Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Nova Southeastern University

CCE Theses and Dissertations

Discipline
Keyword
Publication Year

Articles 1 - 30 of 51

Full-Text Articles in Social and Behavioral Sciences

A Study Of The Effect Of Types Of Organizational Culture On Information Security Procedural Countermeasures, Sheri James Jan 2023

A Study Of The Effect Of Types Of Organizational Culture On Information Security Procedural Countermeasures, Sheri James

CCE Theses and Dissertations

This study examined the impact of specific organizational cultures on information security procedural countermeasures (ISPC). With increasing security incidents and data breaches, organizations acknowledge that people are their greatest asset as well as a vulnerability. Previous research into information security procedural controls has centered on behavioral, cognitive, and social theories; some literature incorporates general notions of organization culture yet there is still an absence in socio-organizational studies dedicated to elucidating how information security policy (ISP) compliance can be augmented by implementing comprehensive security education, training, and awareness (SETA) programs focusing on education, training, and awareness initiatives.

A theoretical model was …


Factors Affecting Customers’ Decision To Share Personal Data With Mobile Operators, Ammar Ali Qaffaf Jan 2022

Factors Affecting Customers’ Decision To Share Personal Data With Mobile Operators, Ammar Ali Qaffaf

CCE Theses and Dissertations

Companies that personalize their services based on users’ specific needs have increased sales and customer satisfaction. Personalization requires analyzing the user’s behavior and correlating the action with other pieces of information. The information available for cellular service providers has grown substantially as connectivity becomes ubiquitous. Customers are unknowingly sharing their locations, habits, activities, and preferences in real-time with their service providers. Although cellular service providers state that they share personal data with external entities in their publicly available privacy policies, users have limited control over who can access their personal information. Users have no, or suboptimal, control to manage their …


Exploring The Existing And Unknown Side Effects Of Privacy Preserving Data Mining Algorithms, Hima Bindu Sadashiva Reddy Jan 2022

Exploring The Existing And Unknown Side Effects Of Privacy Preserving Data Mining Algorithms, Hima Bindu Sadashiva Reddy

CCE Theses and Dissertations

The data mining sanitization process involves converting the data by masking the sensitive data and then releasing it to public domain. During the sanitization process, side effects such as hiding failure, missing cost and artificial cost of the data were observed. Privacy Preserving Data Mining (PPDM) algorithms were developed for the sanitization process to overcome information loss and yet maintain data integrity. While these PPDM algorithms did provide benefits for privacy preservation, they also made sure to solve the side effects that occurred during the sanitization process. Many PPDM algorithms were developed to reduce these side effects. There are several …


A Universal Cybersecurity Competency Framework For Organizational Users, Patricia A. Baker Jan 2022

A Universal Cybersecurity Competency Framework For Organizational Users, Patricia A. Baker

CCE Theses and Dissertations

The global reliance on the Internet to facilitate organizational operations necessitates further investments in organizational information security. Such investments hold the potential for protecting information assets from cybercriminals. To assist organizations with their information security, The National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (NCWF) was created. The framework referenced the cybersecurity work, knowledge, and skills required to competently complete the tasks that strengthen their information security. Organizational users’ limited cybersecurity competency contributes to the financial and information losses suffered by organizations year after year. While most organizational users may be able to respond positively to a cybersecurity threat, …


An Assessment Of The Impacts Of Social Media Inputs And Court Case Information On Mitigating Insider Threats, Robert Jones Jan 2021

An Assessment Of The Impacts Of Social Media Inputs And Court Case Information On Mitigating Insider Threats, Robert Jones

CCE Theses and Dissertations

The insider threat is a global problem that impacts organizations and produces a gamut of undesired outcomes. Businesses often experience lost revenue and stolen trade secrets, which can leave a tarnished reputation. Insider threats can also cause harm to individuals and national security. Past efforts have not mitigated the problem in its entirety. Documented instances of insider threats are as recent as March 2020. Many researchers have focused on monitoring technologies and relying on human monitoring in a reactive posture. An ideal solution would scrutinize an individual’s character and ascertain whether unique traits associated with actors of insider threats are …


Orientation And Social Influences Matter: Revisiting Neutralization Tendencies In Information Systems Security Violation, Frank Curtis King Jan 2021

Orientation And Social Influences Matter: Revisiting Neutralization Tendencies In Information Systems Security Violation, Frank Curtis King

CCE Theses and Dissertations

It is estimated that over half of all information systems security breaches are due directly or indirectly to the poor security practices of an organization’s employees. Previous research has shown neutralization techniques as having influence on the intent to violate information security policy. In this study, we proposed an expansion of the neutralization model by including the effects of business and ethical orientation of individuals on their tendencies to neutralize and compromise with information security policy. Additionally, constructs from social influences and pressures have been integrated into this model to measure the impact on the intent to violate information security …


Improving Employees’ Compliance With Password Policies, Enas Albataineh Jan 2021

Improving Employees’ Compliance With Password Policies, Enas Albataineh

CCE Theses and Dissertations

Employees’ lack of compliance with password policies increases password susceptibility, which leads to financial damages to the organizations as a result of information disclosure, fraud, and unauthorized transactions. However, few studies have examined what motivates employees to comply with password policies.

The purpose of this quantitative cross-sectional study was to examine what factors influence employees’ compliance with password policies. A theoretical model was developed based on Protection Motivation Theory (PMT), General Deterrence Theory (GDT), Theory of Reasoned Action (TRA), and Psychological Ownership Theory to explain employees’ compliance with password policies.

A non-probability convenience sample was employed. The sample consisted of …


Enterprise Social Network Systems Implementation Model For Knowledge Sharing Among Supply Chain It Professionals, Edgardo Luis Velez-Mandes Jan 2021

Enterprise Social Network Systems Implementation Model For Knowledge Sharing Among Supply Chain It Professionals, Edgardo Luis Velez-Mandes

CCE Theses and Dissertations

With the increased use of social network technologies in organizational environments, there is a need to understand how these technologies facilitate organizational knowledge management, particularly knowledge sharing. Prior research has focused on the relationship between knowledge management and enterprise social networking systems (ESNS), but little research has been conducted relating to how organizations implement and use ESNS for knowledge sharing. The goal was to construct and validate internally a model that offers guidance for the successful implementation and use of ESNS for knowledge sharing and building successful virtual communities of practice (vCoPs) among IT supply chain professionals in a healthcare …


Human Errors In Data Breaches: An Exploratory Configurational Analysis, Gabriel A. Cornejo Jan 2021

Human Errors In Data Breaches: An Exploratory Configurational Analysis, Gabriel A. Cornejo

CCE Theses and Dissertations

Information Systems (IS) are critical for employee productivity and organizational success. Data breaches are on the rise—with thousands of data breaches accounting for billions of records breached and annual global cybersecurity costs projected to reach $10.5 trillion by 2025. A data breach is the unauthorized disclosure of sensitive information—and can be achieved intentionally or unintentionally. Significant causes of data breaches are hacking and human error; in some estimates, human error accounted for about a quarter of all data breaches in 2018. Furthermore, the significance of human error on data breaches is largely underrepresented, as hackers often capitalize on organizational users’ …


Investigating The User Experience With A 3d Virtual Anatomy Application, Winnyanne Kunkle Jan 2021

Investigating The User Experience With A 3d Virtual Anatomy Application, Winnyanne Kunkle

CCE Theses and Dissertations

Decreasing hours dedicated to teaching anatomy courses and declining use of human cadavers have spurred the need for innovative solutions in teaching anatomy in medical schools. Advancements in virtual reality (VR), 3D visualizations, computer graphics, and medical graphic images have enabled the development of highly interactive 3D virtual applications. Over recent years, variations of interactive systems on computer-mediated environments have been used as supplementary resource for learners. However, despite the growing sophistication of these resources for learning anatomy, studies show that students predominantly prefer traditional methods of learning and hands-on cadaver-based learning over computer-mediated platforms.

There is limited research on …


An Empirical Examination Of The Computer Security Behaviors Of Telecommuters Working With Confidential Data Through Leveraging The Factors From Fear Appeals Model (Fam), Titus Dohnfon Fofung Jan 2021

An Empirical Examination Of The Computer Security Behaviors Of Telecommuters Working With Confidential Data Through Leveraging The Factors From Fear Appeals Model (Fam), Titus Dohnfon Fofung

CCE Theses and Dissertations

Computer users’ security compliance behaviors can be better understood by devising an experimental study to examine how fear appeals might impact users’ security behavior. Telecommuter security behavior has become very relevant in information systems (IS) research with the growing number of individuals working from home. The increasing dependence on telecommuting to enhance the viability and convenience has created an urgency with the advent of the COVID-19 pandemic to examine the behavior of users working at home across a corporate network. The home networks are usually not as secure as those in corporate settings. There is seldom a firewall setting and …


The Social Media Machines: An Investigation Of The Effect Of Trust Moderated By Disinformation On Users’ Decision-Making Process, Zulma Valedon Westney Jan 2020

The Social Media Machines: An Investigation Of The Effect Of Trust Moderated By Disinformation On Users’ Decision-Making Process, Zulma Valedon Westney

CCE Theses and Dissertations

Social media networking sites (SMNS) have become a popular communications medium where users share information, knowledge, and persuasion. In less than two decades, social media's (SM) dominance as a communication medium can't be disputed, for good or evil. Combined with the newly found immediacy and pervasiveness, these SM applications' persuasive power are useful weapons for organizations, angry customers, employees, actors, and activists bent on attacking or hacking other individuals, institutions, or systems. Consequently, SM has become the preferred default mechanism of news sources; however, users are unsure if the information gathered is true or false. According to the literature, SMNS …


Unix Administrator Information Security Policy Compliance: The Influence Of A Focused Seta Workshop And Interactive Security Challenges On Heuristics And Biases, John Palmer Mcconnell Jan 2020

Unix Administrator Information Security Policy Compliance: The Influence Of A Focused Seta Workshop And Interactive Security Challenges On Heuristics And Biases, John Palmer Mcconnell

CCE Theses and Dissertations

Information Security Policy (ISP) compliance is crucial to the success of healthcare organizations due to security threats and the potential for security breaches. UNIX Administrators (UXAs) in healthcare Information Technology (IT) maintain critical servers that house Protected Health Information (PHI). Their compliance with ISP is crucial to the confidentiality, integrity, and availability of PHI data housed or accessed by their servers. The use of cognitive heuristics and biases may negatively influence threat appraisal, coping appraisal, and ultimately ISP compliance behavior. These failures may result in insufficiently protected servers and put organizations at greater risk of data breaches and financial loss. …


An Investigation Into The Impact Of Social Networking On Knowledge Sharing, James Harold Gorham Jan 2019

An Investigation Into The Impact Of Social Networking On Knowledge Sharing, James Harold Gorham

CCE Theses and Dissertations

Today we are experiencing a rapidly increasing trend to use social networking in ways that dramatically affect both our personal and our public lives. This is a global phenomenon being experienced around the world. Exactly how this technology is being used and by whom is of great interest. The problem is that not a lot of research has been conducted to investigate the role social networking sites play to influence a person’s attitude toward sharing knowledge at work. In light of the marked increase in the use of social networking sites and how it is changing the way we live, …


The Influence Of Identifiable Personality Traits On Nurses’ Intention To Use Wireless Implantable Medical Devices, Vincent Molosky Jan 2019

The Influence Of Identifiable Personality Traits On Nurses’ Intention To Use Wireless Implantable Medical Devices, Vincent Molosky

CCE Theses and Dissertations

Technically-driven medical devices such as wireless implantable medical devices (WIMD) have become ubiquitous within healthcare. The use of these devices has changed the way nurses administer patient care. Consequently, the nursing workforce is large and diverse, and with it comes an expected disparity in personalities. Research involving human factors and technology acceptance in healthcare is not new. Yet due to the changing variables in the manner of which patient care is being administered, both in person and in the mechanism of treatment, recent research suggests that individual human factors such as personality traits may hold unknown implications involving more successful …


Citationally Enhanced Semantic Literature Based Discovery, John David Fleig Jan 2019

Citationally Enhanced Semantic Literature Based Discovery, John David Fleig

CCE Theses and Dissertations

We are living within the age of information. The ever increasing flow of data and publications poses a monumental bottleneck to scientific progress as despite the amazing abilities of the human mind, it is woefully inadequate in processing such a vast quantity of multidimensional information. The small bits of flotsam and jetsam that we leverage belies the amount of useful information beneath the surface. It is imperative that automated tools exist to better search, retrieve, and summarize this content. Combinations of document indexing and search engines can quickly find you a document whose content best matches your query - if …


An Instructional Designer Competency Framework For Complex Learning Designs, David Alan Schubert Jan 2019

An Instructional Designer Competency Framework For Complex Learning Designs, David Alan Schubert

CCE Theses and Dissertations

Learning design competency frameworks published by professional organizations, exist for typical instructional design efforts. However, a review of literature revealed a lack of frameworks available for the creation of complex learning designs (CLDs). The goal of this research was to develop a competency framework for the creation of CLDs. Quantitative and qualitative methods were employed in the four phases of the design and development research approach In phase one, a survey based on the Educational Technology Multimedia Competency Survey (ETMCS) was sent to instructional designers who self-reported as having experience creating CLDs. The purpose of phase one was to identify …


Examining Shared Understanding And Team Performance In Global Virtual Teams, Alva Bullard Jan 2019

Examining Shared Understanding And Team Performance In Global Virtual Teams, Alva Bullard

CCE Theses and Dissertations

Modern organizations face many significant challenges because of turbulent environments and a competitive global economy. These competitive demands have forced many organizations to increase levels of flexibility and adaptability through the use of virtual environments, and global teams are prevalent in business organizations. Although significant research has been conducted on virtual teams, the development of shared understanding among the members of these teams has not been studied adequately. Time/space barriers, communication complexities, and team diversity hinder the development of shared understanding in these teams.

Based on the Media Synchronicity Theory (MST), a new theoretical model was created that used the …


A Comprehensive Cybersecurity Defense Framework For Large Organizations, Willarvis Smith Jan 2019

A Comprehensive Cybersecurity Defense Framework For Large Organizations, Willarvis Smith

CCE Theses and Dissertations

There is a growing need to understand and identify overarching organizational requirements for cybersecurity defense in large organizations. Applying proper cybersecurity defense will ensure that the right capabilities are fielded at the right locations to safeguard critical assets while minimizing duplication of effort and taking advantage of efficiencies. Exercising cybersecurity defense without an understanding of comprehensive foundational requirements instills an ad hoc and in many cases conservative approach to network security. Organizations must be synchronized across federal and civil agencies to achieve adequate cybersecurity defense. Understanding what constitutes comprehensive cybersecurity defense will ensure organizations are better protected and more efficient. …


Examining Task Conflict And Team Atmosphere In Virtual Teams Engaged In Outsourced Project Work, Harold Carr Osborn Jan 2019

Examining Task Conflict And Team Atmosphere In Virtual Teams Engaged In Outsourced Project Work, Harold Carr Osborn

CCE Theses and Dissertations

Global teams have become commonplace. As teams have become more dispersed, leveraging outsourced resources has gained popularity. Outsourcing can be a prudent move financially; however, when it is inappropriately applied, the damage it produces can easily overshadow any financial gains. Such ill effects can include impaired employee performance and morale caused by decreased job security. Moreover, it can lead to a less favorable team atmosphere and increased task conflict.

This study examined the effects of team virtuality along with the strategic alignment of outsourcing on team performance. The research utilized the intervening processes theory (IPT). The IPT posits that the …


Exploring Generational Differences In Text Messaging Usage And Habits, Daniel Wayne Long Jan 2018

Exploring Generational Differences In Text Messaging Usage And Habits, Daniel Wayne Long

CCE Theses and Dissertations

Members of society today embrace multiple communication media for various purposes and intents. Text messaging has been identified as the medium of choice for continual relationship maintenance and text messaging from mobile devices overshadows all other media forms for the support of social connections. Text messaging is changing everything from how operators market their plans to how advertisers and service providers reach consumers. But just as technology usage of social media and internet access are different across generational boundaries, text messaging usage and habits may also be different for various generational groups. The majority of peer-reviewed research regarding text messaging …


Assistive Technology Guidelines For Higher Education Disability Support Staff, Brenda Delee Jan 2018

Assistive Technology Guidelines For Higher Education Disability Support Staff, Brenda Delee

CCE Theses and Dissertations

With the changing laws and effective integration of assistive technology into the classroom environment, students can have the provision of multiple means to complete their work with greater independence. In post secondary education, any student who discloses a sensory, cognitive, or physical disability is eligible to request and receive assistive technology and other services. When used correctly, assistive technology can help students with reading, writing, math, and communication skills. With a possible influx of students, disability support staff must be prepared and willing to meet the needs and address issues relating to students with disabilities. If their needs are not …


Empirical Analysis Of Socio-Cognitive Factors Affecting Security Behaviors And Practices Of Smartphone Users, Joseph P. Simpson Jan 2016

Empirical Analysis Of Socio-Cognitive Factors Affecting Security Behaviors And Practices Of Smartphone Users, Joseph P. Simpson

CCE Theses and Dissertations

The overall security posture of information systems (IS) depends on the behaviors of the IS users. Several studies have shown that users are the greatest vulnerability to IS security. The proliferation of smartphones is introducing an entirely new set of risks, threats, and vulnerabilities. Smartphone devices amplify this data exposure problem by enabling instantaneous transmission and storage of personally identifiable information (PII) by smartphone users, which is becoming a major security risk. Moreover, companies are also capitalizing on the availability and powerful computing capabilities of these smartphone devices and developing a bring-your-own-device (BYOD) program, which makes companies susceptible to divulgence …


An Empirical Assessment Of Employee Cyberslacking In The Public Sector, Wilnelia Hernández Jan 2016

An Empirical Assessment Of Employee Cyberslacking In The Public Sector, Wilnelia Hernández

CCE Theses and Dissertations

With the increasing use of the Internet, new challenges are presented to employees in the workplace. Employees spend time during work hours on non-work related activities including visiting e-commerce Websites, managing personal email accounts, and engaging in e-banking. These types of actions in the workplace are known as cyberslacking. Cyberslacking affects the employees’ productivity, presents legal concerns, and undermines the security of the organization’s network. This research study addressed the problem of cyberslacking in the public sector, by assessing the ethical severity of cyberslacking activities, as well as how employees perceived that the frequency of such activities occurred by their …


A Study Of The Success Of Group Formation In Virtual Teams Using Computer-Mediated Communications, Eliel Melón-Ramos Jan 2016

A Study Of The Success Of Group Formation In Virtual Teams Using Computer-Mediated Communications, Eliel Melón-Ramos

CCE Theses and Dissertations

In the digital domain, virtual teams within organizations and corporations are becoming common. Restructuring an organization or corporation is vital because competition and globalization are increasing. In this era of globalization, distributed working groups need to develop a competitive advantage in these ever-changing environments. Historically, teams had experienced problems stemming from geographical and temporal limitations. With the increase of technology in telecommunications, organizations are increasingly forming virtual teams, which have become critical to the survival of nearly any corporate entity.

Virtual teams have some of the same problems that regular teams have. One of the key challenges is the method …


A Big Idea: The Rollout Of Open Suny, Karen E. Case Jan 2016

A Big Idea: The Rollout Of Open Suny, Karen E. Case

CCE Theses and Dissertations

Leveraging technology may be a viable solution in the higher education industry as enrollments decline and institutions have a hard time meeting their projected budgets. One innovative approach to mitigating this problem was approved in March of 2013 by the Board of Trustees of the State University of New York (SUNY). It is called Open SUNY. Open SUNY consists of nine components: the creation and expansion of online programs to meet workforce development needs, the development of online credit-bearing experiential learning experiences, support for training of faculty who opt to use emerging technologies, support for student access to online courses, …


An Investigation Of Socio-Technical Components Of Knowledge Management System (Kms) Usage, Noel Wint Jr. Jan 2016

An Investigation Of Socio-Technical Components Of Knowledge Management System (Kms) Usage, Noel Wint Jr.

CCE Theses and Dissertations

Existing literature indicates that although both academics and practitioners recognize knowledge management (KM) as a source of competitive advantage, users are not always willing to use a knowledge management system (KMS). Because of the social nature of knowledge transfer, a KMS can be considered a socio-technical system. Many explanations have been presented for this failure to utilize the KMS. These explanations include a number of the socio-technical factors relating to people, processes, and technologies. While these factors may have significant explanatory power when examined independently, existing studies have not sufficiently addressed the interactions among all three socio-technical factors or their …


Electronic Medical Records (Emr): An Empirical Testing Of Factors Contributing To Healthcare Professionals’ Resistance To Use Emr Systems, Emmanuel Patrick Bazile Jan 2016

Electronic Medical Records (Emr): An Empirical Testing Of Factors Contributing To Healthcare Professionals’ Resistance To Use Emr Systems, Emmanuel Patrick Bazile

CCE Theses and Dissertations

The benefits of using electronic medical records (EMRs) have been well documented; however, despite numerous financial benefits and cost reductions being offered by the federal government, some healthcare professionals have been reluctant to implement EMR systems. In fact, prior research provides evidence of failed EMR implementations due to resistance on the part of physicians, nurses, and clinical administrators. In 2010, only 25% of office-based physicians have basic EMR systems and only 10% have fully functional systems. One of the hindrances believed to be responsible for the slow implementation rates of EMR systems is resistance from healthcare professionals not truly convinced …


Use Of Student Created Video Podcasts To Promote Foreign Language Grammar Acquisition In Middle School, Sergio Parra Jan 2016

Use Of Student Created Video Podcasts To Promote Foreign Language Grammar Acquisition In Middle School, Sergio Parra

CCE Theses and Dissertations

The use of video podcasts in education has emerged as a phenomenon that has gained a considerable amount of attention over the last few years. Although video podcasting is becoming a well-established technology in higher education, new multimedia instructional strategies such as student-created video podcasts in grades K-12 are under-researched.

The study investigated the effects of video podcasts created by students to promote foreign language grammar acquisition at the middle school level and find how students described such experience. The current investigation was conducted by using the explanatory sequential design, which is a mixed methods research design that occurs in …


Evaluating The Enterprise Resource Planning (Erp) Systems’ Success At The Individual Level Of Analysis In The Middle East, Mohammad Alzoubi Jan 2016

Evaluating The Enterprise Resource Planning (Erp) Systems’ Success At The Individual Level Of Analysis In The Middle East, Mohammad Alzoubi

CCE Theses and Dissertations

Although ERP systems have been depicted as a solution in many organizations, there are many negative reports on ERP success, benefits, and effect on user’s performance. Previous research noted that there is a lack of knowledge and awareness of ERP systems and their overall value to ERP organizations. ERP systems have been widely studied during the past decade, yet they often fail to deliver the intended benefits originally expected. One notable reason for their failures is the lack of understanding in users’ requirements. This dissertation study was designed to understand the relative importance of system quality (SQ), IQ (IQ), service …