70 research outputs found

    THE IMPACT OF CORPORATE SOCIAL RESPONSIBILITY AND ETHICS IN EDUCATIONAL INSTITUTIONS

    Get PDF
    This paper presents the impact of corporate social responsibility in the educational institutions and how the students value it and try to practice it in an academic environment. Corporate social responsibility, which is now commonly known as CSR is not something mandatory, and the biggest proof of it is the fact that there is no regulator who is monitoring the implementation of CSR in a particular country or even globally.  On the contrary, a number of educational institutions are educating their students about CSR so when these students join the fresh workforce the terminology of CSR is not a misnomer to them and they can fully understand and fathom CSR from a basic as well as an advanced perspective. For this purpose a group of 4o students were selected who are undergoing the courses on CSR and corporate governance and semi structured interviews wereconducted to gather information in order to judge the impact on CSR related activities from the view point of the student community

    Impact of Instant Connectivity on Business Productivity: A Study Using the Community Embodiment Model (CEM)

    Get PDF
    The last decade has seen a significant growth in mobile technologies. Predominantly this technology has been relegated to the realm of personal use, but as this work will suggest, cost related effects of such technologies also need to be considered. For most organizations maximizing operational efficiency is the main reason why new technologies are acquired. However, apart from basic costs, such as total cost of ownership of mobile technologies, other costs (business process reengineering, and employee morale) need to be measured in order to ascertain if an organization can withstand a change to a next-generation system. This study attempts to evaluate ideas put forth by the Community Embodiment Model (CEM) as possible quantifiable variables which may assist an organization in coming to a conclusion about introducing a new product and process. The quantified variables are used in the development of a formula which alongside a simulation program and an Excel sheet gives a detailed picture of benefits gained, costs incurred, and the future picture of the initial investment. Through sensitive analysis the findings of the study will indicate the importance of factors such as employee morale on the success of a particular mobile device (Personal Digital Assistant) implementation at an organization level

    Cybersecurity: Role of Behavioral Training in Healthcare

    Get PDF
    We were tasked by a global leader in healthcare to look into making the organization more secure by creating a training program that focused on employee habits. By adapting a model from consumer behavior to information security, we were able to find strong correlations between habit creation and security threats such as phishing, unauthorized cloud computing use, and password sharing. We were also able to ascertain that traditional security training and awareness programs need to move away from the “one-size” fits all technique to custom models that need to look at employee groups. This study extends literature in habit and information security

    Exploring Organizational Human Resource Information System Security

    Get PDF
    We explore HRIS security by presenting information security fundamentals and how they pertain to organizations. With increasing use of enterprise systems such as HRIS, security of such systems is an area that is worthy of concern. Even then, there is surprisingly little research in this area, albeit extensive work is present with regard to HRIS privacy. While focusing on HRIS security we introduce aspects of HRIS security and how it can be enhanced in organizations. Because of its complex, sensitive nature, we suggest that qualitative research is the optimal method of further investigating HRIS security. We also propose six research questions as part of deepening our understanding of HRIS research in the future

    A Security and Privacy Framework for e-Learning

    Get PDF
    Prior research in the e-learning area has appeared with a focus on its adoption aspects. Limited research has been carried out solely on the interplay between e-learning and security and privacy. Considering the wide acceptance of e-learning, and a plethora of cybersecurity breach incidents, it is surprising that the two topics have not been discussed together. An effective e-learning environment depends on stakeholders who understand the importance of security and behave responsibly within it. In this paper, we present a conceptual model that looks at some of the information security and privacy factors related to e-learning

    Addressing Emerging Information Security Personnel Needs. A Look at Competitions in Academia: Do Cyber Defense Competitions Work?

    Get PDF
    This paper is part of a proposed study that looks at the emerging information security personnel needs of organizations. We are attempting to explore the correlation between components of a regional cyber defense competition and an organization’s needs in terms of employing adequately trained information security personnel. We look to identify some unique characteristics of a regional academic cyber defense competition via the critical success factors method

    WHO WINS IN A DATA BREACH? - A COMPARATIVE STUDY ON THE INTANGIBLE COSTS OF DATA BREACH INCIDENTS

    Get PDF
    Over the years data breaches have become a status quo due to an attacker’s repeated ability to successfully infiltrate networks. 2015 was no stranger to these cases. Victims included millions of customers of Anthem, BlueCross BlueShield, Experian/T-Mobile, and Office of Personnel Management, all of whom lost confidential data. Needless to say, data breaches have a significant impact on the financial performance and reputation of firms. Collectively, the majority of the previous security studies on breach announcements have used event study methodology. These studies have focused on the change in market value of the company within a few days of the security breach announcements and concluded that there is a negative impact. But what is the impact of negative publicity due to a data breach on an organization’s reputation? How should that be gauged? In this study we compare the financial impact with the reputational damage of data breaches. We performed two event studies: an event study on stock prices and additionally a sentiment event study applied on social media data. In contrast to previous research, shareholders do not react negatively to data breach announcements, whereas the impact on reputation is statistically significant as negative

    Ubiquitous Healthcare Information System: Toward Crossing the Security Chasm

    Get PDF
    Ubiquitous healthcare information system is increasingly seen as a viable option for reducing the inherent time lag and inaccuracies in the traditional model of healthcare and promoting the delivery and practice of evidence-based healthcare―as and when needed―without any location and time constraints. Although promising, the realization of ubiquitous healthcare information system brings several threats and risks rooted in real-time collection, analysis, storage, transmission, and access of critical medical data. In this research, we address information security concerns pertaining to the paradigm of ubiquitous healthcare information system. To accomplish this we use National Institute for Standards and Technology’s (NIST’s) system development lifecycle model (SDLC) as the underlying framework to explore the current state of ubiquitous healthcare from the perspective of security. We then leverage the model to propose future research directions in this area. By implementing the NIST’s SDLC model in such a manner, we offer a different dynamic of healthcare security that has not been addressed in literature before

    Influence of Information Overload on IT Security Behavior: A Theoretical Framework

    Get PDF
    IT systems in organizational processes demand high level of security. The operational security of IT systems depend on end-user IT security behavior. The apparent importance of IT security requires that the end-users process and act on a multitude of IT security information and updates. Information overload (also known as infobesity, data smog etc.), in its manifest combinatorial forms of sensory, cognitive and communication overloads, impact the quality, speed and efficacy of decisions (Rogers, Puryear and Root, 2013). This research attempts to analyze similar impact of plausible IT security information overload on the IT security behavior of organizational end-users. A hierarchical model of the impact of information overload on organizational end-users’ IT security behavior is proposed here. This research extends the literature of information overload in the area of information security and creates a framework for empirical validation of the theoretical underpinnings in the emerging area
    • …
    corecore