Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Social and Behavioral Sciences

Improving Employees’ Compliance With Password Policies, Enas Albataineh Jan 2021

Improving Employees’ Compliance With Password Policies, Enas Albataineh

CCE Theses and Dissertations

Employees’ lack of compliance with password policies increases password susceptibility, which leads to financial damages to the organizations as a result of information disclosure, fraud, and unauthorized transactions. However, few studies have examined what motivates employees to comply with password policies.

The purpose of this quantitative cross-sectional study was to examine what factors influence employees’ compliance with password policies. A theoretical model was developed based on Protection Motivation Theory (PMT), General Deterrence Theory (GDT), Theory of Reasoned Action (TRA), and Psychological Ownership Theory to explain employees’ compliance with password policies.

A non-probability convenience sample was employed. The sample consisted of …


The Social Media Machines: An Investigation Of The Effect Of Trust Moderated By Disinformation On Users’ Decision-Making Process, Zulma Valedon Westney Jan 2020

The Social Media Machines: An Investigation Of The Effect Of Trust Moderated By Disinformation On Users’ Decision-Making Process, Zulma Valedon Westney

CCE Theses and Dissertations

Social media networking sites (SMNS) have become a popular communications medium where users share information, knowledge, and persuasion. In less than two decades, social media's (SM) dominance as a communication medium can't be disputed, for good or evil. Combined with the newly found immediacy and pervasiveness, these SM applications' persuasive power are useful weapons for organizations, angry customers, employees, actors, and activists bent on attacking or hacking other individuals, institutions, or systems. Consequently, SM has become the preferred default mechanism of news sources; however, users are unsure if the information gathered is true or false. According to the literature, SMNS …


A Study Of The Success Of Group Formation In Virtual Teams Using Computer-Mediated Communications, Eliel Melón-Ramos Jan 2016

A Study Of The Success Of Group Formation In Virtual Teams Using Computer-Mediated Communications, Eliel Melón-Ramos

CCE Theses and Dissertations

In the digital domain, virtual teams within organizations and corporations are becoming common. Restructuring an organization or corporation is vital because competition and globalization are increasing. In this era of globalization, distributed working groups need to develop a competitive advantage in these ever-changing environments. Historically, teams had experienced problems stemming from geographical and temporal limitations. With the increase of technology in telecommunications, organizations are increasingly forming virtual teams, which have become critical to the survival of nearly any corporate entity.

Virtual teams have some of the same problems that regular teams have. One of the key challenges is the method …


An Investigation Of Socio-Technical Components Of Knowledge Management System (Kms) Usage, Noel Wint Jr. Jan 2016

An Investigation Of Socio-Technical Components Of Knowledge Management System (Kms) Usage, Noel Wint Jr.

CCE Theses and Dissertations

Existing literature indicates that although both academics and practitioners recognize knowledge management (KM) as a source of competitive advantage, users are not always willing to use a knowledge management system (KMS). Because of the social nature of knowledge transfer, a KMS can be considered a socio-technical system. Many explanations have been presented for this failure to utilize the KMS. These explanations include a number of the socio-technical factors relating to people, processes, and technologies. While these factors may have significant explanatory power when examined independently, existing studies have not sufficiently addressed the interactions among all three socio-technical factors or their …


Motivating The Solicited And Unsolicited Sharing Of Tacit Knowledge Through The Process Of Externalization, Sheila Yvonne Sorensen Jan 2015

Motivating The Solicited And Unsolicited Sharing Of Tacit Knowledge Through The Process Of Externalization, Sheila Yvonne Sorensen

CCE Theses and Dissertations

While several U. S. firms have invested in Knowledge Management (KM) tools and software, it has become apparent that investments must be made in additional facets of KM, such as knowledge sharing (KS), thought by many researchers to be the most important component of KM. Of the two types of KS, explicit and tacit, the sharing of tacit knowledge has been shown to contribute the most to an organization’s performance. However, since tacit knowledge is difficult to both convey and acquire, this unshared tacit knowledge may ultimately harm an organization when, without the appropriate knowledge, individuals cannot effectively perform their …


An Investigation Of The Factors Contributing To The Development Of Poorly Defined Is Strategies For Firms In The United States, Karen B. Lacaden Jan 2015

An Investigation Of The Factors Contributing To The Development Of Poorly Defined Is Strategies For Firms In The United States, Karen B. Lacaden

CCE Theses and Dissertations

Although empirical research has shown that a clearly defined information system (IS) strategy has a positive impact to a firm’s performance and a poorly defined IS strategy has a negative impact to a firms’ performance, firms still develop poorly defined IS strategies. Further compounding the problem, research has revealed that 87% of the business executives believe information systems are a critical enabler to their firms' strategic realization, yet only 33% of business executives involve the Chief Information Officer (CIO) in their firm’s business strategy development. The main goal of this research study is to empirically identify factors which impact development …


Implicit Measures And Online Risks, Lucinda W. Wang Jan 2015

Implicit Measures And Online Risks, Lucinda W. Wang

CCE Theses and Dissertations

Information systems researchers typically use self-report measures, such as questionnaires to study consumers’ online risk perception. The self-report approach captures the conscious perception of online risk but not the unconscious perception that precedes and dominates human being’s decision-making. A theoretical model in which implicit risk perception precedes explicit risk evaluation is proposed. The research model proposes that implicit risk affects both explicit risk and the attitude towards online purchase. In a direct path, the implicit risk affects attitude towards purchase. In an indirect path, the implicit risk affects explicit risk, which in turn affects attitude towards purchase.

The stimulus used …