41 |
Maintaining a quality curriculum in information technology at Nicolet Area Technical College using the Wisconsin Technical College Systems quality review processBiscobing, Scott. January 2006 (has links) (PDF)
Thesis PlanB (M.S.)--University of Wisconsin--Stout, 2006. / Includes bibliographical references.
|
42 |
Identifying Key Determinants of Service Provider Effectiveness and the Impact it has on Outsourced Security SuccessLewis, James B. 19 December 2015 (has links)
<p> The purpose of this research was to identify key determinants of service provider effectiveness and how it impacts outsourced security success. As environments have become more robust and dynamic, many organizations have made the decision to leverage external security expertise and have outsourced many of their information technology security functions to Managed Security Service Providers (MSSPs). </p><p> Information Systems Outsourcing, at its core, is when a customer chooses to outsource certain information technology functions or services to a service provider and engages in a legally binding agreement. While legal contracts govern many aspects of an outsourcing arrangement, it cannot serve as the sole source of determining the outcome of a project. Organizations are viewing outsourcing success as an attainment of net benefits achieved through the use of a service provider. The effectiveness of the service provider has an impact on a company’s ability to meet business objectives and adhere to service level agreements. Many empirical studies have focused on outsourcing success, but few have focused on service provider effectiveness, which can serve as a catalyst to outsourcing success. </p><p> For this research, Agency Theory (AT) was proposed as a foundation for developing the research model which included key areas of focus in information asymmetry, the outsourcing contract, moral hazard, trust, service provider effectiveness, and security outsourcing success. Agency Theory helped uncover several hypotheses deemed germane to service provider effectiveness and provided insight into helping understand the principal-agent paradigm that exists with security outsourcing. Confirmatory Factor Analysis (CFA) and Partial Least Squares-Structured Equation Modeling (PLS-SEM) were used with SmartPLS to analyze the data and provided clarity and validation for the research model and helped uncover key determinants of service provider effectiveness. </p><p> The statistical results showed support for information asymmetry, contract, and trust, all of which were mediated through service provider effectiveness. The results also showed that service provider effectiveness is directly correlated to increasing security outsourcing success. This concluded that the research model showed significant results to support 4 of the 5 hypotheses proposed and helped uncover key findings on how security outsourcing success can be impacted. This research served as an original contribution to information security while viewing outsourcing success from the perspective of the client, security services, and customer expectations.</p>
|
43 |
The Impact of Social Digital Behavior on Digital Natives' Computer Security Behavior at Home - A Regression StudyZarenejad, Afshin 02 October 2018 (has links)
<p> Computer system end-users, whether at home or work, have been described as the weakest link in a computer security network. End-users frequently encounter warnings intended to prevent them from engaging in potentially dangerous activities and navigating to potentially malicious sites. However, end-users exhibit behaviors that violate safe computing and Internet use. End-users are either digital natives (born in or after 1982) or digital immigrants (born before 1982). This regression research study addresses the extent to which social behavior (measured by response efficacy, self-efficacy, and social influences) impacts the home computer user’s security behavior, controlling for digital natives. A survey was conducted from a random sample of individuals 21 years of age or older who own a personal computer and are responsible for its maintenance and repairs. The survey intended to determine to what extent do response efficacy, self-efficacy, and social influence impact security behavior of the home computer user, controlling for whether the user is a digital native or digital immigrant. The data was analyzed by using hierarchical linear regression. It was determined that when controlling for the effect of being a digital native, response efficacy and social influence were significantly predictive of behavioral intentions, while self-efficacy was not significantly predictive of behavioral intentions. This study shows that home computer users believe that (a) the security process is essential (response efficacy) and (b) they do not want to be seen in a negative light by their peers (social influence) but (c) that they may not actually change their personal behavior (self-efficacy) when making decisions vis-à-vis the security of their personal computers (security behavioral intentions). It was found that use of persuasive communications can affect the user’s security behavioral intention. Despite the implementation of fear appeals, some users have not changed their decision-making process to ensure the security of their systems. </p><p>
|
44 |
Three essays on how social context shapes engagement onlineBaek, Jiye 30 June 2018 (has links)
Understanding online user engagement is a key challenge for social platforms that support the communal creation or transfer of knowledge and information. Engagement is not only a function of individual attributes but also the result of the social context that derives from platform choices. This dissertation presents several empirical examples of how social context shapes online engagement in social platforms such as social media or online communities. In the first chapter, I investigate how the social network structure influences Twitter users’ information sharing behavior. I reconcile contradictory theories of the diversity of information sharing on social media using data representative of the whole population of Twitter users. In the second chapter, I investigate how online community size impacts users’ platform engagement. By conducting a randomized field experiment on edX, I show a causal influence of community size on individual user’s knowledge-sharing behavior, retention and performance. In the third chapter, I examine how social learning impacts out-group users’ engagement in an online learning community in terms of language and culture. I broaden the scope of my research in this last chapter by studying a context that has received little attention in the platform engagement literature. I use an interdisciplinary multi-method approach in my research that includes social network analysis, randomized field experiment, and econometrics. This dissertation involves a combination of these methods to understand user-behavior in the social platform and introduce interventions to maximize the benefit for digital platform and users alike.
|
45 |
Misinterpretation of Digital Evidence| Recommendations to Improve Data IntegrityBednar-Schadle, Teresa 05 January 2019 (has links)
<p> The criminal justice system struggles to remain current with modern technology, and the result is the conviction of innocent victims due to the misinterpretation of digital forensic data. It is common for criminal trials to rely on digital evidence and not uncommon the guilty acquitted based on digital evidence. The research contained in this report covered some of the factors contributing to the misinterpretation of digital forensic data. Among the contributing factors are lack of professional and ethical standards governing digital forensic investigators, inadequate training, outdated equipment, and lack of standardized protocols for analyzing digital evidence. All are problems leading to evidentiary issues, and improper jury decisions based on shaky digital evidence (Sloan, 2015). </p><p> Research conducted for this report also provides recommendations to minimize the risk of digital forensic data misinterpretation. Recommendations included new technology training and establishment of formal ethics training and requirements for all investigators. Other recommendations included adopting the use of behavior analysis and knowledge management during investigations. Results from a 2015 survey to identify the biggest challenges facing digital forensic investigators also included investigator training, new technology and the need to provide digital technology training for prosecutors.</p><p>
|
46 |
Can the analytical hierarchy process model be effectively applied in the prioritization of information assurance defense in-depth measures? - a quantitative studyAlexander, Rodney T. 17 March 2017 (has links)
<p> Organizational computing devices are increasingly becoming targets of cyber-attacks, and organizations have become dependent on the safety and security of their computer networks and their organizational computing devices. Business and government often use defense in-depth information assurance measures such as firewalls, intrusion detection systems, and password procedures across their enterprises to plan strategically and manage IT security risks. This quantitative study explores whether the analytical hierarchy process (AHP) model can be effectively applied to the prioritization of information assurance defense in-depth measures. In response to these threats, the President, legislators, experts, and others have characterized cybersecurity as a pressing national security issue. The methods used in this study consisted of emailing study participants a survey requesting that they prioritize five defense in-depth information assurance measures, anti-virus, intrusion detection, password, smart-cards, and encryption, with a range of responses from 1-5 using a Likert scale to consider standard cost, effectiveness, and perceived ease of use in terms of protection of organizational computing devices. The measures were then weighted, based on ranking. A pair-wise comparison of each of the five measures were then made using AHP to determine whether the Likert scale and the AHP model could be effectively applied to the prioritization of information assurance measures to protect organizational computing devices. The findings of the research reject the H0 null hypothesis that AHP does not affect the relationship between the information technology analysts’ prioritization of five defense in-depth dependent variables and the independent variables of cost, ease of use, and effectiveness in protecting organizational devices against cyber-attacks.</p>
|
47 |
An Examination of CIO Leadership Style and Business Strategy for Business-IS Strategic Alignment| A Correlational StudyBerepiki, Clifford Olobo 10 January 2018 (has links)
<p> Business leaders rely on information technology (IT) and information systems (IS) to stay competitive, and experts agree that the Chief Information Officer (CIO), as the individual responsible for technology optimization, is essential to business success. Based on this understanding, for over 40 years, researchers have invested valuable resources in examining strategic alignment and its antecedents. Although past scholars hint at the likelihood that leadership style influences strategic alignment, no researcher has verified influence in such a relationship. The purpose of this nonexperimental cross-sectional correlational study was to examine the relationship between a CIO’s leadership style and strategic alignment when moderating for business strategy. In this research, 145 IT managers who work in the United States completed surveys to share their perceptions of their CIOs’ leadership style and the realized business and IS strategies. Correlational statistical analyses supported examination of the relationship between three leadership styles (transactional, transformational, and mixed) and strategic alignment for three business strategy types (defender, prospector, and analyzer). Initial findings showed that the leadership style of a CIO had a statistically significant influence on strategic alignment. Following moderation of the relationship by business strategy type, a statistically significant correlation existed between transactional leadership and strategic alignment for analyzer business strategy. However, no statistically significant evidence supported the CIO’s leadership style suited for defender and prospector business strategies. In practice, organizations could use the insights from this study to select or develop CIOs with a particular leadership style to match their business strategy in order to increase the chance of success in achieving strategic alignment. Recommendations for further studies included the use of adequate samples for all statistical analysis and the use of a validated model for leadership style assessment.</p><p>
|
48 |
Predicting the Adoption of Big Data Security Analytics for Detecting Insider ThreatsLombardo, Gary 27 April 2018 (has links)
<p> Increasingly, organizations are at risk of data breaches due to corporate insider threats. Insiders, in fact, are the biggest threat to corporate data assets and are evading traditional cybersecurity countermeasures. The volume of big data makes insider threat detection more difficult. Conversely big data security analytics (BDSA) enables the detection of anomalous behavior patterns within large datasets in real time, offering organizations potentially a more effective cybersecurity countermeasure for detecting insider threats. However, there was a gap in the literature about what was known about information technology (IT) professionals’ behavioral intentions (BIs) to adopt BDSA. The overarching management question of this study was whether IT professionals’ BIs to adopt BDSA were influenced by perceived usefulness (PU) and perceived ease of use (PEOU). This management question led to the investigation of three research questions: The first was if there was a statistically significant relationship between PU and an IT professional’s BI to adopt BDSA. The second was if there was a statistically significant relationship between PEOU and an IT professional’s BI to adopt BDSA. And, the third was does an IT professional’s PEOU of BDSA influence the PU of BDSA. The study used a quantitative, nonexperimental, research design with the technology acceptance model (TAM) as the theoretical framework. Participants included 110 IT professionals with five or more years of experience in the IT field. A Fast Form Approach to Measuring Technology Acceptance and Other Constructs was used to collect data. The instrument had 12 items that used (a) semantic differential scales that ranged in value from -4 to +4 and (b) bipolar labels to measure the two independent variables, PU and PEOU. Multiple linear regression was used to measure the significance of the relationship between PU and BI, and PEOU and BI. Also measured was the moderating effect of the independent variable, PEOU, on the dependent variable, PU. Finally, multivariate adaptive regression splines (MARS) measured the predictive power of the TAM. The findings of this study indicate a statistically significant relationship between PU and an IT professional’s BI to adopt BDSA and a statistically significant relationship between PEOU and PU. However, there was no statistically significant relationship between PEOU and an IT professional’s BI to adopt BDSA. The MARS analysis indicated the TAM had strong predictive power. The practical implications of this study inform IT practitioners on the importance of technology usefulness. In the case of BDSA, the computational outcome must be reliable and provide value. Also, given the challenges of developing and effectively using BDSA, addressing the issue of ease of use may be important for IT practitioners to adopt and use BDSA. Moreover, as an IT practitioner gains experience with BDSA, the ability to extract value from big data influences PEOU and strengthens its relationship with PU.</p><p>
|
49 |
Required Skill Sets of Information Technology Workers in Managed Hosting Environments in Higher EducationWood, Scott 03 November 2017 (has links)
<p> Through the rise of online learning, the playing field has been leveled for colleges across the globe. As costs continue to increase, greater emphasis is being placed on higher education institutions to maximize existing resources while adapting to technological advances. Building on Christensen's theory of disruptive innovation, and further considering Lunenberg’s work on higher education as an open system that must adapt to its changing environment, the researcher aimed to understand the realities of a shifting information technology (IT) landscape on IT professionals. A mixed method sequential exploratory approach was used to investigate if additional skills were required of IT professionals in managed hosting environments. The study further investigated if a change in organizational staffing would be required or a change in career trajectory would be possible. The quantitative phase, which included responses from 28 participants across 25 institutions, suggested that participants did not find that managed hosting environments required additional skills, different staffing models, or additional career trajectories. The qualitative phase uncovered additional insights. Via responsive interviewing of five interviewees, the researcher found HEIs that utilize managed hosting for IT applications places an emphasis on soft skills and increased user communication. Further, there was a consensus that managed hosting for IT applications changes the responsibilities of IT staff. However, the overall impact of a managed hosting strategy on a HEIs workforce will depend heavily on leadership and the organizational culture of the institution.</p><p>
|
50 |
A framework for the corporate governance of ICT in local governmentDelport, Petrus Marthinus Jacobus January 2017 (has links)
Information and Communication Technology (ICT) has become critical and pervasive in any well-run modern enterprise across all sectors, which include local government. As a result, ICT demands to be managed and governed in a sustainable manner. Therefore, local government should accept the responsibility of implementing good Corporate Governance of ICT (CGICT). Without sound CGICT, ICT is unable to support local government in the achievement of their strategic objectives. This will most likely result in local government not being able to serve the interests of the community. Even though local government is aware of their responsibility regarding CGICT, the Auditor-General reports that their attempts are unsatisfactory, in this regard. This is most probably due to the fact that ample information exists on guiding local government with `what' they should do towards good CGICT, but unfortunately a lack of guidance on `how' to achieve it. Thus, it is imperative for local government to adopt a CGICT framework which provides guidance not only on what they must do towards implementing good CGICT but also on how they should achieve it. In doing so, local government would most likely be able to properly manage and govern ICT and support the needs of the community. Therefore, the aim of this study is to report on research undertaken, in order to assist local government with a CGICT framework that is relevant to their unique environment. Accordingly, this CGICT framework aims to be usable and scallable to the needs of any sized local government entity. As a result, the CGICT framework aims to be simplistic in nature to promote self-implementation of sound CGICT in local government.
|
Page generated in 0.1154 seconds