265 research outputs found

    A Comparison of Adaption-Innovation Styles Between Information Systems Majors and Computer Science Majors

    Get PDF
    This paper reports on a study that compares the problem-solving style, in terms of adaption and innovation, of Information Systems and Computer Science majors. The adaption/innovation characterization of problem-solving styles was developed by Kirton and is measured by Kirton’s Adaption-Innovation inventory. This is a well-validated instrument that measures the respondent’s preferred approach to problem-solving

    EFFECTS OF DEVELOPER COGNITIVE STYLE AND MOTIVATIONS ON INFORMATION SECURITY POLICY COMPLIANCE

    Get PDF
    Organizations are faced with information loss on a daily basis. Threats such as hacker attacks are mitigated by applyingpatches, improving encryption routines, closing security loop-holes in a program and keeping a constant vigil on virus andmalicious threats with up-to-date scanning techniques. Companies invest millions of dollars to keep such attacks at bay sincea loss of up-time to servers could cause a significant loss in customer revenue and thus result in catastrophic losses incustomer satisfaction and ultimately profits. Organizations that create or modify software try to deter threats to theirapplications by providing information security policies that provide guidelines to developers on what best practices need tobe adopted to make their applications safe and secure for customer consumption. This study presents a conceptual model forstudying how cognitive style impacts software developer motivations as they approach the task of complying withinformation security policies. The model is informed by the literature on information security awareness, ProtectionMotivation Theory, Kirton’s adaption-innovation theory and Herzberg’s motivation and hygiene theory

    Protecting Copyright in the Digital Era in China: A Critical Analysis of the Relevant Law and Practice from a Comparative Perspective

    Get PDF
    China, as the birthplace of several great inventions, is no stranger to creativity, and, indeed, innovation. That said, while the notion of copyright has for a long time been recognised as being essential to the protection of Chinese inventions, it is perhaps regrettable that the existing system of copyright protection in that country remains largely inefficacious, at least when compared to western countries, in terms of addressing the key challenges and complexities posed by the rapid developments that characterise the digital age. It is against this backdrop that this thesis has been conceptualised; the overarching aim, in this regard, being to assess the development and nature of copyright protection in China, from a comparative perspective, in an effort to unearth the challenges that arise in the digital age, and to proffer suggestions for reform in this regard. More specifically, through the adoption of the doctrinal, historical and comparative methodologies, this thesis examines the historical evolution of copyright protection in China, and argues that while there has been some progress in recent years in terms of copyright protection that commensurate with China's economic development and international obligations, a number of outstanding issues remain unresolved, especially with regard to striking the right balance between competing interests. The thesis also evaluates the role of emerging technologies, such as peer-to-peer technology, and argues that China has struggled to address many of these challenges associated therewith, notwithstanding the progressive approaches countenanced by other jurisdictions. The thesis argues that one of the main challenges that account for the existing inadequacy that characterises China's system of copyright protection is the country's very history and culture, which do not ascribe a high degree of primacy to the exclusive rights of copyright owners. History and culture, among other, mostly legal, factors, might also account for the currently high levels of uncertainty that characterise the construction of secondary liability in relation to ISPs in China. Apart from assessing the uncertainties associated with secondary liability, however, the thesis will also examine the complexities and challenges that surround the use of emerging technologies, such as technological protection measures, that aim to protect copyright in the digital era, and argues that while these challenges are real, they are not at all insurmountable. Against this backdrop, pragmatic solutions, drawing largely from other jurisdictions, are provided throughout this thesis

    Semantic discovery and reuse of business process patterns

    Get PDF
    Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse

    Introduction to Engineering: Embry-Riddle Aeronautical University EGR101 9th Edition

    Get PDF
    “Introduction to Engineering” is about making our students at Embry-Riddle Aeronautical University successful in academia and responsible engineering professionals. The collective knowledge of several authors representing all departments within the College of Engineering went into its making. Topics were chosen especially for students in the engineering programs at ERAU to specifically address their needs and tailored to assure their success.https://commons.erau.edu/oer-textbook/1003/thumbnail.jp

    Management and Organizational Influences on the Compliance Behavior of Employees to Reduce Non-malicious IT Misuse Intention

    Get PDF
    The widespread use of information technology and information systems (IT) throughout corporations, too often includes employees who choose not to follow the stated policies and procedures in performing their job tasks. In many cases, this encompasses employees who mean no harm, but choose not to comply with IT policies and procedures. The present study frames such compliance behavior as non-malicious IT misuse. Non-malicious IT misuse by an employee occurs when the employee improvises, takes short cuts, or works around IT procedures and guidelines in order to perform their assigned tasks. As expressed, they do not intend to cause internal control or compliance problems but may simply want to meet their assigned task objectives with the use of IT applications. Studies usually address this phenomenon with deterrence and punishment/reward theories, but literature suggests additional theoretical approaches to further understand non-malicious IT misuse. This study proposes management driven policy approaches, along with organizational factors to reduce intention of non-malicious IT misuse

    The new generation of lifestyle magazine journalism in China: the professional approach

    Get PDF
    Chinese consumer journalism is a new type of journalist who has been working in Chinese lifestyle magazines since the 1990s. This study examines the elements and roles of magazine journalists’ professionalisation, and contextualizes them with the main trends of Chinese media development during the transition era. While investigating the daily practice of consumer magazine journalism in China, by exploring the ideology and ethics behind their practices and by discussing the original connection between consumer journalism and other more ‘serious’ forms of journalism in China, the Researcher found that consumer journalists actually share the same journalistic ethics and ideology as their ‘serious’ counterparts. To avoid political retribution and commercial pressure, consumer journalists have reoriented the multiple functions of journalism to present their social role as an ‘information vehicle’, ‘serving the rising class’, with ‘independence from media ownership and commercial forces’ and ‘contributing to culture and traditional society’. The elements involved in this new genre of journalism include financial and operational autonomy from the state, and editorial independence from their international parent magazine companies. Moreover, this genre of journalism shows a trend towards a combination of the internationalist, consumerist and cosmopolitan, unlike other journalism in China

    ESPON project 2.3.2. Governance of Territorial and Urban Policies from EU to Local Level. Final Report

    Get PDF
    Risultati del progetto di ricerca ESPON di cui al titol
    • 

    corecore