Cybersecurity for Information ProfessionalsCybersecurity for Information Professionals

In Proceedings of the 2015 ACM SIGMIS Computers and People Research (SIGMIS-CPR'15), 101–104. New Beach, CA: ACM. doi:10.1145/2751957.2751978. Ho, Shuyuan Mary, and Jeffrey T. Hancock. 2019. “Context in a bottle: Language-action cues in ...

Author: Hsia-Ching Chang

Publisher: CRC Press

ISBN: 9781000065824


Page: 334

View: 655

Information professionals have been paying more attention and putting a greater focus on privacy over cybersecurity. However, the number of both cybersecurity and privacy breach incidents are soaring, which indicates that cybersecurity risks are high and growing. Utilizing cybersecurity awareness training in organizations has been an effective tool to promote a cybersecurity-conscious culture, making individuals more cybersecurity-conscious as well. However, it is unknown if employees’ security behavior at work can be extended to their security behavior at home and personal life. On the one hand, information professionals need to inherit their role as data and information gatekeepers to safeguard data and information assets. On the other hand, information professionals can aid in enabling effective information access and dissemination of cybersecurity knowledge to make users conscious about the cybersecurity and privacy risks that are often hidden in the cyber universe. Cybersecurity for Information Professionals: Concepts and Applications introduces fundamental concepts in cybersecurity and addresses some of the challenges faced by information professionals, librarians, archivists, record managers, students, and professionals in related disciplines. This book is written especially for educators preparing courses in information security, cybersecurity, and the integration of privacy and cybersecurity. The chapters contained in this book present multiple and diverse perspectives from professionals in the field of cybersecurity. They cover such topics as: Information governance and cybersecurity User privacy and security online and the role of information professionals Cybersecurity and social media Healthcare regulations, threats, and their impact on cybersecurity A socio-technical perspective on mobile cybersecurity Cybersecurity in the software development life cycle Data security and privacy Above all, the book addresses the ongoing challenges of cybersecurity. In particular, it explains how information professionals can contribute to long-term workforce development by designing and leading cybersecurity awareness campaigns or cybersecurity hygiene programs to change people’s security behavior.

Information SecurityInformation Security

17th International Conference, ISSA 2018, Pretoria, South Africa, August 15–16, 2018, Revised Selected Papers Hein Venter, ... In: Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research - SIGMIS-CPR 2015, pp.

Author: Hein Venter

Publisher: Springer

ISBN: 9783030114077


Page: 193

View: 254

This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISSA 2018, held in Pretoria, South Africa, in August 2018. The 13 revised full papers presented were carefully reviewed and selected from 40 submissions. The papers are dealing with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; distributed systems security.

Handbook of Research on Cyber Crime and Information PrivacyHandbook of Research on Cyber Crime and Information Privacy

Journal of Technology in Human Services , 30 ( 3-4 ) , 145–159 . doi : 10.1080 / 15 228835.2012.743797 Gil , T. M. , & Poletto , M. ( 2001 , August ) . ... 2017 ACM SIGMIS Conference on Computers and People Research , 185–186 .

Author: Cruz-Cunha, Maria Manuela

Publisher: IGI Global

ISBN: 9781799857297


Page: 753

View: 972

In recent years, industries have transitioned into the digital realm, as companies and organizations are adopting certain forms of technology to assist in information storage and efficient methods of production. This dependence has significantly increased the risk of cyber crime and breaches in data security. Fortunately, research in the area of cyber security and information protection is flourishing; however, it is the responsibility of industry professionals to keep pace with the current trends within this field. The Handbook of Research on Cyber Crime and Information Privacy is a collection of innovative research on the modern methods of crime and misconduct within cyber space. It presents novel solutions to securing and preserving digital information through practical examples and case studies. While highlighting topics including virus detection, surveillance technology, and social networks, this book is ideally designed for cybersecurity professionals, researchers, developers, practitioners, programmers, computer scientists, academicians, security analysts, educators, and students seeking up-to-date research on advanced approaches and developments in cyber security and information protection.

Proceedings of 6th International Conference in Software Engineering for Defence ApplicationsProceedings of 6th International Conference in Software Engineering for Defence Applications

15. 16. 17. 18. 19. 5. Böhm S, Niklas SJ (2012) Mobile recruiting: insights from a survey among German HR managers. In: Proceedings of the 50th annual conference on computers and people research, SIGMIS-CPR 2012.

Author: Paolo Ciancarini

Publisher: Springer

ISBN: 9783030146870


Page: 334

View: 966

This book presents high-quality original contributions on new software engineering models, approaches, methods, and tools and their evaluation in the context of defence and security applications. In addition, important business and economic aspects are discussed, with a particular focus on cost/benefit analysis, new business models, organizational evolution, and business intelligence systems. The contents are based on presentations delivered at SEDA 2018, the 6th International Conference in Software Engineering for Defence Applications, which was held in Rome, Italy, in June 2018. This conference series represents a targeted response to the growing need for research that reports and debates the practical implications of software engineering within the defence environment and also for software performance evaluation in real settings through controlled experiments as well as case and field studies. The book will appeal to all with an interest in modeling, managing, and implementing defence-related software development products and processes in a structured and supportable way.

Setting a New Agenda for Student Engagement and Retention in Historically Black Colleges and UniversitiesSetting a New Agenda for Student Engagement and Retention in Historically Black Colleges and Universities

Proceedings of the ACM SIGMIS Computers and People Research Conference (ACM SIGMIS CPR '12). ... Retrieved June 25, 2015 from Tyson, W., Lee, R., Borman, K. M., ...

Author: Prince, Charles B. W.

Publisher: IGI Global

ISBN: 9781522503095


Page: 343

View: 953

As more Americans are attending college, historically black colleges and universities (HBCUs) are now in a position where they must directly compete with other institutions. While other colleges and universities might have more resources and stronger infrastructures, HBCUs provide better opportunities to meet the needs of students of color. Setting a New Agenda for Student Engagement and Retention in Historically Black Colleges and Universities explores the innovations that HBCUs can enact to better serve and prepare the next generation of African American leaders, and to be more competitive in the higher education landscape. As students need different forms of support throughout their academic career, it becomes necessary to engage them through mentorship, programming, and classroom management. This book is a valuable resource for educators and administration at HBCUs, sociologists, policy makers, and students studying education science and administration.

Human Computer InteractionHuman Computer Interaction

In M. Gallivan, J. E. Moore, & Yager, S. (Eds.), Proceedings of the 2005 ACM SIGMIS CPR Conference on Computer Personnel Research (pp. 24-31). New York: ACM Press. Star, S.L. (Ed). (1995). The cultures of computing.

Author: Panayiotis Zaphiris

Publisher: IGI Global

ISBN: 9781605660530


Page: 2765

View: 104

Penetrates the human computer interaction (HCI) field with breadth and depth of comprehensive research.

Learning and Collaboration Technologies Learning and TeachingLearning and Collaboration Technologies Learning and Teaching

5th International Conference, LCT 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, ... In: Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research, SIGMIS-CPR 2015, pp. 31–39.

Author: Panayiotis Zaphiris

Publisher: Springer

ISBN: 9783319911526


Page: 543

View: 947

This two-volume set LNCS 10924 and 10925 constitute the refereed proceedings of the 5th International Conference on Learning and Collaboration Technologies, LCT 2018, held as part of the 20th International Conference on Human-Computer Interaction, HCII 2018, in Las Vegas, NV, USA in July 2018. The 1171 papers presented at HCII 2018 conferences were carefully reviewed and selected from 4346 submissions. The papers cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of applications areas. The papers in this volume are organized in the following topical sections: designing and evaluating systems and applications, technological innovation in education, learning and collaboration, learners, engagement, motification, and skills, games and gamification of learning, technology-enhanced teaching and assessment, computing and engineering education.​

Codes Cryptology and Information SecurityCodes Cryptology and Information Security

15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 8. Tan, P.N., Steinbach, M., Kumar, V.: Introduction to Data Mining. ... In: Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research - SIGMIS-CPR 2015.

Author: Claude Carlet

Publisher: Springer

ISBN: 9783030164584


Page: 482

View: 556

This book constitutes the proceedings of the Third International Conference on Codes, Cryptology and Information Security, C2SI 2019, held in Rabat, Morocco, in April 2019. The 19 regular papers presented together with 5 invited talks were carefully reviewed and selected from 90 submissions. The first aim of this conference is to pay homage to Said El Hajji for his valuable contribution in research, teaching and disseminating knowledge in numerical analysis, modeling and information security in Morocco, Africa, and worldwide. The second aim of the conference is to provide an international forum for researchers from academia and practitioners from industry from all over the world for discussion of all forms of cryptology, coding theory, and information security.

Issues and Trends in Technology and Human InteractionIssues and Trends in Technology and Human Interaction

In Proceedings of the ACM SIGMIS Computer Personnel Research Conference, Claremont, CA. Trauth, E. M., Quesenberry, J. L., ... Proceedings of the 2005 ACM SIGMIS CPR Conference on Computer Personnel Research, Atlanta, GA (pp. 24-31).

Author: Stahl, Bernd Carsten

Publisher: IGI Global

ISBN: 9781599042701


Page: 348

View: 267

Issues and Trends in Technology and Human Interaction consists of research in the areas of e-commerce through law and culture, intellectual capital in knowledge management, and the philosophy of technology, among other topics. This book also investigates the interaction of technology and humans from a variety of viewpoints, and presents technology assessment of software/hardware development, interaction and conversion between technologies and their impact on society, and phenomenology of e-government.

Trends and Innovations in Information Systems and TechnologiesTrends and Innovations in Information Systems and Technologies

15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. de Gusmão, A.P.H., Silva, M.M., Poleto, T., e Silva, L.C., Costa, ... In: SIGMIS-CPR 2019 – Proceedings of the 2019 Computer and People Research Conference, pp 125–130 (2019) Jennett, P.A., ...

Author: Álvaro Rocha

Publisher: Springer Nature

ISBN: 9783030456917


Page: 842

View: 593

This book gathers selected papers presented at the 2020 World Conference on Information Systems and Technologies (WorldCIST’20), held in Budva, Montenegro, from April 7 to 10, 2020. WorldCIST provides a global forum for researchers and practitioners to present and discuss recent results and innovations, current trends, professional experiences with and challenges regarding various aspects of modern information systems and technologies. The main topics covered are A) Information and Knowledge Management; B) Organizational Models and Information Systems; C) Software and Systems Modeling; D) Software Systems, Architectures, Applications and Tools; E) Multimedia Systems and Applications; F) Computer Networks, Mobility and Pervasive Systems; G) Intelligent and Decision Support Systems; H) Big Data Analytics and Applications; I) Human–Computer Interaction; J) Ethics, Computers & Security; K) Health Informatics; L) Information Technologies in Education; M) Information Technologies in Radiocommunications; and N) Technologies for Biomedical Applications.

Encyclopedia of Gender and Information TechnologyEncyclopedia of Gender and Information Technology

Information Technology and People, 15(2), 98-118. Actor-Network Theory (ANT): Developed by ... In M. Tanniru & S. Weisband (Eds.), Proceedings of the 2004 ACM SIGMIS Conference on Computer Personal Research, Tuscon, AZ (pp. 114-119).

Author: Trauth, Eileen M.

Publisher: IGI Global

ISBN: 9781591408161


Page: 1451

View: 837

"This two volume set includes 213 entries with over 4,700 references to additional works on gender and information technology"--Provided by publisher.

Advances in Information TechnologyAdvances in Information Technology

Human Resource Development Quarterly 15, 279–301 (2004) 7. ... Organizational Behavior and Human Performance 31, 394–417 (1983) 9. ... In: Proceedings of the 2007 ACM SIGMIS-CPR Conference on Computer Personnel Research, pp. 9–14.

Author: Borworn Papasratorn

Publisher: Springer Science & Business Media

ISBN: 9783642166983


Page: 215

View: 357

It was our intention to organize IAIT 2010 as the place where researchers and ind- trial practitioners could share their work and achievements in information technology, both theoretical and in application. This is the fourth time we have organized IAIT to serve as a venue to foster collaboration among industry and academia from different parts of the world. A lot has been achieved since the launch of the first IAIT in 2005; however, many challenges remain to be addressed in the years to come. IAIT 2010 drew attendance from leading professionals in both industry and academes, as in IAIT 2009. In addition to the relevant program offered by IAIT 2010, the conference p- vided an excellent environment to meet peers in the IT profession, build relationships, and exchange lessons learned. During the conference, participants presented and d- cussed the latest topics in information technology, ranging from technical knowledge and experimentation to future strategic directions. As the Internet continues to reach out even further, almost everything in our daily life is accessible via IP addresses, our societies need to recognize that we need new knowledge to make this advancement become a benefit to all life in this world. It is almost impossible to gain this new knowledge without contributions from our c- leagues, working in various aspects of information technology. Some times, new knowledge found in one area can help simplify difficult task in another. Together we can make our world better by creating applications from information technology.

HCI in Business Government and OrganizationsHCI in Business Government and Organizations

Privacy issues related to AI continue as a “Grand Challenge” to Human-Computer interaction [5]. ... Sage, Thousand Oaks (1994) 15. ... In: SIGMIS-CPR 2019 - Proceedings of the 2019 Computers and People Research Conference, pp. 35–42.

Author: Fiona Fui-Hoon Nah

Publisher: Springer Nature

ISBN: 9783030777500


Page: 658

View: 708

This book constitutes the refereed proceedings of the 8th International Conference on HCI in Business, Government and Organizations, HCIBGO 2021, which was held as part of HCI International 2021 and took place virtually during July 24-29, 2021. The total of 1276 papers and 241 posters included in the 39 HCII 2021 proceedings volumes was carefully reviewed and selected from 5222 submissions. The papers included in this book were organized in topical sections as follows: electronic, mobile and ubiquitous commerce; HCI in finance and industry; work and business operations; innovation, collaboration, and knowledge sharing; and digital transformation and artificial intelligence.

Computer Mediated Social NetworkingComputer Mediated Social Networking

Since the visualization section of this research is pretty advanced, with several existing tools such as Vizter, JUNG, ... In: SIGMIS CPR 2006: Proceedings of the 2006 ACM SIGMIS CPR conference on computer personnel research, pp. 4–11.

Author: Maryam Purvis

Publisher: Springer

ISBN: 9783642022760


Page: 201

View: 598

This volume constitutes the revised selected papers of the First International Conference, ICCMSN 2008, held in Dunedin, New Zealand, in June 2009. The 19 revised papers presented were carefully reviewed and selected from a total of 34 submissions. The papers are organized in topical sections on virtual environments and second life; knowledge networks and learning in social networks; applications and integration of social networking systems as well as social concepts associated with social networking.

End User Computing Development and Software Engineering New ChallengesEnd User Computing Development and Software Engineering New Challenges

In Proceedings of the the 2008 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC'08), Herrsching am Ammersee ... In Proceedings of the 2006ACM SIGMIS CPR Conference on Computer Personnel Research, Claremont, CA (pp.

Author: Dwivedi, Ashish

Publisher: IGI Global

ISBN: 9781466601413


Page: 448

View: 956

"This book explores the implementation of organizational and end user computing initiatives and provides foundational research to further the understanding of this discipline and its related fields"--Provided by publisher.

Human Resource Management in Emerging EconomiesHuman Resource Management in Emerging Economies

Proceedings of the 2006 ACM SIGMIS CPR Conference on Computer Personnel Research: Forty Four Years of Computer ... Research in public policy analysis and management (Vol. 15, pp. 863–882). Oxford: Elsevier. Richard, O.C. (2000).

Author: Piotr Zientara

Publisher: Routledge

ISBN: 9781317661481


Page: 214

View: 632

The demise of communism in 1989 in eastern Europe, followed by the break-up of the Soviet Union and the spectacular rise of China and India in the 1990s, brought about a new world order. In eastern Europe communism not only caused large-scale impoverishment and technological slowing, but also signified managerial wastefulness and disregard for employee voice. Yet, since the collapse of the old system, 25 years has passed and things have dramatically improved. Crucially, much has changed in the workplace: a transfer of modern HRM thought led to a shift in the way employees were treated. Human Resource Management in Emerging Economies explores – by means of qualitative and quantitative research methods – the problematics of human resource management in post-communist emerging economies. It also focuses on such interrelated issues as privatisation, trade-unionism, corporate social responsibility, work-life balance and senior employment. The book adopts a multidisciplinary perspective, referring to theories and concepts associated with management, economics, occupational psychology and sociology. Moreover, it contextualises the discussion by including a politico-historical background, and substantiates its claims with findings from empirical research. This book’s multi-faceted approach reflects the complex nature of the subject matter, allowing readers to develop a better understanding of the idiosyncrasies of employment relations in eastern Europe.

Quantitative Multidisciplinary Approaches in Human Capital and Asset ManagementQuantitative Multidisciplinary Approaches in Human Capital and Asset Management

Family Business Review, 15(3), 223–237, doi:10.1111/j.1741-6248.2002.00223.x Habbershon, T. G., & Williams, M. L. (1999). ... Proceedings of ACM SIGMIS CPR Conference on Computer Personnel Doctoral Consortium and Research (pp. 30–39).

Author: Russ, Meir

Publisher: IGI Global

ISBN: 9781466696532


Page: 318

View: 208

In the ‘knowledge economy’, it is widely recognized that the effective engagement and utilization of human capital and the other facets of intellectual capital are critical, if not the only means, to organizations’ short-term success and long-term survival. Quantitative Multidisciplinary Approaches in Human Capital and Asset Management provides robust scientific research and multidisciplinary perspectives on the theory behind the governance of human capital and human assets. Focusing on insight from the diverse fields of economics, finance, accounting, IT, biology, and development, this timely publication is designed to fit the research needs of researchers, practitioners, graduate-level students, and executives seeking methods for managing intellectual capital in the new knowledge economy.