29 research outputs found

    INFORMATION SECURITY BEHAVIOR: FACTORS AND RESEARCH DIRECTIONS

    Get PDF
    This study presents an extensive literature review on information security behavior in the context of factors affectingsecurity behavior of users in organizational environments. The study critically analyzes articles in the informationsecurity behavior and brings forward 18 themes for security practitioners and researchers to consider inimplementing information security initiatives. The findings of this review can be used by researchers andpractitioners as a roadmap to guide further research in information security behavior. Also, the various factorsidentified in this paper can be used to improve information security programs in organizations

    Concomitant leiomyosarcoma of the right kidney and squamous cell carcinoma of the cervix – an unusual clinical presentation

    Get PDF
    We report a case of right-sided leiomyosarcoma of the kidney with concomitant poorly differentiated squamous cell carcinoma of the cervix diagnosed one month after radical nephrectomy in a previously healthy female patient. This is the first reported case of concomitant leiomyosarcoma of the kidney and squamous cell carcinoma of the cervix, and the diagnosis, clinical presentation, prognosis, and treatment are discussed

    Large-Scale Analysis of Pop-Up Scam on Typosquatting URLs

    Full text link
    Today, many different types of scams can be found on the internet. Online criminals are always finding new creative ways to trick internet users, be it in the form of lottery scams, downloading scam apps for smartphones or fake gambling websites. This paper presents a large-scale study on one particular delivery method of online scam: pop-up scam on typosquatting domains. Typosquatting describes the concept of registering domains which are very similar to existing ones while deliberately containing common typing errors; these domains are then used to trick online users while under the belief of browsing the intended website. Pop-up scam uses JavaScript alert boxes to present a message which attracts the user's attention very effectively, as they are a blocking user interface element. Our study among typosquatting domains derived from the Alexa Top 1 Million list revealed on 8255 distinct typosquatting URLs a total of 9857 pop-up messages, out of which 8828 were malicious. The vast majority of those distinct URLs (7176) were targeted and displayed pop-up messages to one specific HTTP user agent only. Based on our scans, we present an in-depth analysis as well as a detailed classification of different targeting parameters (user agent and language) which triggered varying kinds of pop-up scams.Comment: 9 pages, 11 figure

    Merchandising y la decisión de compra en las tiendas del Centro Comercial el Molino del Distrito de Santiago, Cusco – Perú

    Get PDF
    La presente investigación tuvo como objetivo determinar el grado de relación entre el merchandising y la decisión de compra en las tiendas del centro comercial el Molino del distrito de Santiago, Cusco, Perú. Para esto, se empleó el enfoque cuantitativo, con un nivel de investigación correlacional y diseño no experimental de corte transversal; donde la muestra de estudio probabilístico calculado fue de 384 clientes del centro comercial antes mencionado; la técnica de recolección de datos que se utilizó fue una encuesta, el instrumento que se aplicó fue el cuestionario con 32 preguntas en escala Likert. Los resultados nos muestran que existe una relación entre la variable merchandising y decisión de compra la cual puede ser afirmada por la correlación de Rho de Spearman que resulto ser 0.533 y, por otro lado, la obtuvo con el chi-cuadrado, la significancia bilateral o p-valor de 0.000, la cual es menor que el 0.05 por lo que se acepta la hipótesis alterna y rechaza la hipótesis nula. En conclusión, existe una relación entre la variable merchandising y la variable decisión de compra; por lo que si se realiza un adecuado uso de las estrategias del merchandising se garantiza la decisión de compra por parte de los clientes del centro comercial el Molino del distrito de Santiago, Cusco

    SARS-CoV-2 B.1.617.2 Delta variant replication and immune evasion

    Get PDF
    Abstract: The B.1.617.2 (Delta) variant of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) was first identified in the state of Maharashtra in late 2020 and spread throughout India, outcompeting pre-existing lineages including B.1.617.1 (Kappa) and B.1.1.7 (Alpha)1. In vitro, B.1.617.2 is sixfold less sensitive to serum neutralizing antibodies from recovered individuals, and eightfold less sensitive to vaccine-elicited antibodies, compared with wild-type Wuhan-1 bearing D614G. Serum neutralizing titres against B.1.617.2 were lower in ChAdOx1 vaccinees than in BNT162b2 vaccinees. B.1.617.2 spike pseudotyped viruses exhibited compromised sensitivity to monoclonal antibodies to the receptor-binding domain and the amino-terminal domain. B.1.617.2 demonstrated higher replication efficiency than B.1.1.7 in both airway organoid and human airway epithelial systems, associated with B.1.617.2 spike being in a predominantly cleaved state compared with B.1.1.7 spike. The B.1.617.2 spike protein was able to mediate highly efficient syncytium formation that was less sensitive to inhibition by neutralizing antibody, compared with that of wild-type spike. We also observed that B.1.617.2 had higher replication and spike-mediated entry than B.1.617.1, potentially explaining the B.1.617.2 dominance. In an analysis of more than 130 SARS-CoV-2-infected health care workers across three centres in India during a period of mixed lineage circulation, we observed reduced ChAdOx1 vaccine effectiveness against B.1.617.2 relative to non-B.1.617.2, with the caveat of possible residual confounding. Compromised vaccine efficacy against the highly fit and immune-evasive B.1.617.2 Delta variant warrants continued infection control measures in the post-vaccination era

    Information technology, an enabler in corporate governance

    Full text link
    PurposeThe purpose of this paper is to understand how information technology can be utilized as a driver of incentives in the decision‐making process of corporate governance.Design/methodology/approachThe existing theories in corporate governance are compared to understand the incentives offered to executives. Based on the analysis of the theories presented here, an incentive framework is proposed for corporate executives by utilizing the contributions of information technology.FindingsIt is found that find that the stakeholder perspective promotes a value‐laden approach to corporate governance as opposed to other views that are unilateral. The study posits tapping in to the values and beliefs of corporate executives to produce viable and lasting results as opposed to monetary incentives. Information technology is proposed as an “enabler” in empowering executives towards promoting a stakeholder perspectivePractical implicationsThe paper's recommendations can be used by researchers, executives and board members to enhance corporate governance through information technology.Originality/valueThe originality of the work presented here is in analyzing the affordances of information technology to enhance decision‐making in corporate governance. Information technology is proposed as an “enabler” in empowering executives and board members towards promoting a stakeholder perspective.</jats:sec

    Open Educational Resources: Teaching Practice and Lessons learned

    No full text
    Our study focuses on discussing teaching practices, challenges and lessons learned from the implementation of an open textbook initiative in an introduction to database course at Georgia Gwinnett College (GGC). The study was made possible through the affordable learning Georgia (ALG) grant awarded in spring 2019. Our study will share specific classroom activities developed and resources utilized to offer the course using open educational resources (OER). Our approach focuses on integrating active learning approaches based on constructivist learning theory. The no textbook nature of the course provided flexibility in implementing classroom activities to build career awareness and team building skills among students. Our study will highlight results of feedback received from students in reference to use of open educational resources in the course

    ITEC 3200: Introduction to Databases

    No full text
    This adoption of BCcampus Database Design 2nd Edition was made possible through a Round 13 Textbook Transformation Grant. The linked syllabus and final report are available to download in order to provide instructors with a blueprint for this adoption, including the structure, the process, the outcomes, and lessons learned.https://oer.galileo.usg.edu/compsci-collections/1039/thumbnail.jp

    The Role of Conflict Resolution in Designing and Implementing Information Security Policies: An Institutional Perspective

    Get PDF
    This paper examines the suitability of institutional theory in explaining the design and implementation ofinformation security policies in organizations. We conduct a case study in a large governmental organization in theUnited States. We capture multiple perspectives among the different groups in the organization and examine howthis affects the design and implementation of security policies. We find a high interdependence between theinformation security group and other groups in the organization resulting in task and process conflicts. Theseconflicts had both positive and negative outcomes. A combination of dominating and compromising conflictmanagement styles are shown to produce positive results in resolving the conflicts. Our study highlights theimportance for managers to balance security and usability and to ensure that the stringency of security policies donot override the business objectives of the organization
    corecore