monitoring in a reactive posture. An ideal solution would scrutinize an individual’s character and ascertain whether unique traits associated with actors of insider threats are …


The Influence Of An Individual’S Disposition To Value Privacy In A Non-Contrived Study, John Marsh Jan 2021

The Influence Of An Individual’S Disposition To Value Privacy In A Non-Contrived Study, John Marsh

CCE Theses and Dissertations

Unexpected usage of user data has made headlines as both governments and commercial entities have encountered privacy-related issues. Like other social networking sites, LinkedIn provides users to restrict access to their information or allow for public viewing; information available in the public view was used unexpectedly (i.e., profiling). A non-profit entity called ICWATCH used tools to gather information on government mass surveillance programs by scraping publicly accessible user data from LinkedIn. Previous research has shown that privacy concerns influence behavior intention in contrived scenarios. What remains unclear is whether LinkedIn users, whose data was scraped by ICWATCH (an actual situation), …


Identifying The Impact Of Perceived Shared Cultural Values On Knowledge Sharing Through A Social Media Application, Mel Anthony Tomeo Jan 2021

Identifying The Impact Of Perceived Shared Cultural Values On Knowledge Sharing Through A Social Media Application, Mel Anthony Tomeo

CCE Theses and Dissertations

Knowledge sharing (KS) has been determined by many researchers as an important tool for problem-solving experiences and achieving success. Recent studies have explained KS as an activity in which knowledge is exchanged through individuals or between organizations. KS can help facilitate decision-making capabilities, stimulate cultural change, and create innovation. Through KS, individuals and organizations can capture explicit and tacit knowledge to save time and money. Previous studies have indicated a lack of research in how perceived shared cultural values impact KS through a social media application.

The purpose of this research was to add new information to the body of …


The Social Media Machines: An Investigation Of The Effect Of Trust Moderated By Disinformation On Users’ Decision-Making Process, Zulma Valedon Westney Jan 2020

The Social Media Machines: An Investigation Of The Effect Of Trust Moderated By Disinformation On Users’ Decision-Making Process, Zulma Valedon Westney

CCE Theses and Dissertations

Social media networking sites (SMNS) have become a popular communications medium where users share information, knowledge, and persuasion. In less than two decades, social media's (SM) dominance as a communication medium can't be disputed, for good or evil. Combined with the newly found immediacy and pervasiveness, these SM applications' persuasive power are useful weapons for organizations, angry customers, employees, actors, and activists bent on attacking or hacking other individuals, institutions, or systems. Consequently, SM has become the preferred default mechanism of news sources; however, users are unsure if the information gathered is true or false. According to the literature, SMNS …


Empirical Analysis Of Socio-Cognitive Factors Affecting Security Behaviors And Practices Of Smartphone Users, Joseph P. Simpson Jan 2016

Empirical Analysis Of Socio-Cognitive Factors Affecting Security Behaviors And Practices Of Smartphone Users, Joseph P. Simpson

CCE Theses and Dissertations

The overall security posture of information systems (IS) depends on the behaviors of the IS users. Several studies have shown that users are the greatest vulnerability to IS security. The proliferation of smartphones is introducing an entirely new set of risks, threats, and vulnerabilities. Smartphone devices amplify this data exposure problem by enabling instantaneous transmission and storage of personally identifiable information (PII) by smartphone users, which is becoming a major security risk. Moreover, companies are also capitalizing on the availability and powerful computing capabilities of these smartphone devices and developing a bring-your-own-device (BYOD) program, which makes companies susceptible to divulgence …


Constructing A Community Response Grid (Crg): The Dublin, Ohio Case Study, John Freund Jan 2012

Constructing A Community Response Grid (Crg): The Dublin, Ohio Case Study, John Freund

CCE Theses and Dissertations

During an emergency, information availability is critical to preserving life and minimizing damages. During the emergency response, however, information may not be available to those who need it. A community response grid (CRG) can help ameliorate this lack of availability by allowing people to document and distribute emergency information to professional emergency responders (PERs). A CRG combines mobile communications services, Internet technologies, e-government applications, and social network concepts with traditional emergency response systems.

The problem that this case study investigated was how to construct a CRG for the City of Dublin, Ohio, Division of Police that works in conjunction with …