42 research outputs found

    Connecting to Unfamiliar Wi-Fi Hotspots - A Risk Taking Perspective

    Get PDF
    Public Wi-Fi provides a convenient, cost-effective means for network connectivity in areas where wired infrastructure would be impractical. However, the use of multiple access points and radio wave transmissions present formidable challenges to providing a secure platform. Considering the rapid growth in Wi-Fi hotspot deployments and their potential vulnerabilities, the damage from these malicious activities could be substantial. While organizations deploying hotspots have great control over the security posture of the Wi-Fi network, the consumer has little insight into the risk associated with a particular system. Despite widespread knowledge of potential vulnerabilities related to public Wi-Fi, many people still connect to unfamiliar hotspots. We explore user perceptions of public Wi-Fi risks and benefits when making a connection decision. We develop a public Wi-Fi connection calculus model based on the theoretical foundations of motivational determinants of risk taking behavior theory, technology threat avoidance theory, and the extended privacy calculus model

    Virtual Organizational Learnign in Open Source Software Development Projects

    Get PDF
    We studied the existence of virtual organizational learning in open source software (OSS) development projects. Specifically, our research focused on learning effects of OSS projects and factors that affect the learning process. The number and percentage of resolved bugs and bug resolution time of 118 SourceForge.net OSS projects were used to measure the learning effects> Projects were characterized by project type, number and experience of developers, number of bugs, and bug resolution time. Our results provide evidence of virtual organizational learning in OSS development projects.Virtual organizational leraning: Organizational learning curve: Virtual organization: Open source software development: Project performance

    Malware Avoidance Motivations and Behaviors: A Technology Threat Avoidance Replication

    Get PDF
    The current study presents a conceptual replication of Liang and Xue’s (2010) test of their proposed Technology Threat Avoidance Theory (TTAT). Whereas the original study investigated individuals’ spyware related threat perceptions, avoidance motivations, and behaviors; we applied the original study’s research questions, hypotheses, and model to the more general context of malware. Results from a sample of 486 computer users revealed that safeguard effectiveness, safeguard cost, and self-efficacy are relatively robust predictors of avoidance motivation across varied settings. Perceived severity is a strong predictor of perceived threat, however the impact of this overall threat perception (along with its perceived susceptibility antecedent) may be less stable in predicting avoidance motivation under changing contextual/environmental circumstances. The results suggest that TTAT is a valid foundational framework for examining user behavior related to malicious software. Future research should investigate additional predictors of avoidance motivation such as risk propensity, distrust, and impulse control to improve the power of the model. Additionally, the current TTAT instrument offers several opportunities for enhanced measurement accuracy through item modifications, scale anchor revisions, and improvements in parsimony

    A Conceptual Replication of the Unified Model of Information Security Policy Compliance

    Get PDF
    Conceptual replications offer robust tests of theory by subjecting the relational notions of a scientific model to evaluation using alternate instruments, treatments, and subject pools. This study performs a conceptual replication of Moody, Siponen, and Pahnila’s 2018 empirical analysis that integrated elements of eleven theoretical models to produce the unified model of information security policy compliance (UMISPC). This replication employed a substantially more parsimonious instrument, using modestly revised treatment scenarios targeted toward a U.S. audience of 218 IT professionals as opposed to the Finnish graduate students used in the original study. Our results indicate that UMISPC is robust across variations in instruments and subject pools. The replicated model explained approximately two thirds of the variance in information systems security policy compliance intentions across both studies. In contrast, competing models such as the theory of planned behavior and extended protection motivation theory exhibited large changes in explanatory power when the instrument and subject pool were modified. This suggests that UMIPSC may be a superior theoretical model for consistently evaluating security policy compliance behavioral intentions among varied populations. Our results also indicate that the theoretical model is capable of detecting and integrating a wide range of behavioral antecedents that may have differing levels of influence among various populations

    IT Career Counseling: Are Occupational Congruence and the Job Characteristics Model Effective at Predicting IT Job Satisfaction?

    Get PDF
    The IT industry struggles to attract qualified talent despite an exceptional outlook in terms of both job availability and compensation. Similarly, post-secondary academic institutions report difficultiesrecruitingstudents for IT majors. One potential reason for this is that current career counseling practices do not adequately convey relevant job characteristic data to prospective job applicants and academic majors. Accordingly, we report the results of a survey of72 IT professionals regarding their job interests and perceptions of important characteristics of their current job. We use the data to test the efficacy of Holland’s classic occupation congruence model, the basis of current career counseling practices.In addition, we assess an alternate congruence model based on professionals’job perceptions and the Job Characteristics Model of Work Motivation (JCM) to determine which is more effective at predicting desired job outcomes. Results show that a sub-set of JCM constructs including task variety, task identity, and task autonomy is superior to both congruence models in predicting positive job outcomes. This suggeststhat IT career counseling outcomes mightbe improved by emphasizingthe JCMcharacteristics

    Measuring Success in Interorganizational Information Systems: A Case Study

    Get PDF
    We report results of a longitudinal case study in which an emergency medical service replaced a paper-based medical record with an electronic medical record system. The new systems electronically transmitted patient information to various other agencies for reporting, medical quality control, and billing purposes. As expected, the time required for the paramedics to document the medical record increased immediately after system implementation. As a result, operational performance of the paramedics declined. An unexpected consequence of system implementation was that operational performance never reached the level achieved prior to system implementation. However, the benefits attained by all organizations involved outweighed the prolonged decrease in operational performance of the paramedics. Therefore, we advise organizations implementing technology crossing organizational boundaries to consider both the direct and indirect benefits of a system implementation and to evaluate both operational and organizational performance

    Refining Technology Threat Avoidance Theory

    Get PDF
    Understanding individual threat avoidance motivation and behavior is a critical component in designing effective cyber security solutions for both users and organizations. Technology threat avoidance theory (TTAT) asserts that individuals’ perceptions regarding their susceptibility to and the resulting severity of technology threats influence their awareness of the threats, which, in turn, influences their motivation and behavior to avoid them. While TTAT provides cogently and logically explains individuals’ technology threat motivations and behaviors, empirical tests have produced equivocal results particularly in terms of the influence of susceptibility and severity on threat perceptions. Due to these inconsistencies in the threat calculus involving susceptibility, severity, and threat, we need more work to improve and understand individual threat motivations. Additionally, TTAT does not account for individual differences such as risk propensity, distrust propensity, and impulsivity that have been shown to affect cyber security behavior. To address these gaps, we present an empirical assessment of a refined TTAT model, which includes individual differences and models the influence of susceptibility on threat perceptions as partially mediated by severity. Results indicate that, while perceived susceptibility is a significant predictor of threat perceptions, severity perceptions partially mediates its effect. Our results also support the inclusion of risk propensity and distrust propensity in the TTAT model as personal characteristics that significantly affect overall threat perceptions

    Why do Individuals Continue Using Mobile Payments - A Qualitative Study in China

    Get PDF
    Many financial and mobile service providers are viewing mobile payment (MP) as a strategic growth area for their business. In order to realize this anticipated growth potential, users must initially adopt and then continue to use MP systems. However, a rich and detailed user perspective of MP continuance behavior is lacking. We address part of this research gap by content-analyzing interview transcripts of 38 MP users. The findings indicate that perceived usefulness and risk, disconfirmation, satisfaction, subjective norm, and habit are important when users making MP continuance decisions

    Development of a HTSMA-Actuated Surge Control Rod for High-Temperature Turbomachinery Applications

    Get PDF
    In recent years, a demand for compact, lightweight, solid-state actuation systems has emerged, driven in part by the needs of the aeronautics industry. However, most actuation systems used in turbomachinery require not only elevated temperature but high-force capability. As a result, shape memory alloy (SMA) based systems have worked their way to the forefront of a short list of viable options to meet such a technological challenge. Most of the effort centered on shape memory systems to date has involved binary NiTi alloys but the working temperatures required in many aeronautics applications dictate significantly higher transformation temperatures than the binary systems can provide. Hence, a high temperature shape memory alloy (HTSMA) based on NiTiPdPt, having a transformation temperature near 300 C, was developed. Various thermo-mechanical processing schemes were utilized to further improve the dimensional stability of the alloy and it was later extruded/drawn into wire form to be more compatible with envisioned applications. Mechanical testing on the finished wire form showed reasonable work output capability with excellent dimensional stability. Subsequently, the wire form of the alloy was incorporated into a benchtop system, which was shown to provide the necessary stroke requirements of approx.0.125 inches for the targeted surge-control application. Cycle times for the actuator were limited to ~4 seconds due to control and cooling constraints but this cycle time was determined to be adequate for the surge control application targeted as the primary requirement was initial actuation of a surge control rod, which could be completed in approximately one second

    Translating research into evidence-based practice: The National Cancer Institute Community Clinical Oncology Program

    Get PDF
    The recent rapid acceleration of basic science is reshaping both our clinical research system and our health care delivery system. The pace and growing volume of medical discoveries are yielding exciting new opportunities, yet we continue to face old challenges to maintain research progress and effectively translate research into practice. The National Institutes of Health and individual government programs are increasingly emphasizing research agendas involving evidence development, comparative effectiveness research among heterogeneous populations, translational research, and accelerating the translation of research into evidence-based practice, as well as building successful research networks to support these efforts. For over 25 years, the National Cancer Institute's Community Clinical Oncology Program has successfully extended research into the community and facilitated the translation of research into evidence-based practice. By describing its keys to success, this article provides practical guidance to cancer-focused provider-based research networks as well as those in other disciplines
    corecore