5 research outputs found

    DISRUPTING FACULTY SERVICE: USING TECHNOLOGY TO INCREASE ACADEMIC SERVICE PRODUCTIVITY

    Get PDF
    Scholarly attention regarding faculty involvement has primarily focused on faculty opinions of shared governance and faculty influence on institutional decision-making. There has been limited attention given to academic service productivity and the effectiveness of traditional approaches toward the accomplishment of faculty service requirements. This paper discusses disruptive technological change as a subset of disruptive innovation and proposes a technology-based framework for increasing service productivity while maintaining effort with regard to faculty service requirements in academic institutions. Specifically, a social networking tool is used to approach academic service projects with organic involvement and measured progress. It is suggested that such an approach may have positive implications toward increasing productivity in academic service. Further, additional benefits inherent in the tool make possible the leveraging of external networks for further productivity gains with no increase in resources while fostering a standardization of products across universities

    Defining Roles, Relationships, and Value in Cybersecurity Operations

    No full text
    This paper evaluates activities related to the creation and operation of a Security Operations Center (SOC). This SOC is owned by a business college and is run with the cooperation of the university’s information technology department. The creation, nature, and evolution of relationships between the SOC and its external partners are explored and defined. A National Institute of Standards and Technology (NIST) Cybersecurity framework is used as a context and Social Exchange Theory is used as a lens for interpretation and explanation

    THE ETHICAL USE OF IT: A STUDY OF TWO MODELS FOR EXPLAINING ONLINE FILE SHARING BEHAVIOR

    No full text
    The use of peer to peer (P2P) technology to download copyrighted digital material has grown substantially since its introduction to the masses with Napster in 1999. In spite of continued prosecution and law suits costing individuals totals in the millions of dollars, rather than diminish, illegal downloading behaviors continue to grow in popularity raising a question concerning the ethical use of information technology. Why do individuals participate in online file sharing activities in spite of its moral implications? This study investigates the use of two supported models of behavior (Hunt-Vitell General Theory of Ethics, Theory of Planned Behavior) to explain individuals downloading illegal media files. Specifically, the context used in this study is the downloading of illegal music. Given its nature, this context focuses on the ethical component of the use of technology. While the Theory of Planned Behavior (TPB) has been used to address ethical behaviors, the Hunt-Vitell (HV) model specifically addresses the moral component where it is only implied in the TPB. The two models are compared and contrasted as explanatory tools for illegal downloading behavior and subsequently, the ethical use of IT. A synthesized model based on components of the two is proposed and tested with significant results. The results of this study are beneficial to organizations attempting to deal with piracy in their retail business models, academic research in terms of validating current models and presenting a new model for investigating ethical use of IT, and extends to educational curricula and even the home regarding a need for expanding the focus of moral development to include an ever growing use of IT in the personal lives of young people.Decision and Information Sciences, Department o

    Implementing a Security Operations Center at a Midwest University: A Case Study

    No full text
    This study seeks to chronicle the design, implementation, and operation of a Security Operations Center (SOC) at one midwest university

    A Proposed Social Mechanism for Community Membership: The Case of Online File Sharing Using Bittorrent

    Get PDF
    Most previous literature on virtual communities has taken a macro perspective viewing the virtual community as a whole instead of looking into the actions of individuals. This study offers a different perspective as it looks into a virtual community from the point of view of the individual. In so doing, we propose a social mechanism that concentrates on the actions of individuals leading up to and including their membership in a specific type of virtual community associated with the file sharing technology Bittorrent. A further analysis is then presented of a macro process which views the membership process as a whole and suggests there that outside forces of technology/community growth, ISP and CSP involvement, and diminishing experience with traditional media commerce further impact community membership
    corecore