In Proceedings of the 2015 ACM SIGMIS Computers and People Research (SIGMIS-CPR'15), 101–104. New Beach, CA: ACM. doi:10.1145/2751957.2751978. Ho, Shuyuan Mary, and Jeffrey T. Hancock. 2019. “Context in a bottle: Language-action cues in ...
Author: Hsia-Ching Chang
Publisher: CRC Press
Information professionals have been paying more attention and putting a greater focus on privacy over cybersecurity. However, the number of both cybersecurity and privacy breach incidents are soaring, which indicates that cybersecurity risks are high and growing. Utilizing cybersecurity awareness training in organizations has been an effective tool to promote a cybersecurity-conscious culture, making individuals more cybersecurity-conscious as well. However, it is unknown if employees’ security behavior at work can be extended to their security behavior at home and personal life. On the one hand, information professionals need to inherit their role as data and information gatekeepers to safeguard data and information assets. On the other hand, information professionals can aid in enabling effective information access and dissemination of cybersecurity knowledge to make users conscious about the cybersecurity and privacy risks that are often hidden in the cyber universe. Cybersecurity for Information Professionals: Concepts and Applications introduces fundamental concepts in cybersecurity and addresses some of the challenges faced by information professionals, librarians, archivists, record managers, students, and professionals in related disciplines. This book is written especially for educators preparing courses in information security, cybersecurity, and the integration of privacy and cybersecurity. The chapters contained in this book present multiple and diverse perspectives from professionals in the field of cybersecurity. They cover such topics as: Information governance and cybersecurity User privacy and security online and the role of information professionals Cybersecurity and social media Healthcare regulations, threats, and their impact on cybersecurity A socio-technical perspective on mobile cybersecurity Cybersecurity in the software development life cycle Data security and privacy Above all, the book addresses the ongoing challenges of cybersecurity. In particular, it explains how information professionals can contribute to long-term workforce development by designing and leading cybersecurity awareness campaigns or cybersecurity hygiene programs to change people’s security behavior.
17th International Conference, ISSA 2018, Pretoria, South Africa, August 15–16, 2018, Revised Selected Papers Hein Venter, ... In: Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research - SIGMIS-CPR 2015, pp.
Author: Hein Venter
This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISSA 2018, held in Pretoria, South Africa, in August 2018. The 13 revised full papers presented were carefully reviewed and selected from 40 submissions. The papers are dealing with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; distributed systems security.
Journal of Technology in Human Services , 30 ( 3-4 ) , 145–159 . doi : 10.1080 / 15 228835.2012.743797 Gil , T. M. , & Poletto , M. ( 2001 , August ) . ... 2017 ACM SIGMIS Conference on Computers and People Research , 185–186 .
Author: Cruz-Cunha, Maria Manuela
Publisher: IGI Global
In recent years, industries have transitioned into the digital realm, as companies and organizations are adopting certain forms of technology to assist in information storage and efficient methods of production. This dependence has significantly increased the risk of cyber crime and breaches in data security. Fortunately, research in the area of cyber security and information protection is flourishing; however, it is the responsibility of industry professionals to keep pace with the current trends within this field. The Handbook of Research on Cyber Crime and Information Privacy is a collection of innovative research on the modern methods of crime and misconduct within cyber space. It presents novel solutions to securing and preserving digital information through practical examples and case studies. While highlighting topics including virus detection, surveillance technology, and social networks, this book is ideally designed for cybersecurity professionals, researchers, developers, practitioners, programmers, computer scientists, academicians, security analysts, educators, and students seeking up-to-date research on advanced approaches and developments in cyber security and information protection.
15. 16. 17. 18. 19. 5. Böhm S, Niklas SJ (2012) Mobile recruiting: insights from a survey among German HR managers. In: Proceedings of the 50th annual conference on computers and people research, SIGMIS-CPR 2012.
Author: Paolo Ciancarini
This book presents high-quality original contributions on new software engineering models, approaches, methods, and tools and their evaluation in the context of defence and security applications. In addition, important business and economic aspects are discussed, with a particular focus on cost/benefit analysis, new business models, organizational evolution, and business intelligence systems. The contents are based on presentations delivered at SEDA 2018, the 6th International Conference in Software Engineering for Defence Applications, which was held in Rome, Italy, in June 2018. This conference series represents a targeted response to the growing need for research that reports and debates the practical implications of software engineering within the defence environment and also for software performance evaluation in real settings through controlled experiments as well as case and field studies. The book will appeal to all with an interest in modeling, managing, and implementing defence-related software development products and processes in a structured and supportable way.
Proceedings of the ACM SIGMIS Computers and People Research Conference (ACM SIGMIS CPR '12). ... Retrieved June 25, 2015 from http://techcrunch.com/2015/06/15/improving-diversity-hiring-in-tech/ Tyson, W., Lee, R., Borman, K. M., ...
Author: Prince, Charles B. W.
Publisher: IGI Global
As more Americans are attending college, historically black colleges and universities (HBCUs) are now in a position where they must directly compete with other institutions. While other colleges and universities might have more resources and stronger infrastructures, HBCUs provide better opportunities to meet the needs of students of color. Setting a New Agenda for Student Engagement and Retention in Historically Black Colleges and Universities explores the innovations that HBCUs can enact to better serve and prepare the next generation of African American leaders, and to be more competitive in the higher education landscape. As students need different forms of support throughout their academic career, it becomes necessary to engage them through mentorship, programming, and classroom management. This book is a valuable resource for educators and administration at HBCUs, sociologists, policy makers, and students studying education science and administration.
In M. Gallivan, J. E. Moore, & Yager, S. (Eds.), Proceedings of the 2005 ACM SIGMIS CPR Conference on Computer Personnel Research (pp. 24-31). New York: ACM Press. Star, S.L. (Ed). (1995). The cultures of computing.
Author: Panayiotis Zaphiris
Publisher: IGI Global
Penetrates the human computer interaction (HCI) field with breadth and depth of comprehensive research.
5th International Conference, LCT 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, ... In: Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research, SIGMIS-CPR 2015, pp. 31–39.
Author: Panayiotis Zaphiris
This two-volume set LNCS 10924 and 10925 constitute the refereed proceedings of the 5th International Conference on Learning and Collaboration Technologies, LCT 2018, held as part of the 20th International Conference on Human-Computer Interaction, HCII 2018, in Las Vegas, NV, USA in July 2018. The 1171 papers presented at HCII 2018 conferences were carefully reviewed and selected from 4346 submissions. The papers cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of applications areas. The papers in this volume are organized in the following topical sections: designing and evaluating systems and applications, technological innovation in education, learning and collaboration, learners, engagement, motification, and skills, games and gamification of learning, technology-enhanced teaching and assessment, computing and engineering education.
15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 8. Tan, P.N., Steinbach, M., Kumar, V.: Introduction to Data Mining. ... In: Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research - SIGMIS-CPR 2015.
Author: Claude Carlet
This book constitutes the proceedings of the Third International Conference on Codes, Cryptology and Information Security, C2SI 2019, held in Rabat, Morocco, in April 2019. The 19 regular papers presented together with 5 invited talks were carefully reviewed and selected from 90 submissions. The first aim of this conference is to pay homage to Said El Hajji for his valuable contribution in research, teaching and disseminating knowledge in numerical analysis, modeling and information security in Morocco, Africa, and worldwide. The second aim of the conference is to provide an international forum for researchers from academia and practitioners from industry from all over the world for discussion of all forms of cryptology, coding theory, and information security.
In Proceedings of the ACM SIGMIS Computer Personnel Research Conference, Claremont, CA. Trauth, E. M., Quesenberry, J. L., ... Proceedings of the 2005 ACM SIGMIS CPR Conference on Computer Personnel Research, Atlanta, GA (pp. 24-31).
Author: Stahl, Bernd Carsten
Publisher: IGI Global
Issues and Trends in Technology and Human Interaction consists of research in the areas of e-commerce through law and culture, intellectual capital in knowledge management, and the philosophy of technology, among other topics. This book also investigates the interaction of technology and humans from a variety of viewpoints, and presents technology assessment of software/hardware development, interaction and conversion between technologies and their impact on society, and phenomenology of e-government.
15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. de Gusmão, A.P.H., Silva, M.M., Poleto, T., e Silva, L.C., Costa, ... In: SIGMIS-CPR 2019 – Proceedings of the 2019 Computer and People Research Conference, pp 125–130 (2019) Jennett, P.A., ...
Author: Álvaro Rocha
Publisher: Springer Nature
This book gathers selected papers presented at the 2020 World Conference on Information Systems and Technologies (WorldCIST’20), held in Budva, Montenegro, from April 7 to 10, 2020. WorldCIST provides a global forum for researchers and practitioners to present and discuss recent results and innovations, current trends, professional experiences with and challenges regarding various aspects of modern information systems and technologies. The main topics covered are A) Information and Knowledge Management; B) Organizational Models and Information Systems; C) Software and Systems Modeling; D) Software Systems, Architectures, Applications and Tools; E) Multimedia Systems and Applications; F) Computer Networks, Mobility and Pervasive Systems; G) Intelligent and Decision Support Systems; H) Big Data Analytics and Applications; I) Human–Computer Interaction; J) Ethics, Computers & Security; K) Health Informatics; L) Information Technologies in Education; M) Information Technologies in Radiocommunications; and N) Technologies for Biomedical Applications.
Information Technology and People, 15(2), 98-118. Actor-Network Theory (ANT): Developed by ... In M. Tanniru & S. Weisband (Eds.), Proceedings of the 2004 ACM SIGMIS Conference on Computer Personal Research, Tuscon, AZ (pp. 114-119).
Author: Trauth, Eileen M.
Publisher: IGI Global
"This two volume set includes 213 entries with over 4,700 references to additional works on gender and information technology"--Provided by publisher.
Human Resource Development Quarterly 15, 279–301 (2004) 7. ... Organizational Behavior and Human Performance 31, 394–417 (1983) 9. ... In: Proceedings of the 2007 ACM SIGMIS-CPR Conference on Computer Personnel Research, pp. 9–14.
Author: Borworn Papasratorn
Publisher: Springer Science & Business Media
It was our intention to organize IAIT 2010 as the place where researchers and ind- trial practitioners could share their work and achievements in information technology, both theoretical and in application. This is the fourth time we have organized IAIT to serve as a venue to foster collaboration among industry and academia from different parts of the world. A lot has been achieved since the launch of the first IAIT in 2005; however, many challenges remain to be addressed in the years to come. IAIT 2010 drew attendance from leading professionals in both industry and academes, as in IAIT 2009. In addition to the relevant program offered by IAIT 2010, the conference p- vided an excellent environment to meet peers in the IT profession, build relationships, and exchange lessons learned. During the conference, participants presented and d- cussed the latest topics in information technology, ranging from technical knowledge and experimentation to future strategic directions. As the Internet continues to reach out even further, almost everything in our daily life is accessible via IP addresses, our societies need to recognize that we need new knowledge to make this advancement become a benefit to all life in this world. It is almost impossible to gain this new knowledge without contributions from our c- leagues, working in various aspects of information technology. Some times, new knowledge found in one area can help simplify difficult task in another. Together we can make our world better by creating applications from information technology.
Privacy issues related to AI continue as a “Grand Challenge” to Human-Computer interaction . ... Sage, Thousand Oaks (1994) 15. ... In: SIGMIS-CPR 2019 - Proceedings of the 2019 Computers and People Research Conference, pp. 35–42.
Author: Fiona Fui-Hoon Nah
Publisher: Springer Nature
This book constitutes the refereed proceedings of the 8th International Conference on HCI in Business, Government and Organizations, HCIBGO 2021, which was held as part of HCI International 2021 and took place virtually during July 24-29, 2021. The total of 1276 papers and 241 posters included in the 39 HCII 2021 proceedings volumes was carefully reviewed and selected from 5222 submissions. The papers included in this book were organized in topical sections as follows: electronic, mobile and ubiquitous commerce; HCI in finance and industry; work and business operations; innovation, collaboration, and knowledge sharing; and digital transformation and artificial intelligence.
Since the visualization section of this research is pretty advanced, with several existing tools such as Vizter, JUNG, ... In: SIGMIS CPR 2006: Proceedings of the 2006 ACM SIGMIS CPR conference on computer personnel research, pp. 4–11.
Author: Maryam Purvis
This volume constitutes the revised selected papers of the First International Conference, ICCMSN 2008, held in Dunedin, New Zealand, in June 2009. The 19 revised papers presented were carefully reviewed and selected from a total of 34 submissions. The papers are organized in topical sections on virtual environments and second life; knowledge networks and learning in social networks; applications and integration of social networking systems as well as social concepts associated with social networking.
In Proceedings of the the 2008 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC'08), Herrsching am Ammersee ... In Proceedings of the 2006ACM SIGMIS CPR Conference on Computer Personnel Research, Claremont, CA (pp.
Author: Dwivedi, Ashish
Publisher: IGI Global
"This book explores the implementation of organizational and end user computing initiatives and provides foundational research to further the understanding of this discipline and its related fields"--Provided by publisher.
Proceedings of the 2006 ACM SIGMIS CPR Conference on Computer Personnel Research: Forty Four Years of Computer ... Research in public policy analysis and management (Vol. 15, pp. 863–882). Oxford: Elsevier. Richard, O.C. (2000).
Author: Piotr Zientara
The demise of communism in 1989 in eastern Europe, followed by the break-up of the Soviet Union and the spectacular rise of China and India in the 1990s, brought about a new world order. In eastern Europe communism not only caused large-scale impoverishment and technological slowing, but also signified managerial wastefulness and disregard for employee voice. Yet, since the collapse of the old system, 25 years has passed and things have dramatically improved. Crucially, much has changed in the workplace: a transfer of modern HRM thought led to a shift in the way employees were treated. Human Resource Management in Emerging Economies explores – by means of qualitative and quantitative research methods – the problematics of human resource management in post-communist emerging economies. It also focuses on such interrelated issues as privatisation, trade-unionism, corporate social responsibility, work-life balance and senior employment. The book adopts a multidisciplinary perspective, referring to theories and concepts associated with management, economics, occupational psychology and sociology. Moreover, it contextualises the discussion by including a politico-historical background, and substantiates its claims with findings from empirical research. This book’s multi-faceted approach reflects the complex nature of the subject matter, allowing readers to develop a better understanding of the idiosyncrasies of employment relations in eastern Europe.
Family Business Review, 15(3), 223–237, doi:10.1111/j.1741-6248.2002.00223.x Habbershon, T. G., & Williams, M. L. (1999). ... Proceedings of ACM SIGMIS CPR Conference on Computer Personnel Doctoral Consortium and Research (pp. 30–39).
Author: Russ, Meir
Publisher: IGI Global
In the ‘knowledge economy’, it is widely recognized that the effective engagement and utilization of human capital and the other facets of intellectual capital are critical, if not the only means, to organizations’ short-term success and long-term survival. Quantitative Multidisciplinary Approaches in Human Capital and Asset Management provides robust scientific research and multidisciplinary perspectives on the theory behind the governance of human capital and human assets. Focusing on insight from the diverse fields of economics, finance, accounting, IT, biology, and development, this timely publication is designed to fit the research needs of researchers, practitioners, graduate-level students, and executives seeking methods for managing intellectual capital in the new knowledge economy.