Information Studies Theses and Dissertations
Permanent URI for this collectionhttp://hdl.handle.net/1903/2780
Browse
2 results
Search Results
Item HOW DO NONPROFITS INVOLVE BENEFICIARIES IN THE DESIGN OF MISSION PROGRAMS AND SERVICES(2022) DiPasquale, Sarah; Chan, Joel; Library & Information Services; Digital Repository at the University of Maryland; University of Maryland (College Park, Md.)Human service nonprofits play an important role in communities across the United States. While existing research has studied how nonprofits engage beneficiaries in the evaluation of services, little research has been done to understand how human service nonprofits involve beneficiaries in the design of services. This research argues participatory design can be used to engage beneficiaries in program design. Through semi-structured interviews conducted with nine human service nonprofit professionals, this research sought to better understand how human service nonprofits involve beneficiaries in the design and development of service programs; and what barriers exist for human service nonprofits to do participatory design. These research findings provide a foundational understanding of how human service nonprofits use participatory design and uncover barriers to help inform the solutions necessary to increase participatory design use at human service nonprofits.Item AN EMPIRICAL ASSESSMENT OF USER ONLINE SECURITY BEHAVIOR: EVIDENCE FROM A UNIVERSITY(2016) BANDI, SRUTHI; WINTER, SUSAN J; CUKIER, MICHEL; Master in Information Management; Digital Repository at the University of Maryland; University of Maryland (College Park, Md.)The ever-increasing number and severity of cybersecurity breaches makes it vital to understand the factors that make organizations vulnerable. Since humans are considered the weakest link in the cybersecurity chain of an organization, this study evaluates users’ individual differences (demographic factors, risk-taking preferences, decision-making styles and personality traits) to understand online security behavior. This thesis studies four different yet tightly related online security behaviors that influence organizational cybersecurity: device securement, password generation, proactive awareness and updating. A survey (N=369) of students, faculty and staff in a large mid-Atlantic U.S. public university identifies individual characteristics that relate to online security behavior and characterizes the higher-risk individuals that pose threats to the university’s cybersecurity. Based on these findings and insights from interviews with phishing victims, the study concludes with recommendations to help similat organizations increase end-user cybersecurity compliance and mitigate the risks caused by humans in the organizational cybersecurity chain.