22 research outputs found

    ONLINE LEARNING FRAMEWORK - RAPID FRAMEWORK DEVELOPMENT AS A RESPONSE TO THE COVID-19 PANDEMIC

    Get PDF
    The Covid-19 pandemic has had an enormous impact on the world, with the education sector seeing considerable disruption. The practice of social distancing and mandatory lockdowns resulted in the near total closure of schools and universities in many countries across the globe. This led to the need for many institutions to conduct their classes online. There are many examples of how universities transitioned to online teaching during the pandemic, however, this paper will contribute to the body of knowledge by sharing the experiences of academic staff in an international offshore campus in South East Asia. Based on experience, the challenges and benefits of online education are discussed from the perspectives of students, parents and lecturers. Furthermore, the paper elucidates the use of an online framework to provide institution-wide support, enhance the benefits of online learning and mitigate its pitfalls. Reflections from lecturers offer insights running an online class with this framework. The authors recommend the use of an institution wide framework and support to facilitate a smooth transition to online classes and promote long-term sustainability of online learning. Authentic assessments also play a pivotal role in online learning

    Network Security Investment

    Get PDF
    Analysing potential risk and the allocation of resources for computer network security and business continuity require strategic, long-term planning. Most companies tend to be reactive and respond with quick infrastructure solutions. The purpose of risk analysis should be to assist managers in making informed decisions about investment and developing risk management policies. High countermeasures expenditure on every aspect of an information system is out of question in a commercial organisation. Therefore, this expenditure must be directed to reduce corporate exposure to information system risks in the context of overall business risks. The aim of this paper is to report the on going research to justify funding for network security expenditure through risk assessment practice

    Information and network management security Investment

    Get PDF
    In today’s business environment it is difficult to obtain senior management approval for the expenditure of valuable resources to “guarantee “that a potentially disastrous event will not occur that could affect the organisation performance. Analysing potential risk and the allocation of resources for computer network security and business continuity require strategic, long-term planning. Most companies tend to be reactive and respond with quick infrastructure solutions. A strategic approach to computer network security leads to a more efficient plan and a less expensive risk-management strategy. Financial modelling is a fundamental component of all business investment cases. IT security investment proposals have unique qualities that can pose expenditure justification challenges. This paper aims to explore various financial models and to develop one that IT managers can effectively use to support their business cases

    Contextual Difference and Intention to Perform Information Security Behaviours Against Malware in a BYOD Environment: a Protection Motivation Theory Approach

    Get PDF
    The research domain of end-user’s information security behaviours has been gaining much attention over the recent years. While the nature of intention to perform information security behaviours are being revealed, there are still gaps in this area. In particular, few studies have addressed whether such intention remains across contexts, especially from home to public places. Secondly, the amount of the cyber-threats swells with the increase of personal devices with the rapid adoption of the BYOD trend. This research employed MSEM methods to develop a conceptual model based on Protection Motivation Theory by using data collected from 252 higher education students in a BYOD Australian university. Our findings confirmed and explored in details how intention to perform information security behaviours varied due to the change of context. Academics and practitioners could mitigate the security gap by focusing on the intention’s differences discussed in our findings

    Exploring Knowledge Sharing Practices for Raising Security Awareness

    Get PDF
    This study aims to explore the types of information can be effectively communicated in three knowledge-sharing methods and their impact on employees’ security practice. On one end, guarding the organisation’s information system against cyber-attacks is critical and improving users’ knowledge and skills is a common approach to any security program. On the other end, organisations lack a clear understanding in determining what types of security information should be delivered through various methods of communication to be effective in boosting users’ knowledge and compliance behaviour. The study employed a qualitative method using semi-structured interviews with business users in Vietnam. The initial findings indicate a single method of knowledge and skill development is not sufficient to assist users to deal with complex and constant changing security needs. It is necessary to further experiment methods of encouraging formal and peer knowledge sharing that can support individual effort in complying with security policies

    Categorizing Young Facebook Users Based On Their Differential Preference of Social Media Heuristics: A Q-Methodology Approach

    Get PDF
    Background: Social media have become an integral part of our modern society by providing platforms for users to create and exchange news, ideas, and information. The increasing use of social media has raised concerns about the reliability of the shared information, particularly information that is generated from anonymous users. Though prior studies have confirmed the important roles of heuristics and cues in the users’ evaluation of trustworthy information, there has been no research–to our knowledge–that categorized Facebook users based on their approaches to evaluating information credibility. Method: We employed Q-methodology to extract insights from 55 young Vietnamese users and to categorize them into different groups based on the distinct sets of heuristics that they used to evaluate the trustworthiness of online information on Facebook. Results: We identified four distinct types of young Facebook user groups that emerged based on their evaluation of online information trustworthiness. When evaluating online information trustworthiness on Facebook, these user groups assigned priorities differently to the characteristics of the online content, its original source, and the sharers or aggregators. We named these groups: (1) the balanced analyst, (2) the critical analyst, (3) the source analyst, and (4) the social network analyst. Conclusion: The findings offer insights that contribute to information processing literature. Moreover, marketing practitioners who aim to disseminate information effectively on social networks should take these user groups’ perspectives into consideration

    Demystifying online personas of Vietnamese young adults on Facebook: A Q-methodology approach

    No full text
    As online social networking sites (SNS) are becoming a part of many people’s daily life, they have become a topic of interest that attracts the attention of both academics and practitioners. The users’ behaviours on those sites are complex and have important implications. Individuals can use a wide range of SNS’s functionalities, for example, to socialise and promote their online identities or find friends of common interests. Reckless online behaviours on SNS have been shown to result in breaches of privacy and other risks such as cyber-bullying, cyber-stalking, and job loss. As a result, there are many concerns over these problems that prevent SNS from reaching their full potential. Given the vast number of user’s concerns, identified by prior studies, there is a need to explore a typology of users that classifies online personas. This typology would reveal more about the users’ needs and help improve their experience on SNS. To achieve that goal, we collected data from fourteen Vietnamese young adults of different backgrounds who use Facebook, which was then analysed with Q factor analysis. The findings suggested three distinctive online personas that include the Outgoing Connector, the Reserved Trustor, and the Threats Perceiver. Implications for marketing tactics and design of better users’ experiences on social networking sites were discussed, and the proposed typology could serve as a starting point for future research to further explore the different types of social media’s users

    An Integrated Effectiveness Framework of Mobile In-App Advertising

    No full text
    Advertising in mobile apps has recently become one of the most popular advertising channels for businesses when its annual revenue has rapidly increased year over year. On this kind of advertising, the app publishers do not only play a critical role in the ad serving process but also receive a significant portion of the advertising revenue. Their goal of maximizing the revenue sometimes contradict with those of the advertisers. This research conceptualises the role of publishers and proposes an integrated effectiveness framework to further improve the effectiveness of mobile in-app advertising not for one but all participants involved. In specific, this research explores the factors being controlled by publishers and evaluates their impact on the common outcome metric of mobile in-app advertising. An application of the proposed effectiveness framework might help to increase the global mobile in-app advertising revenue significantly higher by balancing the benefits of all participants
    corecore