The social networking population continues to expand at a phenomenal pace. Nevertheless, the question of how an organization gets people to spend long periods on a particular social networking website as well as return to the website is becoming increasingly important. Is the technological sophistication of the website or the social aspect most important? This study addresses technological and social factors. The authors examine social network use by employing a survey instrument to gather data about technological factors based on the technology acceptance model and social factors collecting data on constructs representing social involvement and the sheer enjoyment of using the social networking website. Results of the study suggest that users of social networks are more apt to frequently use a site based upon social/enjoyment factors as opposed to technology-related factors.
Modern software development depends on tools and techniques to represent implied information processing logic to the human engineer, relying chiefly on effortful human reasoning to best determine critical properties of the software system. Current conceptualization, visualization and contextualization of software in development amounts to a significant under-utilization of already limited development resources directed to optimization, prevention, and addressing fundamental security properties of the software system. As a step toward increasing such utilization as a basis for a global ecosystem of secure software, this work explores and evaluates an alternative representation of software source code for the sake of secure development, manifesting universal, critical properties of the system to enhance control of security factors while the bulk of the properties of the system are being determined and the costly skills of the developer are directed to the many aspects of the task.
Twenty-four business executives and 22 security executives had previously participated in a study about information security investment. The current study asked participants to comment on their reasons for participating in that research. A total of 1003 reasons were submitted which were used to perform a content analysis of information security survey research (ISSR) participation factors. Security and business executives' reasons for participating differed. Reasons also differed by industry. The findings will help researchers to properly communicate the benefits of their studies and thus increase participation rates for ISSR. Greater participation will perhaps contribute to efforts to improve information security.
KEYWORDSInformation security survey research; information security executive; business executive; content and correspondence analysis
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.