328 research outputs found

    Processing Information Security Messages: An Elaboration Likelihood Perspective

    Get PDF
    The increasing number of security incidents is causing great concern to organizations. Information security awareness programs are an important approach towards educating users to prevent such incidents. However, it is unclear how to effectively design security programs and messages such that they can inform and change user behaviour. The role of individual factors in influencing the processing of security messages is also unclear. This paper attempts to investigate these problems by studying the effects of security message characteristics and recipient factors on users’ attitude towards security, using the information-processing theory of elaboration likelihood. Two models are developed for this study. The first model studies two message characteristics, argument quantity and quality, as determinants of attitude towards security. A 2x2 factorial design experiment will be conducted to investigate the influence of these characteristics on attitude moderated by the elaboration likelihood towards the security message. The second model tests the effect of four recipient factors on elaboration likelihood. The model development, experimental methodology, and data analysis details are described in this research-in-progress paper. The results are expected to inform the design of effective security messages and contribute to research in this area

    Towards Controlling the Acceptance Factors for a Collaborative Platform in Engineering Design

    No full text
    International audienceThis paper might serve as a guide to take step towards a better acceptance of computer-based Knowledge management (KM) tools in institutional setting. At first time, it investigates a set of factors with different origins which are proved to have an effect on usage decision. Secondly, we set a list of candidate factor which are supposed to influence future users of a collaborative KM platform (Dimocode). At the end, we develop a methodology to take into account the selected factors and master their positive or negative impacts. The contents of this paper would be an appropriate framework in the way of Knowledge management systems (KMS) deployment

    Currency security and forensics: a survey

    Get PDF
    By its definition, the word currency refers to an agreed medium for exchange, a nation’s currency is the formal medium enforced by the elected governing entity. Throughout history, issuers have faced one common threat: counterfeiting. Despite technological advancements, overcoming counterfeit production remains a distant future. Scientific determination of authenticity requires a deep understanding of the raw materials and manufacturing processes involved. This survey serves as a synthesis of the current literature to understand the technology and the mechanics involved in currency manufacture and security, whilst identifying gaps in the current literature. Ultimately, a robust currency is desire

    Cryptanalysis of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables

    Get PDF
    This paper studies the security of a recently-proposed MPEG-video encryption scheme based on secret Huffman tables. Our cryptanalysis shows that: 1) the key space of the encryption scheme is not sufficiently large against divide-and-conquer (DAC) attack and known-plaintext attack; 2) it is possible to decrypt a cipher-video with a partially-known key, thus dramatically reducing the complexity of the DAC brute-force attack in some cases; 3) its security against the chosen-plaintext attack is very weak. Some experimental results are included to support the cryptanalytic results with a brief discuss on how to improve this MPEG-video encryption scheme.Comment: 8 pages, 4 figure

    Artificial Intelligence Meets IS Researchers: Can It Replace Us?

    Get PDF
    Given we live in an era with accelerating digitization and rapid advances in artificial intelligence (AI), AI may eventually automate more job tasks. However, researchers have scarcely if at all critically analyzed how AI will automate such tasks and what professions it will automate more than others. Some studies suggest that AI cannot conduct highly creative and knowledge-intensive tasks. Yet, AI algorithms have generated creative art pieces that even art critics could not distinguish from human-drawn paintings. As IS (and most other) researchers, we pride ourselves on our work’s scarcity, novelty, and creativity. In this context, we report on a panel at the 40th International Conference for Information Systems that debated whether AI can and will replace our major activity, IS research, or even IS researchers themselves

    Untangling knowledge creation and knowledge integration in enterprise wikis

    Get PDF
    A central challenge organizations face is how to build, store, and maintain knowledge over time. Enterprise wikis are community-based knowledge systems situated in an organizational context. These systems have the potential to play an important role in managing knowledge within organizations, but the motivating factors that drive individuals to contribute their knowledge to these systems is not very well understood. We theorize that enterprise wiki initiatives require two separate and distinct types of knowledge-sharing behaviors to succeed: knowledge creation (KC) and knowledge integration (KI). We examine a Wiki initiative at a major German bank to untangle the motivating factors behind KC and KI. Our results suggest KC and KI are indeed two distinct behaviors, reconcile inconsistent findings from past studies on the role of motivational factors for knowledge sharing to establish shared electronic knowledge resources in organizations, and identify factors that can be leveraged to tilt behaviors in favor of KC or KI
    corecore