12 research outputs found

    Organization management today: setting the human resource agenda in the globalized competition

    Get PDF
    The paper‘s discussion focuses on the way the world we live in is being transformed under our own very eyes by factors and forces which are so compelling and overwhelming, in their ramifications. The environment in which business and management are carried on today is becoming more and more complex by the day. Things are unfolding faster and are being transmitted to all corners of the globe at such an alarming speed that no nation, no organization and no individual is insulated. The paper theoretically examined why organization(s) should fit -in into the environmentin order to compete with the rest of the world.Keywords: Organization, Management, Human resources agenda, Globalization, Competitio

    Call for Abstracts and Papers

    Get PDF
    Conference topics include but are not limited to: Cybersecurity, Medical Informatics, Smart Systems, E-learning, Library Science, IT for Economic Development, E-Government, Technological Innovations, Digital Marketing, Business Analytics, Cloud Computing, E-business/commerce, Emerging Trends, Digital Accounting, Healthcare IT, IT Auditing/Forensics, Mobile Computing, Organizational Culture & Technology, Social Networking, and Big Data

    An overview of and factor analytic approach to flow theory in online contexts

    No full text
    An overview of flow theory is presented from the literature across multiple disciplines, including information systems, ecommerce, marketing, digital gaming, user interface, management, and cultural contexts. Flow can play a pivotal role in the user experience and impact the user interaction with a site, computing device, or app. It is worthwhile to examine the effects of flow experience on users and incorporate these findings in designing engaging user experiences and interfaces in both web sites and mobile applications. To further understand these implications, the present study gave a questionnaire to 310 participants in a computer laboratory setting following an online shopping episode. The factor analysis revealed three dimensions of flow experience: control, attention focus, and cognitive enjoyment. All three dimensions had very low correlations. No gender effect on flow was found

    Posted: No Phising

    Get PDF
    Any engineering approach to cybersecurity must recognize that many breaches are the result of human behavior, rather than sophisticated malware. Effective cybersecurity defenses require a systematic engineering approach that recognizes the organizational, cultural and psychological barriers to effectively dealing with this problem. The U.S. Securities and Exchange Commission (SEC) defines “phishing” as, “the use of fraudulent emails and copy-cat websites to trick you into revealing valuable personal information—such as account numbers for banking, securities, mortgage, or credit accounts, your social security numbers, and the login IDs and passwords you use when accessing online financial service providers.” Once this information is fraudulently obtained, it may be used to steal your identity, money, or both. A review of the literature reveals an alarming lack of attention to the prevalent threat of low-technology, or low-complexity phishing attacks. Accordingly, here is a primer on the prominent exploit known as phishing, illustration of several cases, and the necessity for organizational and societal education of data users as to appropriate computer hygiene. Much of the literature about cyberattack addresses technical aspects of computer code, encryption, and bad actor attribution. Yet human behavior remains a significant source responsible for successful cyber intrusions. Your authors believe this Article provides a valuable discussion about the human factors that very often comprise a back-door entryway into data systems

    Posted: No Phising

    Get PDF
    Any engineering approach to cybersecurity must recognize that many breaches are the result of human behavior, rather than sophisticated malware. Effective cybersecurity defenses require a systematic engineering approach that recognizes the organizational, cultural and psychological barriers to effectively dealing with this problem. The U.S. Securities and Exchange Commission (SEC) defines “phishing” as, “the use of fraudulent emails and copy-cat websites to trick you into revealing valuable personal information—such as account numbers for banking, securities, mortgage, or credit accounts, your social security numbers, and the login IDs and passwords you use when accessing online financial service providers.” Once this information is fraudulently obtained, it may be used to steal your identity, money, or both. A review of the literature reveals an alarming lack of attention to the prevalent threat of low-technology, or low-complexity phishing attacks. Accordingly, here is a primer on the prominent exploit known as phishing, illustration of several cases, and the necessity for organizational and societal education of data users as to appropriate computer hygiene. Much of the literature about cyberattack addresses technical aspects of computer code, encryption, and bad actor attribution. Yet human behavior remains a significant source responsible for successful cyber intrusions. Your authors believe this Article provides a valuable discussion about the human factors that very often comprise a back-door entryway into data systems
    corecore