875 research outputs found

    A New Model for Understanding Users’ IS Security Compliance

    Get PDF
    The literature agrees that the major threat to IS security is constituted by careless employees. Therefore, effective IS security requires that users are not only aware of, but also comply with organizations’ IS security policies and procedures. To address this important concern, different IS security awareness, education and enforcement approaches have been proposed. Prior research on IS security compliance has criticized these extant IS security awareness approaches as lacking theoretically and empirically grounded principles to ensure that employees comply with IS security policies. This research-in-progress study proposes a new model that contains the factors that explain employees’ IS security compliance

    Impact of Cloud Computing Adoption on Firm Stock Price – An Empirical Research

    Get PDF
    In this paper, we investigate how cloud computing adoption impacts publicly traded 26 cloud&adopting companies\u27 stocks. In an effort to perform a valid assessment of a firm\u27s cloud adoption initiatives, we also evaluate the stocks of 26 companies, which did not adopt cloud computing and operate in the same industry with similar market capitalization. Our study differs from the previous studies in the area because it uses Fama&French three factor model to d erive the stock abnormal returns for both adopters and non&adopters. Furthermore, given the announced risks of cloud computing in the literature, we analyzed the stock risk between adopters and non&ad opters. Our preliminary analysis implies that businesses adopting cloud computing experience positive cumulative abnormal returns during the time the event was announced. Our research also indicates that both cloud adopting and non&cloud adopting companies suffer from higher stock risk during the announcement but this risk is not statistically significant

    The Impact of Enterprise System Implementations on Enterprise Risk

    Get PDF
    No abstrac

    Measuring Effectiveness of Information Systems Security: An Empirical Research

    Get PDF
    The objective of the present research is to put forth a theoretical model that measures information systems security effectiveness in minimizing security breaches. Very few studies were undertaken in this area. The model includes a number of literature-supported constructs. A number of hypotheses based on the influence of these constructs on IS security effectiveness are presented. These hypotheses are grounded using the appropriate literature. In the next phase of the study, we intend to revise and empirically validate the model using a pilot study utilizing a number of practitioners from Brazil, Finland, and the United States. The data obtained from the pilot study will be used to make improvements on the initial instrument designed for the study. In the third stage of the research a large sample of data will be collected from the aforementioned countries and a regression analysis will be conducted on the data to investigate which constructs influence IS security effectiveness

    AMCIS - Impact of cloud computing adoption on firm stock price - An empirical research

    Get PDF
    In this paper, we investigate how cloud computing adoption impacts publicly traded 26 cloud&adopting companies\u27 stocks. In an effort to perform a valid assessment of a firm\u27s cloud adoption initiatives, we also evaluate the stocks of 26 companies, which did not adopt cloud computing and operate in the same industry with similar market capitalization. Our study differs from the previous studies in the area because it uses Fama&French three factor model to d erive the stock abnormal returns for both adopters and non&adopters. Furthermore, given the announced risks of cloud computing in the literature, we analyzed the stock risk between adopters and non&ad opters. Our preliminary analysis implies that businesses adopting cloud computing experience positive cumulative abnormal returns during the time the event was announced. Our research also indicates that both cloud adopting and non&cloud adopting companies suffer from higher stock risk during the announcement but this risk is not statistically significant

    The Economic Impact of Security Breaches on Publicly Traded Corporations: An Empirical Investigation

    Get PDF
    In a 2008 survey of 522 computer security professionals, the Computer Security Institute found an average reported cost close to $500,000 for those companies that experienced a financial fraud. A survey of potential cloud computing adopters show that security and privacy are the primary concerns for not using the cloud. The present research conducts an event study to investigate the impact of publicly announced security breaches on the market value of the breached companies. We utilize the cumulative abnormal returns, risk shifts, and volume changes to measure this impact. Our results show that the cumulative abnormal return due to a security breach is -.19%. We also found the mean risk factor increases by about 22 percent. Our results also show an abnormal trading volume of about 6%. None of the previous research studies in the information systems area has investigated the impact of security breaches on cumulative abnormal returns, volume changes, and risk shifts

    Impact of cloud computing adoption on firm stock price - An empirical research

    Get PDF
    In this paper, we investigate how cloud computing adoption impacts publicly traded 26 cloud-adopting companies\u27 stocks. In an effort to perform a valid assessment of a firm\u27s cloud adoption initiatives, we also evaluate the stocks of 26 companies, which did not adopt cloud computing and operate in the same industry with similar market capitalization. Our study differs from the previous studies in the area because it uses Fama-French three factor model to derive the stock abnormal returns for both adopters and non-adopters. Furthermore, given the announced risks of cloud computing in the literature, we analyzed the stock risk between adopters and non-adopters. Our preliminary analysis implies that businesses adopting cloud computing experience positive cumulative abnormal returns during the time the event was announced. Our research also indicates that both cloud adopting and non-cloud adopting companies suffer from higher stock risk during the announcement but this risk is not statistically significant

    Optical Imaging with a Cathepsin B Activated Probe for the Enhanced Detection of Esophageal Adenocarcinoma by Dual Channel Fluorescent Upper GI Endoscopy

    Get PDF
    Despite significant advances in diagnosis and treatment, the prognosis of esophageal adenocarcinoma remains poor highlighting the importance of early detection. Although white light (WL) upper endoscopy can be used for screening of the esophagus, it has limited sensitivity for early stage disease. Thus, development of new imaging technology to improve the diagnostic capabilities of upper GI endoscopy for early detection of esophageal adenocarcinoma is an important unmet need. The goal of this study was to develop a method for the detection of malignant lesions in the esophagus using WL upper endoscopy combined with near infrared (NIR) imaging with a protease activatable probe (Prosense750) selective for cathepsin B (CTSB). An orthotopic murine model for distal esophageal adenocarcinoma was generated through the implantation of OE-33 and OE-19 human esophageal adenocarcinoma lines in immunocompromised mice. The mice were imaged simultaneously for WL and NIR signal using a custom-built dual channel upper GI endoscope. The presence of tumor was confirmed by histology and target to background ratios (TBR) were compared for both WL and NIR imaging. NIR imaging with ProSense750 significantly improved upon the TBRs of esophageal tumor foci, with a TBR of 3.64±\pm0.14 and 4.50±\pm0.11 for the OE-33 and OE-19 tumors respectively, compared to 0.88±\pm0.04 and 0.81±\pm0.02 TBR for WL imaging. The combination of protease probes with novel imaging devices has the potential to improve esophageal tumor detection by fluorescently highlighting neoplastic regions
    corecore