Mark Schmidt - Academia.edu (original) (raw)

Uploads

Papers by Mark Schmidt

Research paper thumbnail of Steganography: Forensic, Security, and Legal Issues

Journal of Digital Forensics, Security and Law, 2008

Research paper thumbnail of Videostreaming, HorizonLive, and Tablet PCs for Teaching Information Systems Courses: Revisited

Research paper thumbnail of Getting to the Root of the Problem

Journal of Internet Commerce, 2008

Research paper thumbnail of A Cross-Cultural Comparison of U.S. and Chinese Computer Security Awareness

Journal of Global Information Management, 2008

Despite the recent increased attention afforded malware by the popular press, there appears to be... more Despite the recent increased attention afforded malware by the popular press, there appears to be a dearth in user awareness and understanding of certain aspects of the security paradigm. This article presents a comparison of user awareness levels of rootkits, spyware, and viruses between U.S. and Chinese users. The results of a survey of 210 U.S. respondents and 278 Chinese respondents indicate that respondents’ awareness and knowledge of rootkits is well below that of spyware and viruses. Data analysis further reveals that there are significant differences in Chinese and U.S. user perceptions with regard to spyware and computer viruses. However, there is no difference in cross-cultural awareness with regard to rootkits. Due to the ubiquitous nature of the Internet, rootkits and other malware do not yield at transnational borders. An important step to mitigate the threats posed by malware, such as rootkits, is to raise awareness levels of users worldwide.

Research paper thumbnail of Rootkits and What we Know

International Journal of Information Security and Privacy, 2007

Respondents from eight Korean and US higher education institutions were surveyed as to their know... more Respondents from eight Korean and US higher education institutions were surveyed as to their knowledge and experience with various forms of computer malware. The surveys provide insight into knowledge of rootkits that have become coffee lounge discussion following the once secretive Sony rootkit news break in late 2005 and then the rash of accusations and acknowledgments of other rootkits that followed. The surveys provide an empirical assessment of perceptions between students in the two countries with regard to various forms of malware. The two groups are similar in many respects, but they exhibit significant differences in self-reported perceptions of rootkit familiarity. US respondents report higher levels of familiarity for all assessed malware types, including the fictional “Trilobyte” virus. A timeline-based comparison between virus and rootkit knowledge reveals that relatively little is known about rootkits today. This highlights dangers related to existing knowledge levels ...

Research paper thumbnail of An Empirical Assessment of Technology Adoption as a Choice between Alternatives

Information Resources Management Journal, 2009

Technology adoption by individuals has traditionally been regarded by information systems researc... more Technology adoption by individuals has traditionally been regarded by information systems researchers as a choice between adoption and non-adoption of a single technology. With the current diversity of technology alternatives, the adoption decision may be more accurately specified as a choice between competing alternative technologies. The research question may no longer be simply whether technology is adopted, but rather which technology is adopted. The authors illustrate this with a simplified model of choice between two competing technologies, where the second technology is an enhanced version of the first. Their theoretical model is based on Expectancy Theory (ET). Results indicate that system characteristics can be successfully captured in the Valence Model of ET, and effort expectancy in the Force Model. Future research can expand on these results by including more factors in the Valence Model, and by comparing more than two alternative technologies.

Research paper thumbnail of Wireless Network Security in Hospitality SMEs

Research paper thumbnail of Personality and IT security: An application of the five-factor model

Research paper thumbnail of IT Does Matter (At Least When It Is Properly Managed)

Research paper thumbnail of Using Streaming Technology and Tablet PCs for Teaching Information Systems

Research paper thumbnail of Tablet PCs for Teaching Information Systems Courses

Research paper thumbnail of Managing the diffusion of organizational learning behavior

Information Systems Frontiers, 2009

Research paper thumbnail of Invited Panel Session: Current Status and Issues in Chinese Wireless/Mobile Communications and Virtual Networks

Research paper thumbnail of Steganography: Forensic, Security, and Legal Issues

Journal of Digital Forensics, Security and Law, 2008

Research paper thumbnail of Videostreaming, HorizonLive, and Tablet PCs for Teaching Information Systems Courses: Revisited

Research paper thumbnail of Getting to the Root of the Problem

Journal of Internet Commerce, 2008

Research paper thumbnail of A Cross-Cultural Comparison of U.S. and Chinese Computer Security Awareness

Journal of Global Information Management, 2008

Despite the recent increased attention afforded malware by the popular press, there appears to be... more Despite the recent increased attention afforded malware by the popular press, there appears to be a dearth in user awareness and understanding of certain aspects of the security paradigm. This article presents a comparison of user awareness levels of rootkits, spyware, and viruses between U.S. and Chinese users. The results of a survey of 210 U.S. respondents and 278 Chinese respondents indicate that respondents’ awareness and knowledge of rootkits is well below that of spyware and viruses. Data analysis further reveals that there are significant differences in Chinese and U.S. user perceptions with regard to spyware and computer viruses. However, there is no difference in cross-cultural awareness with regard to rootkits. Due to the ubiquitous nature of the Internet, rootkits and other malware do not yield at transnational borders. An important step to mitigate the threats posed by malware, such as rootkits, is to raise awareness levels of users worldwide.

Research paper thumbnail of Rootkits and What we Know

International Journal of Information Security and Privacy, 2007

Respondents from eight Korean and US higher education institutions were surveyed as to their know... more Respondents from eight Korean and US higher education institutions were surveyed as to their knowledge and experience with various forms of computer malware. The surveys provide insight into knowledge of rootkits that have become coffee lounge discussion following the once secretive Sony rootkit news break in late 2005 and then the rash of accusations and acknowledgments of other rootkits that followed. The surveys provide an empirical assessment of perceptions between students in the two countries with regard to various forms of malware. The two groups are similar in many respects, but they exhibit significant differences in self-reported perceptions of rootkit familiarity. US respondents report higher levels of familiarity for all assessed malware types, including the fictional “Trilobyte” virus. A timeline-based comparison between virus and rootkit knowledge reveals that relatively little is known about rootkits today. This highlights dangers related to existing knowledge levels ...

Research paper thumbnail of An Empirical Assessment of Technology Adoption as a Choice between Alternatives

Information Resources Management Journal, 2009

Technology adoption by individuals has traditionally been regarded by information systems researc... more Technology adoption by individuals has traditionally been regarded by information systems researchers as a choice between adoption and non-adoption of a single technology. With the current diversity of technology alternatives, the adoption decision may be more accurately specified as a choice between competing alternative technologies. The research question may no longer be simply whether technology is adopted, but rather which technology is adopted. The authors illustrate this with a simplified model of choice between two competing technologies, where the second technology is an enhanced version of the first. Their theoretical model is based on Expectancy Theory (ET). Results indicate that system characteristics can be successfully captured in the Valence Model of ET, and effort expectancy in the Force Model. Future research can expand on these results by including more factors in the Valence Model, and by comparing more than two alternative technologies.

Research paper thumbnail of Wireless Network Security in Hospitality SMEs

Research paper thumbnail of Personality and IT security: An application of the five-factor model

Research paper thumbnail of IT Does Matter (At Least When It Is Properly Managed)

Research paper thumbnail of Using Streaming Technology and Tablet PCs for Teaching Information Systems

Research paper thumbnail of Tablet PCs for Teaching Information Systems Courses

Research paper thumbnail of Managing the diffusion of organizational learning behavior

Information Systems Frontiers, 2009

Research paper thumbnail of Invited Panel Session: Current Status and Issues in Chinese Wireless/Mobile Communications and Virtual Networks

Log In