7,004 research outputs found
Shaming as a Technique for Information Security Policy and Training Adherence
Information security policy and information security training are vital parts for maximizing information systems security (Dhillon and Backhouse, 2000; Rezgui and Marks, 2008; Siponen, 2001; Straub and Welke, 1998). However, employees not adhering to security policies and not practicing what they learned in training can lead to unintentional mistakes and financial losses for organizations (CSI, 2010). This research investigates Deterrence Theoryās shaming as a technique for encouraging employees to adhere more to information security policies and training. Results indicate that employees find peer shaming punishments more severe than typical corporate punishment methods. Implications are that employers using peer shaming as a punishment technique may see better security policy and training adherence
Work in progress: a novel method of creating an academic content repository
This paper outlines a project aimed at addressing the issue of the scalability of online academic support. This project is being run during the Autumn semester at the University of Southern Queensland (USQ) Toowoomba Australia, in conjunction with the Australian Digital Futures Institute. The study attached to the project will use Design-Based Research to evaluate the effectiveness of a simple, but innovative academic content and metadata creation tool referred to as Academic Assist. Academic Assist has been recently developed at USQ as a plug-in block for the moodle-based Learning Management System employed at USQ for its several hundred online subjects. The pilot project and associated study now extends over nine subjects, including three consecutive subjects in computer engineering; and covers faculties of Engineering, Education, Business, Science and Arts. Some preliminary results are presented here. Complete results of the study including acceptance surveys, expert reviews and usage statistics will be presented at FIE 2009
A New Look at the Relationship between User Involvement in Systems Development and System Success
The relationship of user involvement to successful systems development has been the focus of much attention for information systems researchers for some time. Common understanding has been that extensive user involvement is not only important, but absolutely essential to system success. However, earlier studies trying to link user involvement to system success have shown mixed results. In this paper we review 28 empirical research studies that investigate the significance of user involvement. From our results we conclude that user involvement in the systems development process is indeed important to system success. We further identify several key points pertinent to making user involvement effective
Does User Participation Lead to System Success?
The effect of user participation on successful systems development has been the focus of much attention for information systems researchers for some time. Common understanding has been that extensive user participation is not only important, but absolutely essential to system success. However, earlier studies trying to link user participation to system success have shown mixed results. In this paper, we analyze fourteen more recently published, empirical research studies that investigate the significance of user participation. From our results we conclude that user participation in the systems development process is indeed critical to system success. Common themes are identified
The Need to Address Mobile Device Security in the Higher Education IT Curriculum
Mobile devices, including smartphones and tablets, enable users to access corporate data from anywhere. In 2013, people will purchase 1.2 billion mobile devices, surpassing personal computers as the most common method for accessing the Internet. However, security of these mobile devices is a major concern for organizations. The two leading mobile operating systems (OS), Googleās Android OS and Appleās iOS, both have security concerns as do the mobile applications and the major application markets. āBring your own devices,ā where employees supply their own equipment for work-related purposes, can cut costs for organizations, but failing to address security can significantly increase those costs. This paper focuses on the increasing need for mobile business and its related mobile device security concerns. We propose that future IT professionals should be aware of these issues and learn how to secure mobile devices through the integration of the topic into the IT Model Curriculum. Using the case of one undergraduate IT program, we developed a set of mobile device security education recommendations, which we then mapped to the IT Model Curriculum using the guidelines from Accreditation Board for Engineering and Technology (ABET). This mapping approach demonstrates one way how higher education institutions could integrate mobile device security into any IT curriculum
Recommended from our members
Mobile App Installation: the Role of Precautions and Desensitization
The purpose of this research is to investigate precautions that consumers take before installing mobile apps and consumerās potential desensitization to excessive app permission requests. Through a survey of 209 participants, a prediction model was created that attempts to predict whether respondents would download applications asking for excessive permissions. The model results indicate those that take more precautions are less likely to download apps requesting excessive permissions. However, the precautions taken by participants may be inadequate and may leave consumers with a false since of security. Another key finding with the support of Communication Theory and the C-HIP Model is that some consumers have become desensitized to excessive permission requests. These consumers knowingly install apps requesting excessive permissions for reasons such as nothing bad has happened to them before, they trust the market, or they really want the app. The security implications of permission desensitization and inadequate precautions are discussed
Reproductive performance of resident and migrant males, females and pairs in a partially migratory bird
We thank everyone from the Centre for Ecology & Hydrology (CEH) who contributed to data collection, and Scottish Natural Heritage for access to the Isle of May National Nature Reserve. We thank the Scottish Ornithologistsā Club (SOC) for their support, and all volunteer observers, particularly Raymond Duncan, Moray Souter and Bob Swann. HG was funded by a Natural Environment Research Council (NERC) CASE studentship supported by CEH and SOC, FD, SW, MPH, MN and SB were funded by NERC and the Joint Nature Conservation Committee, and JMR was part-funded by the Royal Society. Finally, we thank the Associate Editor and two reviewers for constructive comments on the manuscript. The data are available from the Dryad Digital Repository https://doi.org/10.5061/dryad.532j0 (Grist et al., 2017)Peer reviewedPublisher PD
A methodology for projecting sparse populations and its application to remote Indigenous communities
Ā© 2020, The Author(s).
A new method is proposed for generating projections for sparse populations by locality, age cohort and gender. An adaptation of the cohort replacement method, the approach uses a Tobit model with varying censoring limits to model population changes by cohort. As an applied example, projections are generated for 2016 Indigenous populations in communities in regional and remote Australia, and then compared to actual 2016 Census population counts. We argue the approach has considerable potential, with the model performing well in out-of-sample projection while offering projections at a much finer-grained level of disaggregation than currently available to planners and policy-makers
- ā¦