34 research outputs found

    Today\u27s Electronic Communication Facilitators: A Profile of Fortune 1000 Webmasters

    Get PDF
    This profile of Webmasters of Fortune 1000 companies is based on electronic mail survey responses. In general, the people who hold the webmaster title or position within these large organizations are very satisfied with their jobs, are fairly young, and are highly educated although the disciplines of their academic backgrounds are considerably diverse. The Webmasters are also very interested in the characteristics of their professional counterparts in other large organizations. Beyond the demographics, this paper highlights Webmaster perceptions relative to the creation and use of home pages

    Student Recognition and Awareness of Information Security in Course Learning from Management Information Systems and Computer Science Classes: An Empirical Investigation

    Get PDF
    A survey of college students from both IS and CS programs was undertaken to understand student recognition and awareness of information security issues in course learning. Comparisons will be made for students before and after taking the security class as well as between the two different majors. The results of the study will demonstrate possible differences in perceptions between students of two majors, and identify security issues which have not been identified so that students and institutions are able to improve academic achievements by better tailored security curriculum and training. The findings will also provide feedback to future employers of the students

    Tablet PCs for Teaching Information Systems Courses

    Get PDF
    The authors describe integration of and multiple uses for the tablet PC (TPC) in MIS classes. These uses are geared toward enhancing student learning through the TPC rather than learning how to use a specific tool. These technologies are used in a database course and an information security course to enhance student learning by having students participate in drawing entity relationship diagrams (ERD) and network configurations. Digital documents, annotated with digital ink are exchanged between faculty and students. A survey is used to capture perceptions of MIS majors regarding the value of the TPC in these two courses. These results are then compared and contrasted with results that have been previously published for TPCs in a database course. Results indicate that a major issue facing educators is the lack of critical mass in the adoption of TPCs by students

    Securing Personal Information Assets: Testing Antecedents of Behavioral Intentions

    Get PDF
    Due to the increased global reliance on information technology, and the prominence of information resources value, identity theft is a problem domain effecting millions of computer users annually. The realities of identity theft are highly visible in the global media, although empirical investigations on the topic are limited. The purpose of this study is to identify and analyze perceptions of personal information (e.g., identity) as it relates to perceived threats, mitigation, perceived risks, and intended safe information practice intentions. We propose a risk analysis model based on theoretical variables that have been researched and extensively used in both government and private sector organizations. The model is empirically tested using LISREL to perform structural equation modeling. Findings indicate support for a relationship between risk and both 1) behavioral intentions to perform safe information practices and 2) personal information asset value

    LSST Science Book, Version 2.0

    Get PDF
    A survey that can cover the sky in optical bands over wide fields to faint magnitudes with a fast cadence will enable many of the exciting science opportunities of the next decade. The Large Synoptic Survey Telescope (LSST) will have an effective aperture of 6.7 meters and an imaging camera with field of view of 9.6 deg^2, and will be devoted to a ten-year imaging survey over 20,000 deg^2 south of +15 deg. Each pointing will be imaged 2000 times with fifteen second exposures in six broad bands from 0.35 to 1.1 microns, to a total point-source depth of r~27.5. The LSST Science Book describes the basic parameters of the LSST hardware, software, and observing plans. The book discusses educational and outreach opportunities, then goes on to describe a broad range of science that LSST will revolutionize: mapping the inner and outer Solar System, stellar populations in the Milky Way and nearby galaxies, the structure of the Milky Way disk and halo and other objects in the Local Volume, transient and variable objects both at low and high redshift, and the properties of normal and active galaxies at low and high redshift. It then turns to far-field cosmological topics, exploring properties of supernovae to z~1, strong and weak lensing, the large-scale distribution of galaxies and baryon oscillations, and how these different probes may be combined to constrain cosmological models and the physics of dark energy.Comment: 596 pages. Also available at full resolution at http://www.lsst.org/lsst/sciboo

    The Afterglows of Swift-era Gamma-Ray Bursts II.: Type I GRB versus Type II GRB Optical Afterglows

    Get PDF
    We use a large sample of GRB afterglow and prompt-emission data (adding further GRB afterglow observations in this work) to compare the optical afterglows (or the lack thereof) of Type I GRBs with those of Type II GRBs. In comparison to the afterglows of Type II GRBs, we find that those of Type I GRBs have a lower average luminosity and show an intrinsic spread of luminosities at least as wide. From late and deep upper limits on the optical transients, we establish limits on the maximum optical luminosity of any associated supernova, confirming older works and adding new results. We use deep upper limits on Type I GRB optical afterglows to constrain the parameter space of possible mini-SN emission associated with a compact-object merger. Using the prompt emission data, we search for correlations between the parameters of the prompt emission and the late optical afterglow luminosities. We find tentative correlations between the bolometric isotropic energy release and the optical afterglow luminosity at a fixed time after trigger (positive), and between the host offset and the luminosity (negative), but no significant correlation between the isotropic energy release and the duration of the GRBs. We also discuss three anomalous GRBs, GRB 060505, GRB 060614, and GRB 060121, in the light of their optical afterglow luminosities. (Abridged)Comment: Re-submitted to ApJ; 56 pages in emulateapj format; strongly expanded and revised in answer to referee report, added original photometry data; 30 pages main text, 13 pages Appendix, 6 pages references, 5 tables, 16 figures; Figures 1 to 8 downgraded to fit arXiv space restriction

    Busting the ghost in the machine

    No full text

    Spyware

    No full text
    corecore