Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Nova Southeastern University

CCE Theses and Dissertations

Discipline
Keyword
Publication Year

Articles 31 - 51 of 51

Full-Text Articles in Social and Behavioral Sciences

Investigating Categorization Preferences For Online Dating Sites, Scott Morrissette May 2015

Investigating Categorization Preferences For Online Dating Sites, Scott Morrissette

CCE Theses and Dissertations

The purpose of the study was to determine whether a three-category (3C) system for classifying profiles on online dating sites provides advantages over a two-category (2C) system as decision makers evaluate a long list of profiles. Two groups of single heterosexual or bisexual women ages 20 to 30 reviewed a list of 60 male profiles on simulated online dating sites to choose which profiled man they would most like to learn more about. One group (n = 53) evaluated the profiles using a 2C system; the other group (n = 56) used a 3C system. After making their choice, women …


Affect And Online Privacy Concerns, David Charles Castano Apr 2015

Affect And Online Privacy Concerns, David Charles Castano

CCE Theses and Dissertations

The purpose of this study was to investigate the influence of affect on privacy concerns and privacy behaviors. A considerable amount of research in the information systems field argues that privacy concerns, usually conceptualized as an evaluation of privacy risks, influence privacy behaviors. However, recent theoretical work shows that affect, a pre-cognitive evaluation, has a significant effect on preferences and choices in risky situations. Affect is contrasted with cognitive issues in privacy decision making and the role of affective versus cognitive-consequentialist factors is reviewed in privacy context.

A causal model was developed to address how affect influences privacy concerns and …


Immunology Inspired Detection Of Data Theft From Autonomous Network Activity, Theodore O. Cochran Apr 2015

Immunology Inspired Detection Of Data Theft From Autonomous Network Activity, Theodore O. Cochran

CCE Theses and Dissertations

The threat of data theft posed by self-propagating, remotely controlled bot malware is increasing. Cyber criminals are motivated to steal sensitive data, such as user names, passwords, account numbers, and credit card numbers, because these items can be parlayed into cash. For anonymity and economy of scale, bot networks have become the cyber criminal’s weapon of choice. In 2010 a single botnet included over one million compromised host computers, and one of the largest botnets in 2011 was specifically designed to harvest financial data from its victims. Unfortunately, current intrusion detection methods are unable to effectively detect data extraction techniques …


An Interpretive Phenomenological Analysis Inquiry Into Facebook Newcomer Motivations For Participatory Activities, Kristin Raub Mar 2015

An Interpretive Phenomenological Analysis Inquiry Into Facebook Newcomer Motivations For Participatory Activities, Kristin Raub

CCE Theses and Dissertations

This qualitative study provided insight into the phenomenon of newcomers in social networking, in particular, to understand what role specific Facebook features play in motivating content sharing and contribution among newcomers. Research indicated that the first several months or years of social networking site (SNS) membership are the most crucial in terms of indicating long-term participation and commitment to the SNS. Long-term participation is specifically manifested through interactions with peers who are members of the same website and through interactivity such as content sharing and contribution. A number of quantitative studies have focused on motivations for user contribution in social …


Examining Social Network Site Usage By Older Adults: A Phenomenological Approach, Betsy Baugess Mar 2015

Examining Social Network Site Usage By Older Adults: A Phenomenological Approach, Betsy Baugess

CCE Theses and Dissertations

The Internet has infiltrated our daily lives in many ways. Social networking on the Internet is a great example of how the Internet has expanded interpersonal communication. Many individuals have made social networking sites, like FaceBook and Twitter, an essential part of their lives and use these platforms to communicate daily. Until recently, young people have been the primary participants in this fast-growing phenomenon, and older adults' participation in the Internet, specifically social networking sites, has lagged far behind. However, in recent years, there has been a noteworthy increase in the number of older adult participants. The increase in older …


Identifying Unethical Personally Identifiable Information (Pii) Privacy Violations Committed By Is/It Practitioners: A Comparison To Computing Moral Exemplars, Mark H. Rosenbaum Feb 2015

Identifying Unethical Personally Identifiable Information (Pii) Privacy Violations Committed By Is/It Practitioners: A Comparison To Computing Moral Exemplars, Mark H. Rosenbaum

CCE Theses and Dissertations

In some instances, Information Systems and Information Technology (IS/IT) practitioners have been noted to commit privacy violations to Personally Identifiable Information (PII). However, computing exemplars, due to their notable dispositional Hallmark Features of morality, understandings of ethical abstractions, and other components that comprise their virtuous makeups, are theoretically less likely to commit privacy violations to PII. This research attempted to verify if those IS/IT practitioners who identify with some of the Hallmark Features of moral and computing exemplar were less willing to commit privacy violations to PII than were those IS/IT practitioners that did not identify themselves with some of …


Gathering The Requirements For A Mobile Device Tutorial For Older Adults, Michele A. Washington Jan 2015

Gathering The Requirements For A Mobile Device Tutorial For Older Adults, Michele A. Washington

CCE Theses and Dissertations

The United States, as well as other nations, is experiencing an increase in the older adult population. As a result of older adults living longer, mobile devices can be a major component in improving older adults' quality of life. However, older adults may encounter difficulties when using the mobile devices. This research examined the requirements in addressing the needs of older adults when using a mobile device. Specifically, the research focused on gathering the task and feature requirements for a mobile device tutorial for older adults. The approach was accomplished by the development of a mobile device questionnaire, which was …


Digital Forensics Tool Interface Visualization, Roberto A. Altiero Jan 2015

Digital Forensics Tool Interface Visualization, Roberto A. Altiero

CCE Theses and Dissertations

Recent trends show digital devices utilized with increasing frequency in most crimes committed. Investigating crime involving these devices is labor-intensive for the practitioner applying digital forensics tools that present possible evidence with results displayed in tabular lists for manual review. This research investigates how enhanced digital forensics tool interface visualization techniques can be shown to improve the investigator's cognitive capacities to discover criminal evidence more efficiently. This paper presents visualization graphs and contrasts their properties with the outputs of The Sleuth Kit (TSK) digital forensic program. Exhibited is the textual-based interface proving the effectiveness of enhanced data presentation. Further demonstrated …


A Study Of Assistive Technology Competencies Of Specialists In Public Schools, Betsy B. Burgos Jan 2015

A Study Of Assistive Technology Competencies Of Specialists In Public Schools, Betsy B. Burgos

CCE Theses and Dissertations

Despite the rapid proliferation of assistive technology implementation, studies have revealed that a number of professionals that provide assistive technology services do not have adequate competencies to recommend and deliver assistive technologies in school settings. The purpose of the study was to examine the competencies of assistive technology specialists in Florida K-12 public schools, and identify training opportunities that may have helped them achieve professional competence in the evaluation and provision of assistive technology devices and services across AT service providers from different preparations.

The study applied quantitative and qualitative methods to determine answers to the following six research questions: …


Technology And Legal Research: What Is Taught And What Is Used In The Practice Of Law, Rebecca Sewanee Trammell Jan 2015

Technology And Legal Research: What Is Taught And What Is Used In The Practice Of Law, Rebecca Sewanee Trammell

CCE Theses and Dissertations

Law schools are criticized for graduating students who lack the skills necessary to practice law. Legal research is a foundational ability necessary to support lawyering competency. The American Bar Association (ABA) establishes standards for legal education that include a requirement that each law student receive substantial instruction in legal skills, including legal research. Despite the recognized importance of legal research in legal education, there is no consensus of what to teach as part of a legal research course or even how to teach such a course.

Legal educators struggle to address these issues. The practicing bar and judiciary have expressed …


Motivating The Solicited And Unsolicited Sharing Of Tacit Knowledge Through The Process Of Externalization, Sheila Yvonne Sorensen Jan 2015

Motivating The Solicited And Unsolicited Sharing Of Tacit Knowledge Through The Process Of Externalization, Sheila Yvonne Sorensen

CCE Theses and Dissertations

While several U. S. firms have invested in Knowledge Management (KM) tools and software, it has become apparent that investments must be made in additional facets of KM, such as knowledge sharing (KS), thought by many researchers to be the most important component of KM. Of the two types of KS, explicit and tacit, the sharing of tacit knowledge has been shown to contribute the most to an organization’s performance. However, since tacit knowledge is difficult to both convey and acquire, this unshared tacit knowledge may ultimately harm an organization when, without the appropriate knowledge, individuals cannot effectively perform their …


Well-Being Technologies: Meditation Using Virtual Worlds, Laura Downey Jan 2015

Well-Being Technologies: Meditation Using Virtual Worlds, Laura Downey

CCE Theses and Dissertations

In a technologically overloaded world, is it possible to use technology to support well-being activities and enhance human flourishing? Proponents of positive technology and positive computing are striving to answer yes to that question. However, the impact of technology on well-being remains unresolved. Positive technology combines technology and positive psychology. Positive psychology focuses on well-being and the science of human flourishing. Positive computing includes an emphasis on designing with well-being in mind as a way to support human potential. User experience (UX) is critical to positive technology and positive computing. UX researchers and practitioners are advocating for experience-driven design and …


An Investigation Of The Factors Contributing To The Development Of Poorly Defined Is Strategies For Firms In The United States, Karen B. Lacaden Jan 2015

An Investigation Of The Factors Contributing To The Development Of Poorly Defined Is Strategies For Firms In The United States, Karen B. Lacaden

CCE Theses and Dissertations

Although empirical research has shown that a clearly defined information system (IS) strategy has a positive impact to a firm’s performance and a poorly defined IS strategy has a negative impact to a firms’ performance, firms still develop poorly defined IS strategies. Further compounding the problem, research has revealed that 87% of the business executives believe information systems are a critical enabler to their firms' strategic realization, yet only 33% of business executives involve the Chief Information Officer (CIO) in their firm’s business strategy development. The main goal of this research study is to empirically identify factors which impact development …


Implicit Measures And Online Risks, Lucinda W. Wang Jan 2015

Implicit Measures And Online Risks, Lucinda W. Wang

CCE Theses and Dissertations

Information systems researchers typically use self-report measures, such as questionnaires to study consumers’ online risk perception. The self-report approach captures the conscious perception of online risk but not the unconscious perception that precedes and dominates human being’s decision-making. A theoretical model in which implicit risk perception precedes explicit risk evaluation is proposed. The research model proposes that implicit risk affects both explicit risk and the attitude towards online purchase. In a direct path, the implicit risk affects attitude towards purchase. In an indirect path, the implicit risk affects explicit risk, which in turn affects attitude towards purchase.

The stimulus used …


An Empirical Investigation Into The Role That Boredom, Relationships, Anxiety, And Gratification (Brag) Play In A Driver’S Decision To Text, Nathan White Jan 2015

An Empirical Investigation Into The Role That Boredom, Relationships, Anxiety, And Gratification (Brag) Play In A Driver’S Decision To Text, Nathan White

CCE Theses and Dissertations

Texting while driving is a growing problem that has serious, and sometimes fatal, consequences. Despite laws enacted to curb this behavior, the problem continues to grow. Discovering factors that can reduce such risky behavior can significantly contribute to research, as well as save lives and reduce property damage. This study developed a model to explore the motivations that cause a driver to send messages. The model evaluates the effects that boredom, social relationships, social anxiety, and social gratification (BRAG) have upon a driver’s frequency of typing text messages. In addition, the perceived severity of the consequences and the presence of …


Determinants Of Intention To Use New Technology: An Investigation Of Students In Higher Education, Yolanda Dupree Jan 2015

Determinants Of Intention To Use New Technology: An Investigation Of Students In Higher Education, Yolanda Dupree

CCE Theses and Dissertations

The federal government continues to monitor the cost of paper texts as an essential component of postsecondary education expenses. The Higher Education Act (HEA), which was initially passed in 1965, was created to buttress the educational resources of colleges and universities. Along with addressing the benefits of financial aid in postsecondary and higher education, the act referenced the projected financial burdens of paper texts. The last 2008 reauthorization suggested that colleges and universities develop plans to reduce the costs of college. Congress is currently working to reauthorize the legislation. Based on this information, the problem identified in this study explored …


Police Opinions Of Digital Evidence Response Handling In The State Of Georgia: An Examination From The Viewpoint Of Local Agencies’ Patrol Officers, Tanya Macneil Jan 2015

Police Opinions Of Digital Evidence Response Handling In The State Of Georgia: An Examination From The Viewpoint Of Local Agencies’ Patrol Officers, Tanya Macneil

CCE Theses and Dissertations

This research examined opinions of local law enforcement agencies’ patrol officers in the State of Georgia regarding preparedness and expectations for handling of digital evidence. The increased criminal use of technology requires that patrol officers be prepared to handle digital evidence in many different situations. The researcher’s goal was to gain insight into how patrol officers view their preparedness to handle digital evidence as well as their opinions on management expectations regarding patrol officers’ abilities to handle digital evidence. The research focused on identifying whether a gap existed between patrol officers’ opinions of digital evidence and the patrol officers’ views …


The State Of Mobile Learning Implementation In Government Cabinet-Level Agencies And Departments, Algernon B. Corbett Jan 2015

The State Of Mobile Learning Implementation In Government Cabinet-Level Agencies And Departments, Algernon B. Corbett

CCE Theses and Dissertations

As mobile technologies have increasingly become a part of personal and work environments, mobile learning is emerging as a viable alternative for training and education needs. Faced with the need for innovative and cost-efficient ways for training government employees, agencies and departments are considering the use of mobile learning. The availability of a wide range of mobile technology provides many options. Other than the Department of Defense, little is known about implementing mobile learning in United States government cabinet level agencies and departments. A concurrent, mixed methods case study was used to examine how organizations decide to use, implement and …


Serving Military Families: Perceptions Of Educational Counseling In A Virtual Environment, Taryn Stevenson Nov 2014

Serving Military Families: Perceptions Of Educational Counseling In A Virtual Environment, Taryn Stevenson

CCE Theses and Dissertations

The advances in communication technology over the past 20 years have significant implications for the delivery of psycho-educational therapeutic services to populations that have been historically underserved due to remote locations lacking trained providers. One such population is military families, who also suffer from a negative stigma of asking for outside help or education for personal growth. This population also faces increasing mental health needs due to military deployment in Operation Iraqi Freedom (OIF) and Operation Enduring Freedom (OEF). These operations have increased the number of returning service members who have been physically and mentally injured. The effect that these …


A Causal Model To Predict Organizational Knowledge Sharing Via Information And Communication Technologies, Simon Cleveland Oct 2014

A Causal Model To Predict Organizational Knowledge Sharing Via Information And Communication Technologies, Simon Cleveland

CCE Theses and Dissertations

Knowledge management literature identifies numerous barriers that inhibit employees' knowledge seeking and knowledge contributing practices via information and communication technologies (ICTs). Presently, there is a significant gap in the literature that explains what factors promote common knowledge sharing barriers. To bridge this gap, this study examined two research questions: 1) What are the potential factors that contribute to the commonly accepted barriers to knowledge sharing?, and 2) How do these factors impact employees' use of ICTs for knowledge seeking and knowledge contributing? Literature review of 103 knowledge management articles identified three major barriers to knowledge sharing practices (lack of time, …


Security Policies That Make Sense For Complex Systems: Comprehensible Formalism For The System Consumer, Rhonda R. Henning Oct 2014

Security Policies That Make Sense For Complex Systems: Comprehensible Formalism For The System Consumer, Rhonda R. Henning

CCE Theses and Dissertations

Information Systems today rarely are contained within a single user workstation, server, or networked environment. Data can be transparently accessed from any location, and maintained across various network infrastructures. Cloud computing paradigms commoditize the hardware and software environments and allow an enterprise to lease computing resources by the hour, minute, or number of instances required to complete a processing task. An access control policy mediates access requests between authorized users of an information system and the system's resources. Access control policies are defined at any given level of abstraction, such as the file, directory, system, or network, and can be …