Jorja Wright | University of charleston (original) (raw)
Academic Contributions by Jorja Wright
In proceeding of: 6th International Conference of Education, Research and Innovation,, Nov 2013
Open source software (OSS) in academia can have multiple types of implementations and positive re... more Open source software (OSS) in academia can have multiple types of implementations and positive returns. This paper explores the use of OSS as a method to teach entrepreneurship concepts and practices to Science, Technology, Engineering, and Mathematics (STEM) majors. OSS allows for individuals to contribute and provide support services for applications. This will allow students to gain expertise in low level design, software project management, and software consulting services in order to successfully deploy their own spin off company. Covered in this submission will be examples of how the Linux software project development groups, mobile application development, video game design, and support services can be used in the classroom. These examples will serve as the base for any additions or changes in curriculum development, and design to aid institutions in deploying innovative programs in technology entrepreneurship to STEM students.
INTED2013 Proceedings, Mar 2013
This paper represents the evaluation and integration of Open Source Software (OSS) technologies t... more This paper represents the evaluation and integration of Open Source Software (OSS) technologies to enhance the learning of engineers and scientists within the university. The utilization of OSS is essential as costs around the world continue to rise for education, institutions must become innovative in the ways they teach and grow Science, Technology, Engineering, & Mathematics (STEM) majors. To do this effectively professors and administrative staff should push toward the utilization of OSS and other available tools to enhance or supplement currently available tools with minimal integration costs. The OSS applications would allow students the ability to learn critical technological skills for success at small fraction of the cost. OSS also provides faculty members the ability to have students dissect source code, analyze network traffic, create virtual instances of real Operating Systems (OSs), and prepare students for low level software development. It is critical that all institutions look at alternatives in providing training and delivering educational material regardless of limitations going forward as the world continues to be more global due to the increased use of technologies everywhere. Through reviewing the available technology, possible implementations of these technologies, and the application of these items in industry could provide a starting point in integrating these tools into academia. When administrators or faculty debate the possibilities of OSS, gaming, and simulation tools this applied research provides a guide for changing the ability to develop future scientists and engineers that will be competitive on a global level in STEM fields.
INTED2013 Proceedings, Mar 2013
This paper examines the significance of integrating Information Technology (IT) into the inner ci... more This paper examines the significance of integrating Information Technology (IT) into the inner city K - 12 educational curriculum. Educational curriculum reform is eminent due to the major breakthroughs in technology, including mobile internet, digital textbooks, and cloud computation. Currently, some educational systems are starting to utilize IT. Examples of this are seen with: Technology- based educational reform efforts such as Huntsville City Schools Laptop Initiative and Geospatial Information Technology (GIT); Software-focused initiatives such as Apple Textbook Initiative and Barnes and Noble e-book editions for Nook; finally, structured/standardized professional development workshops or courses such as the Library of Congress Teaching with Primary Sources Program for K – 12 educators. However, a consensus must be reached on how to properly integrate IT into the K – 12 curriculums. Educators’ ideologies differ when considering various avenues for IT integration. Furthermore, there are several barriers that inhibit the effectiveness of incorporating IT into the national educational system, such as: teacher-level, school-level and system-level. Some studies recommend a Technology, Pedagogy, and Content Knowledge (TPACK) framework as a solution to effectively incorporate technology into the curriculum. Lastly, information technology integration is a multi-faceted issue that requires the expertise of various educators, scientists and professionals. A seamless transition from traditional educational approaches to contemporary digital methodologies requires careful planning and proper training to ensure that students benefit from this new approach to education. The result of the research is to increase the numbers of minorities in the Science, Technology, Engineers, & Mathematics (STEM) fields by injecting IT into the K – 12 curriculum in inner city schools.
Journal of Information Systems Technology and Planning, 2012
"Smartphones are becoming a vehicle to provide an efficient and convenient way to access, find an... more "Smartphones are becoming a vehicle to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of smartphones do not have pre-installed security software. This lack in security is an opportunity for malicious cyber attackers to hack into the various devices that are popular (i.e. Android, iPhone and Blackberry). Traditional security software found in personal computers (PCs), such as firewalls, antivirus, and encryption, is not currently available in smartphones. Moreover, smartphones are even more
vulnerable than personal computers because more people are using smartphones to do personal tasks. Nowadays, smartphone users can email, use social networking applications (Facebook and Twitter), buy and download various applications and shop. Furthermore, users can now conduct monetary transactions, such as buying goods, redeeming coupons and tickets, banking and processing point-of-sale payments. Monetary transactions are especially attractive to cyber attackers because they can gain access to bank account information after
hacking a user’s smartphone. Lastly, smartphones are small and are easy to carry anywhere. Unfortunately, the convenience of using smartphones to do personal task is the loophole cyber attackers need to gain access to personal data. Thus, this paper examines the importance of developing a national security policy created for mobile devices in order to protect sensitive,personal data."
Handbook of Research on Education and Technology in a Changing Society, 2014
This chapter examines the use of Open Source Software (OSS) technologies that can be used to impr... more This chapter examines the use of Open Source Software (OSS) technologies that can be used to improve the learning of Science, Technology, Engineering, and Mathematics (STEM). Explored are the various methods that can be utilized to improve the percentage of STEM majors in the American educational system with resources such as: Open Source as Alternative (OSALT), virtualization, cloud computing, Linux distributions, open source programming, and open source hardware platforms. Increasing the amount of students that pursue STEM majors is important because the projected job growth in the STEM field compared to non-STEM jobs is 33%. OSALT provides cost-effective alternatives to commercial products such as Microsoft Office Suite and Adobe Photoshop. Second, creating Virtual Machines (VMs) is another avenue to teach complex concepts in computer science, engineering, and Information Technology (IT). Third, cloud computing is an inexpensive way for clients to access information from multiple locations and devices. Fourth, universities can use the Operating System (OS) Linux and its various distributions as replacements for commercial operating systems like Windows in order to reduce IT costs. Lastly, open source programming languages like Python and their associated Integrated Development Environments (IDEs) provide comprehensive facilities for software engineers for application development or testing.
Mobile devices are becoming a method to provide an efficient and convenient way to access, find a... more Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, antivirus, and encryption, is widely used by the general public in mobile devices. Moreover, mobile devices are even more vulnerable than personal desktop computers because more people are using mobile devices to do personal tasks. This review attempts to display the importance of developing a national security policy created for mobile devices in order to protect sensitive and confidential data.
Open Source Technology: Concepts, Methodologies, Tools, and Applications, 2015
This chapter examines the use of Open Source Software (OSS) technologies that can be used to impr... more This chapter examines the use of Open Source Software (OSS) technologies that can be used to improve the learning of Science, Technology, Engineering, and Mathematics (STEM). Explored are the various methods that can be utilized to improve the percentage of STEM majors in the American educational system with resources such as: Open Source as Alternative (OSALT), virtualization, cloud computing, Linux distributions, open source programming, and open source hardware platforms. Increasing the amount of students that pursue STEM majors is important because the projected job growth in the STEM field compared to non-STEM jobs is 33%. OSALT provides cost-effective alternatives to commercial products such as Microsoft Office Suite and Adobe Photoshop. Second, creating Virtual Machines (VMs) is another avenue to teach complex concepts in computer science, engineering, and Information Technology (IT). Third, cloud computing is an inexpensive way for clients to access information from multiple locations and devices. Fourth, universities can use the Operating System (OS) Linux and its various distributions as replacements for commercial operating systems like Windows in order to reduce IT costs. Lastly, open source programming languages like Python and their associated Integrated Development Environments (IDEs) provide comprehensive facilities for software engineers for application development or testing.
Papers by Jorja Wright
Health Economics and Management Review, Dec 30, 2023
Advances in information security, privacy, and ethics book series, Mar 27, 2023
International journal of smart education and urban society, Oct 6, 2022
Commonly referenced as corporate citizenship or sustainability, the initial idea of corporate soc... more Commonly referenced as corporate citizenship or sustainability, the initial idea of corporate social responsibility (CSR) matured from the 1987 seminal Brundtland Report, which the United Nations is credited for spearheading. The steady progression of CSR highlights the need for organizations to coordinate the fulfillment of legal, philanthropic, moral, and financial obligations to ensure appropriate strategies toward sustainability initiatives and positive behaviors toward environments, the population, and monetary gain. The purpose of this paper is to analyze the causation by which organizations adapt green organizational cultures. Some findings suggest organizational cultures are forced to adopt new philosophies in a changing environment governed by corporate sustainability efforts. These green conceptual models transform human resources (HR) role in changing and creating organizational cultures that influence organizational strategies in ways that support sustainability and influence the organizational impact concerning climate change.
IGI Global eBooks, Feb 18, 2022
Since the onset of COVID-19, food insecurity and access to healthy food have become significant p... more Since the onset of COVID-19, food insecurity and access to healthy food have become significant public health problems. Inequalities in dietary behaviors have been unambiguously correlated to the food environment, including access to healthy and fresh foods. The Coronavirus Disease, also known as the COVID-19 pandemic, has led to significant fluctuations in the distribution, sale, purchase, preparation, and food consumption in the United States (U.S.). In addition, in the United States (U.S.), substantial socioeconomic and racial disparities exist in dietary behaviors. Limited access to fresh food, coupled with a greater prevalence of fast-food outlets in lower-income and minority neighborhoods, is partially responsible for sub-optimal eating patterns among residents. The purpose of this research is to highlight the factors and influences concerning childhood obesity, food education, community gardening, and healthy eating.
ABSTRACT Smartphones are becoming a vehicle to provide an efficient and convenient way to access,... more ABSTRACT Smartphones are becoming a vehicle to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of smartphones do not have pre-installed security software. This lack in security is an opportunity for malicious cyber attackers to hack into the various devices that are popular (i.e. Android, iPhone and Blackberry). Traditional security software found in personal computers (PCs), such as firewalls, antivirus, and encryption, is not currently available in smartphones. Moreover, smartphones are even more vulnerable than personal computers because more people are using smartphones to do personal tasks. Nowadays, smartphone users can email, use social networking applications (Facebook and Twitter), buy and download various applications and shop. Furthermore, users can now conduct monetary transactions, such as buying goods, redeeming coupons and tickets, banking and processing point-of-sale payments. Monetary transactions are especially attractive to cyber attackers because they can gain access to bank account information after hacking a user’s smartphone. Lastly, smartphones are small and are easy to carry anywhere. Unfortunately, the convenience of using smartphones to do personal task is the loophole cyber attackers need to gain access to personal data. Thus, this paper examines the importance of developing a national security policy created for mobile devices in order to protect sensitive, personal data
Advances in information security, privacy, and ethics book series, May 26, 2023
Advances in information security, privacy, and ethics book series, May 26, 2023
This study examines the nature of professionals being insider threats to their own organization, ... more This study examines the nature of professionals being insider threats to their own organization, as well as the general increase in harder-to-detect threats coming from an ever-widening acceptance of thirdparty insiders by organizations that rely on them, such as those in the fields of biomedical sciences, synthetic biology, artificial intelligence, and food production engineering. The current and emerging literature on how individuals are motivated to engage in problematic workplace behaviors as a means of gaining their specific goal or need is examined in this chapter. Following that, the chapter articulates malicious cybersecurity and cyberbiosecurity insider threat indicators and then provides best practices for reducing the risk of these threats in organizations involved in food production engineering, synthetic biology, and artificial intelligence.
International Journal of Smart Education and Urban Society
Commonly referenced as corporate citizenship or sustainability, the initial idea of corporate soc... more Commonly referenced as corporate citizenship or sustainability, the initial idea of corporate social responsibility (CSR) matured from the 1987 seminal Brundtland Report, which the United Nations is credited for spearheading. The steady progression of CSR highlights the need for organizations to coordinate the fulfillment of legal, philanthropic, moral, and financial obligations to ensure appropriate strategies toward sustainability initiatives and positive behaviors toward environments, the population, and monetary gain. The purpose of this paper is to analyze the causation by which organizations adapt green organizational cultures. Some findings suggest organizational cultures are forced to adopt new philosophies in a changing environment governed by corporate sustainability efforts. These green conceptual models transform human resources (HR) role in changing and creating organizational cultures that influence organizational strategies in ways that support sustainability and infl...
International Journal of Public and Private Perspectives on Healthcare, Culture, and the Environment
This analysis takes a deep dive into how a U.S. hospital, at risk of losing millions of dollars f... more This analysis takes a deep dive into how a U.S. hospital, at risk of losing millions of dollars from a contract because of unfair hiring practices and discriminatory promotion practices among racial minorities. The hospital is also facing a class-action nursing discrimination lawsuit. The employee perception is that the organization is biased against African American, Native American, and Latino nurses with hiring, promotions, bonuses, training opportunities, and management job opportunities. These groups have representation numbers in their nursing workforce of less than 5 percent. The focus of the study is an exploration of the consequential impact of a non-diverse and inclusive workplace. An action research approach used included fact-finding interviews, barrier analysis, company policy assessments, content analysis of the problem in the literature, and recommendations based on the amalgamation of the triangulated data.
International Journal of Health Systems and Translational Medicine
Healthcare systems in the United States have discovered the massive potential for digital technol... more Healthcare systems in the United States have discovered the massive potential for digital technology to enhance clinical outcomes and change care delivery (Coventry & Branley, 2018). Technologies range from telemedicine technology providing care remotely, storing electronic health records (EHRs), and devices that deliver medication or monitor health (Coventry & Branley, 2018). There has been a 300% increase in cyberattacks in the healthcare industry (Janofsky, 2019). The increasing cost and threat to cybersecurity, especially amid a global pandemic, highlights organizations' immediate need to utilize system thinking to prevent continuous loss. This research discussion aims to use the literature's contextual review to examine healthcare cybersecurity organizational behavior through systems thinking lens to explore a holistic managerial thinking to better manage healthcare cybersecurity.
International Journal of Applied Management Sciences and Engineering
Women represent 50% of workers in the United States but only 28% of the employees at 51 of the to... more Women represent 50% of workers in the United States but only 28% of the employees at 51 of the top U.S. engineering and technology organizations. Engineering and technology firms have experienced significant challenges in creating more women-friendly cultures. According to Women Who Tech’s most recent survey, 75% of female employees have experienced offensive jokes, 54% experienced unwelcome physical contact, 51% had sexually-oriented comments directed at them, and 35% were propositioned for sex. The purpose of this project is to investigate the consequential impact of organizational dynamics bias and discrimination against women TECH 2022, which is a healthcare information technology and biotechnology consulting firm via a management consulting organizational development (OD) framework case study analysis.
In proceeding of: 6th International Conference of Education, Research and Innovation,, Nov 2013
Open source software (OSS) in academia can have multiple types of implementations and positive re... more Open source software (OSS) in academia can have multiple types of implementations and positive returns. This paper explores the use of OSS as a method to teach entrepreneurship concepts and practices to Science, Technology, Engineering, and Mathematics (STEM) majors. OSS allows for individuals to contribute and provide support services for applications. This will allow students to gain expertise in low level design, software project management, and software consulting services in order to successfully deploy their own spin off company. Covered in this submission will be examples of how the Linux software project development groups, mobile application development, video game design, and support services can be used in the classroom. These examples will serve as the base for any additions or changes in curriculum development, and design to aid institutions in deploying innovative programs in technology entrepreneurship to STEM students.
INTED2013 Proceedings, Mar 2013
This paper represents the evaluation and integration of Open Source Software (OSS) technologies t... more This paper represents the evaluation and integration of Open Source Software (OSS) technologies to enhance the learning of engineers and scientists within the university. The utilization of OSS is essential as costs around the world continue to rise for education, institutions must become innovative in the ways they teach and grow Science, Technology, Engineering, & Mathematics (STEM) majors. To do this effectively professors and administrative staff should push toward the utilization of OSS and other available tools to enhance or supplement currently available tools with minimal integration costs. The OSS applications would allow students the ability to learn critical technological skills for success at small fraction of the cost. OSS also provides faculty members the ability to have students dissect source code, analyze network traffic, create virtual instances of real Operating Systems (OSs), and prepare students for low level software development. It is critical that all institutions look at alternatives in providing training and delivering educational material regardless of limitations going forward as the world continues to be more global due to the increased use of technologies everywhere. Through reviewing the available technology, possible implementations of these technologies, and the application of these items in industry could provide a starting point in integrating these tools into academia. When administrators or faculty debate the possibilities of OSS, gaming, and simulation tools this applied research provides a guide for changing the ability to develop future scientists and engineers that will be competitive on a global level in STEM fields.
INTED2013 Proceedings, Mar 2013
This paper examines the significance of integrating Information Technology (IT) into the inner ci... more This paper examines the significance of integrating Information Technology (IT) into the inner city K - 12 educational curriculum. Educational curriculum reform is eminent due to the major breakthroughs in technology, including mobile internet, digital textbooks, and cloud computation. Currently, some educational systems are starting to utilize IT. Examples of this are seen with: Technology- based educational reform efforts such as Huntsville City Schools Laptop Initiative and Geospatial Information Technology (GIT); Software-focused initiatives such as Apple Textbook Initiative and Barnes and Noble e-book editions for Nook; finally, structured/standardized professional development workshops or courses such as the Library of Congress Teaching with Primary Sources Program for K – 12 educators. However, a consensus must be reached on how to properly integrate IT into the K – 12 curriculums. Educators’ ideologies differ when considering various avenues for IT integration. Furthermore, there are several barriers that inhibit the effectiveness of incorporating IT into the national educational system, such as: teacher-level, school-level and system-level. Some studies recommend a Technology, Pedagogy, and Content Knowledge (TPACK) framework as a solution to effectively incorporate technology into the curriculum. Lastly, information technology integration is a multi-faceted issue that requires the expertise of various educators, scientists and professionals. A seamless transition from traditional educational approaches to contemporary digital methodologies requires careful planning and proper training to ensure that students benefit from this new approach to education. The result of the research is to increase the numbers of minorities in the Science, Technology, Engineers, & Mathematics (STEM) fields by injecting IT into the K – 12 curriculum in inner city schools.
Journal of Information Systems Technology and Planning, 2012
"Smartphones are becoming a vehicle to provide an efficient and convenient way to access, find an... more "Smartphones are becoming a vehicle to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of smartphones do not have pre-installed security software. This lack in security is an opportunity for malicious cyber attackers to hack into the various devices that are popular (i.e. Android, iPhone and Blackberry). Traditional security software found in personal computers (PCs), such as firewalls, antivirus, and encryption, is not currently available in smartphones. Moreover, smartphones are even more
vulnerable than personal computers because more people are using smartphones to do personal tasks. Nowadays, smartphone users can email, use social networking applications (Facebook and Twitter), buy and download various applications and shop. Furthermore, users can now conduct monetary transactions, such as buying goods, redeeming coupons and tickets, banking and processing point-of-sale payments. Monetary transactions are especially attractive to cyber attackers because they can gain access to bank account information after
hacking a user’s smartphone. Lastly, smartphones are small and are easy to carry anywhere. Unfortunately, the convenience of using smartphones to do personal task is the loophole cyber attackers need to gain access to personal data. Thus, this paper examines the importance of developing a national security policy created for mobile devices in order to protect sensitive,personal data."
Handbook of Research on Education and Technology in a Changing Society, 2014
This chapter examines the use of Open Source Software (OSS) technologies that can be used to impr... more This chapter examines the use of Open Source Software (OSS) technologies that can be used to improve the learning of Science, Technology, Engineering, and Mathematics (STEM). Explored are the various methods that can be utilized to improve the percentage of STEM majors in the American educational system with resources such as: Open Source as Alternative (OSALT), virtualization, cloud computing, Linux distributions, open source programming, and open source hardware platforms. Increasing the amount of students that pursue STEM majors is important because the projected job growth in the STEM field compared to non-STEM jobs is 33%. OSALT provides cost-effective alternatives to commercial products such as Microsoft Office Suite and Adobe Photoshop. Second, creating Virtual Machines (VMs) is another avenue to teach complex concepts in computer science, engineering, and Information Technology (IT). Third, cloud computing is an inexpensive way for clients to access information from multiple locations and devices. Fourth, universities can use the Operating System (OS) Linux and its various distributions as replacements for commercial operating systems like Windows in order to reduce IT costs. Lastly, open source programming languages like Python and their associated Integrated Development Environments (IDEs) provide comprehensive facilities for software engineers for application development or testing.
Mobile devices are becoming a method to provide an efficient and convenient way to access, find a... more Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, antivirus, and encryption, is widely used by the general public in mobile devices. Moreover, mobile devices are even more vulnerable than personal desktop computers because more people are using mobile devices to do personal tasks. This review attempts to display the importance of developing a national security policy created for mobile devices in order to protect sensitive and confidential data.
Open Source Technology: Concepts, Methodologies, Tools, and Applications, 2015
This chapter examines the use of Open Source Software (OSS) technologies that can be used to impr... more This chapter examines the use of Open Source Software (OSS) technologies that can be used to improve the learning of Science, Technology, Engineering, and Mathematics (STEM). Explored are the various methods that can be utilized to improve the percentage of STEM majors in the American educational system with resources such as: Open Source as Alternative (OSALT), virtualization, cloud computing, Linux distributions, open source programming, and open source hardware platforms. Increasing the amount of students that pursue STEM majors is important because the projected job growth in the STEM field compared to non-STEM jobs is 33%. OSALT provides cost-effective alternatives to commercial products such as Microsoft Office Suite and Adobe Photoshop. Second, creating Virtual Machines (VMs) is another avenue to teach complex concepts in computer science, engineering, and Information Technology (IT). Third, cloud computing is an inexpensive way for clients to access information from multiple locations and devices. Fourth, universities can use the Operating System (OS) Linux and its various distributions as replacements for commercial operating systems like Windows in order to reduce IT costs. Lastly, open source programming languages like Python and their associated Integrated Development Environments (IDEs) provide comprehensive facilities for software engineers for application development or testing.
Health Economics and Management Review, Dec 30, 2023
Advances in information security, privacy, and ethics book series, Mar 27, 2023
International journal of smart education and urban society, Oct 6, 2022
Commonly referenced as corporate citizenship or sustainability, the initial idea of corporate soc... more Commonly referenced as corporate citizenship or sustainability, the initial idea of corporate social responsibility (CSR) matured from the 1987 seminal Brundtland Report, which the United Nations is credited for spearheading. The steady progression of CSR highlights the need for organizations to coordinate the fulfillment of legal, philanthropic, moral, and financial obligations to ensure appropriate strategies toward sustainability initiatives and positive behaviors toward environments, the population, and monetary gain. The purpose of this paper is to analyze the causation by which organizations adapt green organizational cultures. Some findings suggest organizational cultures are forced to adopt new philosophies in a changing environment governed by corporate sustainability efforts. These green conceptual models transform human resources (HR) role in changing and creating organizational cultures that influence organizational strategies in ways that support sustainability and influence the organizational impact concerning climate change.
IGI Global eBooks, Feb 18, 2022
Since the onset of COVID-19, food insecurity and access to healthy food have become significant p... more Since the onset of COVID-19, food insecurity and access to healthy food have become significant public health problems. Inequalities in dietary behaviors have been unambiguously correlated to the food environment, including access to healthy and fresh foods. The Coronavirus Disease, also known as the COVID-19 pandemic, has led to significant fluctuations in the distribution, sale, purchase, preparation, and food consumption in the United States (U.S.). In addition, in the United States (U.S.), substantial socioeconomic and racial disparities exist in dietary behaviors. Limited access to fresh food, coupled with a greater prevalence of fast-food outlets in lower-income and minority neighborhoods, is partially responsible for sub-optimal eating patterns among residents. The purpose of this research is to highlight the factors and influences concerning childhood obesity, food education, community gardening, and healthy eating.
ABSTRACT Smartphones are becoming a vehicle to provide an efficient and convenient way to access,... more ABSTRACT Smartphones are becoming a vehicle to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of smartphones do not have pre-installed security software. This lack in security is an opportunity for malicious cyber attackers to hack into the various devices that are popular (i.e. Android, iPhone and Blackberry). Traditional security software found in personal computers (PCs), such as firewalls, antivirus, and encryption, is not currently available in smartphones. Moreover, smartphones are even more vulnerable than personal computers because more people are using smartphones to do personal tasks. Nowadays, smartphone users can email, use social networking applications (Facebook and Twitter), buy and download various applications and shop. Furthermore, users can now conduct monetary transactions, such as buying goods, redeeming coupons and tickets, banking and processing point-of-sale payments. Monetary transactions are especially attractive to cyber attackers because they can gain access to bank account information after hacking a user’s smartphone. Lastly, smartphones are small and are easy to carry anywhere. Unfortunately, the convenience of using smartphones to do personal task is the loophole cyber attackers need to gain access to personal data. Thus, this paper examines the importance of developing a national security policy created for mobile devices in order to protect sensitive, personal data
Advances in information security, privacy, and ethics book series, May 26, 2023
Advances in information security, privacy, and ethics book series, May 26, 2023
This study examines the nature of professionals being insider threats to their own organization, ... more This study examines the nature of professionals being insider threats to their own organization, as well as the general increase in harder-to-detect threats coming from an ever-widening acceptance of thirdparty insiders by organizations that rely on them, such as those in the fields of biomedical sciences, synthetic biology, artificial intelligence, and food production engineering. The current and emerging literature on how individuals are motivated to engage in problematic workplace behaviors as a means of gaining their specific goal or need is examined in this chapter. Following that, the chapter articulates malicious cybersecurity and cyberbiosecurity insider threat indicators and then provides best practices for reducing the risk of these threats in organizations involved in food production engineering, synthetic biology, and artificial intelligence.
International Journal of Smart Education and Urban Society
Commonly referenced as corporate citizenship or sustainability, the initial idea of corporate soc... more Commonly referenced as corporate citizenship or sustainability, the initial idea of corporate social responsibility (CSR) matured from the 1987 seminal Brundtland Report, which the United Nations is credited for spearheading. The steady progression of CSR highlights the need for organizations to coordinate the fulfillment of legal, philanthropic, moral, and financial obligations to ensure appropriate strategies toward sustainability initiatives and positive behaviors toward environments, the population, and monetary gain. The purpose of this paper is to analyze the causation by which organizations adapt green organizational cultures. Some findings suggest organizational cultures are forced to adopt new philosophies in a changing environment governed by corporate sustainability efforts. These green conceptual models transform human resources (HR) role in changing and creating organizational cultures that influence organizational strategies in ways that support sustainability and infl...
International Journal of Public and Private Perspectives on Healthcare, Culture, and the Environment
This analysis takes a deep dive into how a U.S. hospital, at risk of losing millions of dollars f... more This analysis takes a deep dive into how a U.S. hospital, at risk of losing millions of dollars from a contract because of unfair hiring practices and discriminatory promotion practices among racial minorities. The hospital is also facing a class-action nursing discrimination lawsuit. The employee perception is that the organization is biased against African American, Native American, and Latino nurses with hiring, promotions, bonuses, training opportunities, and management job opportunities. These groups have representation numbers in their nursing workforce of less than 5 percent. The focus of the study is an exploration of the consequential impact of a non-diverse and inclusive workplace. An action research approach used included fact-finding interviews, barrier analysis, company policy assessments, content analysis of the problem in the literature, and recommendations based on the amalgamation of the triangulated data.
International Journal of Health Systems and Translational Medicine
Healthcare systems in the United States have discovered the massive potential for digital technol... more Healthcare systems in the United States have discovered the massive potential for digital technology to enhance clinical outcomes and change care delivery (Coventry & Branley, 2018). Technologies range from telemedicine technology providing care remotely, storing electronic health records (EHRs), and devices that deliver medication or monitor health (Coventry & Branley, 2018). There has been a 300% increase in cyberattacks in the healthcare industry (Janofsky, 2019). The increasing cost and threat to cybersecurity, especially amid a global pandemic, highlights organizations' immediate need to utilize system thinking to prevent continuous loss. This research discussion aims to use the literature's contextual review to examine healthcare cybersecurity organizational behavior through systems thinking lens to explore a holistic managerial thinking to better manage healthcare cybersecurity.
International Journal of Applied Management Sciences and Engineering
Women represent 50% of workers in the United States but only 28% of the employees at 51 of the to... more Women represent 50% of workers in the United States but only 28% of the employees at 51 of the top U.S. engineering and technology organizations. Engineering and technology firms have experienced significant challenges in creating more women-friendly cultures. According to Women Who Tech’s most recent survey, 75% of female employees have experienced offensive jokes, 54% experienced unwelcome physical contact, 51% had sexually-oriented comments directed at them, and 35% were propositioned for sex. The purpose of this project is to investigate the consequential impact of organizational dynamics bias and discrimination against women TECH 2022, which is a healthcare information technology and biotechnology consulting firm via a management consulting organizational development (OD) framework case study analysis.
International Journal of Smart Education and Urban Society
According to the US Centers for Disease Control, Health disparities are preventable differences i... more According to the US Centers for Disease Control, Health disparities are preventable differences in the burden of disease, injury, violence, or opportunities to achieve optimal health experienced by socially disadvantaged populations and minority communities. COVID-19 has had a disproportionate impact on communities of color. Since 2020, communities of color in the US have experienced tremendous uncertainty, fear, and anger concerning trustworthy information about the origins, treatments, and prevention methods regarding COVID-19. This paper explores diversity and inclusion and its connection to health disparities through the kaleidoscope of COVID-19 and through the use of health theories and education solutions developed from the literature.
Advances in Public Policy and Administration
The increasing complexity of the United States healthcare system has compounded the likelihood of... more The increasing complexity of the United States healthcare system has compounded the likelihood of mistakes. One of the 10 leading causes of death and disability is safety issues with patient care. Medical errors put undue hardship on the economy resulting in the loss of billions of dollars. The current COVID-19 pandemic revealed gaps in public health strategies, medical treatments, comprehensive patient safety, and human resources strategy. Implementing human resources and performance management processes that promote safety, safe decision making, and reduce medical errors is critical. Adopting methods used by high-reliability organizations (HRO) may reduce medical errors and improve patient safety. Qualitative focus groups were used to collect data around creating organizational cultures focused on safety. This research aims to improve performance by providing healthcare leaders with tools to enhance organizational culture, reduce medical errors, and improve patient safety in the a...
Advances in Public Policy and Administration
Since the onset of COVID-19, food insecurity and access to healthy food have become significant p... more Since the onset of COVID-19, food insecurity and access to healthy food have become significant public health problems. Inequalities in dietary behaviors have been unambiguously correlated to the food environment, including access to healthy and fresh foods. The Coronavirus Disease, also known as the COVID-19 pandemic, has led to significant fluctuations in the distribution, sale, purchase, preparation, and food consumption in the United States (U.S.). In addition, in the United States (U.S.), substantial socioeconomic and racial disparities exist in dietary behaviors. Limited access to fresh food, coupled with a greater prevalence of fast-food outlets in lower-income and minority neighborhoods, is partially responsible for sub-optimal eating patterns among residents. The purpose of this research is to highlight the factors and influences concerning childhood obesity, food education, community gardening, and healthy eating.
International Journal of Smart Education and Urban Society, 2022
The increasing complexity of the United States healthcare system has compounded the likelihood of... more The increasing complexity of the United States healthcare system has compounded the likelihood of mistakes. As a result, the ability to learn smart and adaptive approaches to management have never been more critical. Medical errors put undue hardship on the economy resulting in the loss of billions of dollars. The current COVID-19 pandemic revealed gaps in public health strategies, medical treatments, comprehensive patient safety, and human resources strategy. Implementing human resources and performance management processes that promote safety, safe decision making, and reduce medical errors is critical. Adopting methods used by high-reliability organizations (HRO) may reduce medical errors and improve patient safety. Qualitative focus groups were used to collect data around creating organizational cultures focused on safety. This research aims to improve performance by providing healthcare leaders ability to learn how to smartly adapt with tools to enhance organizational culture, ...
Int. J. Smart Educ. Urban Soc., 2020
US government organizations struggle to broaden an entire of government approach to recruit and k... more US government organizations struggle to broaden an entire of government approach to recruit and keep younger cybersecurity talent at a time when national security and intelligence organizations and emergency response agencies are extremely concerned that threats to federal structures and networks from cyber-attacks have never been higher for the state, local, and federal agencies. This study looks to explore innovative options for these agencies to address these employee talents and retention shortages for young information security and information technology professionals.
International Journal of Smart Education and Urban Society, 2020
The Master of Business Administration (MBA) plays a significant role in developing managers in a ... more The Master of Business Administration (MBA) plays a significant role in developing managers in a plethora of global organizations. In most circles, it is considered a degree to develop corporate managers. With the leadership failures of organizations like pharmaceutical price collusion and price increase of 539% of Perrigo Pharmaceuticals, the fake account fraud practices at Wells Fargo, sexual harassment issues at Uber, the Equifax data breach, and the video of a forcible, bloody removal of a passenger on a United Airlines in the U.S., there has been increased criticism concerning the effectiveness of current MBA programs and leadership development in general. This qualitative research study explores how the curriculum of the MBA of the future should look.
This paper represents the evaluation and integration of Open Source Software (OSS) technologies t... more This paper represents the evaluation and integration of Open Source Software (OSS) technologies to enhance the learning of engineers and scientists within the university. The utilization of OSS is essential as costs around the world continue to rise for education, institutions must become innovative in the ways they teach and grow Science, Technology, Engineering, & Mathematics (STEM) majors. To do this effectively professors and administrative staff should push toward the utilization of OSS and other available tools to enhance or supplement currently available tools with minimal integration costs. The OSS applications would allow students the ability to learn critical technological skills for success at small fraction of the cost. OSS also provides faculty members the ability to have students dissect source code, analyze network traffic, create virtual instances of real Operating Systems (OSs), and prepare students for low level software development. It is critical that all institu...