The purpose of this article is to identify a range of challenges and dilemmas related to academic... more The purpose of this article is to identify a range of challenges and dilemmas related to academic integrity. It provides a thorough and thoughtful discussion on different issues associated with research ethics. The objective is to create awareness for new researchers of the seriousness and consequences associated with unethical practices. Academic research is based on six ethical values (a) honesty, (b) fairness, (c) objectivity, (d) openness, (d) trustworthiness, and (e) respect for others. Thus, any violation of these values constitutes fabrication, falsification, and other questionable research practices. However, academic integrity is not limited to research protocol. It involves all academic activities within the scholarly enterprise. Academic dishonesty is a global concern, especially since intellectual property is often stolen. Thus, there is a need for a continuing discussion on academic honesty and intellectual property rights so that the climate of scholastic enterprise is...
The purpose of this article is to present an overview of the challenges of cyber threats and the ... more The purpose of this article is to present an overview of the challenges of cyber threats and the survivability of businesses. The ubiquitous and uncontrollable nature of the internet has caused the cyberspace to become a battleground for hackers and cyber warriors who exploit assets of businesses and institutions. The very technologies that empowers businesses and institutions to create, innovate, and operate also empower those that disrupt, steal, and destroy. No organization, business, institution, or industry is immune to cyber exploitation due to the sophistication of attacks. Thus, this article examined the changing nature of cyber-attacks and techniques in the context of an online marketplace and provided a taxonomy of tools and best practices that could create awareness and enhance the survivability of businesses in a highly collaborative yet insecure environment.
This paper discusses the importance of theory to research and includes a discussion of how theory... more This paper discusses the importance of theory to research and includes a discussion of how theory is conceptualized. Researchers have debated the definition of theory for many years, with many theorists using typologies and classifications systems to describe the types of theory, in the context of purpose, functions, boundaries, and goals.Theory that is driven by research is directly relevant to practice and beneficial to any field of study. The systematic nature of theory is to provide an explanation of a problem, to describe the distinguishing innovative features of a phenomenon, and to provide predictive utility. Research without theory has no foundation; likewise, theory depends on research to provide proof of the theories correctness.
In the past few years, governments and businesses have taken advantage of the exponential growth ... more In the past few years, governments and businesses have taken advantage of the exponential growth and interconnectivity within the cyberspace to expand their digital transactions, services, and operations. As government services are expanded within the cyberspace, new vulnerabilities are created, enabling cyber criminals to exploit public and private assets and infrastructure. Although Internet resources are not trustworthy, U.S. dependence on e-government continues to grow as defenses are failing and the impact of cyber-attacks has not diminished. However, exploitation of cyber targets by cyber criminals represents either money or is motivated by political grievances. This article is structured to provide insights about challenges and speculations regarding the security of Obamacare beneficiaries’ data in the cyberspace. Although the healthcare marketplace entered the cyberspace as an attractive target for political adversaries, it could not be considered an attractive target to cyb...
The purpose of this article is to identify a range of challenges and dilemmas related to academic... more The purpose of this article is to identify a range of challenges and dilemmas related to academic integrity. It provides a thorough and thoughtful discussion on different issues associated with research ethics. The objective is to create awareness for new researchers of the seriousness and consequences associated with unethical practices. Academic research is based on six ethical values (a) honesty, (b) fairness, (c) objectivity, (d) openness, (d) trustworthiness, and (e) respect for others. Thus, any violation of these values constitutes fabrication, falsification, and other questionable research practices. However, academic integrity is not limited to research protocol. It involves all academic activities within the scholarly enterprise. Academic dishonesty is a global concern, especially since intellectual property is often stolen. Thus, there is a need for a continuing discussion on academic honesty and intellectual property rights so that the climate of scholastic enterprise is...
The purpose of this article is to present an overview of the challenges of cyber threats and the ... more The purpose of this article is to present an overview of the challenges of cyber threats and the survivability of businesses. The ubiquitous and uncontrollable nature of the internet has caused the cyberspace to become a battleground for hackers and cyber warriors who exploit assets of businesses and institutions. The very technologies that empowers businesses and institutions to create, innovate, and operate also empower those that disrupt, steal, and destroy. No organization, business, institution, or industry is immune to cyber exploitation due to the sophistication of attacks. Thus, this article examined the changing nature of cyber-attacks and techniques in the context of an online marketplace and provided a taxonomy of tools and best practices that could create awareness and enhance the survivability of businesses in a highly collaborative yet insecure environment.
This paper discusses the importance of theory to research and includes a discussion of how theory... more This paper discusses the importance of theory to research and includes a discussion of how theory is conceptualized. Researchers have debated the definition of theory for many years, with many theorists using typologies and classifications systems to describe the types of theory, in the context of purpose, functions, boundaries, and goals.Theory that is driven by research is directly relevant to practice and beneficial to any field of study. The systematic nature of theory is to provide an explanation of a problem, to describe the distinguishing innovative features of a phenomenon, and to provide predictive utility. Research without theory has no foundation; likewise, theory depends on research to provide proof of the theories correctness.
In the past few years, governments and businesses have taken advantage of the exponential growth ... more In the past few years, governments and businesses have taken advantage of the exponential growth and interconnectivity within the cyberspace to expand their digital transactions, services, and operations. As government services are expanded within the cyberspace, new vulnerabilities are created, enabling cyber criminals to exploit public and private assets and infrastructure. Although Internet resources are not trustworthy, U.S. dependence on e-government continues to grow as defenses are failing and the impact of cyber-attacks has not diminished. However, exploitation of cyber targets by cyber criminals represents either money or is motivated by political grievances. This article is structured to provide insights about challenges and speculations regarding the security of Obamacare beneficiaries’ data in the cyberspace. Although the healthcare marketplace entered the cyberspace as an attractive target for political adversaries, it could not be considered an attractive target to cyb...
Uploads