44 research outputs found

    A Conceptual Model for Explaining Violations of the Information Security Policy (ISP): A Cross Cultural Perspective

    Get PDF
    This paper is an attempt to develop a model that explores the factors that affect the frequency of violations of information security policies (ISPs). Additionally, it examines the moderating effect of cultural attributes on the frequency of ISP violations. Does national culture affect the way managers and employees perceive and practice ISPs? If we understand why ISPs are violated, perhaps we can deter future violations before they occur. We look at three groups of factors and the impact they have on the frequency of violations of ISPs. The factors examined are 1) the individual characteristics and capabilities of employees, 2) the information security policy (ISP) itself and 3) management issues. Finally, the study examines the moderating effect of Hofstede’s cultural dimensions (uncertainty avoidance, individualism/collectivism, and power distance) on the proposed model

    Improved Residual Dense Network for Large Scale Super-Resolution via Generative Adversarial Network

    Get PDF
    Recent single image super resolution (SISR) studies were conducted extensively on small upscaling factors such as x2 and x4 on remote sensing images, while less work was conducted on large factors such as the factor x8 and x16. Owing to the high performance of the generative adversarial networks (GANs), in this paper, two GAN’s frameworks are implemented to study the SISR on the residual remote sensing image with large magnification under x8 scale factor, which is still lacking acceptable results. This work proposes a modified version of the residual dense network (RDN) and then it been implemented within GAN framework which named RDGAN. The second GAN framework has been built based on the densely sampled super resolution network (DSSR) and we named DSGAN. The used loss function for the training employs the adversarial, mean squared error (MSE) and the perceptual loss derived from the VGG19 model. We optimize the training by using Adam for number of epochs then switching to the SGD optimizer. We validate the frameworks on the proposed dataset of this work and other three remote sensing datasets: the UC Merced, WHU-RS19 and RSSCN7. To validate the frameworks, we use the following image quality assessment metrics: the PSNR and the SSIM on the RGB and the Y channel and the MSE. The RDGAN evaluation values on the proposed dataset were 26.02, 0.704, and 257.70 for PSNR, SSIM and the MSE, respectively, and the DSGAN evaluation on the same dataset yielded 26.13, 0.708 and 251.89 for the PSNR, the SSIM, and the MSE

    Predicting Student-Perceived Learning Outcomes and Satisfaction in ERP Courses: An Empirical Investigation

    Get PDF
    This article uses the Unified Theory of Acceptance and Use of Technology model (UTAUT) as the basis for the research framework to examine factors that influence student-perceived learning outcomes and satisfaction in enterprise resource planning (ERP) courses. Antecedent variables considered are student attitude, performance expectancy, effort expectancy, training (hands-on), course structure, and perceived instructor knowledge. A Structural Equation Model (SEM) using LISREL was employed to test the measurement and structural models using a convenience sample of 102 students enrolled in ERP courses. The results showed that student attitude had the largest significant direct impact on student-perceived learning outcomes and satisfaction. Effort expectancy and performance expectancy had significant direct impacts on attitude. Course structure and training (hands-on) had indirect effects on attitude through effort expectancy and performance expectancy. The findings suggest that, in order to impact student attitude and, thus, impact their perceived learning outcomes and satisfaction, instructors should emphasize the importance of learning about ERP systems and should provide clear directions so that students experience a meaningful interaction with ERP systems. Implications for practitioners and educators are reported

    The double-edged sword of social media usage during the COVID-19 pandemic: demographical and cultural analyses

    Get PDF
    Purpose This exploratory research aims to (1) investigate the bright and dark sides of social media use during the COVID-19 pandemic; (2) explore the impact of demographic factors on social media usage; and (3) assess the effects of cultural dimensions on social media usage. Design/methodology/approach The data are collected through an online survey. Factors derived from grounded theories and models such as affordance theory and Hofstede\u27s cultural framework were considered. Spearman correlation and nonparametric analysis were used to test the hypotheses. Findings The results revealed that social media usage was positively associated with healing and affiliation, and negatively associated with self-control. There are also positive associations between social media usage and sharing information related to COVID-19 without verification, perceived reliability of COVID-19 information on social media and relapse. The impact of demographic and cultural factors indicated significant effects of gender, age, marital status, educational level, power distance and collectivism on social media usage, sharing information, perceived information reliability, healing and affiliation. Originality/value This study contributes to technology affordances by examining social media\u27s positive and negative affordances in a new context (COVID-19 pandemic). From the positive side, this study explores the use of social media for healing and affiliation. As for the negative impact of social media during the pandemic, this study assesses the user\u27s addiction to social media use (relapse) and perception of the social media information reliability and information sharing without verification. It is among few research endeavors conducted in a non-Western country. This study also examines the influence of demographic and cultural factors on social media users. The results provide insights for both researchers and policymakers regarding social media usage

    The Determinants of Student Effort at Learning ERP: A Cultural Perspective

    Get PDF
    This paper develops a research model based on the Unified Theory of Acceptance and Use of Technology model (UTAUT) and Hofstede’s cultural dimensions to explore factors that influence student effort at learning Enterprise Resource Planning (ERP) systems. A Structural Equation Model (SEM) using LISREL was utilized to validate the proposed research model using a convenience sample of students at two universities in the USA. The results showed that while subjective norm and career relevance were positively associated with performance expectancy (PE), course structure and self-efficacy were positively associated with effort expectancy (EE). Performance expectancy and effort expectancy were positively associated with student attitude toward ERP. Student attitude toward ERP was positively associated with student effort at learning ERP. The results also revealed that power distance, uncertainty avoidance, and masculinity moderate the relationships between EE and PE on one side and attitude on the other side, between EE and PE, and between attitude and effort at learning ERP, respectively. Implications for educators and researchers are reported

    IS Success Model in E-Learning Context Based on Students\u27 Perceptions

    Get PDF
    This study utilized the Information Systems Success (ISS) model in examining e-learning systems success. The study was built on the premise that system quality (SQ) and information quality (IQ) influence system use and user satisfaction, which in turn impact system success. A structural equation model (SEM), using LISREL, was used to test the measurement and structural models using a convenience sample of 674 students at a Midwestern university. The results revealed that both system quality and information quality had significant positive impact on user satisfaction and system use. Additionally, the results showed that user satisfaction, compared to system use, had a stronger impact on system success. Implications for educators and researchers are reported

    Hofstede’s cultural dimensions in technology acceptance models: a meta-analysis

    Get PDF
    This paper employs a quantitative meta-analysis to investigate the direct, moderating, and mediating role of cultural dimensions in technology acceptance models. A comprehensive literature review of hypothesized relationships of technology acceptance models with cultural dimensions as direct, moderating, and mediating factors found in articles published from 1989 to 2019 is included. Results of reviewed research studies are analyzed, and a parsimonious model is developed based on the ‘best predictors’ as identified by the meta-analysis approach

    AMCIS 2008 Panel Summary: Managing Student Projects - Learning from the Past

    Get PDF
    This paper is the summary of a panel presentation at the Americas Conference on Information Systems (AMCIS) 2008. We examine methods to employ in managing student projects. With the underlying assumption that we all want students to learn from their projects and become successful in the workplace while minimizing our micromanaging as instructors, we will share what we have learned from our (and our students’) successes and failures. Another assumption is that if you have taught classes in which you have used student group projects, you are not 100 percent pleased with the results and would not do everything the exact same way again. In our discussion, we examine successful methods for managing the aspects of forming groups, managing teams, and the project assignment itself including guidelines, deliverables, evaluation, and presentation

    Information security policy compliance: a higher education case study

    Get PDF
    Purpose: The purpose of this case study is to examine the factors that impact higher education employees’ violations of information security policy by developing a research model based on grounded theories such as deterrence theory, neutralization theory and justice theory. Design/methodology/approach: The research model was tested using 195 usable responses. After conducting model validation, the hypotheses were tested using multiple linear regression. Findings: The results of the study revealed that procedural justice, distributive justice, severity and celerity of sanction, privacy, responsibility and organizational security culture were significant predictors of violations of information security measures. Only interactional justice was not significant. Research limitations/implications: As with any exploratory case study, this research has limitations such as the self-reported information and the method of measuring the violation of information security measures. The method of measuring information security violations has been a challenge for researchers. Of course, the best method is to capture the actual behavior. Another limitation to this case study which might have affected the results is the significant number of faculty members in the respondent pool. The shared governance culture of faculty members on a US university campus might bias the results more than in a company environment. Caution should be applied when generalizing the results of this case study. Practical implications: The findings validate past research and should encourage managers to ensure employees are involved with developing and implementing information security measures. Additionally, the information security measures should be applied consistently and in a timely manner. Past research has focused more on the certainty and severity of sanctions and not as much on the celerity or swiftness of applying sanctions. The results of this research indicate there is a need to be timely (swift) in applying sanctions. The importance of information security should be grounded in company culture. Employees should have a strong sense of treating company data as they would want their own data to be treated. Social implications: Engaging employees in developing and implementing information security measures will reduce employees’ violations. Additionally, giving employees the assurance that all are given the same treatment when it comes to applying sanctions will reduce the violations. Originality/value: Setting and enforcing in a timely manner a solid sanction system will help in preventing information security violations. Moreover, creating a culture that fosters information security will help in positively affecting the employees’ perceptions toward privacy and responsibility, which in turn, impacts information security violations. This case study applies some existing theories in the context of the US higher education environment. The results of this case study contributed to the extension of existing theories by including new factors, on one hand, and confirming previous findings, on the other hand

    An agile educational framework: A response for the covid-19 pandemic

    Get PDF
    The COVID-19 pandemic has caused an emergent move in all countries across the world. All education institutions were forced to shut down until further notice and were forced to come up with creative solutions to continue with the learning process. Based on existing literature, students and faculty feedback, and interview responses obtained from top management of higher education institutions in several countries, this paper proposes an agile educational framework for higher education institutions to be better prepared for teaching/learning in the digital age for the long term, and for the upcoming academic years in the short term. The proposed framework encompasses the major components that contribute to the effectiveness and efficiency of online, hybrid or traditional face-to-face instruction mode
    corecore