共查询到20条相似文献,搜索用时 22 毫秒
1.
Diana K. Young Darrell Carpenter Michele Maasberg 《Journal of Computer Information Systems》2018,58(3):253-263
A key challenge resulting from the rapid growth of the information technology (IT) industry is finding enough qualified workers to fill available positions. In this paper, Holland’s Theory of Occupational Themes, Social Cognitive Career Theory, and Career Construction Theory are used to investigate how job-related beliefs, career planning perceptions, and occupational congruence work together to influence students’ career decisions, major satisfaction, and academic performance. Using 210 student responses, we empirically test a theoretically derived research model. Our findings suggest that job security is a strong predictor of both IT career optimism and career planning ability. In addition, career optimism and career planning ability are important antecedents of students’ IT career commitment, which significantly influences satisfaction with academic major. A modest portion of academic performance was explained by the model. Most notably, occupational congruence was found to be a poor predictor of academic major satisfaction and performance. 相似文献
2.
Thomas Weißschuh 《Computer Fraud & Security》2000,2000(9):9-11
The Internet, the ‘network of networks’ has had a lasting impact on the IT landscape, fundamentally changing the computing environment. At the same time, adapting and strengthening IT security to these changed conditions is often neglected. In the rush to get online, many E-commerce companies are criticized for focusing on growth at the expense of security. 相似文献
3.
ABSTRACTModern organizations face significant information security threats, to which they respond with various managerial techniques. It is widely believed that “one size does not fit all” for achieving employee information security policy compliance; nevertheless, it is yet to be determined which techniques work best to different organizational employees. We further this research stream by finding that different levels of users might be effectively motivated by different types of coercive and empowering techniques that are suitable to their level and position in the organizational chart. Our results suggest that participation in the ISP decision-making process might prove to be a more effective approach to motivate lower-level employees toward compliance and that enhancing the meaningfulness of policy compliance could be the preferred method among higher levels of management. Members within each level of the organization can be effectively influenced to comply with ISPs when such strategies are customized for their level. 相似文献
4.
This article uses the protection motivation theory to study the impact of information security awareness on desktop security behavior. It contributes to the literature by examining the roles played by awareness, an important antecedent to the cognitive processes in the protection motivation theory. The findings indicate that security awareness significantly affects perceived severity, response efficacy, self-efficacy, and response cost. Constructs in the coping appraisal process (except response cost), in turn, significantly impact recommended security behavior. 相似文献
5.
With a rapid growth in technology, cloud computing has become increasingly popular among individual users and businesses around the world. This computing technology continues to attract attention in both academic and business settings. The popularity of cloud computing is due to its ability to provide faster on-demand infrastructure, self-service, and independent ability to contribute to, and access, resources. Despite many potential benefits of cloud computing usage, there are certain aspects that have prohibited some consumers to accept this technology and remain reserved toward its adoption. There are some crucial factors to consider before cloud computing can be accepted entirely by the individual, larger business, or academic groups. This study thus aims at investigating how cloud computing is perceived by potential users and which factors have a tendency to encourage or discourage them to adopt cloud computing. 相似文献
6.
Fred Cohen 《Network Security》2001,2001(3):12-17
Some commonly cited oxymorons are ‘military intelligence’ and ‘central intelligence’. While there are certainly times when the intelligence communities seem to get it wrong, today, we will be defending intelligence practices and expanding upon them in the area of corporate intelligence. 相似文献
7.
Winn Schwartau 《Network Security》2001,2001(8):11-13
The destruction of the United States would be the ultimate in non-availability. (France might disagree, but so be it.) To avoid that eventuality during the Cold War, the US military defended us poor, soon-to-be-nuked, citizenry, with time. 相似文献
8.
Liqiang Chen Jean A. Pratt Carey B. Cole 《Journal of Computer Information Systems》2016,56(4):313-320
Systems development is an academic major in many information systems (IS) programs. Attracting students who are interested in systems development is important to increasing IS enrollment. The purpose of this study aims to empirically investigate which factors influence students’ decisions to select systems development as a major and future career. This research makes three contributions to IS research and education. First, the research findings extend previous research associating outcome expectations and job availability with attitudes toward systems development. IS educators can use these findings to create better recruiting strategies and to improve the IS curriculum. Second, the findings connect academic-major choice with career choice. The findings indicate that attitudes toward systems development and personal innovativeness in IT (PIIT) positively influence students’ intentions to pursue a career as a systems developer. Third, this research paves a foundation for further investigation into systems development behavior and performance in the workplace. 相似文献
9.
The purpose of this study is to develop a better understanding of the factors motivating individuals who use cloud-based services despite the privacy and security risks associated with it. The authors developed a research model that incorporates the theory of planned behavior (TPB) and constructs from previous research to explain individuals’ intentions to use cloud-based services. Our analysis shows support for the relationships among predictor variables (attitude, subjective norm, perceived behavioral control, and information privacy) and the outcome variable (behavioral intention). Additionally, our analysis shows IT leadership and trust as moderating variables between the TPB predictor variables (attitude and perceived behavioral control), but not subjective norm. The results indicate that IT leadership support of cloud-based systems can have a positive effect on cloud adoption and individuals are likely to continue their use of cloud computing despite the privacy and security risks associated with it. 相似文献
10.
The e-commerce of fresh commodities keeps being adaptive to the change of consumer consumption attitudes and behavior in the current era of global economy. In the fierce competition of the industry, how to attract and retain customers more efficiently and increase consumer repurchase behavior is a long-term concern for fresh food e-commerce platforms. This research aims to focus on how the fresh e-commerce platforms can reduce consumer conversion to other forms of purchase and increase consumer repurchase. In this paper a research model is constructed whereby a set of perceived value scales is generated to evaluate consumer repurchase behavior. Data from a sample of 515 consumers is collected through a web-based questionnaire, and structural equation modeling is used to test the research hypotheses and empirically investigate the factors and internal mechanisms influencing repurchase behavior on fresh e-commerce platforms. Results from the analysis show that the product quality and product price from the product-side, perceived ease of use, reliability, response speed and convenience from the service-side, and subjective norms of the consumer personal factors impose significant effects on consumer satisfaction. consumer satisfaction plays a key mediating role in consumer repurchase behavior. Guidance and suggestions for the operation processes of e-commerce platforms are developed based on these key factors to cultivate customer loyalty and attract potential customers more specifically. Moreover, the examination of the factors from the three dimensions promotes the e-commerce platforms to raise their service level by enhancing their supply chain as the bottom rocks of the platform enterprises. 相似文献
11.
Information Systems Frontiers - The protection of organizational information and information systems (IS) is a socio-technical issue and requires insiders take on a more proactive set of security... 相似文献
12.
Information Systems and e-Business Management - With the increasing adoption of robotics in professional applications, the question arises of what impact robots with more cognitive skills will have... 相似文献
13.
Abstract The purpose of this study is to explore students’ understanding of loops and nested loops concepts. Sixty-three mechanical engineering students attending an introductory programming course participated in the study. APOS (Action, Process, Object, Schema) is a constructivist theory developed originally for mathematics education. This study is the first attempt to use the APOS framework in the context of programming education. Results showed that APOS theory is a useful framework for examining engineering students’ understanding related to loops and nested loops. The results of this study have specific implications for researchers and practitioners when designing programming instruction. 相似文献
14.
Princely Ifinedo 《Information Systems Management》2016,33(1):30-41
This study was designed to examine the impacts of employees’ cost–benefit analysis, deterrence considerations, and top management support and beliefs on information systems security policy compliance. Surveys of Canadian professionals’ perceptions were carried out. A research model was proposed and tested. The results confirmed that top management support and beliefs, sanction severity, and cost–benefit analysis significantly influenced employees’ information systems security policy compliance. The implications of the study findings are discussed, and conclusions are drawn. 相似文献
15.
Critical Success Factors to Improve the Game Development Process from a Developer’s Perspective
下载免费PDF全文

The growth of the software game development industry is enormous and is gaining importance day by day. This growth imposes severe pressure and a number of issues and challenges on the game development community. Game development is a complex process, and one important game development choice is to consider the developer’s perspective to produce good-quality software games by improving the game development process. The objective of this study is to provide a better understanding of the developer’s dimension as a factor in software game success. It focuses mainly on an empirical investigation of the effect of key developer’s factors on the software game development process and eventually on the quality of the resulting game. A quantitative survey was developed and conducted to identify key developer’s factors for an enhanced game development process. For this study, the developed survey was used to test the research model and hypotheses. The results provide evidence that game development organizations must deal with multiple key factors to remain competitive and to handle high pressure in the software game industry. The main contribution of this paper is to investigate empirically the influence of key developer’s factors on the game development process. 相似文献
16.
David Herson 《Computer Fraud & Security》2001,2001(9):8-9
In my July column, I mentioned the forthcoming review of the 1992 Guidelines for the Security of Information Systems, which had recently begun within the Paris-based Organization for Economic Cooperation and Development (OECD/OCDE). The Guidelines were formally adopted by the Council of the OECD as a Recommendation at its 793rd Session on 26–27 November 1992 (ref. C(92)188/FINAL). 相似文献
17.
Benoît Valiron 《New Generation Computing》2013,31(1):1-26
This paper is the second part of a series of two articles on quantum computation. If the first part was mostly concerned with the mathematical formalism, here we turn to the programmer’s perspective. We analyze the various existing models of quantum computation and the problem of the stability of quantum information. We discuss the needs and challenges for the design of a scalable quantum programming language. We then present two interesting approaches and examine their strengths and weaknesses. Finally, we take a step back, and review the state of the research on the semantics of quantum computation, and how this can help in achieving some of the goals. 相似文献
18.
Fakhar Shahzad GuoYi Xiu Imran Khan Jian Wang 《International journal of human-computer interaction》2019,35(10):899-915
The participation of mobile technology could be a massive development to ensure the citizen’s safety by linking various government agencies under the umbrella of the m-government (m-govt) security response system (SRS). Based on the novel phenomenon of m-govt SRS, this research provides a comprehensive theoretical model to discover citizens’ adoption intention. Our findings proved that transparency and trust mediate the influence of information quality characteristics and channel characteristics, while perceived usefulness mediate the influence of awareness on citizens’ intentions to use; which reduce uncertainty and enhance citizens’ willingness to adopt the m-govt SRS. This study proved that perceived response time is a key construct in the context of providing m-govt SRS to enhance citizens’ intention to use. The outcomes make a noteworthy contribution to theoretical literature and having practical implications regarding understanding various aspects of m-govt SRS adoption among citizens, which provide the broadest view to government agencies for successful implementation of these services. 相似文献
19.
Perry Luzwick 《Computer Fraud & Security》2001,2001(1):16-17
What would you do if you were stuck in one place, and everyday was exactly the same, and nothing you did mattered?”Phil Connor, Ground Hog Day“That about sums it up for me,” answered Ralph, and I’m sure most system administrators, information system security officers (ISSOs), physical security, operations security, and other security professionals would agree. Everybody takes them for granted — until the network goes down or applications can’t be used. And that’s the problem: a totally wrong perception of what’s required for the serious business of properly doing full spectrum security. Security is not something extra. Security is a normal part of doing business. 相似文献
20.
《Information & Management》2023,60(6):103843
This study delves into how employee proactiveness on enterprise social media can influence social outcomes at work, both positively and negatively. Drawing on social network and social exchange theories, we develop a model to understand how virtual proactiveness is perceived by leaders and coworkers. Using a round-robin design, we collected data from 281 respondents in 56 teams across three waves. The results show that affiliative and challenging proactiveness positively relate to leader-member and team-member exchanges. However, challenging proactiveness negatively affects team-member exchange, potentially leading to coworker envy. These findings shed light on the intricate social dynamics in remote working environments. 相似文献