6,567 research outputs found

    Shaming as a Technique for Information Security Policy and Training Adherence

    Get PDF
    Information security policy and information security training are vital parts for maximizing information systems security (Dhillon and Backhouse, 2000; Rezgui and Marks, 2008; Siponen, 2001; Straub and Welke, 1998). However, employees not adhering to security policies and not practicing what they learned in training can lead to unintentional mistakes and financial losses for organizations (CSI, 2010). This research investigates Deterrence Theory’s shaming as a technique for encouraging employees to adhere more to information security policies and training. Results indicate that employees find peer shaming punishments more severe than typical corporate punishment methods. Implications are that employers using peer shaming as a punishment technique may see better security policy and training adherence

    Work in progress: a novel method of creating an academic content repository

    Get PDF
    This paper outlines a project aimed at addressing the issue of the scalability of online academic support. This project is being run during the Autumn semester at the University of Southern Queensland (USQ) Toowoomba Australia, in conjunction with the Australian Digital Futures Institute. The study attached to the project will use Design-Based Research to evaluate the effectiveness of a simple, but innovative academic content and metadata creation tool referred to as Academic Assist. Academic Assist has been recently developed at USQ as a plug-in block for the moodle-based Learning Management System employed at USQ for its several hundred online subjects. The pilot project and associated study now extends over nine subjects, including three consecutive subjects in computer engineering; and covers faculties of Engineering, Education, Business, Science and Arts. Some preliminary results are presented here. Complete results of the study including acceptance surveys, expert reviews and usage statistics will be presented at FIE 2009

    A New Look at the Relationship between User Involvement in Systems Development and System Success

    Get PDF
    The relationship of user involvement to successful systems development has been the focus of much attention for information systems researchers for some time. Common understanding has been that extensive user involvement is not only important, but absolutely essential to system success. However, earlier studies trying to link user involvement to system success have shown mixed results. In this paper we review 28 empirical research studies that investigate the significance of user involvement. From our results we conclude that user involvement in the systems development process is indeed important to system success. We further identify several key points pertinent to making user involvement effective

    Does User Participation Lead to System Success?

    Get PDF
    The effect of user participation on successful systems development has been the focus of much attention for information systems researchers for some time. Common understanding has been that extensive user participation is not only important, but absolutely essential to system success. However, earlier studies trying to link user participation to system success have shown mixed results. In this paper, we analyze fourteen more recently published, empirical research studies that investigate the significance of user participation. From our results we conclude that user participation in the systems development process is indeed critical to system success. Common themes are identified

    The Need to Address Mobile Device Security in the Higher Education IT Curriculum

    Get PDF
    Mobile devices, including smartphones and tablets, enable users to access corporate data from anywhere. In 2013, people will purchase 1.2 billion mobile devices, surpassing personal computers as the most common method for accessing the Internet. However, security of these mobile devices is a major concern for organizations. The two leading mobile operating systems (OS), Google’s Android OS and Apple’s iOS, both have security concerns as do the mobile applications and the major application markets. ‘Bring your own devices,’ where employees supply their own equipment for work-related purposes, can cut costs for organizations, but failing to address security can significantly increase those costs. This paper focuses on the increasing need for mobile business and its related mobile device security concerns. We propose that future IT professionals should be aware of these issues and learn how to secure mobile devices through the integration of the topic into the IT Model Curriculum. Using the case of one undergraduate IT program, we developed a set of mobile device security education recommendations, which we then mapped to the IT Model Curriculum using the guidelines from Accreditation Board for Engineering and Technology (ABET). This mapping approach demonstrates one way how higher education institutions could integrate mobile device security into any IT curriculum

    Reproductive performance of resident and migrant males, females and pairs in a partially migratory bird

    Get PDF
    We thank everyone from the Centre for Ecology & Hydrology (CEH) who contributed to data collection, and Scottish Natural Heritage for access to the Isle of May National Nature Reserve. We thank the Scottish Ornithologists’ Club (SOC) for their support, and all volunteer observers, particularly Raymond Duncan, Moray Souter and Bob Swann. HG was funded by a Natural Environment Research Council (NERC) CASE studentship supported by CEH and SOC, FD, SW, MPH, MN and SB were funded by NERC and the Joint Nature Conservation Committee, and JMR was part-funded by the Royal Society. Finally, we thank the Associate Editor and two reviewers for constructive comments on the manuscript. The data are available from the Dryad Digital Repository https://doi.org/10.5061/dryad.532j0 (Grist et al., 2017)Peer reviewedPublisher PD

    A methodology for projecting sparse populations and its application to remote Indigenous communities

    Get PDF
    © 2020, The Author(s). A new method is proposed for generating projections for sparse populations by locality, age cohort and gender. An adaptation of the cohort replacement method, the approach uses a Tobit model with varying censoring limits to model population changes by cohort. As an applied example, projections are generated for 2016 Indigenous populations in communities in regional and remote Australia, and then compared to actual 2016 Census population counts. We argue the approach has considerable potential, with the model performing well in out-of-sample projection while offering projections at a much finer-grained level of disaggregation than currently available to planners and policy-makers
    • …
    corecore