Security Aspects of Users' Information Sharing on Social Media

This study aims to investigate college students' security awareness of using social media in sharing information. The two theories that have guided this study are the theory of planned behavior (TPB) and the technology acceptance model (TAM). Data was collected from both undergraduate and graduate students from the University of North Texas (UNT) in Denton. The total responses included 380 students from different majors with 291 valid responses for data analysis; The structural equation model (SEM) Lavaan package was used to find out the best fit of the model. A diagonally weighted least squares (DWLS) was used to model the variables as ordinal in this study's analysis as ordinal data made the model fit substantially. The study found that 6 factors: attitude (AB), subjective norm (SN), perceived behavior control (PBC), perceived usefulness (PU), perceived risks (PR), and security awareness (SA) influenced behavior intention (BI). Also, I found that AB was influenced by PR and SA, as well as SN influenced by SA. Self-efficacy (SE) influenced PBC. On the other hand, the study found that controllability (C) did not influence PBC; perhaps, an individual's skills do not interact with social media security settings. Perceived ease of use (PEOU) did not influence …
Date: May 2023
Creator: Alharbi, Mohannad Abdulltef
System: The UNT Digital Library

Study of Information Behavior of Opportunistic Insiders with Malicious Intent

Enterprises have focused on mechanisms to track insiders who may intentionally exceed and misuse their authorized access. However, there is an opportunity to understand why a trusted individual would want to exploit the trust and seek information with the intent of a malicious outcome. The detection of insider rogue or nefarious activities with information to which a user is already authorized is extremely difficult. Such insider threats require more deliberation than just considering it to be a problem that can be mitigated only by software or hardware enhancements. This research expects to help gain an early understanding of antecedents to such information behavior and provide an opportunity to develop approaches to address relevant character traits which could lead to a higher propensity of information misuse. This research proposes a theoretical framework and a conceptual research model to understand the antecedent factors to opportunistic information-seeking behavior of individuals. The study follows the three-essay format. Essay 1 explores the scholarly literature published about insider behavior to understand information behavior and proposes the theoretical framework for the study. PRISMA methodology was used for the thematic literature review. Essay 2 is a quantitative study of 424 university students surveyed using an online instrument for …
Date: May 2023
Creator: Sinha, Vikas
System: The UNT Digital Library

Transdisciplinary Information Flow and Key Challenges of Effective Knowledge Transfer between Expert and Novice

When the need arises to transmute complex and theoretical ideas into practice or communicate them to the uninitiated, there often exists a gap in the levels of understanding between the parties involved. This research examined knowledge transfer between practitioners within the information technology (IT) domain of interest by asking the following questions: what is the relationship between knowledge spaces for IT experts and novices; and what factors impact knowledge transfer among knowledge spaces for IT experts and novices? This study conducted interviews with a range of IT professionals to identify knowledge states that resulted in knowledge spaces for both experts and novice practitioners. A conceptual model was developed to examine the knowledge transfer process between expert and novice practitioners and identify factors affecting both the knowledge space and the knowledge states. The model also takes in consideration external factors such as organization and culture and organizational environment. The results from the study show that leadership and executive skillsets play a major role in characterizing the expert knowledge state. The results also show that knowledge transfer between and among groups was primarily impacted by interest and awareness factors among experts. Among novices, the largest barriers were cultural in nature (e.g., no …
Date: May 2023
Creator: Upchurch, Eric Conrad
System: The UNT Digital Library
Understanding Sociotechnical Factors Impacting Cybersecurity Controls on Mobile Devices and Smartphones at the Individual Level (open access)

Understanding Sociotechnical Factors Impacting Cybersecurity Controls on Mobile Devices and Smartphones at the Individual Level

Technological advances such as mobile technology, big data, and machine learning allow businesses to associate advertisements with consumer behaviors to maximize sales. Thus, information about consumer behavior became the central resource of businesses. Recent discussions and concerns about the emerging economic order centered around capturing consumers' data suggest that more research efforts be allocated to address new challenges in different domains, such as health, education, smart cities, and communication. Research on individual cybersecurity behavior is relatively new and requires more attention in academic research. This study has proposed and validated a cybersecurity behavioral model to enrich our understanding of users' behavioral intention (BI) to use cybersecurity controls. An online survey was used to collect information from University of North Texas (UNT) students to explore various technology usage determinants and specific computer security practices. The instrument measured the actual cybersecurity controls behaviors (ACB) by incorporating technical and social factors. Accordingly, the construct of ACB was created and validated to test how it relates to the participants' behavioral intentions. The findings confirm a large number of the proposed relationships. Additionally, the results show that the model explained a significant amount of variance in the proposed dependent variables BI and ACB. Within the …
Date: May 2023
Creator: Gadi, Abdullah Mohamed Y.
System: The UNT Digital Library