scispace - formally typeset
Search or ask a question
Author

S. E. Kruck

Bio: S. E. Kruck is an academic researcher from James Madison University. The author has contributed to research in topics: Information system & Curriculum. The author has an hindex of 7, co-authored 16 publications receiving 196 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: The rapid advance of technology has permitted the creation of vast amounts of information, both on and off the Internet, and the public is only just beginning to realize how this information, especially personal information, may be used in ways that may be acceptable.
Abstract: The rapid advance of technology has permitted the creation of vast amounts of information, both on and off the Internet. The public is only just beginning to realize how this information, especially personal information, may be used in ways that may not be acceptable. Laws across different countries are often conflicting, making it difficult to control how personal information is being used and how individual privacy is being violated. The solution to this problem lies somewhere between government, industry, and the individual. This paper discusses the current state of personal privacy in each of these three areas.

38 citations

Journal ArticleDOI
TL;DR: The findings relate to the students usage of: antivirus programs; firewalls; opening attachments; password security; and security patches; and student perceptions of computer security and its importance.
Abstract: For several decades computer security has been gaining in importance to organizations. In today's corporate computing environment with widespread information sharing over the Web, computer security has become an even more vital concern as threats to corporate computers continue to grow. The purpose of this article is to present the results of an empirical study of the security practices and perceptions of the next generation of corporate computer users–undergraduate university students. Specifically, this study surveyed students majoring in Computer Information Systems, Art, and Integrated Science and Technology. The findings relate to the students usage of: antivirus programs; firewalls; opening attachments; password security; and security patches. Student perceptions of computer security and its importance are also reported.

36 citations

Journal ArticleDOI
TL;DR: The results of this study indicate that the Spreadsheet Accuracy Theory developed three aids that significantly improve development of accurate spreadsheets.
Abstract: Electronic spreadsheets are used extensively to support financial analysis and problem solving processes; however, research has revealed that experienced professionals and students make many errors when developing spreadsheets. Practitioners recognize the importance of accuracy and have published many techniques for improving the accuracy of their spreadsheets. Their prescriptions and results of research are consistent and together these works form the basis for spreadsheet accuracy theory. Three propositions describe how the three constructs influence spreadsheet accuracy in a laboratory experiment. The results of this study indicate that the Spreadsheet Accuracy Theory developed three aids that significantly improve development of accurate spreadsheets.

32 citations

Journal ArticleDOI
TL;DR: The authors investigated the incidence of computer-related majors in accredited business schools and their names, then compared the data with that of three years ago to provide evidence that although information systems programs remain common, there is no move toward standardization of the majors' names.
Abstract: Information systems, management information systems, computer information systems, business information systems, and information technology are some of the names referring to a relatively new discipline in traditional business school offerings. Professionals and educators in this discipline want to assure that such programs continue to meet the needs of their stakeholders. As a first step in researching the trends in IS education, the authors investigated the incidence of computer-related majors in accredited business schools and their names, then compared the data with that of three years ago. The results provide evidence that although information systems programs remain common, there is no move toward standardization of the majors' names.

27 citations

Journal ArticleDOI
TL;DR: A significant difference in course taking patterns in physics, but not differences in computer access is found, and perception of technology majors is reported on.
Abstract: IT jobs continue to increase; however, the number of women pursuing a career in technology has declined. We conducted a study of incoming freshmen to examine previous course taking patterns, access to computers, interest in technology majors and reasons students opted in or out of a technology major. Males and females exhibited differences in course taking patterns. We found a significant difference in course taking patterns in physics, but not differences in computer access. We also report on perception of technology majors.

22 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: The study reveals that an individual's loyalty to a web site is closely linked to the levels of trust and directly affects the effective purchasing behavior, in terms of preference, cost and frequency of visits, and therefore, the level of profitability provided by each consumer.
Abstract: Purpose – The purpose of this paper is to analyze the effect of privacy and perceived security on the level of trust shown by the consumer in the internet. It also aims to reveal and test the close relationship between the trust in a web site and the degree of loyalty to it.Design/methodology/approach – First, there is an explanation of the main attributes of the concepts examined, with special attention being paid to the multi‐dimensional nature of the variables and the relationships between them. This is followed by an examination of the validation processes of the measuring instruments.Findings – Specifically, the study reveals that an individual's loyalty to a web site is closely linked to the levels of trust. Thus, the development of trust not only affects the intention to buy, as shown by previous researchers, but it also directly affects the effective purchasing behavior, in terms of preference, cost and frequency of visits, and therefore, the level of profitability provided by each consumer. In ad...

714 citations

01 Jan 2010
TL;DR: The IS 2010 report is the latest output from model curriculum work for Information Systems (IS) that began in the early 1970s and is grounded in the expected requirements of industry, represents the views of organizations employing the graduates, and is supported by other IS-related organizations.

541 citations

Journal ArticleDOI
TL;DR: The most recent version of the IS undergraduate model curriculum is IS 2002 (Gorgone et al., 2003) published in early 2003 as discussed by the authors, which is the most recent output from model curriculum work for Information Systems (IS) that began in the early 1970s.
Abstract: The IS 2010 report is the latest output from model curriculum work for Information Systems (IS) that began in the early 1970s. Prior to this current effort, the most recent version of the IS undergraduate model curriculum is IS 2002 (Gorgone et al., 2003), published in early 2003. IS 2002 was a relatively minor update of IS'97 (Davis et al., 1997). Both IS 2002 and IS '97 were joint efforts by ACM, AIS, and DPMA/AITP (Data Processing Management Association/ Association of Information Technology Professionals). IS'97 was preceded by DPMA'90 (Longenecker and Feinstein 1991) and ACM Curriculum Recommendations 1983 (ACM 1983) and 1973 (Couger 1973). IS 2002 has been widely accepted and it has also been the basis for accreditation of undergraduate programs of Information Systems. This report represents the combined effort of numerous individuals and reflects the interests of thousands of faculty and practitioners. It is grounded in the expected requirements of industry, represents the views of organizations employing the graduates, and is supported by other IS-related organizations.

468 citations

Journal ArticleDOI
TL;DR: The data showed that web site security and privacy, usability and reputation have a direct and significant effect on consumer trust in a financial services industry context and suggests that trust has a positive effect on consumers commitment.
Abstract: Purpose – The purpose of this research is to analyse the influence of perceived web site security and privacy, usability and reputation on consumer trust in the context of online banking. Moreover, the paper also aims to analyse the trust‐commitment relationship since commitment is a key variable for establishing successful long‐term relationships with customers.Design/methodology/approach – The paper describes the positive effects of security and privacy, usability and reputation on consumer trust in a web site in the online banking context. Besides this, it also suggests that trust has a positive effect on consumer commitment. After the validation of measurement scales, the hypotheses are contrasted through structural modelling. Finally, the paper compares the hypothesised model with a rival one in order to test the mediating role of trust.Findings – The data showed that web site security and privacy, usability and reputation have a direct and significant effect on consumer trust in a financial services...

330 citations