首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
    
Abstract

There is an increasing recognition of cybersecurity’s importance to organizations, and business schools are in a unique position to meet industry’s demand for cybersecurity professionals. Using MSIS 2016 and National Centers of Academic Excellence Cyber Defense Education standards, the author investigates cybersecurity master’s programs in U.S. business schools. The author surveyed 529 Association to Advance Collegiate Schools of Business–accredited schools and identified 37 cybersecurity master’s programs; the five most frequently required courses are information technology security; network security; cybersecurity planning and management; information technology infrastructure; and policy, legal, ethics and compliance. The author also found that the master’s programs currently pivot their curriculums toward courses that are cybersecurity and technical in nature. Using survey data, the author develops a new, graduate-level cybersecurity curriculum model for business schools.  相似文献   

2.
3.
    
ABSTRACT

Bring-Your-Own-Device (BYOD) has gained increased popularity in organizations but may engender information security concerns. To address these concerns, employees are expected to opt-in and comply with organizational BYOD security policy. This study investigates the factors that affect employees’ opt-in decisions with BYOD security policy. Drawing on the theoretical lenses of persuasion and cognitive elaboration, we propose that employees’ cognitive elaborations of BYOD security policy could be affected by the valence of justification of the BYOD security policy, the stringency of BYOD security measures, and the sequence of the introduction of BYOD security policy in relation to employees’ use of personal devices to perform organizational tasks and such cognitive elaborations would in turn affect opt-in decisions. We conducted an experimental survey to test our propositions. The results indicate that positive BYOD security policy justification framing and post-task security policy exposure would lead to more positive cognitive elaboration, decision to opt-in, and compliance with the BYOD security policy. This research has significant implications for security management with respect to the design and implementation of BYOD security policy within an organization according to the nature of security policy and the task requirements.  相似文献   

4.
5.
    
This study examines the role of self-concept in consumer responses to advertising messages. Specifically, this study postulates that matching advertising message framing (concrete vs. abstract) with consumers’ self-concept (actual vs. ideal self) should yield positive ad evaluation. Results from an experimental study suggest that individuals primed into their actual self evaluated the concrete ad message more favorably than they did the abstract ad message. In contrast, those primed into their ideal self responded more favorably to the abstract ad than to the concrete ad. Implications from the study and suggestions for future research are provided.  相似文献   

6.
    
  相似文献   

7.
面对人类社会发展的新格局和经济社会发展的新需求,地球科学研究视域、学科任务、知识体系和方法手段等正酝酿着新的变革。面对经济社会大转型和新时期地球科学的发展,创新体制机制、培养地学创新人才是地质教育义不容辞的责任和重要课题。创新人才有类别和层次之分,可以区分为学术创新人才、技术创新人才和创业人才,应遵循"尊重意愿、鉴识潜力、分类培养、通专结合、以专为重"的方针进行培养。最后给出了一个成都理工大学实施创新人才培养的典型案例。  相似文献   

8.
The present study analyzes the elements that differentiate violators from non-violators of information security measures. Various elements are derived from established theories and models such as general deterrence theory, theory of planned behavior, theory of reasoned action, protection motivation theory, and social cognitive theory. To examine these factors, the data are gathered through an online study conducted in a Midwestern University, USA. The data are collected using questionnaires, and after scrutiny, 195 questionnaires are selected for final analysis. This data are analyzed using second-level statistical techniques, such as chi-square analysis and ANOVA. Results reveal that violators and non-violators of information security measures differ significantly with respect to many factors. These factors include perceived privacy, subjective norms, perceived information security policy (ISP) scope, perceived severity of penalty, perceived celerity of penalty, management support, organizational security culture, and perceived organizational IT capability. The non-significant factors are trust and work load. Implications for practitioners and researchers are provided.  相似文献   

9.
    
The continued use of information technology systems by small and medium enterprises (SMEs) in developing countries has the potential to bring significant benefits but, at the same time, expose them to online cybersecurity threats. Addressing these threats is, therefore, of paramount importance for developing countries, not only because SMEs are seen as the vehicle for employment and job creation, but because research on SMEs and cybersecurity in this context is limited. This study is a contribution toward addressing this gap.

The purpose of this study is, therefore, to explore SME cybersecurity practices and the challenges they face in developing countries. The goal is to sensitize practitioners and government institutions about the challenges and practices faced by SMEs, so that the various parties can work collaboratively in providing context-specific solutions to address these challenges and improve current cybersecurity practices. The study follows a qualitative enquiry approach to solicit information from three South African SMEs that had implemented cybersecurity practices. The findings show that an SME’s perception of cybersecurity is constrained by internal factors of budget, management support, and attitudes. Further findings show that SMEs’ cybersecurity practices are affected by the landscape of cybersecurity, as well as institutional pressures.  相似文献   


10.
    
As information technology infrastructure becomes strategic to organizations, the author examines business-school programs that educate future infrastructure analysts. Information systems (IS) 2010 and information technology (IT) 2008 curriculum models are used to survey courses required by telecommunications and IT infrastructure programs in business schools. Of 525 Association to Advance Collegiate Schools of Business–accredited schools, 259 have IS/IT programs and 18 have telecommunications and infrastructure-related programs. IT Infrastructure, Networking-Advanced, and IT Security are the top three infrastructure-related courses. Programs also require courses including IS Project Management; Social and Professional Issues; and IS Strategy, Management and Acquisition. Data collected are used to develop a new curriculum model of IT infrastructure management program that can be offered by business schools.  相似文献   

11.
为适应现代战争数字化的军事需求,解决战场环境下需要传输的信息种类和数量日益增多以及网络带宽受限等问题,设计了可变报文格式(VMF)编解码模块,作为底层消息传送的技术支撑。利用动态链接库、JSON(Java Script Object Notation)、Snappy(压缩算法)等技术为上层应用提供消息的编解码服务,设计基于JSON的可变长报文模板、比特流集成压缩算法、基于JSON的数据字典结构,实现报文的“按需发送”,根据不同的发送需求,动态地组合报文内容。实验显示所设计的模块编码解码只需3 ms左右,而参考系统编解码则需耗时200 ms以上,可见速率提升明显,数据流长度也进一步缩短。  相似文献   

12.
    
This study uses the National System of Innovation (NSI) as an analytical framework and introduces it as a catching-up economic perspective with a focus on Taiwan's current and future manpower environment, including the three basic elements of NSI in relation to science and technology (S&T). This study explores Taiwanese S&T manpower flow and distribution, as well as how the government facilitates the development of the technology network, narrowing the gap between catching-up economies and advanced economies through the NSI analysis. This study also investigates how the NSI factors affect one another, and how the interaction among government policy, the academic system, and the industrial sector promote Taiwan's S&T manpower development. Research conclusions and suggestions are also provided.  相似文献   

13.
    
This study applied the Risk Information Seeking and Processing (RISP) model to social risk information seeking and processing on social media and prosocial behavioral intentions. Survey data were collected among Chinese college students. Structural Equation Modeling revealed that the model can be successfully applied to social risk information seeking and processing on social media. Students who exhibit high tendencies for systematic information processing and for the interdependent self-construal are more likely to engage in prosocial activities. NPOs are suggested to target young adults with high inter-dependent self-construals, and to craft compelling messages on social media.  相似文献   

14.
Word-of-mouth communication (WOMC) has been recognized as a powerful marketing communication medium and a credible information-gathering tool. To date, the various types of WOM messages have not been adequately studied, especially in credence-based services (CBS). Using the individual interview technique, this study fills this gap by describing the three types of WOMC messages in CBS information-gathering. The results contribute to the ongoing development of WOMC theory and also advance management's understandings of the types of WOMC messages in the CBS information-gathering process.  相似文献   

15.
当前,世界各国纷纷立足科技创新,以科技外交为触手参与国际竞争和规则重构。日本综合科技创新会议(CSTI)是日本最高科技政策咨询决策部门,其重要职能之一便是促进日本科技外交发展。本文基于中国学者张冀燕对科技外交工具的分类,以CSTI的发展、产出成果中展现的工具性为切入点,分析日本科技外交发展特点,为我国发展科技外交提供策略建议。  相似文献   

16.
针对无线突发通信中频带利用率低、信道参数获取困难等问题,提出了一种应用于突发通信的叠加训练信道估计与检测方案。该方案将信息和训练叠加发送,通过预失真发送信息符号使得训练与信息在频域正交,收端采用一阶统计信道估计和最大似然符号检测,并设计了抗直流干扰的信道估计方案。仿真表明,新方案在消除训练序列的频带开销的情况下获得了较好的信道估计和符号检测性能,与采用时分复用训练的方案相比,其有效吞吐率更优。  相似文献   

17.
本文采用增长核算方法对1980-2003年部分OECD国家的服务业和制造业劳动生产率增长进行了贡献率分析。研究结果表明,信息通信技术(ICT)资本加深对服务业劳动生产率增长的贡献率远高于对制造业的贡献率,服务业劳动生产率增长落后于制造业的主要根源在于全要素生产率。ICT不能完全根治"成本病",但可以在一定程度上缓解服务业"成本病"。  相似文献   

18.
    
The emergence of the digital economy has serious implications on the pervasiveness of money laundering. The key factors that affect money laundering activities were studied using the double-Tobit method. In particular, this article addresses the implications of information and communication technology on money laundering behavior. The key findings from the study provide evidence that information and communication technology alone is not effective in curbing money laundering activities but effective when coupled with a high-skilled workforce and an efficient tax system.Based on the findings, various initiatives were identified. Enforcement challenges faced to combat money laundering globally and, in particular, in developing economies were also discussed.  相似文献   

19.
In order to better understand how internet users actually decide to conduct business transactions or related activities in a B2C e-commerce environment, this article adds a new lens of study by investigating the roles of Threat Appraisal (TA) and Perceived Coping Appraisal (PCA) from the end user's perspective. Based on established academic theories and relevant industrial practices, it is suggested that TA and PCA are critical behavioral components influencing the user's intentions to participate in online transactions. These functions serve as important inputs to formalizing our understanding of how services offered by e-commerce websites are utilized.  相似文献   

20.
针对正交频分复用(OFDM)系统对同步错误率和频率偏移敏感的问题,提出了一种叠加共轭对称训练序列的OFDM系统时间和频率同步方法。该同步方法将快速傅里叶逆变换(IFFT)调制后的序列构成具有共轭对称特性的训练序列,并叠加到OFDM数据符号上;在接收端,利用叠加训练序列和融合循环前缀信息来获取OFDM系统同步信息。理论分析和仿真表明:在信噪比为5 dB时,该同步算法定时同步正确概率已接近100%;在信噪比为4 dB时,频偏估计精度可以达到10-4;该同步算法不仅具有更好的同步性能,而且节省系统的有效带宽以及降低系统的计算法复杂度。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号