Now showing items 1-4 of 4
A Case Study of an Interdisciplinary Design Course for Pervasive Computing
This paper provides a case study of an interdisciplinary design project course for pervasive computing products. As a team of faculty from computer engineering, industrial design, and marketing, we have run several ...
Applying Best Supply Chain Practices to Humanitarian Relief
(Penn State, 2015-05)
With the growth in length and breadth of extended supply chains, more companies are employing risk management techniques and resilience planning to deal with burgeoning and costly supply chain disruptions. As companies can ...
The Mobile Privacy-Security Knowledge Gap Model: Understanding Behaviors
(Hawaii International Conference on System Sciences, 2017-01-04)
Increasing collection of individuals’ information has led to several security and privacy issues, such as identity theft and targeted marketing. These risks are further heightened in the mobile realm as data collection can ...
Religiosity and Information Security Policy Compliance
Information security is a top concern of managers, often addressed with technical, behavioral and procedural solutions. Information Security Policies (ISPs) are among these solutions. ISPs require organizational members ...