6,269 research outputs found

    Examining Control Balance & Information Security Policy Violations

    Get PDF

    Examining Cognitive Load and Information Systems Security Compliance

    Get PDF

    Examining Ethics Washing & Consumer Trust in the Smart Device Context

    Get PDF

    Eliciting Societal Values About Cyberstalking Policy Decisions

    Get PDF
    Cyberstalking is a significant challenge in the era of Internet and technology. When dealing with cyberstalking, institutions and governments alike have a problem in how to manage it and where to allocate resources. Hence, it is important to understand how individuals feel about the problem of cyberstalking so it can be managed in the context of cybersecurity. To do this the problem question is twofold: First, what objectives are important based on the values of the general public with regard to the prevention of cyberstalking. Second, what are the possible scenarios for the implementation of these objectives that organizations, governments and society at large can look to that will guide their decision making process. In this paper we utilize Keeney’s (1990) public value forum to elicit public values which can form the basis for the decision making process in preventing cyberstalking so institutions and governments can allocate resources prudently

    IS Security Research Development: Implications For Future Researchers

    Get PDF
    Security within the context of Information Systems has long been a concern for both academics and practitioners. For this reason an extensive body of research has been built around the need for protecting vital technical systems and the information contained within them. This stream of research, termed Information Systems Security (ISS), has evolved with technology over the last several decades in numerous different ways. This evolution can create a great deal of difficulty for researchers to identify under-represented areas of ISS research as well as ensure all relevant areas of concern are addressed. The purpose of this paper is threefold: First, our goal is to map the progression of ISS research from past to present. Second, conduct a review of ISS literature from the date of the last holistic literature review to present, identifying key security thematic presented in these works, grouping them categorically. Lastly, from this review we explain the thematic these works resolve to and based on these categories we discuss where ISS research currently stands

    Systems Theory: Should Information Researchers Even Care?

    Get PDF
    Several prominent perspectives that offer valuable insight and quality contributions to academic research currently influence the field of information systems (IS). The purpose of this paper is to discuss systems theory within the field of IS and provide evidence of its merit for adding useful perspective in conducting IS research. This is accomplished by the following: First, the historical background and context for systems theory is provided and put in relation to information systems; second, we review a case study that uses a systems theory perspective to demonstrate its real-world application; and third, we discuss the ways in which systems theory can make new contributions to the field of IS and which warrant its further consideration as a lens for conducting research. The purpose of this paper is to move the discussion forward regarding systems theory application in the IS field and to demonstrate that it has and continues to have significant research implications

    Integer quantum Hall effect on a six valley hydrogen-passivated silicon (111) surface

    Full text link
    We report magneto-transport studies of a two-dimensional electron system formed in an inversion layer at the interface between a hydrogen-passivated Si(111) surface and vacuum. Measurements in the integer quantum Hall regime demonstrate the expected sixfold valley degeneracy for these surfaces is broken, resulting in an unequal occupation of the six valleys and anisotropy in the resistance. We hypothesize the misorientation of Si surface breaks the valley states into three unequally spaced pairs, but the observation of odd filling factors, is difficult to reconcile with non-interacting electron theory.Comment: 4 pages, 4 figures, to appear in Physical Review Letter

    Distinguishing Multiple System Atrophy vs Parkinson’s Disease in an African American Woman

    Get PDF
    An 87-year-old African American woman with a past medical history of atrial fibrillation on warfarin and peripheral neuropathy with a family history of myasthenia gravis presented to the Emergency Department. The primary reason was loss of consciousness upon standing. The patient was given the diagnosis of hypertension, cervical spinal stenosis, and Parkinson’s Disease. There is little improvement with medications for any of these conditions. Currently, patient has episodes of worsening BP, blackouts, dysphagia, snoring, decreasing voice pitch with trismus. In addition, the patient is positive for dizziness, mild resting tremor in left hand with rigidity, constipation, multiple UTIs and postural instability. The patient and caregiver feel strongly that the care received is less than optimal. The possibility of Multiple System Atrophy, which usually is detected in younger (around age 50) patients, is examined based on differential diagnosis

    Dielectric photonic crystal as medium with negative electric permittivity and magnetic permeability

    Full text link
    We show that a two-dimensional photonic crystal (PC) made from a non-magnetic dielectric is a left-handed material in the sense defined by Veselago. Namely, it has negative values of both the electric permittivity ϵ\epsilon and the magnetic permeability μ\mu in some frequency range. This follows from a recently proven general theorem. The negative values of ϵ\epsilon and μ\mu are found by a numerical simulation. Using these values we demonstrate the Veselago lens, a unique optical device predicted by Veselago. An approximate analytical theory is proposed to calculate the values of ϵ\epsilon and μ\mu from the PC band structure. It gives the results that are close to those obtained by the numerical simulation. The theory explains how a non-zero magnetization arises in a non-magnetic PC.Comment: 11 pages 4 figure

    A Review of Cyberattack Research using Latent Dirichlet Allocation

    Get PDF
    Cyber Attacks have been on an increase in the past decade. Dominant academic research has considered a range of theoretical approaches to the study of cyberattacks on organizations and society at large. However, there is a paucity of research that systematically reviews the current literature to define current emphasis and propose future research directions. In this paper we use the Latent Dirichlet Allocation approach to review cyberattack research in the Chartered Association of Business Schools level 3 and above journals over the last two decades. In a final synthesis we propose a future research agenda
    corecore