14 research outputs found

    Security Policy Implementation: Leadership in Disruptive Change

    Get PDF
    A well-crafted information security policy is one of the key ingredients for a ensuring a secure organization (Paananen, et al., 2019). However, implementation of a security policy can result in disruptive organizational change (Lapke & Dhillon, 2008). There is a gap in the literature in examining the relationship between effective leadership and sound security policy implementation. We propose that the examination of leadership through the use of qualitative case study in organizations that have recently implemented new IS security policy can illustrate the effectiveness of good leadership on IS security policy implementation. Methods for data collection will rely on semi structured interview questions based on the theoretical frameworks we will build for leadership and security policy implementation

    Applying E-commerce Techniques to Public School Software

    Get PDF
    Applying e-commerce technology to public school software is a process that involves an extensive and thorough analysis. There are typically three groups of users who would use such a system: teachers, administrators and parents. Teachers need a system that nearly duplicates the software that they are currently using to enter, store, and calculate their grades, while school administrators and parents need to student and teacher\u27s information. This is where the use of e-commerce technology comes in very nicely. The analysis performed for this project involved extensive interviews with the expert user set and a walk-through of the current system. The majority of the interviews were with the teachers. The design involved the standard function descriptions and data analysis. Use cases were used to describe functionality and an entity relationship diagram was created to describe the data. In order to describe the data flow of the system, a screen hierarchy chart was created as well. This project was undertaken with the goal of providing a readily available medium to student data to different groups of users. The primary data enterers, the teachers, did not want any additional work so the system had to duplicate their current system, functionaly, for entering grades. In actuality, the system improved the way in which grades were entered because several duplicate tasks were eliminated in the creation of the new system. This project was successful in every aspect for which it was planned

    Injecting security into information systems development

    Get PDF
    This paper will attempt to reconcile the apparent developmental duality (Baskerville, 1992) be­tween Information Systems (IS) development and IS security development IS Development and IS Security Development each have a substantial foundation of literature on their respective approaches and methodologies. Livari, Hirschheim and Klein (2001) provide a dynamic framework for classifying IS development approaches and methodologies. Besides providing a method for classification, this framework demonstrates the rich history behind IS Development. Baskerville (1993) likewise provides a valuable literature history for IS security development. We believe part of the cause of the security problems that continue to plague organizations (Dhillon, 2001) is ad hoc security implementation (Baskerville, 1993). This "security after the fact" can lead to an incompatibility between the system and the security of the system. Our argument is that a theoretically grounded and methodological approach is lacking for integrating security with Information Systems Development

    SOCIAL NETWORKING MEDIA USAGE TO INCREASE EXPATRIATE EMPLOYEE PERCEIVED ORGANIZATIONAL SUPPORT AND DECREASE TURNOVER

    Get PDF
    The use of social networking media has proliferated in organizations to meet many organizational goals such as marketing, reputation management, and employee recruitment. With communication being an integral component in motivating employees, the use of social networking media has the potential to strengthen employee morale and motivation within an organization. Due to social networking media being a relatively new phenomenon that is still in a nascent and evolving stage of development in society, there is little empirical research on all of the possible impacts it has on organizations. The proposed research will explore the correlations, if any, between expatriate employees’ use of social networking media and motivation of employees in regards to higher perceived organizational support and decreased turnover. High turnover is an issue that companies deal with in regard to its repatriate employees and has a significant impact on the bottom line of a company’s profits and on the development of its employees for long-term strategic growth. It is expected that the usage of social networking media by expatriate employees who interact more often with peers and supervisors will create a higher sense of perceived organizational support, thus leading to lower turnover intentions with those employees

    Healthcare Professionals’ Attitudes towards Privacy in Healthcare Information Systems

    Get PDF
    As a result of the Health Information Technology for Economic and Clinical Health Act (HITECH), healthcare organizations are finding themselves scrambling to digitize their Electronic Medical Records (EMRs). A concern of the widespread implementation of digital health records is the assurance of privacy for the sensitive information held by healthcare organizations (Greenberg, 2010; Hoffmann, 2009). There have been many studies that examine patient’s perspectives and expectations of privacy (Agarwal & Anderson, 2011; Cannoy & Salam, 2010) but the literature is lacking analysis of healthcare providers’ privacy perspectives with regards to EMRs. Using Information Boundary Theory (Stanton, 2002) as a theoretical framework, this study seeks to determine healthcare providers’ attitudes towards privacy with regards to EMRs. Analysis of survey data collected from healthcare providers found that healthcare providers do not value patient privacy over personal or organizational gain

    Power Relationships in Information Systems Security Policy Formulation and Implementation

    Get PDF
    This thesis argues that organizational power impacts the development and implementation of Information Systems (IS) Security policy. The motivation for this research stems from the continuing concern of ineffective security in organizations, leading to significant monetary losses. IS researchers have contended that ineffective IS Security policy is a precursor to ineffective IS Security (Loch et al. 1992; Whitman et al. 2001; David 2002; Solms and Solms 2004). Beyond this pragmatic aspect, there is a gap in the literature concerning power relationships and IS Security policy. This research intends to bridge the gap. The dissertation is a two phased study whereby the first phase seeks to understand the intricacies of IS Security policy formulation and implementation. In the first phase, a conceptual framework utilizes Katz\u27s (1970) semantic theory. The conceptual framework provides the theoretical foundation for a case study that takes place at an educational institution\u27s Information Technology (IT) Department. In the results, it is confirmed that a disconnect exists between IS Security policy formulation and implementation. Furthermore, a significant emergent finding indicates that power relationships have a direct impact on this observed disconnect. The second phase takes place as an in depth case study at the IT department within a large financial organization. The theoretical foundation for the second phase is based was Clegg\u27s (2002) Circuits of Power. A conceptual framework for this phase utilizes this theory. This framework guides the study of power relationships and how they might affect the formulation and implementation of IS Security policy in this organization. The case study demonstrates that power relationships have a clear impact on the formulation and implementation of IS security policy. Though there is a strong security culture at the organization and a well defined set of processes, an improvement in the process and ensuing security culture is possible by accounting for the effect of power relationships

    POWER AND ETHICS IN THE MOTIVATION AND APPLICATION OF GREEN TECHNOLOGY

    Get PDF
    The information and communication sector is responsible for roughly 4% of global electricity consumption as well as the emission of 730 million metric tons of CO2-eq or 1.4% of global greenhouse gas emissions (Cunliff, 2020). This research will investigate the intersection of power, ethics, and green technology. A primary point is to analyze the obligation of consumers and organizations to utilize information technology to help mitigate climate change contributions. Secondly, to what extent are governments obligated to create regulations for organizations in order to reduce their contributions to climate change? Finally, given that green technology can dampen economic expansion, is this an acceptable reason to slow or stop the implementation of such technology? Given the large scope of this study (individual to planet), the most appropriate framework for ethical analysis is discourse ethics. Discourse ethics employs three strategies: conceptual investigations, where different stakeholders debate the relative importance of particular values, empirical investigations of the actual context of use, and technical investigations of the extent to which available technology could in fact support or hinder particular values (Mingers and Walsham, 2010; Habermas 1992)

    The Effect of Homomorphic Encryption on Voters\u27 Perceptions of Security in Election Systems

    Get PDF
    In the United States, elections play a critical role in maintaining the democracy that is the foundation of this country. In the last few election cycles, technology has started to play a large role in elections. This increase in technology may have played a role in the emerging lack of trust that has become a focal point in recent years. Online voting use has started to make an appearance and will likely continue to grow in the future (US Election Assistance Commision, n.d.), further exacerbating technological change in electoral systems. There are several complex factors in this system that this research intends to explore. How exactly does technological change affect a voter’s perception of security? Would a technical solution, such as homomorphic encryption change the perception of security in election systems? We finally seek to determine the degree to which the perception of security affects electoral system use
    corecore