55 research outputs found

    Partly Cloudy, Scattered Clients: Cloud Implementation in the Federal Government

    Get PDF
    Since the issuance of a federal mandate in 2010 requiring federal government agencies in the United States of America to immediately shift to a “Cloud First” policy, agencies have struggled to adopt cloud computing. Previous research has examined hindrances to cloud computing adoption across industries in the private sector (Raza et al., 2015, Park and Ryoo, 2012, and Bhattacherjee and Park, 2012). While this research provides important insights on cloud computing adoption in the private sector, it devotes scant attention to challenges of cloud computing adoption in the federal government. This study seeks to fill this gap by examining the roles of Top Management Support and Information Security Awareness on cloud computing implementation success in the federal government. Institutional theory serves as the theoretical framework for this study

    Is Teleworking for Millennials?

    Get PDF
    While research has examined generational attitudes regarding work, there are limited studies on the expectations of the newest workforce, the Millennials (born 1981- 1999). This study looks at the Millennials’ attitudes toward autonomy, work/life balance, perceived computer competence and its relationship with telework preference. Using a survey instrument, a sample representing 195 Millennials and 68 non-Millennials were scrutinized to determine their preferences by group. Partial support was found for the effect of autonomy and work/life balance toward the preference to telework. Millennials do not seem to prefer teleworking. However, differences between males and females depicted greater interest in males

    Software Reuse Success Strategy Model: An Empirical Study of Factors Involved in the Success of Software Reuse

    Get PDF
    This study examined the relationship between information technology (IT) governance and software reuse success. Software reuse has been mostly an IT problem but rarely a business one. Studies in software reuse are abundant; however, to date, none has a deep appreciation of IT governance. This study demonstrates that IT governance has a positive influence on software reuse success. IT strategy and strategic decision-making process mediate the relationship between IT governance and software reuse success as mediators of the relationship. A sample of over 200 responses from IT professionals and business managers was used in this research. Data analysis was accomplished using confirmatory factor analysis (CFA) and structural equation model (SEM) with AMOS. The findings of this study supported the main causal relationship between effective IT governance and software reuse success. This study confirmed the need for effective IT governance in order to achieve success in software reuse initiatives

    IT Placement Data: What Can It Tell You About Educating the IT Workforce?

    Get PDF
    We seek to share and engage in discussion with colleagues about IT placement data at their institutions, the aggregated, the shared, the hidden, and the research studies explored or ignored. We are seeing increasing interest in data about first destination jobs of our IT graduates, whether they are educated in business, computer science, engineering, or information schools (see NACE 2024). New and emerging technologies have challenged us and sometimes rocked us in recent years. Between COVID-19, political instabilities, generative AI, and all the shifts to virtual engagement, the employment picture has shifted for the IT workforce. These have affected students graduating into any occupation but are additionally challenging for those who wish to become part of the IT workforce. The outcomes of our educational efforts are often hard to measure and surprisingly are often not pursued strategically as sources of insights into curriculum, employer relations, or environmental conditions. After a quick review of some existing IT placement initiatives, we will focus on what we have learned from the literature and our research. Building on our published research and work-in-progress, we will share some findings from two of our studies of IT graduates published eighteen years apart, some challenges, and potential opportunities of IT placement data for academic administrators, researchers, and others engaged in curricular or career development of the IT workforce (Kaarst-Brown & Guzman, 2005, 2023). We have questions even as we offer suggestions. As a starting point, do you know if your department/school/institution collects placement data in general and placement data specific to your IT graduate programs? Do you have access to the data, or do you only see aggregated reports? If you participate in curriculum and program discussions, has this data been brought to the forefront of discussions? Do you know who hires your graduates and what knowledge, skills, and abilities these employers seem to value? Are you working on research that might benefit from IT placement data? We hope to engage our colleagues in a discussion about IT placement data, why it is important to our goals of educating the IT workforce, and what we can learn from it

    Factors that influence HIPAA Secure compliance in small and medium-size health care facilities

    Get PDF
    This study extends the body of literature concerning security compliance by investigating the antecedents of HIPPA security compliance. A conceptual model, specifying a set of hypothesized relationships between management support, security awareness, security culture; security behavior, and risk of sanctions to address their effect on HIPAA security compliance is presented. This model was developed based on the review of the literature, Protection Motivation Theory, and General Deterrence Theory. Specifically, the aim of the study is to examine the mediating role of risk of sanctions on HIPAA security compliance

    Identifying Factors that Influence Corporate Information Security Behavior

    Get PDF
    In this paper, we present a social/behavioral meta-study of good corporate information security practices. The research model combines social cognitive theory and control theory in order to explain the individual and environmental factors that influence corporate information security behavior. The model includes employees’ beliefs about their abilities to competently use computer information security tools in the determination of effective information security practices within organizations. We present the definition and operationalization of constructs such as information security awareness and information security practice as the dependent variable and then support within the organization, encouragement by others, others’ use as environmental factors in the information security context; and finally, self-efficacy and outcome expectations as the independent variables of the model. This research model is aimed to develop an effective audit and recommendation model for organizations that are looking to make significant improvements in their information security profiles

    Three Perspectives on the Value of Bridgers Within IT: A Longitudinal Study of Eight Years of Job Placement of IT Graduates

    Get PDF
    Job placement data is important for understanding where graduates get jobs. We present an empirical study of eight years of undergraduate and graduate IT placement data to explore IT jobs obtained within IT functions. Niederman, Ferratt, and Trauth (2016) propose clustering IT jobs into four macro-level categories based on the knowledge, skills, and abilities (KSAs) required for these jobs: IT bridgers, technical specialists, application domain specialists, and IT managers. They argue an increased need for and value placed on “bridgers” who can fill bridging jobs within IT. Bridgers within IT possess both technical and “soft skills” like communications/managerial and change/project management and work within the IT function but can liaise between IT and business units. Using a longitudinal sample of 1,980 IT graduates from one Information School, the data supports that IT bridgers are hired within IT, are hired earlier, and are largely hired in consulting, technology, and finance industry sectors. Contributions include exploring the utility of the macro-level categorization of NFT IT job categories to analyze job placement, the importance of tracking IT job placement in employer sectors, and the overall value of IT placement data for IT educators and administrators
    • …
    corecore