Can the field of MIS be disciplined?
Communications of the ACM
Assessing the value of information
ICIS '89 Proceedings of the tenth international conference on Information Systems
The importance of learning style in end-user training
MIS Quarterly
Controlling prototype development through risk analysis
MIS Quarterly
Diversity in information systems action research methods
European Journal of Information Systems
Rethinking end-user training strategy: applying a hierarchical knowledge-level model
Journal of End User Computing - Special issue on end user computing: clarity, change, choice
Secrets & Lies: Digital Security in a Networked World
Secrets & Lies: Digital Security in a Networked World
Deploying and Using Public Key Technology: Lessons Learned in Real Life
IEEE Security and Privacy
A conceptual model for the process of IT innovation adoption in organizations
Journal of Engineering and Technology Management
Enterprise Systems Training Strategies: Knowledge Levels and User Understanding
Journal of Organizational and End User Computing
IS Security Policy Violations: A Rational Choice Perspective
Journal of Organizational and End User Computing
CISSP All-in-One Exam Guide
Hi-index | 0.00 |
Identification and access management I/AM is among the top security issues facing institutions of higher education. Most institutions of higher education require end users to provide usernames and passwords to gain access to personally identifiable information PII. This leaves universities vulnerable to unauthorized access and unauthorized disclosure of PII as, according to recent literature, usernames and passwords alone are insufficient for proper authentication of users into information and information systems. This study examines a critical element in the successful implementation of any information security initiative, end user training. Specifically, this study advances research in the area of end user security training by using canonical action research CAR to develop and refine an IT security training framework that can guide institutions of higher education in the implementation of USB security tokens for two-factor authentication using public key infrastructure PKI.