265 research outputs found
A Comparison of Adaption-Innovation Styles Between Information Systems Majors and Computer Science Majors
This paper reports on a study that compares the problem-solving style, in terms of adaption and innovation, of Information Systems and Computer Science majors. The adaption/innovation characterization of problem-solving styles was developed by Kirton and is measured by Kirtonâs Adaption-Innovation inventory. This is a well-validated instrument that measures the respondentâs preferred approach to problem-solving
EFFECTS OF DEVELOPER COGNITIVE STYLE AND MOTIVATIONS ON INFORMATION SECURITY POLICY COMPLIANCE
Organizations are faced with information loss on a daily basis. Threats such as hacker attacks are mitigated by applyingpatches, improving encryption routines, closing security loop-holes in a program and keeping a constant vigil on virus andmalicious threats with up-to-date scanning techniques. Companies invest millions of dollars to keep such attacks at bay sincea loss of up-time to servers could cause a significant loss in customer revenue and thus result in catastrophic losses incustomer satisfaction and ultimately profits. Organizations that create or modify software try to deter threats to theirapplications by providing information security policies that provide guidelines to developers on what best practices need tobe adopted to make their applications safe and secure for customer consumption. This study presents a conceptual model forstudying how cognitive style impacts software developer motivations as they approach the task of complying withinformation security policies. The model is informed by the literature on information security awareness, ProtectionMotivation Theory, Kirtonâs adaption-innovation theory and Herzbergâs motivation and hygiene theory
Protecting Copyright in the Digital Era in China: A Critical Analysis of the Relevant Law and Practice from a Comparative Perspective
China, as the birthplace of several great inventions, is no stranger to creativity, and, indeed, innovation. That said, while the notion of copyright has for a long time been recognised as being essential to the protection of Chinese inventions, it is perhaps regrettable that the existing system of copyright protection in that country remains largely inefficacious, at least when compared to western countries, in terms of addressing the key challenges and complexities posed by the rapid developments that characterise the digital age. It is against this backdrop that this thesis has been conceptualised; the overarching aim, in this regard, being to assess the development and nature of copyright protection in China, from a comparative perspective, in an effort to unearth the challenges that arise in the digital age, and to proffer suggestions for reform in this regard.
More specifically, through the adoption of the doctrinal, historical and comparative methodologies, this thesis examines the historical evolution of copyright protection in China, and argues that while there has been some progress in recent years in terms of copyright protection that commensurate with China's economic development and international obligations, a number of outstanding issues remain unresolved, especially with regard to striking the right balance between competing interests. The thesis also evaluates the role of emerging technologies, such as peer-to-peer technology, and argues that China has struggled to address many of these challenges associated therewith, notwithstanding the progressive approaches countenanced by other jurisdictions. The thesis argues that one of the main challenges that account for the existing inadequacy that characterises China's system of copyright protection is the country's very history and culture, which do not ascribe a high degree of primacy to the exclusive rights of copyright owners. History and culture, among other, mostly legal, factors, might also account for the currently high levels of uncertainty that characterise the construction of secondary liability in relation to ISPs in China. Apart from assessing the uncertainties associated with secondary liability, however, the thesis will also examine the complexities and challenges that surround the use of emerging technologies, such as technological protection measures, that aim to protect copyright in the digital era, and argues that while these challenges are real, they are not at all insurmountable. Against this backdrop, pragmatic solutions, drawing largely from other jurisdictions, are provided throughout this thesis
Semantic discovery and reuse of business process patterns
Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse
Introduction to Engineering: Embry-Riddle Aeronautical University EGR101 9th Edition
âIntroduction to Engineeringâ is about making our students at Embry-Riddle Aeronautical University successful in academia and responsible engineering professionals. The collective knowledge of several authors representing all departments within the College of Engineering went into its making. Topics were chosen especially for students in the engineering programs at ERAU to specifically address their needs and tailored to assure their success.https://commons.erau.edu/oer-textbook/1003/thumbnail.jp
Management and Organizational Influences on the Compliance Behavior of Employees to Reduce Non-malicious IT Misuse Intention
The widespread use of information technology and information systems (IT) throughout corporations, too often includes employees who choose not to follow the stated policies and procedures in performing their job tasks. In many cases, this encompasses employees who mean no harm, but choose not to comply with IT policies and procedures. The present study frames such compliance behavior as non-malicious IT misuse. Non-malicious IT misuse by an employee occurs when the employee improvises, takes short cuts, or works around IT procedures and guidelines in order to perform their assigned tasks. As expressed, they do not intend to cause internal control or compliance problems but may simply want to meet their assigned task objectives with the use of IT applications. Studies usually address this phenomenon with deterrence and punishment/reward theories, but literature suggests additional theoretical approaches to further understand non-malicious IT misuse. This study proposes management driven policy approaches, along with organizational factors to reduce intention of non-malicious IT misuse
Recommended from our members
Are Online Catalogs for Children Giving Them What They Need? Children's Cognitive Development and Information Seeking and Their Impact on Design
Research shows children in an online environment often search by browsing, which relies heavily on recognition and content knowledge, so catalog systems for children must use effective symbols or pictorial representations, which correspond with children's own cognitive schema and level of recognition knowledge. This study was designed to look at the success of young children (ages 5 to 8) in searching 3 online public library catalogs designed for them, and it focused specifically on the pictorial representations and text descriptors used in the systems' browsing hierarchy. The research sought answer whether young children (ages 5 to 8) are really poor searchers because of cognitive development and lack of technology skills or if system design is the major reason for poor search results; i.e., Do current children's online catalog designs function in a manner that is compatible with information seeking by children? Although these results can not be generalized, this study indicates that there was a disconnect between the cognitive abilities of young users and catalog design. The study looked at search success on the 3 catalogs in relation to the catalog characteristics and individual user characteristics and makes 3 significant contributions to the field of library and information science. The first contribution is the modification of an existing model posed by Cooper and O'Connor and modified by Abbas (2002). The second significant contribution is the proposal of a new model, Creel's second best choice (SBC) model, that addresses the cognitive gap and design flaws that impact the choices participants made. The third significant contribution is that this study addresses and fills a gap in the literature
The new generation of lifestyle magazine journalism in China: the professional approach
Chinese consumer journalism is a new type of journalist who has been working in Chinese lifestyle magazines since the 1990s. This study examines the elements and roles of magazine journalistsâ professionalisation, and contextualizes them with the main trends of Chinese media development during the transition era.
While investigating the daily practice of consumer magazine journalism in China, by exploring the ideology and ethics behind their practices and by discussing the original connection between consumer journalism and other more âseriousâ forms of journalism in China, the Researcher found that consumer journalists actually share the same journalistic ethics and ideology as their âseriousâ counterparts. To avoid political retribution and commercial pressure, consumer journalists have reoriented the multiple functions of journalism to present their social role as an âinformation vehicleâ, âserving the rising classâ, with âindependence from media ownership and commercial forcesâ and âcontributing to culture and traditional societyâ.
The elements involved in this new genre of journalism include financial and operational autonomy from the state, and editorial independence from their international parent magazine companies. Moreover, this genre of journalism shows a trend towards a combination of the internationalist, consumerist and cosmopolitan, unlike other journalism in China
ESPON project 2.3.2. Governance of Territorial and Urban Policies from EU to Local Level. Final Report
Risultati del progetto di ricerca ESPON di cui al titol
- âŠ