3,350 research outputs found

    The design and evaluation of an anonymous, two-way, ethics management reporting system

    Get PDF
    Despite a recognized need for whistleblowing systems in academic research, little to no attention has been given to the necessary requirements for and specific design of effective whistleblowing systems. In order to increase the rate of reporting, it is critical for reporting systems to be designed with the intent to reduce employee fears and inhibitions by reducing the potential for retaliation. Therefore, the goal of this three-essay dissertation was to enhance a firm\u27s ability to solicit and investigate concerns by proposing and evaluating a system aimed at fostering anonymous, two-way communication between employees and investigators of wrongdoing. In essay one, design science (Hevner et al., 2004; March & Smith, 1995; Walls, Widmeyer, & El Savvy, 1992, 2004) was employed in order to theorize and justify the design of an anonymous reporting system artifact. In doing so, existing reporting systems were examined and modern technologies were incorporated into a proposed design of an anonymous, two-way ethics management reporting system. Essay two reviewed existing theories in the extant whistleblowing literature and relied upon communication research, both inter-personal and computer-mediated, to address the limitations of prior theory regarding reduced perceptions of credibility for anonymous whistleblowers. The experiment tasked subjects with evaluating simulated two-way communication between an investigator and an employee attempting to blow the whistle on financial wrongdoing. The results provide strong evidence that two-way communication can reduce the credibility gap between perceptions of anonymous and identified whistleblowers. Lastly, essay three assessed the system design proposed in essay one from the perspective of the organizational insider. The proposed system was also compared to other channels available to report wrongdoing, such as the use of open door policies and telephone hotlines. Two simultaneous online experiments tested user perceptions of anonymity protections provided by each channel, as well as the specific whistlebloweroriented design features proposed in the design. This essay provides evidence that online reporting systems are perceived to provide significantly higher anonymity protections than phone hotlines and open door policies, while select features of the proposed system impact user perceptions of anonymity

    The Development of a Red Teaming Service-Learning Course

    Get PDF
    Despite advancements in pedagogy and technology, students often yearn for more applied opportunities in information security education. Further, small businesses are likely to have inadequate information security postures due to limited budgets and expertise. To address both issues, an advanced course in ethical hacking was developed which allows students to perform security assessments for local businesses through red team engagements. This paper will allow academics to implement similar courses, improving security education for students and increasing opportunities for local businesses to receive affordable security assessments

    Teaching Tip: Hook, Line, and Sinker – The Development of a Phishing Exercise to Enhance Cybersecurity Awareness

    Get PDF
    In this paper, we describe the development of an in-class exercise designed to teach students how to craft social engineering attacks. Specifically, we focus on the development of phishing emails. Providing an opportunity to craft offensive attacks not only helps prepare students for a career in penetration testing but can also enhance their ability to detect and defend against similar methods. First, we discuss the relevant background. Second, we outline the requirements necessary to implement the exercise. Third, we describe how we implemented the exercise. Finally, we discuss our results and share student feedback

    Wavelength dependence of angular diameters of M giants: an observational perspective

    Get PDF
    We discuss the wavelength dependence of angular diameters of M giants from an observational perspective. Observers cannot directly measure an optical-depth radius for a star, despite this being a common theoretical definition. Instead, they can use an interferometer to measure the square of the fringe visibility. We present new plots of the wavelength-dependent centre-to-limb variation (CLV) of intensity of the stellar disk as well as visibility for Mira and non-Mira M giant models. We use the terms ``CLV spectra'' and ``visibility spectra'' for these plots. We discuss a model-predicted extreme limb-darkening effect (also called the narrow-bright-core effect) in very strong TiO bands which can lead to a misinterpretation of the size of a star in these bands. We find no evidence as yet that this effect occurs in real stars. Our CLV spectra can explain the similarity in visibilities of R Dor (M8IIIe) that have been observed recently despite the use of two different passbands. We compare several observations with models and find the models generally under-estimate the observed variation in visibility with wavelength. We present CLV and visibility spectra for a model that is applicable to the M supergiant alpha Ori.Comment: 16 pages with figures. Accepted by MNRA

    Exploring the Role of Contextual Integrity in Electronic Medical Record (EMR) System Workaround Decisions: An Information Security and Privacy Perspective

    Get PDF
    Many healthcare providers in the US are seeking increased efficiency and effectiveness by rapidly adopting information technology (IT) solutions such as electronic medical record (EMR) systems. Legislation such as the Health Information Technology for Economic and Clinical Health Act (HITECH), which codified the adoption and “meaningful use” of electronic records in the US, has further spurred the industry-wide adoption of EMR. However, despite what are often large investments in EMR, studies indicate that the healthcare industry maintains a culture of system workarounds. Though perhaps not uncommon, the creation of informal workflows among healthcare workers is problematic for assuring information security and patient privacy, particularly when involving decisions of information management (e.g., information storage, retrieval, and/or transmission). Drawing on the framework of contextual integrity, we assert that one can often explain workarounds involving information transmissions in terms of trade-offs informed by context-specific informational norms. We surveyed healthcare workers and analyzed their willingness to engage in a series of EMR workaround scenarios. Our results indicate that contextual integrity provides a useful framework for understanding information transmission and workaround decisions in the health sector. Armed with these findings, managers and system designers should be better able to anticipate healthcare workers’ information transmission principles (e.g., privacy norms) and workaround patterns (e.g., usage norms). We present our findings and discuss their significance for research and practice

    Textbook Broke: Textbook Affordability as a Social Justice Issue

    Get PDF
    In light of rising textbook prices, open education resources (OER) have been shown to decrease non-tuition costs, while simultaneously increasing academic access, student performance, and time-to-graduation rates. Yet very little research to date has explored OER’s specific impact on those who are presumed to benefit most from this potential: historically underserved students. This reality has left a significant gap of understanding in the current body of literature, resulting in calls for more empirically-based examinations of OER through a social justice lens. For each of these reasons, this study explored the impact of OER and textbook pricing among racial/ethnic minority students, low-income students, and first-generation college students at a four-year Hispanic Serving Institution (HSI) in Southern California. Drawing upon more than 700 undergraduate surveys, our univariate, bivariate and multivariate results revealed textbook costs to be a substantial barrier for the vast majority of students. However, those barriers were even more significant among historically underserved college students; thus, confirming textbook affordability as a redistributive justice issue, and positing OER as a potential avenue for realizing a more socially just college experience

    Gene trap mutation of murine Outer dense fiber protein-2 gene can result in sperm tail abnormalities in mice with high percentage chimaerism

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Outer dense fiber protein 2, Odf2, is a major component of the outer dense fibers, ODF, in the flagellum of spermatozoa. ODF are associated with microtubule doublets that form the axoneme. We recently demonstrated that tyrosine phosphorylation of Odf2 is important for sperm motility. In the course of a study of Odf2 using Odf2 mouse knockout lines we observed that males of a high percentage chimaerism, made using XL169 embryonic stem cells, were infertile, whereas mice of low-medium percentage chimaerism were fertile.</p> <p>Results</p> <p>XL169 ES cells have a β-geo gene trap cassette inserted in the Odf2 gene. To determine possible underlying mechanisms resulting in infertility we analyzed epididymal sperm and observed that >50% displayed bent tails. We next performed ultrastructural analyses on testis of high percentage XL169 chimaeric mice. This analysis showed that high percentage XL169 chimaeric mice produce elongating spermatids that miss one or more entire outer dense fibers in their midpiece and principal piece. In addition, we observed elongating spermatids that show thinning of outer dense fibers. No other obvious abnormalities or defects are present in elongating spermatids. Spermatozoa from the caput and cauda epididymis of XL169 mice of high percentage chimaerism show additional tail defects, including absence of one or more axonemal microtubule doublets and bent tails. Sperm with bent tails display abnormal motility.</p> <p>Conclusions</p> <p>Our results document the possible impact of loss of one Odf2 allele on sperm tail structure and function, resulting in a novel sperm tail phenotype.</p

    KLC3 is involved in sperm tail midpiece formation and sperm function

    Get PDF
    AbstractKinesin light chain 3 (KLC3) is the only known kinesin light chain expressed in post-meiotic male germ cells. We have reported that in rat spermatids KLC3 associates with outer dense fibers and mitochondrial sheath. KLC3 is able to bind to mitochondria in vitro and in vivo employing the conserved tetratrico-peptide repeat kinesin light chain motif. The temporal expression and association of KLC3 with mitochondria coincides with the stage in spermatogenesis when mitochondria move from the spermatid cell periphery to the developing midpiece suggesting a role in midpiece formation. In fibroblasts, expression of KLC3 results in formation of large KLC3 aggregates close to the nucleus that contain mitochondria. However, the molecular basis of the aggregation of mitochondria by KLC3 and its role in sperm tail midpiece formation are not clear.Here we show that KLC3 expression from an inducible system causes mitochondrial aggregation within 6h in a microtubule dependent manner. We identified the mitochondrial outer membrane porin protein VDAC2 as a KLC3 binding partner. To analyze a role for KLC3 in spermatids we developed a transgenic mouse model in which a KLC3ΔHR mutant protein is specifically expressed in spermatids: this KLC3 mutant protein binds mitochondria and causes aggregate formation, but cannot bind outer dense fibers. Male transgenic mice display significantly reduced reproductive efficiency siring small sized litters. We observed defects in the mitochondrial sheath structure in a number of transgenic spermatids. Transgenic males have a significantly reduced sperm count and produce spermatozoa that exhibit abnormal motility parameters. Our results indicate that KLC3 plays a role during spermiogenesis in the development of the midpiece and in the normal function of spermatozoa

    The Utility of a Small Pressurized Rover with Suit Ports for Lunar Exploration: A Geologist's Perspective

    Get PDF
    Rover trade study: As summarized recently, mission simulations at Black Point Lava Flow (Arizona) that included realistic extravehicular activity (EVA) tasking, accurate traverse timelines, and an in-loop science CAPCOM (or SciCOM) showed that a small pressurized rover (SPR) was a better mobility asset than an unpressurized rover (UPR). Traverses within the SPR were easier on crew than spending an entire day in a spacesuit, enhancing crew productivity at each station. The SPR, named Lunar Electric Rover (LER), and sometimes called the Space Exploration Vehicle (SEV), could also provide shelter during a suit malfunction, radiation event, or medical emergency that might occur on the Moon. Intravehicular activity (IVA) capabilities: From within the vehicle, crew could describe and photo-document distant features during drives between stations, as well as in the near-field, directly in front of the LER, providing an ability to begin EVA planning on approach to each outcrop prior to egress. The vehicle can rotate 360 without any lateral movement, providing views in all directions. It has high-visibility windows, a ForeCam, AftCam, port and starboard cameras, docking cameras, and a GigaPan camera. EVA capabilities: To reduce timeline, mass, and volumetric overhead, rapid egress and ingress were envisioned, replacing an airlock with lower cabin pressure than on the International Space Station and suit ports on the aft cabin wall [2]. When needed for closer inspection and sample collecting, crew could egress in about 10 minutes through suit ports. Crew use SuitCams for additional photo-documentation, transmit mobile observations verbally, and collect surface materials. Typical simulations involved 3 to 4 EVA stations/day and 2 to 3 hr/day of boots on the ground. This allowed crew to explore a far larger territory, with more complex geological and in situ resource utilization (ISRU) features, than would a single, longer-duration EVA at one location, while also minimizing crew time in a spacesuit. Additionally, the vehicle could be driven with crew locked into the suit ports. This approach could involve a driver in the cockpit with a suited crewmember in a suit port, or the vehicle could be driven from the aft deck with both crewmembers in their suit ports. This approach was used when distances between stops were short enough that vehicle ingress and egress were less efficient than remaining in the suits and driving. Utility of suit ports: The advantages of suit ports were clearly demonstrated in those field-based trade studies. To illustrate those advantages further, consider the consequences of a SPR without suit ports at the Apollo 17 landing site. At that site, the crew's second EVA was an approximately 18 km loop conducted in a UPR, called the Lunar Roving Vehicle (LRV), in 7 hr 36 min 56 s. The traverse was composed of 5 formal stations, plus 8 additional LRV stations where crew made brief scientific stops. In a scenario involving a SPR without suit ports, crew would go EVA through an airlock and probably be limited to a single EVA per day. In that case, crew could drive the SPR ~9 km from the landing site to station 2, go EVA, and complete station 2 tasks. However, to conduct station 3 tasks, the crew would then need to walk approximately 3 km to station 3, while ground control in Houston tele-robotically drives the LER to station 3. A walk of approximately 3 km is possible, as that is what the Apollo 14 crew did before LRVs were deployed, but it is a lengthy and potentially grueling EVA. Assuming crew completes station 3 tasks, they would likely need to re-enter the SPR, ending the day's EVA, and return to the landing site. They would not be able to walk the additional distances to stations 4 and 5 (the latter being about 6 km from station 3). Thus, crew in an SPR without suit ports would require two days to accomplish the same tasks Apollo 17 crew completed in a single day. If a future crew is involved in long duration traverses on the lunar surface, the deployment of a vehicle with suit ports would probably be a better solution

    When Programs Collide - A Panel Discussion on the Competing Interests of Analytics and Security

    Get PDF
    The increasing demand for business analytics and cybersecurity professionals provides an exciting job outlook for graduates of information systems programs. However, the rapid proliferation of devices and systems that has spurred this trend has created a challenging ethical dilemma for those responsible for educating future generations of IT professionals. Many firms are collecting and storing as much data as possible in the hopes that technology might uncover useful insights in the future. This results in an ever-increasing challenge for those charged with protecting organizational assets and exerts pressure on executives seeking an analytical edge to remain profitable in a hyper-competitive marketplace. With this dilemma in mind, the panel will search for a delicate balance between unleashing the power of analytics and securing the sensitive data it consumes. Keyword
    • …
    corecore