454 research outputs found

    Cybercrime Post-Incident Leadership Model

    Get PDF
    Cybercrimes are facts of the modern technological society. While extant literature proposes a variety of prescriptive practices to combat cybercrimes, there is scant research to address how organizational leaders should minimize the impact of cybercrimes on their companies and the community after they have occurred. This study addresses the steps leaders should take in the aftermath of cybercrimes and proposes a four-stage leadership model consisting of best practices to guide leaders in preparing, responding, and recovering from a digital or cybersecurity attack

    Toward Cybersecurity Leadership Framework

    Get PDF
    Cybersecurity is a critical issue for organization and executive leadership faces challenges that their predecessors escaped. If executive leadership and boards of directors are charged with setting policy and regulations regarding the company’s cybersecurity efforts, a greater understanding of the field and the threats needs to be communicated before leadership can be expected to make critical decisions in the face of cyberattacks. This study addresses what type of leadership should be applied in the various cybersecurity preparation and response stages in order to educate cybersecurity leaders in developing a prescriptive approach to addressing future cyberattacks. A novel cybersecurity leadership framework is proposed, which recommends leadership styles against the functional areas of the cybersecurity preparation and response stages

    Using Microblogging for Lessons Learned in Information Systems Projects

    Get PDF
    According to the Standish Group (2011), 66% of projects fail, while 75% of the successful ones are managed by experienced project managers (PM). These PMs document their experience in the form of stories to facilitate knowledge capture (Jonassen and Hernandez-Serrano, 2002); however, while 62.4% of the organizations have formal procedures for documenting lessons learned (LL), 89.3% of the organizations are not doing so (Williams, 2008). The problem, therefore, is how to facilitate the capture of project knowledge from the experienced PMs and transfer it to the novice PMs. A new information and communication technology (ICT) called microblogging is an effective tool for capturing and disseminating usage practices (Zhang, Qu, Cody and Wu, 2010); however, it has not been studied yet for the purpose of capturing and transferring project knowledge in organizations. This paper proposes research to validate whether microblogging is a useful platform for knowledge creation of LL in projects

    On-the-job Informal Learning Practices for IS Students

    Get PDF
    Information systems (IS) students find soft skills acquired in schools to be insufficient to fully prepare them for their jobs because soft skills are context-dependent and difficult to teach. To compensate for this adversity, students could acquire knowledge through continuous on-the-job informal learning; however, only 20 percent of what organizations invest in training is dedicated to enhancing informal learning. As a result, it is essential that students enter the work force with sufficient knowledge of informal learning practices in order to better acquire experiential knowledge. This paper recommends four techniques that universities can incorporate in IS curriculums to prepare students to become better on-the-job learners

    The Role of Microblogging Capacities in Knowledge Sharing and Collaboration in Virtual Teams

    Get PDF
    To combat loss of knowledge, organizations are investing in social media technologies, such as microblogging platforms, to help facilitate knowledge transfer. While literature indicates that knowledge sharing and collaboration attitudes are impacted by many factors, there is a dearth of research investigating the relationships between technology capacities and individual attitudes toward knowledge sharing and collaboration in virtual teams. To narrow the research gap, this study explores five potential microblogging capacities, and proposes a model to test the impacts of these factors on employees’ attitudes to share knowledge. Specifically, the study identifies microblogging ubiquity, brevity, communication, subscription, and source identity and suggests these may positively influence knowledge sharing attitudes in virtual teams

    Causal Model for Predicting Knowledge Sharing via ICTs

    Get PDF
    Research has identified numerous constructs impacting employees’ use of information and communication technologies (ICTs) for the purposes of knowledge seeking and knowledge contributing. Presently, there is a significant gap in the literature that examines factors that contribute to the most commonly accepted barriers to knowledge sharing and how these factors impact organizational knowledge management practices. This research examines three knowledge sharing barriers (lack of time, poor communications skills, and lack of trust) and proposes three shared contributing factors among them (role conflict, role ambiguity, and locus of control) and a moderator (ICT). A theoretical model is presented to explain the causal relationships between the contributors and ICT users’ knowledge seeking and knowledge contributing behaviors

    Evolutionary Systems: Applications to Cybersecurity

    Get PDF
    Evolution is a well-known biological theory; however, there is a gap in literature that examines how evolutionary principles can be applied to other natural as well as artificial systems. This paper includes an extension to the general evolutionary algorithm to showcase how evolutionary principles can be applied through technology evolutionary models and tools to identify and prevent cyber threats

    Organizational Information Dissemination Within Collaborative Networks Using Digital Communication Tools

    Get PDF
    Knowledge transfer among employees remains a challenge for many organizations. With the increased adoption rate of corporate social media collaboration technologies, there is an urgent need to determine the factors that enhance information diffusion among employees. \ \ The current study leverages prior research on social media collaboration performed in the public domain to determine whether the dimensions of tie strength have any effect on information diffusion among corporate users of social media technologies. Analysis of 511 Lync messages related to a training topic at a mid-sized South Central corporation was performed. The preliminary results demonstrated that the dimensions of tie strength (intimacy, structural, and social) were highly correlated to the number of messages among users. Moreover, regression analysis showed that three quarters of the messages were also predicted by the dimensions of tie strength.

    Toward a Model for Customer-Driven Release Management

    Get PDF
    Undetected software bugs frequently result in service disruptions, productivity losses, and in some instances significant threat to human life. One way to prevent such bugs is to engage customers in acceptance testing prior to the production software release, yet there is a considerable lack of empirical examination of the release process from the customer’s perspective. To address this research-practice gap, this study proposes a model for customer-driven release management that has been shown to minimize the number of software bugs discovered in production systems. The model is evaluated during a 27 month study at a municipality using the action research method. Following the model, 361 software bugs were detected and eliminated prior to final production releases, confirming the value of customer-driven release management for elimination of production software bugs

    Knowledge Exchange via Unified Communication Services: A Grounded Theory Approach

    Get PDF
    Literature remains scant concerning the benefits of unified communication services (UCS) for the purposes of knowledge exchange in organizations. This study utilized the Grounded Theory approach to systematically analyze 3023 communication logs among 47 employees at a mid-size South Central company. Findings show that UCS knowledge exchange occurs with high frequency, has short duration and is done primarily through low synchronicity mediums. A theoretical model is also proposed to explain the dimensions of the exchanged knowledge exchanged
    • 

    corecore