Kregg Aytes

Learn More
Despite rapid technological advances in computer hardware and software, insecure behavior by individual computer users continues to be a significant source of direct cost and productivity loss. Why do individuals, many of whom are aware of the possible grave consequences of low-level insecure behaviors such as failure to backup work and disclosing(More)
Computer security issues have typically been approached from the perspective of building technical countermeasures to reduce risk. Recently, researchers have recognized that computer users play an important role in ensuring secure systems by implementing those technical countermeasures. As a means of encouraging safe computing practice, user training and(More)
Groups use procedural structures to organize their efforts in meetings. These structures are affected by group members' preferences for the degree of procedural order they want in a meeting, as well as by the communication media available in the meeting environment. Analysis of thirty partially distributed experimental groups that met over a series of four(More)
This paper describes the use the Information Orientation (IO) Maturity Model as the basis of a MBA course-based project. The IO model explicitly draws the relationship between business performance and several information and technology management concepts. More importantly, the IO Model is accompanied by a specific method of gathering and analyzing data,(More)