id sid tid token lemma pos 10973 1 1 Information Information NNP 10973 1 2 Security Security NNP 10973 1 3 in in IN 10973 1 4 Libraries library NNS 10973 1 5 : : : 10973 1 6 Examining examine VBG 10973 1 7 the the DT 10973 1 8 Effects Effects NNPS 10973 1 9 of of IN 10973 1 10 Knowledge Knowledge NNP 10973 1 11 Transfer Transfer NNP 10973 1 12 Tonia Tonia NNP 10973 1 13 San San NNP 10973 1 14 Nicolas Nicolas NNP 10973 1 15 - - HYPH 10973 1 16 Rocca Rocca NNP 10973 1 17 and and CC 10973 1 18 Richard Richard NNP 10973 1 19 J. J. NNP 10973 1 20 Burkhard Burkhard NNP 10973 1 21 INFORMATION INFORMATION NNP 10973 1 22 TECHNOLOGY TECHNOLOGY NNP 10973 1 23 AND and CC 10973 1 24 LIBRARIES LIBRARIES NNP 10973 1 25 | | NNP 10973 1 26 JUNE JUNE NNP 10973 1 27 2019 2019 CD 10973 1 28 58 58 CD 10973 1 29 Tonia Tonia NNP 10973 1 30 San San NNP 10973 1 31 Nicolas Nicolas NNP 10973 1 32 - - HYPH 10973 1 33 Rocca Rocca NNP 10973 1 34 ( ( -LRB- 10973 1 35 tonia.sannicolas-rocca@sjsu.edu tonia.sannicolas-rocca@sjsu.edu NNP 10973 1 36 ) ) -RRB- 10973 1 37 is be VBZ 10973 1 38 Assistant Assistant NNP 10973 1 39 Professor Professor NNP 10973 1 40 in in IN 10973 1 41 the the DT 10973 1 42 School School NNP 10973 1 43 of of IN 10973 1 44 Information Information NNP 10973 1 45 at at IN 10973 1 46 San San NNP 10973 1 47 Jose Jose NNP 10973 1 48 State State NNP 10973 1 49 University University NNP 10973 1 50 . . . 10973 2 1 Richard Richard NNP 10973 2 2 J. J. NNP 10973 2 3 Burkhard Burkhard NNP 10973 2 4 ( ( -LRB- 10973 2 5 richard.burkhard@sjsu.edu richard.burkhard@sjsu.edu NN 10973 2 6 ) ) -RRB- 10973 2 7 is be VBZ 10973 2 8 Professor Professor NNP 10973 2 9 in in IN 10973 2 10 the the DT 10973 2 11 School School NNP 10973 2 12 of of IN 10973 2 13 Information Information NNP 10973 2 14 Systems Systems NNPS 10973 2 15 and and CC 10973 2 16 Technology Technology NNP 10973 2 17 in in IN 10973 2 18 the the DT 10973 2 19 College College NNP 10973 2 20 of of IN 10973 2 21 Business Business NNP 10973 2 22 at at IN 10973 2 23 San San NNP 10973 2 24 Jose Jose NNP 10973 2 25 State State NNP 10973 2 26 University University NNP 10973 2 27 . . . 10973 3 1 . . . 10973 4 1 Author author NN 10973 4 2 Three three CD 10973 4 3 ( ( -LRB- 10973 4 4 email email NN 10973 4 5 ) ) -RRB- 10973 4 6 is be VBZ 10973 4 7 Title Title NNP 10973 4 8 , , , 10973 4 9 Institution Institution NNP 10973 4 10 . . . 10973 5 1 ABSTRACT ABSTRACT NNP 10973 5 2 Libraries Libraries NNPS 10973 5 3 in in IN 10973 5 4 the the DT 10973 5 5 United United NNP 10973 5 6 States States NNP 10973 5 7 handle handle VBP 10973 5 8 sensitive sensitive JJ 10973 5 9 patron patron NN 10973 5 10 information information NN 10973 5 11 , , , 10973 5 12 including include VBG 10973 5 13 personally personally RB 10973 5 14 identifiable identifiable JJ 10973 5 15 information information NN 10973 5 16 and and CC 10973 5 17 circulation circulation NN 10973 5 18 records record NNS 10973 5 19 . . . 10973 6 1 With with IN 10973 6 2 libraries library NNS 10973 6 3 providing provide VBG 10973 6 4 services service NNS 10973 6 5 to to IN 10973 6 6 millions million NNS 10973 6 7 of of IN 10973 6 8 patrons patron NNS 10973 6 9 across across IN 10973 6 10 the the DT 10973 6 11 U.S. U.S. NNP 10973 6 12 , , , 10973 6 13 it -PRON- PRP 10973 6 14 is be VBZ 10973 6 15 important important JJ 10973 6 16 that that IN 10973 6 17 they -PRON- PRP 10973 6 18 understand understand VBP 10973 6 19 the the DT 10973 6 20 importance importance NN 10973 6 21 of of IN 10973 6 22 patron patron NN 10973 6 23 privacy privacy NN 10973 6 24 and and CC 10973 6 25 how how WRB 10973 6 26 to to TO 10973 6 27 protect protect VB 10973 6 28 it -PRON- PRP 10973 6 29 . . . 10973 7 1 This this DT 10973 7 2 study study NN 10973 7 3 investigates investigate VBZ 10973 7 4 how how WRB 10973 7 5 knowledge knowledge NN 10973 7 6 transferred transfer VBN 10973 7 7 within within IN 10973 7 8 an an DT 10973 7 9 online online JJ 10973 7 10 cybersecurity cybersecurity NN 10973 7 11 education education NN 10973 7 12 affects affect VBZ 10973 7 13 library library JJ 10973 7 14 employee employee NN 10973 7 15 information information NN 10973 7 16 security security NN 10973 7 17 practices practice NNS 10973 7 18 . . . 10973 8 1 The the DT 10973 8 2 results result NNS 10973 8 3 of of IN 10973 8 4 this this DT 10973 8 5 study study NN 10973 8 6 suggest suggest VBP 10973 8 7 that that IN 10973 8 8 knowledge knowledge NN 10973 8 9 transfer transfer NN 10973 8 10 does do VBZ 10973 8 11 have have VB 10973 8 12 a a DT 10973 8 13 positive positive JJ 10973 8 14 effect effect NN 10973 8 15 on on IN 10973 8 16 library library JJ 10973 8 17 employee employee NN 10973 8 18 information information NN 10973 8 19 security security NN 10973 8 20 and and CC 10973 8 21 risk risk NN 10973 8 22 management management NN 10973 8 23 practices practice NNS 10973 8 24 . . . 10973 9 1 INTRODUCTION introduction NN 10973 9 2 Libraries library NNS 10973 9 3 across across IN 10973 9 4 the the DT 10973 9 5 U.S. U.S. NNP 10973 9 6 provide provide VB 10973 9 7 a a DT 10973 9 8 wide wide JJ 10973 9 9 range range NN 10973 9 10 of of IN 10973 9 11 services service NNS 10973 9 12 and and CC 10973 9 13 resources resource NNS 10973 9 14 to to IN 10973 9 15 society society NN 10973 9 16 . . . 10973 10 1 Libraries library NNS 10973 10 2 of of IN 10973 10 3 all all DT 10973 10 4 types type NNS 10973 10 5 are be VBP 10973 10 6 viewed view VBN 10973 10 7 as as IN 10973 10 8 important important JJ 10973 10 9 parts part NNS 10973 10 10 of of IN 10973 10 11 their -PRON- PRP$ 10973 10 12 communities community NNS 10973 10 13 , , , 10973 10 14 offering offer VBG 10973 10 15 a a DT 10973 10 16 place place NN 10973 10 17 for for IN 10973 10 18 research research NN 10973 10 19 , , , 10973 10 20 to to TO 10973 10 21 learn learn VB 10973 10 22 about about IN 10973 10 23 technology technology NN 10973 10 24 , , , 10973 10 25 to to TO 10973 10 26 access access VB 10973 10 27 accurate accurate JJ 10973 10 28 and and CC 10973 10 29 unbiased unbiased JJ 10973 10 30 information information NN 10973 10 31 , , , 10973 10 32 and and CC 10973 10 33 a a DT 10973 10 34 place place NN 10973 10 35 that that WDT 10973 10 36 inspires inspire VBZ 10973 10 37 and and CC 10973 10 38 sparks spark VBZ 10973 10 39 creativity creativity NN 10973 10 40 . . . 10973 11 1 As as IN 10973 11 2 a a DT 10973 11 3 result result NN 10973 11 4 , , , 10973 11 5 there there EX 10973 11 6 were be VBD 10973 11 7 over over IN 10973 11 8 171 171 CD 10973 11 9 million million CD 10973 11 10 registered register VBN 10973 11 11 public public JJ 10973 11 12 library library NN 10973 11 13 users user NNS 10973 11 14 in in IN 10973 11 15 the the DT 10973 11 16 U.S. U.S. NNP 10973 11 17 in in IN 10973 11 18 2016.1 2016.1 CD 10973 11 19 A a DT 10973 11 20 library library NN 10973 11 21 is be VBZ 10973 11 22 a a DT 10973 11 23 collection collection NN 10973 11 24 of of IN 10973 11 25 information information NN 10973 11 26 resources resource NNS 10973 11 27 and and CC 10973 11 28 services service NNS 10973 11 29 made make VBN 10973 11 30 available available JJ 10973 11 31 to to IN 10973 11 32 the the DT 10973 11 33 community community NN 10973 11 34 in in IN 10973 11 35 which which WDT 10973 11 36 it -PRON- PRP 10973 11 37 serves serve VBZ 10973 11 38 . . . 10973 12 1 The the DT 10973 12 2 American American NNP 10973 12 3 Library Library NNP 10973 12 4 Association Association NNP 10973 12 5 ( ( -LRB- 10973 12 6 ALA ALA NNP 10973 12 7 ) ) -RRB- 10973 12 8 affirms affirm VBZ 10973 12 9 the the DT 10973 12 10 ethical ethical JJ 10973 12 11 imperative imperative NN 10973 12 12 to to TO 10973 12 13 provide provide VB 10973 12 14 unrestricted unrestricted JJ 10973 12 15 access access NN 10973 12 16 to to IN 10973 12 17 information information NN 10973 12 18 and and CC 10973 12 19 to to TO 10973 12 20 guard guard VB 10973 12 21 against against IN 10973 12 22 impediments impediment NNS 10973 12 23 to to TO 10973 12 24 open open VB 10973 12 25 inquiry.2 inquiry.2 NNP 10973 12 26 Further further RB 10973 12 27 , , , 10973 12 28 in in IN 10973 12 29 all all DT 10973 12 30 areas area NNS 10973 12 31 of of IN 10973 12 32 librarianship librarianship NN 10973 12 33 , , , 10973 12 34 best good JJS 10973 12 35 practice practice NN 10973 12 36 leaves leave VBZ 10973 12 37 the the DT 10973 12 38 library library NN 10973 12 39 user user NN 10973 12 40 in in IN 10973 12 41 control control NN 10973 12 42 of of IN 10973 12 43 as as RB 10973 12 44 many many JJ 10973 12 45 choices choice NNS 10973 12 46 as as IN 10973 12 47 possible.3 possible.3 CD 10973 12 48 In in IN 10973 12 49 a a DT 10973 12 50 library library NN 10973 12 51 , , , 10973 12 52 the the DT 10973 12 53 right right NN 10973 12 54 to to IN 10973 12 55 privacy privacy NN 10973 12 56 is be VBZ 10973 12 57 the the DT 10973 12 58 right right NN 10973 12 59 to to TO 10973 12 60 open open VB 10973 12 61 inquiry inquiry NN 10973 12 62 without without IN 10973 12 63 having have VBG 10973 12 64 the the DT 10973 12 65 subject subject NN 10973 12 66 of of IN 10973 12 67 one one NN 10973 12 68 ’s ’s POS 10973 12 69 interest interest NN 10973 12 70 examined examine VBD 10973 12 71 or or CC 10973 12 72 scrutinized scrutinize VBN 10973 12 73 by by IN 10973 12 74 others.4 others.4 JJ 10973 12 75 Many many JJ 10973 12 76 library library NN 10973 12 77 resources resource NNS 10973 12 78 require require VBP 10973 12 79 the the DT 10973 12 80 use use NN 10973 12 81 of of IN 10973 12 82 a a DT 10973 12 83 library library NN 10973 12 84 card card NN 10973 12 85 . . . 10973 13 1 To to TO 10973 13 2 obtain obtain VB 10973 13 3 a a DT 10973 13 4 library library NN 10973 13 5 card card NN 10973 13 6 in in IN 10973 13 7 the the DT 10973 13 8 U.S. U.S. NNP 10973 13 9 one one PRP 10973 13 10 must must MD 10973 13 11 provide provide VB 10973 13 12 official official JJ 10973 13 13 photo photo NN 10973 13 14 identification identification NN 10973 13 15 showing show VBG 10973 13 16 personally personally RB 10973 13 17 identifiable identifiable JJ 10973 13 18 information information NN 10973 13 19 ( ( -LRB- 10973 13 20 PII PII NNP 10973 13 21 ) ) -RRB- 10973 13 22 , , , 10973 13 23 such such JJ 10973 13 24 as as IN 10973 13 25 name name NN 10973 13 26 , , , 10973 13 27 address address NN 10973 13 28 , , , 10973 13 29 telephone telephone NN 10973 13 30 number number NN 10973 13 31 , , , 10973 13 32 and and CC 10973 13 33 email email NN 10973 13 34 address address NN 10973 13 35 . . . 10973 14 1 PII PII NNP 10973 14 2 connects connect VBZ 10973 14 3 library library JJ 10973 14 4 users user NNS 10973 14 5 or or CC 10973 14 6 patrons patron NNS 10973 14 7 with with IN 10973 14 8 , , , 10973 14 9 for for IN 10973 14 10 example example NN 10973 14 11 , , , 10973 14 12 items item NNS 10973 14 13 checked check VBD 10973 14 14 out out RP 10973 14 15 , , , 10973 14 16 and and CC 10973 14 17 websites website NNS 10973 14 18 visited visit VBD 10973 14 19 . . . 10973 15 1 As as IN 10973 15 2 such such JJ 10973 15 3 , , , 10973 15 4 PII PII NNP 10973 15 5 has have VBZ 10973 15 6 the the DT 10973 15 7 potential potential NN 10973 15 8 to to TO 10973 15 9 build build VB 10973 15 10 up up RP 10973 15 11 an an DT 10973 15 12 image image NN 10973 15 13 of of IN 10973 15 14 a a DT 10973 15 15 library library NN 10973 15 16 patron patron NN 10973 15 17 that that WDT 10973 15 18 could could MD 10973 15 19 potentially potentially RB 10973 15 20 be be VB 10973 15 21 used use VBN 10973 15 22 to to TO 10973 15 23 assess assess VB 10973 15 24 the the DT 10973 15 25 patron patron NN 10973 15 26 ’s ’s POS 10973 15 27 character character NN 10973 15 28 . . . 10973 16 1 In in IN 10973 16 2 response response NN 10973 16 3 , , , 10973 16 4 the the DT 10973 16 5 ALA ALA NNP 10973 16 6 developed develop VBD 10973 16 7 a a DT 10973 16 8 policy policy NN 10973 16 9 concerning concern VBG 10973 16 10 the the DT 10973 16 11 confidentiality confidentiality NN 10973 16 12 of of IN 10973 16 13 PII PII NNP 10973 16 14 about about IN 10973 16 15 library library NN 10973 16 16 users.5 users.5 DT 10973 16 17 Confidentiality Confidentiality NNP 10973 16 18 extends extend VBZ 10973 16 19 to to IN 10973 16 20 “ " `` 10973 16 21 information information NN 10973 16 22 sought seek VBD 10973 16 23 or or CC 10973 16 24 received receive VBD 10973 16 25 and and CC 10973 16 26 resources resource NNS 10973 16 27 consulted consult VBN 10973 16 28 , , , 10973 16 29 borrowed borrow VBN 10973 16 30 , , , 10973 16 31 acquired acquire VBN 10973 16 32 or or CC 10973 16 33 transmitted transmit VBN 10973 16 34 , , , 10973 16 35 ” " '' 10973 16 36 and and CC 10973 16 37 includes include VBZ 10973 16 38 , , , 10973 16 39 but but CC 10973 16 40 is be VBZ 10973 16 41 not not RB 10973 16 42 limited limit VBN 10973 16 43 to to IN 10973 16 44 , , , 10973 16 45 database database NN 10973 16 46 search search NN 10973 16 47 records record NNS 10973 16 48 , , , 10973 16 49 reference reference NN 10973 16 50 interviews interview NNS 10973 16 51 , , , 10973 16 52 circulation circulation NN 10973 16 53 records record NNS 10973 16 54 , , , 10973 16 55 interlibrary interlibrary JJ 10973 16 56 loan loan NN 10973 16 57 records record NNS 10973 16 58 , , , 10973 16 59 and and CC 10973 16 60 other other JJ 10973 16 61 personally personally RB 10973 16 62 identifiable identifiable JJ 10973 16 63 uses use NNS 10973 16 64 of of IN 10973 16 65 library library NN 10973 16 66 materials material NNS 10973 16 67 , , , 10973 16 68 facilities facility NNS 10973 16 69 , , , 10973 16 70 or or CC 10973 16 71 services.6 services.6 RB 10973 16 72 In in IN 10973 16 73 more more JJR 10973 16 74 recent recent JJ 10973 16 75 years year NNS 10973 16 76 , , , 10973 16 77 the the DT 10973 16 78 ALA ALA NNP 10973 16 79 has have VBZ 10973 16 80 further further RB 10973 16 81 specified specify VBN 10973 16 82 that that IN 10973 16 83 the the DT 10973 16 84 right right NN 10973 16 85 of of IN 10973 16 86 patrons patron NNS 10973 16 87 to to IN 10973 16 88 privacy privacy NN 10973 16 89 applies apply VBZ 10973 16 90 to to IN 10973 16 91 any any DT 10973 16 92 information information NN 10973 16 93 that that WDT 10973 16 94 can can MD 10973 16 95 link link VB 10973 16 96 “ " `` 10973 16 97 choices choice NNS 10973 16 98 of of IN 10973 16 99 taste taste NN 10973 16 100 , , , 10973 16 101 interest interest NN 10973 16 102 , , , 10973 16 103 or or CC 10973 16 104 research research NN 10973 16 105 with with IN 10973 16 106 an an DT 10973 16 107 individual individual NN 10973 16 108 . . . 10973 16 109 ”7 ”7 '' 10973 16 110 When when WRB 10973 16 111 library library NN 10973 16 112 users user NNS 10973 16 113 recognize recognize VBP 10973 16 114 or or CC 10973 16 115 fear fear VBP 10973 16 116 that that IN 10973 16 117 their -PRON- PRP$ 10973 16 118 privacy privacy NN 10973 16 119 or or CC 10973 16 120 INFORMATION information NN 10973 16 121 TECHNOLOGY technology NN 10973 16 122 AND and CC 10973 16 123 LIBRARIES LIBRARIES NNP 10973 16 124 | | NNP 10973 16 125 JUNE JUNE NNP 10973 16 126 2019 2019 CD 10973 16 127 59 59 CD 10973 16 128 confidentiality confidentiality NN 10973 16 129 is be VBZ 10973 16 130 compromised compromise VBN 10973 16 131 , , , 10973 16 132 true true JJ 10973 16 133 freedom freedom NN 10973 16 134 of of IN 10973 16 135 inquiry inquiry NN 10973 16 136 no no RB 10973 16 137 longer long RBR 10973 16 138 exists exist VBZ 10973 16 139 . . . 10973 17 1 Therefore therefore RB 10973 17 2 , , , 10973 17 3 it -PRON- PRP 10973 17 4 is be VBZ 10973 17 5 imperative imperative JJ 10973 17 6 that that WDT 10973 17 7 libraries library NNS 10973 17 8 use use VBP 10973 17 9 extra extra JJ 10973 17 10 care care NN 10973 17 11 when when WRB 10973 17 12 handling handle VBG 10973 17 13 patron patron NN 10973 17 14 personally personally RB 10973 17 15 identifiable identifiable JJ 10973 17 16 information information NN 10973 17 17 . . . 10973 18 1 While while IN 10973 18 2 librarians librarian NNS 10973 18 3 and and CC 10973 18 4 other other JJ 10973 18 5 library library NN 10973 18 6 employees employee NNS 10973 18 7 may may MD 10973 18 8 understand understand VB 10973 18 9 the the DT 10973 18 10 importance importance NN 10973 18 11 of of IN 10973 18 12 data datum NNS 10973 18 13 protection protection NN 10973 18 14 , , , 10973 18 15 they -PRON- PRP 10973 18 16 generally generally RB 10973 18 17 do do VBP 10973 18 18 n’t not RB 10973 18 19 have have VB 10973 18 20 the the DT 10973 18 21 resources resource NNS 10973 18 22 available available JJ 10973 18 23 to to TO 10973 18 24 assess assess VB 10973 18 25 information information NN 10973 18 26 security security NN 10973 18 27 risk risk NN 10973 18 28 , , , 10973 18 29 employ employ VB 10973 18 30 risk risk NN 10973 18 31 mitigation mitigation NN 10973 18 32 strategies strategy NNS 10973 18 33 , , , 10973 18 34 or or CC 10973 18 35 offer offer VB 10973 18 36 security security NN 10973 18 37 education education NN 10973 18 38 , , , 10973 18 39 training training NN 10973 18 40 , , , 10973 18 41 or or CC 10973 18 42 awareness awareness NN 10973 18 43 ( ( -LRB- 10973 18 44 SETA SETA NNP 10973 18 45 ) ) -RRB- 10973 18 46 programs program NNS 10973 18 47 . . . 10973 19 1 This this DT 10973 19 2 is be VBZ 10973 19 3 of of IN 10973 19 4 particular particular JJ 10973 19 5 concern concern NN 10973 19 6 as as IN 10973 19 7 libraries library NNS 10973 19 8 increasingly increasingly RB 10973 19 9 have have VBP 10973 19 10 access access NN 10973 19 11 to to IN 10973 19 12 databases database NNS 10973 19 13 of of IN 10973 19 14 both both CC 10973 19 15 proprietary proprietary JJ 10973 19 16 and and CC 10973 19 17 personal personal JJ 10973 19 18 information.8 information.8 CD 10973 19 19 SETA seta NN 10973 19 20 programs program NNS 10973 19 21 are be VBP 10973 19 22 risk risk NN 10973 19 23 mitigation mitigation NN 10973 19 24 strategies strategy NNS 10973 19 25 employed employ VBN 10973 19 26 by by IN 10973 19 27 organizations organization NNS 10973 19 28 worldwide worldwide RB 10973 19 29 to to TO 10973 19 30 increase increase VB 10973 19 31 and and CC 10973 19 32 maintain maintain VB 10973 19 33 end end NN 10973 19 34 - - HYPH 10973 19 35 user user NN 10973 19 36 compliance compliance NN 10973 19 37 of of IN 10973 19 38 information information NN 10973 19 39 security security NN 10973 19 40 and and CC 10973 19 41 privacy privacy NN 10973 19 42 policies policy NNS 10973 19 43 . . . 10973 20 1 In in IN 10973 20 2 libraries library NNS 10973 20 3 , , , 10973 20 4 information information NN 10973 20 5 systems system NNS 10973 20 6 are be VBP 10973 20 7 widely widely RB 10973 20 8 used use VBN 10973 20 9 to to TO 10973 20 10 provide provide VB 10973 20 11 services service NNS 10973 20 12 to to IN 10973 20 13 patrons patron NNS 10973 20 14 , , , 10973 20 15 however however RB 10973 20 16 , , , 10973 20 17 there there EX 10973 20 18 is be VBZ 10973 20 19 little little RB 10973 20 20 known know VBN 10973 20 21 about about IN 10973 20 22 information information NN 10973 20 23 security security NN 10973 20 24 practices practice NNS 10973 20 25 in in IN 10973 20 26 libraries.9 libraries.9 CD 10973 20 27 Given give VBN 10973 20 28 the the DT 10973 20 29 sensitivity sensitivity NN 10973 20 30 of of IN 10973 20 31 the the DT 10973 20 32 data data NN 10973 20 33 libraries library NNS 10973 20 34 handle handle VBP 10973 20 35 , , , 10973 20 36 and and CC 10973 20 37 the the DT 10973 20 38 lack lack NN 10973 20 39 of of IN 10973 20 40 information information NN 10973 20 41 security security NN 10973 20 42 resources resource NNS 10973 20 43 available available JJ 10973 20 44 to to IN 10973 20 45 them -PRON- PRP 10973 20 46 , , , 10973 20 47 it -PRON- PRP 10973 20 48 is be VBZ 10973 20 49 important important JJ 10973 20 50 for for IN 10973 20 51 those those DT 10973 20 52 currently currently RB 10973 20 53 or or CC 10973 20 54 planning plan VBG 10973 20 55 to to TO 10973 20 56 work work VB 10973 20 57 in in IN 10973 20 58 the the DT 10973 20 59 library library NN 10973 20 60 environment environment NN 10973 20 61 to to TO 10973 20 62 develop develop VB 10973 20 63 the the DT 10973 20 64 knowledge knowledge NN 10973 20 65 necessary necessary JJ 10973 20 66 to to TO 10973 20 67 identify identify VB 10973 20 68 risks risk NNS 10973 20 69 and and CC 10973 20 70 develop develop VB 10973 20 71 and and CC 10973 20 72 employ employ VB 10973 20 73 risk risk NN 10973 20 74 mitigation mitigation NN 10973 20 75 strategies strategy NNS 10973 20 76 to to TO 10973 20 77 protect protect VB 10973 20 78 information information NN 10973 20 79 and and CC 10973 20 80 information information NN 10973 20 81 resources resource NNS 10973 20 82 they -PRON- PRP 10973 20 83 are be VBP 10973 20 84 entrusted entrust VBN 10973 20 85 with with IN 10973 20 86 . . . 10973 21 1 Therefore therefore RB 10973 21 2 , , , 10973 21 3 the the DT 10973 21 4 research research NN 10973 21 5 question question NN 10973 21 6 in in IN 10973 21 7 this this DT 10973 21 8 present present JJ 10973 21 9 study study NN 10973 21 10 is be VBZ 10973 21 11 : : : 10973 21 12 How how WRB 10973 21 13 can can MD 10973 21 14 cybersecurity cybersecurity VB 10973 21 15 education education NN 10973 21 16 strengthen strengthen VB 10973 21 17 information information NN 10973 21 18 security security NN 10973 21 19 practices practice NNS 10973 21 20 in in IN 10973 21 21 libraries library NNS 10973 21 22 ? ? . 10973 22 1 Currently currently RB 10973 22 2 , , , 10973 22 3 there there EX 10973 22 4 is be VBZ 10973 22 5 a a DT 10973 22 6 dearth dearth NN 10973 22 7 of of IN 10973 22 8 research research NN 10973 22 9 on on IN 10973 22 10 information information NN 10973 22 11 security security NN 10973 22 12 practices practice NNS 10973 22 13 in in IN 10973 22 14 libraries.10 libraries.10 NNP 10973 22 15 This this DT 10973 22 16 is be VBZ 10973 22 17 an an DT 10973 22 18 important important JJ 10973 22 19 research research NN 10973 22 20 gap gap NN 10973 22 21 to to TO 10973 22 22 acknowledge acknowledge VB 10973 22 23 given give VBN 10973 22 24 that that DT 10973 22 25 patron patron NN 10973 22 26 privacy privacy NN 10973 22 27 is be VBZ 10973 22 28 fundamental fundamental JJ 10973 22 29 to to IN 10973 22 30 the the DT 10973 22 31 practice practice NN 10973 22 32 of of IN 10973 22 33 librarianship librarianship NN 10973 22 34 in in IN 10973 22 35 the the DT 10973 22 36 U.S U.S NNP 10973 22 37 , , , 10973 22 38 and and CC 10973 22 39 the the DT 10973 22 40 advancement advancement NN 10973 22 41 in in IN 10973 22 42 technology technology NN 10973 22 43 coupled couple VBN 10973 22 44 with with IN 10973 22 45 federal federal JJ 10973 22 46 regulations regulation NNS 10973 22 47 adds add VBZ 10973 22 48 to to IN 10973 22 49 the the DT 10973 22 50 challenges challenge NNS 10973 22 51 of of IN 10973 22 52 keeping keep VBG 10973 22 53 patron patron NN 10973 22 54 privacy privacy NN 10973 22 55 safe.11 safe.11 NNP 10973 22 56 Thus thus RB 10973 22 57 this this DT 10973 22 58 study study NN 10973 22 59 contributes contribute VBZ 10973 22 60 to to IN 10973 22 61 current current JJ 10973 22 62 literature literature NN 10973 22 63 by by IN 10973 22 64 evaluating evaluate VBG 10973 22 65 the the DT 10973 22 66 effects effect NNS 10973 22 67 of of IN 10973 22 68 knowledge knowledge NN 10973 22 69 transfer transfer NN 10973 22 70 as as IN 10973 22 71 a a DT 10973 22 72 means means NN 10973 22 73 to to TO 10973 22 74 strengthen strengthen VB 10973 22 75 information information NN 10973 22 76 security security NN 10973 22 77 within within IN 10973 22 78 libraries library NNS 10973 22 79 . . . 10973 23 1 Furthermore furthermore RB 10973 23 2 , , , 10973 23 3 this this DT 10973 23 4 study study NN 10973 23 5 will will MD 10973 23 6 offer offer VB 10973 23 7 a a DT 10973 23 8 preliminary preliminary JJ 10973 23 9 investigation investigation NN 10973 23 10 as as IN 10973 23 11 to to IN 10973 23 12 whether whether IN 10973 23 13 knowledge knowledge NN 10973 23 14 utilization utilization NN 10973 23 15 leads lead VBZ 10973 23 16 to to IN 10973 23 17 motivation motivation NN 10973 23 18 and and CC 10973 23 19 the the DT 10973 23 20 participation participation NN 10973 23 21 of of IN 10973 23 22 information information NN 10973 23 23 security security NN 10973 23 24 risk risk NN 10973 23 25 management management NN 10973 23 26 activities activity NNS 10973 23 27 within within IN 10973 23 28 libraries library NNS 10973 23 29 . . . 10973 24 1 The the DT 10973 24 2 remainder remainder NN 10973 24 3 of of IN 10973 24 4 this this DT 10973 24 5 paper paper NN 10973 24 6 proceeds proceed NNS 10973 24 7 as as IN 10973 24 8 follows follow VBZ 10973 24 9 : : : 10973 24 10 First first RB 10973 24 11 , , , 10973 24 12 a a DT 10973 24 13 review review NN 10973 24 14 of of IN 10973 24 15 knowledge knowledge NN 10973 24 16 transfer transfer NN 10973 24 17 is be VBZ 10973 24 18 covered cover VBN 10973 24 19 . . . 10973 25 1 A a DT 10973 25 2 description description NN 10973 25 3 of of IN 10973 25 4 the the DT 10973 25 5 cybersecurity cybersecurity NN 10973 25 6 course course NN 10973 25 7 , , , 10973 25 8 including include VBG 10973 25 9 students student NNS 10973 25 10 and and CC 10973 25 11 course course NN 10973 25 12 material material NN 10973 25 13 , , , 10973 25 14 is be VBZ 10973 25 15 provided provide VBN 10973 25 16 . . . 10973 26 1 Data datum NNS 10973 26 2 collection collection NN 10973 26 3 and and CC 10973 26 4 analysis analysis NN 10973 26 5 are be VBP 10973 26 6 then then RB 10973 26 7 presented present VBN 10973 26 8 . . . 10973 27 1 This this DT 10973 27 2 is be VBZ 10973 27 3 followed follow VBN 10973 27 4 by by IN 10973 27 5 a a DT 10973 27 6 discussion discussion NN 10973 27 7 of of IN 10973 27 8 the the DT 10973 27 9 findings finding NNS 10973 27 10 , , , 10973 27 11 limitations limitation NNS 10973 27 12 , , , 10973 27 13 and and CC 10973 27 14 future future JJ 10973 27 15 research research NN 10973 27 16 . . . 10973 28 1 LITERATURE LITERATURE NNP 10973 28 2 RIVEW RIVEW NNP 10973 28 3 Knowledge Knowledge NNP 10973 28 4 Transfer Transfer NNP 10973 28 5 in in IN 10973 28 6 SETA SETA NNP 10973 28 7 Knowledge knowledge NN 10973 28 8 transfer transfer NN 10973 28 9 through through IN 10973 28 10 SETA SETA NNP 10973 28 11 programs program NNS 10973 28 12 plays play VBZ 10973 28 13 a a DT 10973 28 14 key key JJ 10973 28 15 role role NN 10973 28 16 in in IN 10973 28 17 the the DT 10973 28 18 development development NN 10973 28 19 and and CC 10973 28 20 implementation implementation NN 10973 28 21 of of IN 10973 28 22 cybersecurity cybersecurity NN 10973 28 23 practices.12 practices.12 NNP 10973 28 24 Knowledge Knowledge NNP 10973 28 25 is be VBZ 10973 28 26 transferred transfer VBN 10973 28 27 when when WRB 10973 28 28 learning learning NN 10973 28 29 takes take VBZ 10973 28 30 place place NN 10973 28 31 and and CC 10973 28 32 when when WRB 10973 28 33 the the DT 10973 28 34 recipient recipient NN 10973 28 35 of of IN 10973 28 36 that that DT 10973 28 37 knowledge knowledge NN 10973 28 38 understands understand VBZ 10973 28 39 the the DT 10973 28 40 intricacies intricacy NNS 10973 28 41 and and CC 10973 28 42 implications implication NNS 10973 28 43 associated associate VBN 10973 28 44 with with IN 10973 28 45 that that DT 10973 28 46 knowledge knowledge NN 10973 28 47 so so IN 10973 28 48 that that IN 10973 28 49 he -PRON- PRP 10973 28 50 or or CC 10973 28 51 she -PRON- PRP 10973 28 52 can can MD 10973 28 53 apply apply VB 10973 28 54 it.13 it.13 NNP 10973 28 55 For for IN 10973 28 56 example example NN 10973 28 57 , , , 10973 28 58 in in IN 10973 28 59 a a DT 10973 28 60 security security NN 10973 28 61 education education NN 10973 28 62 program program NN 10973 28 63 , , , 10973 28 64 an an DT 10973 28 65 educator educator NN 10973 28 66 may may MD 10973 28 67 transfer transfer VB 10973 28 68 knowledge knowledge NN 10973 28 69 about about IN 10973 28 70 information information NN 10973 28 71 security security NN 10973 28 72 risks risk NNS 10973 28 73 to to IN 10973 28 74 users user NNS 10973 28 75 who who WP 10973 28 76 learn learn VBP 10973 28 77 and and CC 10973 28 78 apply apply VB 10973 28 79 the the DT 10973 28 80 knowledge knowledge NN 10973 28 81 to to TO 10973 28 82 increase increase VB 10973 28 83 patron patron NN 10973 28 84 privacy privacy NN 10973 28 85 . . . 10973 29 1 The the DT 10973 29 2 knowledge knowledge NN 10973 29 3 is be VBZ 10973 29 4 applied apply VBN 10973 29 5 when when WRB 10973 29 6 evidenced evidence VBN 10973 29 7 by by IN 10973 29 8 users user NNS 10973 29 9 who who WP 10973 29 10 are be VBP 10973 29 11 able able JJ 10973 29 12 to to TO 10973 29 13 identify identify VB 10973 29 14 risks risk NNS 10973 29 15 to to IN 10973 29 16 patron patron NN 10973 29 17 data datum NNS 10973 29 18 and and CC 10973 29 19 implement implement VB 10973 29 20 risk risk NN 10973 29 21 mitigations mitigation NNS 10973 29 22 strategies strategy NNS 10973 29 23 that that WDT 10973 29 24 serve serve VBP 10973 29 25 to to TO 10973 29 26 protect protect VB 10973 29 27 patron patron NN 10973 29 28 information information NN 10973 29 29 and and CC 10973 29 30 information information NN 10973 29 31 system system NN 10973 29 32 assets asset NNS 10973 29 33 . . . 10973 30 1 Knowledge knowledge NN 10973 30 2 transfer transfer NN 10973 30 3 can can MD 10973 30 4 be be VB 10973 30 5 influenced influence VBN 10973 30 6 by by IN 10973 30 7 four four CD 10973 30 8 factors factor NNS 10973 30 9 : : : 10973 30 10 absorptive absorptive JJ 10973 30 11 capacity capacity NN 10973 30 12 , , , 10973 30 13 communication communication NN 10973 30 14 , , , 10973 30 15 motivation motivation NN 10973 30 16 , , , 10973 30 17 and and CC 10973 30 18 user user NN 10973 30 19 participation.14 participation.14 NNP 10973 30 20 This this DT 10973 30 21 study study NN 10973 30 22 evaluates evaluate VBZ 10973 30 23 the the DT 10973 30 24 extent extent NN 10973 30 25 to to TO 10973 30 26 which which WDT 10973 30 27 knowledge knowledge NN 10973 30 28 transferred transfer VBN 10973 30 29 from from IN 10973 30 30 a a DT 10973 30 31 cybersecurity cybersecurity NN 10973 30 32 course course NN 10973 30 33 strengthens strengthen VBZ 10973 30 34 information information NN 10973 30 35 security security NN 10973 30 36 practices practice NNS 10973 30 37 within within IN 10973 30 38 libraries library NNS 10973 30 39 . . . 10973 31 1 This this DT 10973 31 2 study study NN 10973 31 3 adapts adapt VBZ 10973 31 4 the the DT 10973 31 5 theoretical theoretical JJ 10973 31 6 model model NN 10973 31 7 as as IN 10973 31 8 proposed propose VBN 10973 31 9 by by IN 10973 31 10 Spears Spears NNP 10973 31 11 & & CC 10973 31 12 San San NNP 10973 31 13 Nicolas Nicolas NNP 10973 31 14 - - HYPH 10973 31 15 Rocca Rocca NNP 10973 31 16 INFORMATION INFORMATION VBD 10973 31 17 SECURITY SECURITY NNP 10973 31 18 IN in IN 10973 31 19 LIBRARIES LIBRARIES NNP 10973 31 20 | | NNP 10973 31 21 SAN SAN NNP 10973 31 22 - - HYPH 10973 31 23 NICOLAS NICOLAS NNP 10973 31 24 - - HYPH 10973 31 25 ROCCA ROCCA NNP 10973 31 26 AND and CC 10973 31 27 BURKHARD burkhard NN 10973 31 28 60 60 CD 10973 31 29 https://doi.org/10.6017/ital.v38i2.10973 https://doi.org/10.6017/ital.v38i2.10973 NNP 10973 31 30 ( ( -LRB- 10973 31 31 2015 2015 CD 10973 31 32 ) ) -RRB- 10973 31 33 ( ( -LRB- 10973 31 34 see see VB 10973 31 35 figure figure NN 10973 31 36 1 1 CD 10973 31 37 ) ) -RRB- 10973 31 38 to to TO 10973 31 39 examine examine VB 10973 31 40 the the DT 10973 31 41 effects effect NNS 10973 31 42 of of IN 10973 31 43 cybersecurity cybersecurity NN 10973 31 44 education education NN 10973 31 45 on on IN 10973 31 46 information information NN 10973 31 47 security security NN 10973 31 48 practices practice NNS 10973 31 49 in in IN 10973 31 50 libraries.15 libraries.15 NNP 10973 31 51 Figure Figure NNP 10973 31 52 1 1 CD 10973 31 53 . . . 10973 32 1 Factors factor NNS 10973 32 2 of of IN 10973 32 3 Knowledge knowledge NN 10973 32 4 Transfer Transfer NNP 10973 32 5 Leads Leads NNPS 10973 32 6 to to IN 10973 32 7 Knowledge knowledge NN 10973 32 8 Utilization utilization NN 10973 32 9 . . . 10973 33 1 Absorptive absorptive JJ 10973 33 2 Capacity capacity NN 10973 33 3 Absorptive absorptive JJ 10973 33 4 capacity capacity NN 10973 33 5 is be VBZ 10973 33 6 the the DT 10973 33 7 ability ability NN 10973 33 8 of of IN 10973 33 9 a a DT 10973 33 10 recipient recipient NN 10973 33 11 to to TO 10973 33 12 recognize recognize VB 10973 33 13 the the DT 10973 33 14 importance importance NN 10973 33 15 and and CC 10973 33 16 value value NN 10973 33 17 of of IN 10973 33 18 eternally eternally RB 10973 33 19 sourced source VBN 10973 33 20 knowledge knowledge NN 10973 33 21 , , , 10973 33 22 assimilate assimilate VB 10973 33 23 and and CC 10973 33 24 apply apply VB 10973 33 25 it -PRON- PRP 10973 33 26 and and CC 10973 33 27 has have VBZ 10973 33 28 been be VBN 10973 33 29 found find VBN 10973 33 30 to to TO 10973 33 31 be be VB 10973 33 32 positively positively RB 10973 33 33 related relate VBN 10973 33 34 to to IN 10973 33 35 knowledge knowledge NN 10973 33 36 transfer.16 transfer.16 NNP 10973 33 37 Activating activate VBG 10973 33 38 a a DT 10973 33 39 student student NN 10973 33 40 ’s ’s POS 10973 33 41 prior prior JJ 10973 33 42 knowledge knowledge NN 10973 33 43 could could MD 10973 33 44 enhance enhance VB 10973 33 45 their -PRON- PRP$ 10973 33 46 ability ability NN 10973 33 47 to to TO 10973 33 48 process process VB 10973 33 49 new new JJ 10973 33 50 information.17 information.17 NNP 10973 33 51 That that RB 10973 33 52 is be VBZ 10973 33 53 , , , 10973 33 54 knowledge knowledge NN 10973 33 55 transfer transfer NN 10973 33 56 is be VBZ 10973 33 57 more more RBR 10973 33 58 likely likely JJ 10973 33 59 to to TO 10973 33 60 take take VB 10973 33 61 place place NN 10973 33 62 between between IN 10973 33 63 the the DT 10973 33 64 instructor instructor NN 10973 33 65 and and CC 10973 33 66 students student NNS 10973 33 67 enrolled enrol VBN 10973 33 68 in in IN 10973 33 69 a a DT 10973 33 70 cybersecurity cybersecurity NN 10973 33 71 course course NN 10973 33 72 if if IN 10973 33 73 the the DT 10973 33 74 student student NN 10973 33 75 has have VBZ 10973 33 76 existing exist VBG 10973 33 77 knowledge knowledge NN 10973 33 78 or or CC 10973 33 79 has have VBZ 10973 33 80 had have VBN 10973 33 81 experience experience NN 10973 33 82 in in IN 10973 33 83 some some DT 10973 33 84 related related JJ 10973 33 85 area area NN 10973 33 86 . . . 10973 34 1 For for IN 10973 34 2 the the DT 10973 34 3 present present JJ 10973 34 4 study study NN 10973 34 5 , , , 10973 34 6 students student NNS 10973 34 7 have have VBP 10973 34 8 stated state VBN 10973 34 9 that that IN 10973 34 10 prior prior RB 10973 34 11 to to IN 10973 34 12 enrolling enrol VBG 10973 34 13 in in IN 10973 34 14 the the DT 10973 34 15 cybersecurity cybersecurity NN 10973 34 16 course course NN 10973 34 17 , , , 10973 34 18 they -PRON- PRP 10973 34 19 had have VBD 10973 34 20 little little JJ 10973 34 21 to to IN 10973 34 22 no no DT 10973 34 23 knowledge knowledge NN 10973 34 24 of of IN 10973 34 25 cybersecurity cybersecurity NN 10973 34 26 . . . 10973 35 1 One one CD 10973 35 2 student student NN 10973 35 3 mentioned mention VBD 10973 35 4 , , , 10973 35 5 “ " `` 10973 35 6 While while IN 10973 35 7 I -PRON- PRP 10973 35 8 am be VBP 10973 35 9 the the DT 10973 35 10 director director NN 10973 35 11 of of IN 10973 35 12 a a DT 10973 35 13 small small JJ 10973 35 14 academic academic JJ 10973 35 15 library library NN 10973 35 16 , , , 10973 35 17 I -PRON- PRP 10973 35 18 have have VBP 10973 35 19 no no DT 10973 35 20 understanding understanding NN 10973 35 21 of of IN 10973 35 22 cybersecurity cybersecurity NN 10973 35 23 . . . 10973 36 1 I -PRON- PRP 10973 36 2 am be VBP 10973 36 3 taking take VBG 10973 36 4 this this DT 10973 36 5 course course NN 10973 36 6 to to TO 10973 36 7 learn learn VB 10973 36 8 about about IN 10973 36 9 cybersecurity cybersecurity NN 10973 36 10 so so IN 10973 36 11 that that IN 10973 36 12 I -PRON- PRP 10973 36 13 can can MD 10973 36 14 better well RBR 10973 36 15 secure secure VB 10973 36 16 the the DT 10973 36 17 library library NN 10973 36 18 I -PRON- PRP 10973 36 19 work work VBP 10973 36 20 in in IN 10973 36 21 and and CC 10973 36 22 to to TO 10973 36 23 share share VB 10973 36 24 the the DT 10973 36 25 information information NN 10973 36 26 with with IN 10973 36 27 those those DT 10973 36 28 who who WP 10973 36 29 work work VBP 10973 36 30 in in IN 10973 36 31 the the DT 10973 36 32 library library NN 10973 36 33 . . . 10973 36 34 ” " '' 10973 36 35 Another another DT 10973 36 36 student student NN 10973 36 37 mentioned mention VBD 10973 36 38 , , , 10973 36 39 “ " `` 10973 36 40 My -PRON- PRP$ 10973 36 41 goal goal NN 10973 36 42 is be VBZ 10973 36 43 to to TO 10973 36 44 work work VB 10973 36 45 in in IN 10973 36 46 a a DT 10973 36 47 public public JJ 10973 36 48 library library NN 10973 36 49 after after IN 10973 36 50 graduation graduation NN 10973 36 51 . . . 10973 37 1 I -PRON- PRP 10973 37 2 am be VBP 10973 37 3 taking take VBG 10973 37 4 this this DT 10973 37 5 course course NN 10973 37 6 because because IN 10973 37 7 I -PRON- PRP 10973 37 8 keep keep VBP 10973 37 9 hearing hear VBG 10973 37 10 about about IN 10973 37 11 cybersecurity cybersecurity NN 10973 37 12 breaches breach NNS 10973 37 13 in in IN 10973 37 14 the the DT 10973 37 15 news news NN 10973 37 16 , , , 10973 37 17 and and CC 10973 37 18 I -PRON- PRP 10973 37 19 want want VBP 10973 37 20 to to TO 10973 37 21 learn learn VB 10973 37 22 more more JJR 10973 37 23 about about IN 10973 37 24 cybersecurity cybersecurity NN 10973 37 25 because because IN 10973 37 26 I -PRON- PRP 10973 37 27 think think VBP 10973 37 28 it -PRON- PRP 10973 37 29 will will MD 10973 37 30 help help VB 10973 37 31 me -PRON- PRP 10973 37 32 in in IN 10973 37 33 my -PRON- PRP$ 10973 37 34 future future JJ 10973 37 35 job job NN 10973 37 36 . . . 10973 37 37 ” " '' 10973 37 38 While while IN 10973 37 39 all all DT 10973 37 40 of of IN 10973 37 41 the the DT 10973 37 42 students student NNS 10973 37 43 enrolled enrol VBN 10973 37 44 in in IN 10973 37 45 the the DT 10973 37 46 course course NN 10973 37 47 had have VBD 10973 37 48 no no DT 10973 37 49 cybersecurity cybersecurity NN 10973 37 50 experience experience NN 10973 37 51 , , , 10973 37 52 all all DT 10973 37 53 of of IN 10973 37 54 them -PRON- PRP 10973 37 55 had have VBD 10973 37 56 some some DT 10973 37 57 understanding understanding NN 10973 37 58 of of IN 10973 37 59 principle principle NN 10973 37 60 3 3 CD 10973 37 61 in in IN 10973 37 62 the the DT 10973 37 63 ALA ALA NNP 10973 37 64 Code Code NNP 10973 37 65 of of IN 10973 37 66 Ethics Ethics NNP 10973 37 67 , , , 10973 37 68 which which WDT 10973 37 69 states state VBZ 10973 37 70 , , , 10973 37 71 “ " `` 10973 37 72 We -PRON- PRP 10973 37 73 protect protect VBP 10973 37 74 each each DT 10973 37 75 library library NN 10973 37 76 user user NN 10973 37 77 ’s ’s POS 10973 37 78 right right NN 10973 37 79 to to IN 10973 37 80 privacy privacy NN 10973 37 81 and and CC 10973 37 82 confidentiality confidentiality NN 10973 37 83 with with IN 10973 37 84 respect respect NN 10973 37 85 to to IN 10973 37 86 information information NN 10973 37 87 sought seek VBN 10973 37 88 or or CC 10973 37 89 received receive VBD 10973 37 90 and and CC 10973 37 91 resources resource NNS 10973 37 92 consulted consult VBN 10973 37 93 , , , 10973 37 94 borrowed borrow VBN 10973 37 95 , , , 10973 37 96 acquired acquire VBN 10973 37 97 or or CC 10973 37 98 transmitted transmit VBN 10973 37 99 . . . 10973 37 100 ”18 ”18 '' 10973 37 101 Understanding understanding NN 10973 37 102 of of IN 10973 37 103 principle principle NN 10973 37 104 3 3 CD 10973 37 105 in in IN 10973 37 106 the the DT 10973 37 107 Code Code NNP 10973 37 108 of of IN 10973 37 109 Ethics Ethics NNP 10973 37 110 demonstrates demonstrate VBZ 10973 37 111 existing exist VBG 10973 37 112 knowledge knowledge NN 10973 37 113 in in IN 10973 37 114 some some DT 10973 37 115 related related JJ 10973 37 116 area area NN 10973 37 117 with with IN 10973 37 118 regards regard NNS 10973 37 119 to to IN 10973 37 120 cybersecurity cybersecurity NN 10973 37 121 , , , 10973 37 122 albeit albeit IN 10973 37 123 limited limited JJ 10973 37 124 knowledge knowledge NN 10973 37 125 . . . 10973 38 1 Given give VBN 10973 38 2 this this DT 10973 38 3 understanding understanding NN 10973 38 4 , , , 10973 38 5 students student NNS 10973 38 6 should should MD 10973 38 7 have have VB 10973 38 8 the the DT 10973 38 9 ability ability NN 10973 38 10 to to TO 10973 38 11 process process VB 10973 38 12 new new JJ 10973 38 13 information information NN 10973 38 14 from from IN 10973 38 15 the the DT 10973 38 16 cybersecurity cybersecurity NN 10973 38 17 course course NN 10973 38 18 . . . 10973 39 1 INFORMATION INFORMATION NNP 10973 39 2 TECHNOLOGY technology NN 10973 39 3 AND and CC 10973 39 4 LIBRARIES LIBRARIES NNP 10973 39 5 | | NNP 10973 39 6 JUNE JUNE NNP 10973 39 7 2019 2019 CD 10973 39 8 61 61 CD 10973 39 9 Communication communication NN 10973 39 10 The the DT 10973 39 11 success success NN 10973 39 12 of of IN 10973 39 13 any any DT 10973 39 14 SETA SETA NNP 10973 39 15 program program NN 10973 39 16 depends depend VBZ 10973 39 17 on on IN 10973 39 18 the the DT 10973 39 19 ability ability NN 10973 39 20 of of IN 10973 39 21 the the DT 10973 39 22 instructor instructor NN 10973 39 23 to to TO 10973 39 24 effectively effectively RB 10973 39 25 communicate communicate VB 10973 39 26 the the DT 10973 39 27 applicability applicability NN 10973 39 28 and and CC 10973 39 29 practical practical JJ 10973 39 30 purpose purpose NN 10973 39 31 of of IN 10973 39 32 the the DT 10973 39 33 material material NN 10973 39 34 to to TO 10973 39 35 be be VB 10973 39 36 mastered master VBN 10973 39 37 , , , 10973 39 38 as as IN 10973 39 39 distinguished distinguish VBN 10973 39 40 from from IN 10973 39 41 abstract abstract JJ 10973 39 42 or or CC 10973 39 43 conceptual conceptual JJ 10973 39 44 learning.19 learning.19 NNP 10973 39 45 According accord VBG 10973 39 46 to to IN 10973 39 47 current current JJ 10973 39 48 research research NN 10973 39 49 , , , 10973 39 50 knowledge knowledge NN 10973 39 51 transfer transfer NN 10973 39 52 can can MD 10973 39 53 only only RB 10973 39 54 occur occur VB 10973 39 55 if if IN 10973 39 56 communication communication NN 10973 39 57 is be VBZ 10973 39 58 effective effective JJ 10973 39 59 in in IN 10973 39 60 terms term NNS 10973 39 61 of of IN 10973 39 62 type type NN 10973 39 63 , , , 10973 39 64 amount amount NN 10973 39 65 , , , 10973 39 66 competence competence NN 10973 39 67 , , , 10973 39 68 and and CC 10973 39 69 usefulness.20 usefulness.20 NNP 10973 39 70 For for IN 10973 39 71 the the DT 10973 39 72 present present JJ 10973 39 73 study study NN 10973 39 74 , , , 10973 39 75 students student NNS 10973 39 76 were be VBD 10973 39 77 enrolled enrol VBN 10973 39 78 in in IN 10973 39 79 an an DT 10973 39 80 online online JJ 10973 39 81 graduate graduate JJ 10973 39 82 level level NN 10973 39 83 cybersecurity cybersecurity NN 10973 39 84 course course NN 10973 39 85 at at IN 10973 39 86 a a DT 10973 39 87 university university NN 10973 39 88 we -PRON- PRP 10973 39 89 call call VBP 10973 39 90 Mountain Mountain NNP 10973 39 91 View View NNP 10973 39 92 University University NNP 10973 39 93 ( ( -LRB- 10973 39 94 MVU MVU NNP 10973 39 95 ) ) -RRB- 10973 39 96 . . . 10973 40 1 We -PRON- PRP 10973 40 2 changed change VBD 10973 40 3 the the DT 10973 40 4 name name NN 10973 40 5 to to TO 10973 40 6 protect protect VB 10973 40 7 the the DT 10973 40 8 privacy privacy NN 10973 40 9 of of IN 10973 40 10 the the DT 10973 40 11 research research NN 10973 40 12 participants participant NNS 10973 40 13 . . . 10973 41 1 While while IN 10973 41 2 research research NN 10973 41 3 suggests suggest VBZ 10973 41 4 that that IN 10973 41 5 the the DT 10973 41 6 best good JJS 10973 41 7 form form NN 10973 41 8 of of IN 10973 41 9 communication communication NN 10973 41 10 for for IN 10973 41 11 knowledge knowledge NN 10973 41 12 transfer transfer NN 10973 41 13 is be VBZ 10973 41 14 face face NN 10973 41 15 - - HYPH 10973 41 16 to to IN 10973 41 17 - - HYPH 10973 41 18 face face NN 10973 41 19 communication communication NN 10973 41 20 , , , 10973 41 21 the the DT 10973 41 22 cybersecurity cybersecurity NN 10973 41 23 course course NN 10973 41 24 at at IN 10973 41 25 MVU MVU NNP 10973 41 26 is be VBZ 10973 41 27 only only RB 10973 41 28 offered offer VBN 10973 41 29 online.21 online.21 NNP 10973 41 30 Therefore therefore RB 10973 41 31 , , , 10973 41 32 communication communication NN 10973 41 33 relating relate VBG 10973 41 34 to to IN 10973 41 35 the the DT 10973 41 36 course course NN 10973 41 37 was be VBD 10973 41 38 conducted conduct VBN 10973 41 39 via via IN 10973 41 40 course course NN 10973 41 41 management management NN 10973 41 42 software software NN 10973 41 43 , , , 10973 41 44 email email NN 10973 41 45 , , , 10973 41 46 video video NN 10973 41 47 conferencing conferencing NN 10973 41 48 , , , 10973 41 49 discussion discussion NN 10973 41 50 board board NNP 10973 41 51 , , , 10973 41 52 and and CC 10973 41 53 pre- pre- RB 10973 41 54 recorded record VBN 10973 41 55 videos video NNS 10973 41 56 . . . 10973 42 1 Motivation Motivation NNP 10973 42 2 Motivation Motivation NNP 10973 42 3 can can MD 10973 42 4 be be VB 10973 42 5 a a DT 10973 42 6 significant significant JJ 10973 42 7 influence influence NN 10973 42 8 on on IN 10973 42 9 knowledge knowledge NN 10973 42 10 transfer.22 transfer.22 NNP 10973 42 11 That that RB 10973 42 12 is is RB 10973 42 13 , , , 10973 42 14 an an DT 10973 42 15 individual individual NN 10973 42 16 ’s ’s POS 10973 42 17 motivation motivation NN 10973 42 18 to to TO 10973 42 19 participate participate VB 10973 42 20 in in IN 10973 42 21 SETA SETA NNP 10973 42 22 programs program NNS 10973 42 23 has have VBZ 10973 42 24 been be VBN 10973 42 25 found find VBN 10973 42 26 to to TO 10973 42 27 influence influence VB 10973 42 28 the the DT 10973 42 29 extent extent NN 10973 42 30 to to TO 10973 42 31 which which WDT 10973 42 32 knowledge knowledge NN 10973 42 33 is be VBZ 10973 42 34 transferred.23 transferred.23 NNP 10973 42 35 Specifically specifically RB 10973 42 36 , , , 10973 42 37 without without IN 10973 42 38 motivation motivation NN 10973 42 39 , , , 10973 42 40 a a DT 10973 42 41 trainee trainee NN 10973 42 42 may may MD 10973 42 43 fail fail VB 10973 42 44 to to TO 10973 42 45 use use VB 10973 42 46 information information NN 10973 42 47 shared share VBN 10973 42 48 with with IN 10973 42 49 them -PRON- PRP 10973 42 50 about about IN 10973 42 51 methods method NNS 10973 42 52 used use VBN 10973 42 53 to to TO 10973 42 54 protect protect VB 10973 42 55 and and CC 10973 42 56 safeguard safeguard VB 10973 42 57 patron patron NN 10973 42 58 privacy privacy NN 10973 42 59 . . . 10973 43 1 In in IN 10973 43 2 this this DT 10973 43 3 present present JJ 10973 43 4 study study NN 10973 43 5 , , , 10973 43 6 research research NN 10973 43 7 participants participant NNS 10973 43 8 voluntarily voluntarily RB 10973 43 9 enrolled enrol VBN 10973 43 10 in in IN 10973 43 11 the the DT 10973 43 12 cybersecurity cybersecurity NN 10973 43 13 course course NN 10973 43 14 . . . 10973 44 1 The the DT 10973 44 2 cybersecurity cybersecurity NN 10973 44 3 course course NN 10973 44 4 is be VBZ 10973 44 5 not not RB 10973 44 6 a a DT 10973 44 7 core core NN 10973 44 8 course course NN 10973 44 9 or or CC 10973 44 10 a a DT 10973 44 11 class class NN 10973 44 12 required require VBN 10973 44 13 for for IN 10973 44 14 graduation graduation NN 10973 44 15 . . . 10973 45 1 Therefore therefore RB 10973 45 2 , , , 10973 45 3 enrolling enrol VBG 10973 45 4 in in IN 10973 45 5 the the DT 10973 45 6 course course NN 10973 45 7 implies imply VBZ 10973 45 8 motivation motivation NN 10973 45 9 to to TO 10973 45 10 learn learn VB 10973 45 11 about about IN 10973 45 12 cybersecurity cybersecurity NN 10973 45 13 by by IN 10973 45 14 participating participate VBG 10973 45 15 in in IN 10973 45 16 course course NN 10973 45 17 activities activity NNS 10973 45 18 and and CC 10973 45 19 completing complete VBG 10973 45 20 assigned assign VBN 10973 45 21 work work NN 10973 45 22 . . . 10973 46 1 User User NNP 10973 46 2 Participation Participation NNP 10973 46 3 User User NNP 10973 46 4 participation participation NN 10973 46 5 in in IN 10973 46 6 information information NN 10973 46 7 security security NN 10973 46 8 activities activity NNS 10973 46 9 may may MD 10973 46 10 influence influence VB 10973 46 11 effective effective JJ 10973 46 12 knowledge knowledge NN 10973 46 13 transfer transfer NN 10973 46 14 initiatives.24 initiatives.24 NNP 10973 46 15 According accord VBG 10973 46 16 to to IN 10973 46 17 previous previous JJ 10973 46 18 research research NN 10973 46 19 , , , 10973 46 20 when when WRB 10973 46 21 users user NNS 10973 46 22 participate participate VBP 10973 46 23 in in IN 10973 46 24 cybersecurity cybersecurity NN 10973 46 25 activities activity NNS 10973 46 26 , , , 10973 46 27 security security NN 10973 46 28 safeguards safeguard NNS 10973 46 29 were be VBD 10973 46 30 more more RBR 10973 46 31 aligned align VBN 10973 46 32 with with IN 10973 46 33 organizational organizational JJ 10973 46 34 objectives objective NNS 10973 46 35 and and CC 10973 46 36 were be VBD 10973 46 37 more more RBR 10973 46 38 effectively effectively RB 10973 46 39 designed design VBN 10973 46 40 and and CC 10973 46 41 performed perform VBN 10973 46 42 within within IN 10973 46 43 the the DT 10973 46 44 organization.25 organization.25 NNP 10973 46 45 For for IN 10973 46 46 the the DT 10973 46 47 present present JJ 10973 46 48 study study NN 10973 46 49 , , , 10973 46 50 given give VBN 10973 46 51 that that IN 10973 46 52 students student NNS 10973 46 53 enrolled enrol VBN 10973 46 54 in in IN 10973 46 55 the the DT 10973 46 56 cybersecurity cybersecurity NN 10973 46 57 course course NN 10973 46 58 , , , 10973 46 59 it -PRON- PRP 10973 46 60 is be VBZ 10973 46 61 expected expect VBN 10973 46 62 that that IN 10973 46 63 they -PRON- PRP 10973 46 64 will will MD 10973 46 65 participate participate VB 10973 46 66 in in IN 10973 46 67 information information NN 10973 46 68 security security NN 10973 46 69 risk risk NN 10973 46 70 management management NN 10973 46 71 activities activity NNS 10973 46 72 , , , 10973 46 73 such such JJ 10973 46 74 as as IN 10973 46 75 the the DT 10973 46 76 completion completion NN 10973 46 77 of of IN 10973 46 78 personal personal JJ 10973 46 79 and and CC 10973 46 80 organizational organizational JJ 10973 46 81 risk risk NN 10973 46 82 management management NN 10973 46 83 projects project NNS 10973 46 84 . . . 10973 47 1 CYBERSECURITY CYBERSECURITY NNS 10973 47 2 COURSE course NN 10973 47 3 INFORMATION INFORMATION VBD 10973 47 4 This this DT 10973 47 5 study study NN 10973 47 6 will will MD 10973 47 7 examine examine VB 10973 47 8 whether whether IN 10973 47 9 cybersecurity cybersecurity NN 10973 47 10 education education NN 10973 47 11 strengthens strengthen VBZ 10973 47 12 information information NN 10973 47 13 security security NN 10973 47 14 practices practice NNS 10973 47 15 within within IN 10973 47 16 libraries library NNS 10973 47 17 . . . 10973 48 1 Based base VBN 10973 48 2 on on IN 10973 48 3 the the DT 10973 48 4 model model NN 10973 48 5 in in IN 10973 48 6 figure figure NN 10973 48 7 1 1 CD 10973 48 8 , , , 10973 48 9 students student NNS 10973 48 10 enrolled enrol VBN 10973 48 11 in in IN 10973 48 12 the the DT 10973 48 13 cybersecurity cybersecurity NN 10973 48 14 course course NN 10973 48 15 ( ( -LRB- 10973 48 16 motivation motivation NN 10973 48 17 ) ) -RRB- 10973 48 18 , , , 10973 48 19 and and CC 10973 48 20 therefore therefore RB 10973 48 21 , , , 10973 48 22 were be VBD 10973 48 23 expected expect VBN 10973 48 24 to to TO 10973 48 25 participate participate VB 10973 48 26 in in IN 10973 48 27 all all DT 10973 48 28 course course NN 10973 48 29 activities activity NNS 10973 48 30 and and CC 10973 48 31 complete complete VB 10973 48 32 assigned assigned JJ 10973 48 33 work work NN 10973 48 34 ( ( -LRB- 10973 48 35 user user NN 10973 48 36 participation participation NN 10973 48 37 ) ) -RRB- 10973 48 38 , , , 10973 48 39 such such JJ 10973 48 40 as as IN 10973 48 41 ISRM ISRM NNP 10973 48 42 assignments assignment NNS 10973 48 43 . . . 10973 49 1 ISRM ISRM NNP 10973 49 2 assignments assignment NNS 10973 49 3 are be VBP 10973 49 4 described describe VBN 10973 49 5 in in IN 10973 49 6 the the DT 10973 49 7 Course Course NNP 10973 49 8 Material Material NNP 10973 49 9 section section NN 10973 49 10 below below RB 10973 49 11 . . . 10973 50 1 As as IN 10973 50 2 per per IN 10973 50 3 figure figure NN 10973 50 4 2 2 CD 10973 50 5 , , , 10973 50 6 the the DT 10973 50 7 cybersecurity cybersecurity NN 10973 50 8 course course NN 10973 50 9 was be VBD 10973 50 10 offered offer VBN 10973 50 11 online online RB 10973 50 12 , , , 10973 50 13 and and CC 10973 50 14 used use VBD 10973 50 15 multiple multiple JJ 10973 50 16 forms form NNS 10973 50 17 of of IN 10973 50 18 communication communication NN 10973 50 19 , , , 10973 50 20 including include VBG 10973 50 21 email email NN 10973 50 22 , , , 10973 50 23 video video NN 10973 50 24 conferencing conferencing NN 10973 50 25 , , , 10973 50 26 discussion discussion NN 10973 50 27 board board NNP 10973 50 28 , , , 10973 50 29 and and CC 10973 50 30 pre pre JJ 10973 50 31 - - JJ 10973 50 32 recorded recorded JJ 10973 50 33 videos video NNS 10973 50 34 ( ( -LRB- 10973 50 35 communication communication NN 10973 50 36 ) ) -RRB- 10973 50 37 . . . 10973 51 1 Students student NNS 10973 51 2 were be VBD 10973 51 3 able able JJ 10973 51 4 to to TO 10973 51 5 access access VB 10973 51 6 these these DT 10973 51 7 resources resource NNS 10973 51 8 through through IN 10973 51 9 Canvas Canvas NNP 10973 51 10 , , , 10973 51 11 a a DT 10973 51 12 learning learn VBG 10973 51 13 management management NN 10973 51 14 system system NN 10973 51 15 . . . 10973 52 1 Students student NNS 10973 52 2 came come VBD 10973 52 3 into into IN 10973 52 4 the the DT 10973 52 5 class class NN 10973 52 6 with with IN 10973 52 7 some some DT 10973 52 8 understanding understanding NN 10973 52 9 of of IN 10973 52 10 principle principle NN 10973 52 11 3 3 CD 10973 52 12 in in IN 10973 52 13 the the DT 10973 52 14 ALA ALA NNP 10973 52 15 Code Code NNP 10973 52 16 of of IN 10973 52 17 Ethics Ethics NNP 10973 52 18 . . . 10973 53 1 Therefore therefore RB 10973 53 2 , , , 10973 53 3 given give VBN 10973 53 4 that that IN 10973 53 5 this this DT 10973 53 6 knowledge knowledge NN 10973 53 7 is be VBZ 10973 53 8 in in IN 10973 53 9 a a DT 10973 53 10 “ " `` 10973 53 11 related related JJ 10973 53 12 area area NN 10973 53 13 , , , 10973 53 14 ” " '' 10973 53 15 students student NNS 10973 53 16 may may MD 10973 53 17 be be VB 10973 53 18 able able JJ 10973 53 19 to to TO 10973 53 20 process process VB 10973 53 21 new new JJ 10973 53 22 information information NN 10973 53 23 relating relate VBG 10973 53 24 to to IN 10973 53 25 cybersecurity cybersecurity NN 10973 53 26 ( ( -LRB- 10973 53 27 absorptive absorptive JJ 10973 53 28 capacity capacity NN 10973 53 29 ) ) -RRB- 10973 53 30 . . . 10973 54 1 As as IN 10973 54 2 per per IN 10973 54 3 the the DT 10973 54 4 above above JJ 10973 54 5 information information NN 10973 54 6 and and CC 10973 54 7 as as IN 10973 54 8 depicted depict VBN 10973 54 9 in in IN 10973 54 10 figure figure NN 10973 54 11 1 1 CD 10973 54 12 , , , 10973 54 13 motivation motivation NN 10973 54 14 , , , 10973 54 15 user user NN 10973 54 16 participation participation NN 10973 54 17 , , , 10973 54 18 communication communication NN 10973 54 19 , , , 10973 54 20 and and CC 10973 54 21 absorptive absorptive JJ 10973 54 22 capacity capacity NN 10973 54 23 will will MD 10973 54 24 lead lead VB 10973 54 25 to to IN 10973 54 26 knowledge knowledge NN 10973 54 27 transfer transfer NN 10973 54 28 . . . 10973 55 1 Therefore therefore RB 10973 55 2 , , , 10973 55 3 this this DT 10973 55 4 study study NN 10973 55 5 will will MD 10973 55 6 focus focus VB 10973 55 7 on on IN 10973 55 8 how how WRB 10973 55 9 knowledge knowledge NN 10973 55 10 transfer transfer NN 10973 55 11 , , , 10973 55 12 as as IN 10973 55 13 a a DT 10973 55 14 means means NN 10973 55 15 to to TO 10973 55 16 strengthen strengthen VB 10973 55 17 information information NN 10973 55 18 security security NN 10973 55 19 , , , 10973 55 20 leads lead VBZ 10973 55 21 to to IN 10973 55 22 knowledge knowledge NN 10973 55 23 utilization utilization NN 10973 55 24 by by IN 10973 55 25 cybersecurity cybersecurity NN 10973 55 26 students student NNS 10973 55 27 within within IN 10973 55 28 information information NN 10973 55 29 organizations organization NNS 10973 55 30 . . . 10973 56 1 INFORMATION INFORMATION NNP 10973 56 2 SECURITY SECURITY NNP 10973 56 3 IN in IN 10973 56 4 LIBRARIES LIBRARIES NNP 10973 56 5 | | NNP 10973 56 6 SAN SAN NNP 10973 56 7 - - HYPH 10973 56 8 NICOLAS NICOLAS NNP 10973 56 9 - - HYPH 10973 56 10 ROCCA ROCCA NNP 10973 56 11 AND and CC 10973 56 12 BURKHARD burkhard NN 10973 56 13 62 62 CD 10973 56 14 https://doi.org/10.6017/ital.v38i2.10973 https://doi.org/10.6017/ital.v38i2.10973 NNP 10973 56 15 Specifically specifically RB 10973 56 16 , , , 10973 56 17 this this DT 10973 56 18 study study NN 10973 56 19 will will MD 10973 56 20 explore explore VB 10973 56 21 the the DT 10973 56 22 possibility possibility NN 10973 56 23 of of IN 10973 56 24 knowledge knowledge NN 10973 56 25 utilization utilization NN 10973 56 26 leading lead VBG 10973 56 27 to to IN 10973 56 28 motivation motivation NN 10973 56 29 , , , 10973 56 30 and and CC 10973 56 31 participation participation NN 10973 56 32 in in IN 10973 56 33 ISRM ISRM NNP 10973 56 34 initiatives initiative NNS 10973 56 35 in in IN 10973 56 36 libraries library NNS 10973 56 37 . . . 10973 57 1 Figure figure NN 10973 57 2 2 2 CD 10973 57 3 . . . 10973 58 1 Knowledge Knowledge NNP 10973 58 2 Transfer Transfer NNP 10973 58 3 Elements Elements NNPS 10973 58 4 : : : 10973 58 5 Cybersecurity cybersecurity NN 10973 58 6 Knowledge knowledge NN 10973 58 7 Transfer Transfer NNP 10973 58 8 for for IN 10973 58 9 Information Information NNP 10973 58 10 Organizations Organizations NNP 10973 58 11 . . . 10973 59 1 Course Course NNP 10973 59 2 Material Material NNP 10973 59 3 The the DT 10973 59 4 course course NN 10973 59 5 was be VBD 10973 59 6 offered offer VBN 10973 59 7 to to TO 10973 59 8 graduate graduate VB 10973 59 9 students student NNS 10973 59 10 at at IN 10973 59 11 Mountain Mountain NNP 10973 59 12 View View NNP 10973 59 13 University University NNP 10973 59 14 . . . 10973 60 1 Course course NN 10973 60 2 material material NN 10973 60 3 was be VBD 10973 60 4 created create VBN 10973 60 5 based base VBN 10973 60 6 on on IN 10973 60 7 the the DT 10973 60 8 National National NNP 10973 60 9 Institute Institute NNP 10973 60 10 of of IN 10973 60 11 Technology Technology NNP 10973 60 12 Special Special NNP 10973 60 13 Publication Publication NNP 10973 60 14 ( ( -LRB- 10973 60 15 NIST NIST NNP 10973 60 16 SP SP NNP 10973 60 17 ) ) -RRB- 10973 60 18 800 800 CD 10973 60 19 - - SYM 10973 60 20 53 53 CD 10973 60 21 and and CC 10973 60 22 60 60 CD 10973 60 23 , , , 10973 60 24 as as RB 10973 60 25 well well RB 10973 60 26 as as IN 10973 60 27 Federal Federal NNP 10973 60 28 Information Information NNP 10973 60 29 Processing Processing NNP 10973 60 30 Standards Standards NNPS 10973 60 31 ( ( -LRB- 10973 60 32 FIPS FIPS NNP 10973 60 33 ) ) -RRB- 10973 60 34 Publications Publications NNP 10973 60 35 199 199 CD 10973 60 36 and and CC 10973 60 37 200 200 CD 10973 60 38 . . . 10973 61 1 The the DT 10973 61 2 focus focus NN 10973 61 3 of of IN 10973 61 4 the the DT 10973 61 5 course course NN 10973 61 6 was be VBD 10973 61 7 information information NN 10973 61 8 security security NN 10973 61 9 risk risk NN 10973 61 10 management management NN 10973 61 11 ( ( -LRB- 10973 61 12 ISRM ISRM NNP 10973 61 13 ) ) -RRB- 10973 61 14 . . . 10973 62 1 Course course NN 10973 62 2 requirements requirement NNS 10973 62 3 included include VBD 10973 62 4 lab lab NN 10973 62 5 exercises exercise NNS 10973 62 6 , , , 10973 62 7 discussion discussion NN 10973 62 8 posts post NNS 10973 62 9 relating relate VBG 10973 62 10 to to IN 10973 62 11 current current JJ 10973 62 12 cybersecurity cybersecurity NN 10973 62 13 findings finding NNS 10973 62 14 and and CC 10973 62 15 news news NN 10973 62 16 reports report NNS 10973 62 17 , , , 10973 62 18 and and CC 10973 62 19 ISRM ISRM NNP 10973 62 20 assignments assignment NNS 10973 62 21 . . . 10973 63 1 ISRM ISRM NNP 10973 63 2 assignments assignment NNS 10973 63 3 included include VBD 10973 63 4 a a DT 10973 63 5 personal personal JJ 10973 63 6 risk risk NN 10973 63 7 management management NN 10973 63 8 assignment assignment NN 10973 63 9 , , , 10973 63 10 which which WDT 10973 63 11 then then RB 10973 63 12 led lead VBD 10973 63 13 to to IN 10973 63 14 the the DT 10973 63 15 completion completion NN 10973 63 16 of of IN 10973 63 17 an an DT 10973 63 18 organizational organizational JJ 10973 63 19 risk risk NN 10973 63 20 management management NN 10973 63 21 project project NN 10973 63 22 ( ( -LRB- 10973 63 23 ORMP ORMP NNP 10973 63 24 ) ) -RRB- 10973 63 25 . . . 10973 64 1 Students student NNS 10973 64 2 completed complete VBD 10973 64 3 the the DT 10973 64 4 ORMP ORMP NNP 10973 64 5 for for IN 10973 64 6 various various JJ 10973 64 7 libraries library NNS 10973 64 8 , , , 10973 64 9 healthcare healthcare NN 10973 64 10 institutions institution NNS 10973 64 11 , , , 10973 64 12 pharmaceutical pharmaceutical NN 10973 64 13 companies company NNS 10973 64 14 , , , 10973 64 15 government government NN 10973 64 16 organizations organization NNS 10973 64 17 , , , 10973 64 18 and and CC 10973 64 19 small small JJ 10973 64 20 businesses business NNS 10973 64 21 . . . 10973 65 1 With with IN 10973 65 2 instructor instructor NN 10973 65 3 approval approval NN 10973 65 4 , , , 10973 65 5 students student NNS 10973 65 6 were be VBD 10973 65 7 allowed allow VBN 10973 65 8 to to TO 10973 65 9 select select VB 10973 65 10 the the DT 10973 65 11 organization organization NN 10973 65 12 they -PRON- PRP 10973 65 13 wanted want VBD 10973 65 14 to to TO 10973 65 15 work work VB 10973 65 16 with with IN 10973 65 17 . . . 10973 66 1 The the DT 10973 66 2 objective objective NN 10973 66 3 of of IN 10973 66 4 the the DT 10973 66 5 course course NN 10973 66 6 was be VBD 10973 66 7 for for IN 10973 66 8 students student NNS 10973 66 9 to to TO 10973 66 10 obtain obtain VB 10973 66 11 an an DT 10973 66 12 understanding understanding NN 10973 66 13 of of IN 10973 66 14 ISRM ISRM NNP 10973 66 15 and and CC 10973 66 16 be be VB 10973 66 17 able able JJ 10973 66 18 to to TO 10973 66 19 apply apply VB 10973 66 20 what what WP 10973 66 21 they -PRON- PRP 10973 66 22 have have VBP 10973 66 23 learned learn VBN 10973 66 24 to to IN 10973 66 25 the the DT 10973 66 26 workplace workplace NN 10973 66 27 . . . 10973 67 1 Course course NN 10973 67 2 Communication communication NN 10973 67 3 SETA seta NN 10973 67 4 programs program NNS 10973 67 5 depend depend VBP 10973 67 6 strongly strongly RB 10973 67 7 on on IN 10973 67 8 the the DT 10973 67 9 ability ability NN 10973 67 10 of of IN 10973 67 11 the the DT 10973 67 12 knowledge knowledge NN 10973 67 13 source source NN 10973 67 14 to to TO 10973 67 15 effectively effectively RB 10973 67 16 communicate communicate VB 10973 67 17 the the DT 10973 67 18 importance importance NN 10973 67 19 and and CC 10973 67 20 applicability applicability NN 10973 67 21 of of IN 10973 67 22 the the DT 10973 67 23 knowledge knowledge NN 10973 67 24 shared share VBD 10973 67 25 . . . 10973 68 1 Current current JJ 10973 68 2 research research NN 10973 68 3 suggests suggest VBZ 10973 68 4 that that IN 10973 68 5 the the DT 10973 68 6 type type NN 10973 68 7 of of IN 10973 68 8 communication communication NN 10973 68 9 medium medium NN 10973 68 10 , , , 10973 68 11 relevance relevance NN 10973 68 12 and and CC 10973 68 13 usefulness usefulness NN 10973 68 14 of of IN 10973 68 15 the the DT 10973 68 16 information information NN 10973 68 17 , , , 10973 68 18 and and CC 10973 68 19 competency competency NN 10973 68 20 of of IN 10973 68 21 the the DT 10973 68 22 instructor instructor NN 10973 68 23 can can MD 10973 68 24 affect affect VB 10973 68 25 knowledge knowledge NN 10973 68 26 transfer transfer NN 10973 68 27 . . . 10973 69 1 Given give VBN 10973 69 2 that that DT 10973 69 3 face face NN 10973 69 4 - - HYPH 10973 69 5 to to IN 10973 69 6 - - HYPH 10973 69 7 face face NN 10973 69 8 communication communication NN 10973 69 9 is be VBZ 10973 69 10 considered consider VBN 10973 69 11 the the DT 10973 69 12 best good JJS 10973 69 13 method method NN 10973 69 14 for for IN 10973 69 15 successful successful JJ 10973 69 16 knowledge knowledge NN 10973 69 17 transfer transfer NN 10973 69 18 , , , 10973 69 19 it -PRON- PRP 10973 69 20 is be VBZ 10973 69 21 important important JJ 10973 69 22 to to TO 10973 69 23 understand understand VB 10973 69 24 if if IN 10973 69 25 online online JJ 10973 69 26 communication communication NN 10973 69 27 methods method NNS 10973 69 28 were be VBD 10973 69 29 effective effective JJ 10973 69 30 in in IN 10973 69 31 the the DT 10973 69 32 cybersecurity cybersecurity NN 10973 69 33 course course NN 10973 69 34 described describe VBD 10973 69 35 herein herein NNP 10973 69 36 as as IN 10973 69 37 the the DT 10973 69 38 main main JJ 10973 69 39 focus focus NN 10973 69 40 of of IN 10973 69 41 this this DT 10973 69 42 study study NN 10973 69 43 is be VBZ 10973 69 44 to to TO 10973 69 45 determine determine VB 10973 69 46 if if IN 10973 69 47 knowledge knowledge NN 10973 69 48 transfer transfer NN 10973 69 49 leads lead VBZ 10973 69 50 to to IN 10973 69 51 knowledge knowledge NN 10973 69 52 utilization utilization NN 10973 69 53 . . . 10973 70 1 According accord VBG 10973 70 2 to to IN 10973 70 3 table table NN 10973 70 4 1 1 CD 10973 70 5 , , , 10973 70 6 respondents respondent VBZ 10973 70 7 “ " `` 10973 70 8 Strongly strongly RB 10973 70 9 Agree agree VB 10973 70 10 ” " '' 10973 70 11 or or CC 10973 70 12 “ " `` 10973 70 13 Agree agree VB 10973 70 14 ” " '' 10973 70 15 that that IN 10973 70 16 the the DT 10973 70 17 materials material NNS 10973 70 18 used use VBN 10973 70 19 , , , 10973 70 20 relevance relevance NN 10973 70 21 of of IN 10973 70 22 communication communication NN 10973 70 23 , , , 10973 70 24 comprehension comprehension NN 10973 70 25 of of IN 10973 70 26 instructor instructor NN 10973 70 27 communication communication NN 10973 70 28 , , , 10973 70 29 and and CC 10973 70 30 the the DT 10973 70 31 amount amount NN 10973 70 32 of of IN 10973 70 33 time time NN 10973 70 34 communicating communicate VBG 10973 70 35 about about IN 10973 70 36 cybersecurity cybersecurity NN 10973 70 37 in in IN 10973 70 38 the the DT 10973 70 39 course course NN 10973 70 40 was be VBD 10973 70 41 effective effective JJ 10973 70 42 ( ( -LRB- 10973 70 43 data datum NNS 10973 70 44 collection collection NN 10973 70 45 described describe VBN 10973 70 46 in in IN 10973 70 47 section section NN 10973 70 48 , , , 10973 70 49 Data Data NNP 10973 70 50 Collection Collection NNP 10973 70 51 and and CC 10973 70 52 Analysis Analysis NNP 10973 70 53 . . . 10973 71 1 INFORMATION INFORMATION NNP 10973 71 2 TECHNOLOGY technology NN 10973 71 3 AND and CC 10973 71 4 LIBRARIES LIBRARIES NNP 10973 71 5 | | NNP 10973 71 6 JUNE JUNE NNP 10973 71 7 2019 2019 CD 10973 71 8 63 63 CD 10973 71 9 Questions Questions NNPS 10973 71 10 Response Response NNP 10973 71 11 Strongly strongly RB 10973 71 12 Agree agree VB 10973 71 13 Agree Agree NNP 10973 71 14 Neither neither CC 10973 71 15 Agree Agree NNP 10973 71 16 nor nor CC 10973 71 17 Disagree disagree NN 10973 71 18 Disagree disagree NN 10973 71 19 Strongly strongly RB 10973 71 20 Disagree disagree VBP 10973 71 21 Medium medium NN 10973 71 22 : : : 10973 71 23 The the DT 10973 71 24 material material NN 10973 71 25 used use VBN 10973 71 26 in in IN 10973 71 27 the the DT 10973 71 28 cybersecurity cybersecurity NN 10973 71 29 course course NN 10973 71 30 I -PRON- PRP 10973 71 31 took take VBD 10973 71 32 at at IN 10973 71 33 MVU MVU NNP 10973 71 34 communicated communicate VBN 10973 71 35 security security NN 10973 71 36 lessons lesson NNS 10973 71 37 effectively effectively RB 10973 71 38 . . . 10973 72 1 12 12 CD 10973 72 2 ( ( -LRB- 10973 72 3 50 50 CD 10973 72 4 % % NN 10973 72 5 ) ) -RRB- 10973 72 6 12 12 CD 10973 72 7 ( ( -LRB- 10973 72 8 50 50 CD 10973 72 9 % % NN 10973 72 10 ) ) -RRB- 10973 72 11 0 0 NFP 10973 72 12 ( ( -LRB- 10973 72 13 0.00 0.00 CD 10973 72 14 % % NN 10973 72 15 ) ) -RRB- 10973 72 16 0 0 NFP 10973 72 17 ( ( -LRB- 10973 72 18 0.00 0.00 CD 10973 72 19 % % NN 10973 72 20 ) ) -RRB- 10973 72 21 0 0 NFP 10973 72 22 ( ( -LRB- 10973 72 23 0.00 0.00 CD 10973 72 24 % % NN 10973 72 25 ) ) -RRB- 10973 72 26 Relevance relevance NN 10973 72 27 : : : 10973 72 28 Communication communication NN 10973 72 29 during during IN 10973 72 30 the the DT 10973 72 31 cybersecurity cybersecurity NN 10973 72 32 course course NN 10973 72 33 I -PRON- PRP 10973 72 34 took take VBD 10973 72 35 at at IN 10973 72 36 MVU MVU NNP 10973 72 37 was be VBD 10973 72 38 effective effective JJ 10973 72 39 in in IN 10973 72 40 focusing focus VBG 10973 72 41 on on IN 10973 72 42 things thing NNS 10973 72 43 I -PRON- PRP 10973 72 44 needed need VBD 10973 72 45 to to TO 10973 72 46 know know VB 10973 72 47 about about IN 10973 72 48 cybersecurity cybersecurity NN 10973 72 49 for for IN 10973 72 50 my -PRON- PRP$ 10973 72 51 job job NN 10973 72 52 . . . 10973 73 1 10 10 CD 10973 73 2 ( ( -LRB- 10973 73 3 45.45 45.45 CD 10973 73 4 % % NN 10973 73 5 ) ) -RRB- 10973 73 6 12 12 CD 10973 73 7 ( ( -LRB- 10973 73 8 54.55 54.55 CD 10973 73 9 % % NN 10973 73 10 ) ) -RRB- 10973 73 11 0 0 NFP 10973 73 12 ( ( -LRB- 10973 73 13 0.00 0.00 CD 10973 73 14 % % NN 10973 73 15 ) ) -RRB- 10973 73 16 0 0 NFP 10973 73 17 ( ( -LRB- 10973 73 18 0.00 0.00 CD 10973 73 19 % % NN 10973 73 20 ) ) -RRB- 10973 73 21 0 0 NFP 10973 73 22 ( ( -LRB- 10973 73 23 0.00 0.00 CD 10973 73 24 % % NN 10973 73 25 ) ) -RRB- 10973 73 26 Comprehension comprehension NN 10973 73 27 : : : 10973 73 28 In in IN 10973 73 29 the the DT 10973 73 30 cybersecurity cybersecurity NN 10973 73 31 course course NN 10973 73 32 I -PRON- PRP 10973 73 33 took take VBD 10973 73 34 at at IN 10973 73 35 MVU MVU NNP 10973 73 36 , , , 10973 73 37 the the DT 10973 73 38 instructor instructor NN 10973 73 39 ’s ’s POS 10973 73 40 oral oral JJ 10973 73 41 and/or and/or CC 10973 73 42 written write VBN 10973 73 43 communication communication NN 10973 73 44 with with IN 10973 73 45 me -PRON- PRP 10973 73 46 was be VBD 10973 73 47 understandable understandable JJ 10973 73 48 . . . 10973 74 1 12 12 CD 10973 74 2 ( ( -LRB- 10973 74 3 54.55 54.55 CD 10973 74 4 % % NN 10973 74 5 ) ) -RRB- 10973 74 6 10 10 CD 10973 74 7 ( ( -LRB- 10973 74 8 45.45 45.45 CD 10973 74 9 % % NN 10973 74 10 ) ) -RRB- 10973 74 11 0 0 NFP 10973 74 12 ( ( -LRB- 10973 74 13 0.00 0.00 CD 10973 74 14 % % NN 10973 74 15 ) ) -RRB- 10973 74 16 0 0 NFP 10973 74 17 ( ( -LRB- 10973 74 18 0.00 0.00 CD 10973 74 19 % % NN 10973 74 20 ) ) -RRB- 10973 74 21 0 0 NFP 10973 74 22 ( ( -LRB- 10973 74 23 0.00 0.00 CD 10973 74 24 % % NN 10973 74 25 ) ) -RRB- 10973 74 26 Amount amount NN 10973 74 27 : : : 10973 74 28 In in IN 10973 74 29 the the DT 10973 74 30 cybersecurity cybersecurity NN 10973 74 31 course course NN 10973 74 32 I -PRON- PRP 10973 74 33 took take VBD 10973 74 34 at at IN 10973 74 35 MVU MVU NNP 10973 74 36 , , , 10973 74 37 the the DT 10973 74 38 amount amount NN 10973 74 39 of of IN 10973 74 40 time time NN 10973 74 41 communicating communicate VBG 10973 74 42 about about IN 10973 74 43 cybersecurity cybersecurity NN 10973 74 44 was be VBD 10973 74 45 sufficient sufficient JJ 10973 74 46 . . . 10973 75 1 12 12 CD 10973 75 2 ( ( -LRB- 10973 75 3 54.55 54.55 CD 10973 75 4 % % NN 10973 75 5 ) ) -RRB- 10973 75 6 10 10 CD 10973 75 7 ( ( -LRB- 10973 75 8 45.45 45.45 CD 10973 75 9 % % NN 10973 75 10 ) ) -RRB- 10973 75 11 0 0 NFP 10973 75 12 ( ( -LRB- 10973 75 13 0.00 0.00 CD 10973 75 14 % % NN 10973 75 15 ) ) -RRB- 10973 75 16 0 0 NFP 10973 75 17 ( ( -LRB- 10973 75 18 0.00 0.00 CD 10973 75 19 % % NN 10973 75 20 ) ) -RRB- 10973 75 21 0 0 NFP 10973 75 22 ( ( -LRB- 10973 75 23 0.00 0.00 CD 10973 75 24 % % NN 10973 75 25 ) ) -RRB- 10973 75 26 Table table NN 10973 75 27 1 1 CD 10973 75 28 . . . 10973 76 1 Effectiveness effectiveness NN 10973 76 2 of of IN 10973 76 3 communication communication NN 10973 76 4 in in IN 10973 76 5 cybersecurity cybersecurity NN 10973 76 6 course course NN 10973 76 7 . . . 10973 77 1 DATA datum NNS 10973 77 2 COLLECTION COLLECTION NNPS 10973 77 3 AND and CC 10973 77 4 ANALYSIS analysis VBP 10973 77 5 The the DT 10973 77 6 purpose purpose NN 10973 77 7 of of IN 10973 77 8 this this DT 10973 77 9 study study NN 10973 77 10 is be VBZ 10973 77 11 to to TO 10973 77 12 determine determine VB 10973 77 13 if if IN 10973 77 14 knowledge knowledge NN 10973 77 15 transfer transfer NN 10973 77 16 through through IN 10973 77 17 cybersecurity cybersecurity NN 10973 77 18 education education NN 10973 77 19 , , , 10973 77 20 as as IN 10973 77 21 a a DT 10973 77 22 means means NN 10973 77 23 to to TO 10973 77 24 strengthen strengthen VB 10973 77 25 information information NN 10973 77 26 security security NN 10973 77 27 , , , 10973 77 28 leads lead VBZ 10973 77 29 to to IN 10973 77 30 knowledge knowledge NN 10973 77 31 utilization utilization NN 10973 77 32 within within IN 10973 77 33 libraries library NNS 10973 77 34 . . . 10973 78 1 Specifically specifically RB 10973 78 2 , , , 10973 78 3 this this DT 10973 78 4 study study NN 10973 78 5 will will MD 10973 78 6 examine examine VB 10973 78 7 if if IN 10973 78 8 research research NN 10973 78 9 participants participant NNS 10973 78 10 will will MD 10973 78 11 engage engage VB 10973 78 12 in in IN 10973 78 13 ISRM ISRM NNP 10973 78 14 activities activity NNS 10973 78 15 after after IN 10973 78 16 completion completion NN 10973 78 17 of of IN 10973 78 18 the the DT 10973 78 19 cybersecurity cybersecurity NN 10973 78 20 education education NN 10973 78 21 course course NN 10973 78 22 . . . 10973 79 1 The the DT 10973 79 2 model model NN 10973 79 3 in in IN 10973 79 4 figure figure NN 10973 79 5 1 1 CD 10973 79 6 is be VBZ 10973 79 7 examined examine VBN 10973 79 8 via via IN 10973 79 9 survey survey NN 10973 79 10 instrument instrument NN 10973 79 11 by by IN 10973 79 12 the the DT 10973 79 13 authors author NNS 10973 79 14 . . . 10973 80 1 The the DT 10973 80 2 survey survey NN 10973 80 3 instrument instrument NN 10973 80 4 was be VBD 10973 80 5 available available JJ 10973 80 6 to to IN 10973 80 7 former former JJ 10973 80 8 students student NNS 10973 80 9 who who WP 10973 80 10 completed complete VBD 10973 80 11 an an DT 10973 80 12 online online JJ 10973 80 13 , , , 10973 80 14 semester semester NN 10973 80 15 long long JJ 10973 80 16 , , , 10973 80 17 cybersecurity cybersecurity NN 10973 80 18 course course NN 10973 80 19 from from IN 10973 80 20 fall fall NN 10973 80 21 2013 2013 CD 10973 80 22 through through IN 10973 80 23 fall fall NN 10973 80 24 2017 2017 CD 10973 80 25 . . . 10973 81 1 One one CD 10973 81 2 hundred hundred CD 10973 81 3 and and CC 10973 81 4 twenty twenty CD 10973 81 5 - - HYPH 10973 81 6 six six CD 10973 81 7 former former JJ 10973 81 8 students student NNS 10973 81 9 completed complete VBD 10973 81 10 one one CD 10973 81 11 of of IN 10973 81 12 eight eight CD 10973 81 13 cybersecurity cybersecurity NN 10973 81 14 courses course NNS 10973 81 15 , , , 10973 81 16 and and CC 10973 81 17 all all DT 10973 81 18 were be VBD 10973 81 19 asked ask VBN 10973 81 20 to to TO 10973 81 21 participate participate VB 10973 81 22 in in IN 10973 81 23 this this DT 10973 81 24 study study NN 10973 81 25 . . . 10973 82 1 Thirty thirty CD 10973 82 2 - - HYPH 10973 82 3 nine nine CD 10973 82 4 students student NNS 10973 82 5 accessed access VBD 10973 82 6 the the DT 10973 82 7 survey survey NN 10973 82 8 , , , 10973 82 9 but but CC 10973 82 10 only only RB 10973 82 11 thirty thirty CD 10973 82 12 - - HYPH 10973 82 13 eight eight CD 10973 82 14 agreed agree VBD 10973 82 15 to to TO 10973 82 16 participate participate VB 10973 82 17 . . . 10973 83 1 Of of IN 10973 83 2 those those DT 10973 83 3 who who WP 10973 83 4 agreed agree VBD 10973 83 5 to to TO 10973 83 6 participate participate VB 10973 83 7 in in IN 10973 83 8 the the DT 10973 83 9 survey survey NN 10973 83 10 , , , 10973 83 11 only only RB 10973 83 12 twenty twenty CD 10973 83 13 - - HYPH 10973 83 14 two two CD 10973 83 15 work work NN 10973 83 16 in in IN 10973 83 17 a a DT 10973 83 18 library library NN 10973 83 19 in in IN 10973 83 20 the the DT 10973 83 21 U.S. U.S. NNP 10973 83 22 or or CC 10973 83 23 a a DT 10973 83 24 U.S. U.S. NNP 10973 83 25 territory territory NN 10973 83 26 . . . 10973 84 1 Of of IN 10973 84 2 the the DT 10973 84 3 other other JJ 10973 84 4 sixteen sixteen CD 10973 84 5 participants participant NNS 10973 84 6 , , , 10973 84 7 twelve twelve CD 10973 84 8 do do VBP 10973 84 9 not not RB 10973 84 10 currently currently RB 10973 84 11 work work VB 10973 84 12 within within IN 10973 84 13 a a DT 10973 84 14 library library NN 10973 84 15 environment environment NN 10973 84 16 , , , 10973 84 17 and and CC 10973 84 18 four four CD 10973 84 19 do do VBP 10973 84 20 not not RB 10973 84 21 have have VB 10973 84 22 a a DT 10973 84 23 job job NN 10973 84 24 . . . 10973 85 1 Therefore therefore RB 10973 85 2 , , , 10973 85 3 responses response NNS 10973 85 4 from from IN 10973 85 5 twenty twenty CD 10973 85 6 - - HYPH 10973 85 7 two two CD 10973 85 8 research research NN 10973 85 9 participants participant NNS 10973 85 10 who who WP 10973 85 11 work work VBP 10973 85 12 in in IN 10973 85 13 a a DT 10973 85 14 library library NN 10973 85 15 in in IN 10973 85 16 the the DT 10973 85 17 U.S. U.S. NNP 10973 85 18 or or CC 10973 85 19 U.S. U.S. NNP 10973 85 20 territory territory NN 10973 85 21 will will MD 10973 85 22 be be VB 10973 85 23 reported report VBN 10973 85 24 in in IN 10973 85 25 this this DT 10973 85 26 study study NN 10973 85 27 . . . 10973 86 1 Table table NN 10973 86 2 2 2 CD 10973 86 3 provides provide VBZ 10973 86 4 a a DT 10973 86 5 list list NN 10973 86 6 of of IN 10973 86 7 the the DT 10973 86 8 types type NNS 10973 86 9 of of IN 10973 86 10 libraries library NNS 10973 86 11 the the DT 10973 86 12 twenty twenty CD 10973 86 13 - - HYPH 10973 86 14 two two CD 10973 86 15 research research NN 10973 86 16 participants participant NNS 10973 86 17 work work VBP 10973 86 18 in in IN 10973 86 19 . . . 10973 87 1 Type type NN 10973 87 2 of of IN 10973 87 3 Library Library NNP 10973 87 4 Environment Environment NNP 10973 87 5 Response Response NNP 10973 87 6 ( ( -LRB- 10973 87 7 22 22 CD 10973 87 8 ) ) -RRB- 10973 87 9 Academic Academic NNP 10973 87 10 Library Library NNP 10973 87 11 3 3 CD 10973 87 12 ( ( -LRB- 10973 87 13 13.64 13.64 CD 10973 87 14 % % NN 10973 87 15 ) ) -RRB- 10973 87 16 Public Public NNP 10973 87 17 Library Library NNP 10973 87 18 11 11 CD 10973 87 19 ( ( -LRB- 10973 87 20 50 50 CD 10973 87 21 % % NN 10973 87 22 ) ) -RRB- 10973 87 23 School School NNP 10973 87 24 Library Library NNP 10973 87 25 ( ( -LRB- 10973 87 26 K-12 k-12 CD 10973 87 27 ) ) -RRB- 10973 87 28 2 2 CD 10973 87 29 ( ( -LRB- 10973 87 30 9.09 9.09 CD 10973 87 31 % % NN 10973 87 32 ) ) -RRB- 10973 87 33 Special Special NNP 10973 87 34 Library Library NNP 10973 87 35 6 6 CD 10973 87 36 ( ( -LRB- 10973 87 37 27.27 27.27 CD 10973 87 38 % % NN 10973 87 39 ) ) -RRB- 10973 87 40 Table table NN 10973 87 41 2 2 CD 10973 87 42 . . . 10973 88 1 Types type NNS 10973 88 2 of of IN 10973 88 3 libraries library NNS 10973 88 4 research research NN 10973 88 5 participants participant NNS 10973 88 6 work work VBP 10973 88 7 in in IN 10973 88 8 . . . 10973 89 1 INFORMATION INFORMATION NNP 10973 89 2 SECURITY SECURITY NNP 10973 89 3 IN in IN 10973 89 4 LIBRARIES LIBRARIES NNP 10973 89 5 | | NNP 10973 89 6 SAN SAN NNP 10973 89 7 - - HYPH 10973 89 8 NICOLAS NICOLAS NNP 10973 89 9 - - HYPH 10973 89 10 ROCCA ROCCA NNP 10973 89 11 AND and CC 10973 89 12 BURKHARD burkhard NN 10973 89 13 64 64 CD 10973 89 14 https://doi.org/10.6017/ital.v38i2.10973 https://doi.org/10.6017/ital.v38i2.10973 TO 10973 89 15 Having have VBG 10973 89 16 knowledge knowledge NN 10973 89 17 and and CC 10973 89 18 an an DT 10973 89 19 understanding understanding NN 10973 89 20 of of IN 10973 89 21 information information NN 10973 89 22 security security NN 10973 89 23 policies policy NNS 10973 89 24 , , , 10973 89 25 work work NN 10973 89 26 processes process NNS 10973 89 27 , , , 10973 89 28 and and CC 10973 89 29 information information NN 10973 89 30 and and CC 10973 89 31 information information NN 10973 89 32 system system NN 10973 89 33 use use VBP 10973 89 34 within within IN 10973 89 35 a a DT 10973 89 36 library library NN 10973 89 37 environment environment NN 10973 89 38 , , , 10973 89 39 a a DT 10973 89 40 knowledge knowledge NN 10973 89 41 recipient recipient NN 10973 89 42 may may MD 10973 89 43 understand understand VB 10973 89 44 the the DT 10973 89 45 value value NN 10973 89 46 of of IN 10973 89 47 the the DT 10973 89 48 knowledge knowledge NN 10973 89 49 shared share VBN 10973 89 50 with with IN 10973 89 51 them -PRON- PRP 10973 89 52 through through IN 10973 89 53 effective effective JJ 10973 89 54 SETA SETA NNP 10973 89 55 programs program NNS 10973 89 56 and and CC 10973 89 57 utilize utilize VB 10973 89 58 the the DT 10973 89 59 new new JJ 10973 89 60 knowledge knowledge NN 10973 89 61 to to TO 10973 89 62 protect protect VB 10973 89 63 information information NN 10973 89 64 and and CC 10973 89 65 information information NN 10973 89 66 resources resource NNS 10973 89 67 . . . 10973 90 1 According accord VBG 10973 90 2 to to IN 10973 90 3 table table NN 10973 90 4 3 3 CD 10973 90 5 , , , 10973 90 6 most most JJS 10973 90 7 survey survey NN 10973 90 8 participants participant NNS 10973 90 9 stated state VBD 10973 90 10 that that IN 10973 90 11 they -PRON- PRP 10973 90 12 have have VBP 10973 90 13 average average JJ 10973 90 14 to to IN 10973 90 15 excellent excellent JJ 10973 90 16 knowledge knowledge NN 10973 90 17 of of IN 10973 90 18 their -PRON- PRP$ 10973 90 19 library library NN 10973 90 20 ’s ’s POS 10973 90 21 computing compute VBG 10973 90 22 - - HYPH 10973 90 23 related relate VBN 10973 90 24 policies policy NNS 10973 90 25 , , , 10973 90 26 work work NN 10973 90 27 processes process NNS 10973 90 28 that that WDT 10973 90 29 handle handle VBP 10973 90 30 sensitive sensitive JJ 10973 90 31 patron patron NN 10973 90 32 information information NN 10973 90 33 , , , 10973 90 34 how how WRB 10973 90 35 access access NN 10973 90 36 to to IN 10973 90 37 patron patron NN 10973 90 38 information information NN 10973 90 39 is be VBZ 10973 90 40 granted grant VBN 10973 90 41 , , , 10973 90 42 and and CC 10973 90 43 how how WRB 10973 90 44 internal internal JJ 10973 90 45 staff staff NN 10973 90 46 tend tend VBP 10973 90 47 to to TO 10973 90 48 use use VB 10973 90 49 computing computing NN 10973 90 50 devices device NNS 10973 90 51 to to TO 10973 90 52 access access VB 10973 90 53 organizational organizational JJ 10973 90 54 information information NN 10973 90 55 . . . 10973 91 1 A a DT 10973 91 2 few few JJ 10973 91 3 respondents respondent NNS 10973 91 4 stated state VBD 10973 91 5 that that IN 10973 91 6 their -PRON- PRP$ 10973 91 7 knowledge knowledge NN 10973 91 8 is be VBZ 10973 91 9 below below IN 10973 91 10 average average JJ 10973 91 11 . . . 10973 92 1 Questions question NNS 10973 92 2 : : : 10973 92 3 Response response NN 10973 92 4 Excellent Excellent NNP 10973 92 5 Above Above NNP 10973 92 6 Average Average NNP 10973 92 7 Average average NN 10973 92 8 Below below IN 10973 92 9 Average average JJ 10973 92 10 Poor poor JJ 10973 92 11 How how WRB 10973 92 12 would would MD 10973 92 13 you -PRON- PRP 10973 92 14 rate rate VB 10973 92 15 your -PRON- PRP$ 10973 92 16 knowledge knowledge NN 10973 92 17 of of IN 10973 92 18 your -PRON- PRP$ 10973 92 19 organization organization NN 10973 92 20 ’s ’s POS 10973 92 21 computing compute VBG 10973 92 22 - - HYPH 10973 92 23 related relate VBN 10973 92 24 policies policy NNS 10973 92 25 for for IN 10973 92 26 internal internal JJ 10973 92 27 staff staff NN 10973 92 28 computer computer NN 10973 92 29 usage usage NN 10973 92 30 ? ? . 10973 93 1 4 4 CD 10973 93 2 ( ( -LRB- 10973 93 3 18.18 18.18 CD 10973 93 4 % % NN 10973 93 5 ) ) -RRB- 10973 93 6 10 10 CD 10973 93 7 ( ( -LRB- 10973 93 8 45.45 45.45 CD 10973 93 9 % % NN 10973 93 10 ) ) -RRB- 10973 93 11 8 8 CD 10973 93 12 ( ( -LRB- 10973 93 13 36.36 36.36 CD 10973 93 14 % % NN 10973 93 15 ) ) -RRB- 10973 93 16 0 0 NFP 10973 93 17 ( ( -LRB- 10973 93 18 0.00 0.00 CD 10973 93 19 % % NN 10973 93 20 ) ) -RRB- 10973 93 21 0 0 NFP 10973 93 22 ( ( -LRB- 10973 93 23 0.00 0.00 CD 10973 93 24 % % NN 10973 93 25 ) ) -RRB- 10973 93 26 How how WRB 10973 93 27 would would MD 10973 93 28 you -PRON- PRP 10973 93 29 rate rate VB 10973 93 30 your -PRON- PRP$ 10973 93 31 knowledge knowledge NN 10973 93 32 of of IN 10973 93 33 your -PRON- PRP$ 10973 93 34 library library NN 10973 93 35 ’s ’s POS 10973 93 36 work work NN 10973 93 37 processes process NNS 10973 93 38 that that WDT 10973 93 39 handle handle VBP 10973 93 40 sensitive sensitive JJ 10973 93 41 patron patron NN 10973 93 42 information information NN 10973 93 43 ? ? . 10973 94 1 4 4 CD 10973 94 2 ( ( -LRB- 10973 94 3 18.18 18.18 CD 10973 94 4 % % NN 10973 94 5 ) ) -RRB- 10973 94 6 11 11 CD 10973 94 7 ( ( -LRB- 10973 94 8 50 50 CD 10973 94 9 % % NN 10973 94 10 ) ) -RRB- 10973 94 11 6 6 CD 10973 94 12 ( ( -LRB- 10973 94 13 27.27 27.27 CD 10973 94 14 % % NN 10973 94 15 ) ) -RRB- 10973 94 16 1 1 CD 10973 94 17 ( ( -LRB- 10973 94 18 4.55 4.55 CD 10973 94 19 % % NN 10973 94 20 ) ) -RRB- 10973 94 21 0 0 NFP 10973 94 22 ( ( -LRB- 10973 94 23 0.00 0.00 CD 10973 94 24 % % NN 10973 94 25 ) ) -RRB- 10973 94 26 Within within IN 10973 94 27 the the DT 10973 94 28 organization organization NN 10973 94 29 you -PRON- PRP 10973 94 30 work work VBP 10973 94 31 for for IN 10973 94 32 , , , 10973 94 33 how how WRB 10973 94 34 would would MD 10973 94 35 you -PRON- PRP 10973 94 36 rate rate VB 10973 94 37 your -PRON- PRP$ 10973 94 38 knowledge knowledge NN 10973 94 39 of of IN 10973 94 40 how how WRB 10973 94 41 access access NN 10973 94 42 to to IN 10973 94 43 patron patron NN 10973 94 44 information information NN 10973 94 45 is be VBZ 10973 94 46 granted grant VBN 10973 94 47 ? ? . 10973 95 1 3 3 CD 10973 95 2 ( ( -LRB- 10973 95 3 13.64 13.64 CD 10973 95 4 % % NN 10973 95 5 ) ) -RRB- 10973 95 6 12 12 CD 10973 95 7 ( ( -LRB- 10973 95 8 54.55 54.55 CD 10973 95 9 % % NN 10973 95 10 ) ) -RRB- 10973 95 11 5 5 CD 10973 95 12 ( ( -LRB- 10973 95 13 22.73 22.73 CD 10973 95 14 % % NN 10973 95 15 ) ) -RRB- 10973 95 16 2 2 CD 10973 95 17 ( ( -LRB- 10973 95 18 9.10 9.10 CD 10973 95 19 % % NN 10973 95 20 ) ) -RRB- 10973 95 21 0 0 NFP 10973 95 22 ( ( -LRB- 10973 95 23 0.00 0.00 CD 10973 95 24 % % NN 10973 95 25 ) ) -RRB- 10973 95 26 How how WRB 10973 95 27 would would MD 10973 95 28 you -PRON- PRP 10973 95 29 rate rate VB 10973 95 30 your -PRON- PRP$ 10973 95 31 knowledge knowledge NN 10973 95 32 on on IN 10973 95 33 how how WRB 10973 95 34 internal internal JJ 10973 95 35 staff staff NN 10973 95 36 tend tend VBP 10973 95 37 to to TO 10973 95 38 use use VB 10973 95 39 computing computing NN 10973 95 40 devices device NNS 10973 95 41 to to TO 10973 95 42 access access VB 10973 95 43 organizational organizational JJ 10973 95 44 information information NN 10973 95 45 ? ? . 10973 96 1 2 2 LS 10973 96 2 ( ( -LRB- 10973 96 3 9.10 9.10 CD 10973 96 4 % % NN 10973 96 5 ) ) -RRB- 10973 96 6 11 11 CD 10973 96 7 ( ( -LRB- 10973 96 8 50 50 CD 10973 96 9 % % NN 10973 96 10 ) ) -RRB- 10973 96 11 8 8 CD 10973 96 12 ( ( -LRB- 10973 96 13 36.36 36.36 CD 10973 96 14 % % NN 10973 96 15 ) ) -RRB- 10973 96 16 1 1 CD 10973 96 17 ( ( -LRB- 10973 96 18 4.55 4.55 CD 10973 96 19 % % NN 10973 96 20 ) ) -RRB- 10973 96 21 0 0 NFP 10973 96 22 ( ( -LRB- 10973 96 23 0.00 0.00 CD 10973 96 24 % % NN 10973 96 25 ) ) -RRB- 10973 96 26 Table table NN 10973 96 27 3 3 CD 10973 96 28 . . . 10973 97 1 Knowledge Knowledge NNP 10973 97 2 of of IN 10973 97 3 organization organization NN 10973 97 4 ’s ’s POS 10973 97 5 computing compute VBG 10973 97 6 - - HYPH 10973 97 7 related relate VBN 10973 97 8 policies policy NNS 10973 97 9 . . . 10973 98 1 Knowledge Knowledge NNP 10973 98 2 Transfer Transfer NNP 10973 98 3 For for IN 10973 98 4 this this DT 10973 98 5 study study NN 10973 98 6 , , , 10973 98 7 knowledge knowledge NN 10973 98 8 transfer transfer NN 10973 98 9 is be VBZ 10973 98 10 measured measure VBN 10973 98 11 as as IN 10973 98 12 the the DT 10973 98 13 extent extent NN 10973 98 14 to to TO 10973 98 15 which which WDT 10973 98 16 the the DT 10973 98 17 cybersecurity cybersecurity NN 10973 98 18 student student NN 10973 98 19 acquired acquire VBD 10973 98 20 knowledge knowledge NN 10973 98 21 or or CC 10973 98 22 understands understand VBZ 10973 98 23 the the DT 10973 98 24 key key JJ 10973 98 25 educational educational JJ 10973 98 26 objective objective NN 10973 98 27 . . . 10973 99 1 According accord VBG 10973 99 2 to to IN 10973 99 3 table table NN 10973 99 4 4 4 CD 10973 99 5 below below RB 10973 99 6 , , , 10973 99 7 all all DT 10973 99 8 survey survey NN 10973 99 9 participants participant NNS 10973 99 10 stated state VBD 10973 99 11 that that IN 10973 99 12 during during IN 10973 99 13 the the DT 10973 99 14 cybersecurity cybersecurity NN 10973 99 15 course course NN 10973 99 16 , , , 10973 99 17 they -PRON- PRP 10973 99 18 acquired acquire VBD 10973 99 19 knowledge knowledge NN 10973 99 20 on on IN 10973 99 21 information information NN 10973 99 22 security security NN 10973 99 23 risks risk NNS 10973 99 24 , , , 10973 99 25 and and CC 10973 99 26 solutions solution NNS 10973 99 27 to to TO 10973 99 28 manage manage VB 10973 99 29 information information NN 10973 99 30 security security NN 10973 99 31 risks risk NNS 10973 99 32 within within IN 10973 99 33 organizations organization NNS 10973 99 34 . . . 10973 100 1 Furthermore furthermore RB 10973 100 2 , , , 10973 100 3 91 91 CD 10973 100 4 percent percent NN 10973 100 5 of of IN 10973 100 6 the the DT 10973 100 7 twenty twenty CD 10973 100 8 - - HYPH 10973 100 9 two two CD 10973 100 10 survey survey NN 10973 100 11 participants participant NNS 10973 100 12 stated state VBD 10973 100 13 that that IN 10973 100 14 they -PRON- PRP 10973 100 15 gained gain VBD 10973 100 16 an an DT 10973 100 17 understanding understanding NN 10973 100 18 of of IN 10973 100 19 the the DT 10973 100 20 feasibility feasibility NN 10973 100 21 to to TO 10973 100 22 implement implement VB 10973 100 23 solutions solution NNS 10973 100 24 and and CC 10973 100 25 potential potential JJ 10973 100 26 impact impact NN 10973 100 27 of of IN 10973 100 28 not not RB 10973 100 29 implementing implement VBG 10973 100 30 solutions solution NNS 10973 100 31 to to TO 10973 100 32 manage manage VB 10973 100 33 information information NN 10973 100 34 security security NN 10973 100 35 risk risk NN 10973 100 36 within within IN 10973 100 37 the the DT 10973 100 38 organizations organization NNS 10973 100 39 in in IN 10973 100 40 which which WDT 10973 100 41 they -PRON- PRP 10973 100 42 work work VBP 10973 100 43 . . . 10973 101 1 This this DT 10973 101 2 is be VBZ 10973 101 3 consistent consistent JJ 10973 101 4 with with IN 10973 101 5 previous previous JJ 10973 101 6 research research NN 10973 101 7 that that WDT 10973 101 8 has have VBZ 10973 101 9 measured measure VBN 10973 101 10 knowledge knowledge NN 10973 101 11 transfer.26 transfer.26 NNP 10973 101 12 Question Question NNP 10973 101 13 : : : 10973 101 14 During during IN 10973 101 15 the the DT 10973 101 16 cybersecurity cybersecurity NN 10973 101 17 course course NN 10973 101 18 I -PRON- PRP 10973 101 19 took take VBD 10973 101 20 at at IN 10973 101 21 MVU MVU NNP 10973 101 22 , , , 10973 101 23 I -PRON- PRP 10973 101 24 _ _ NNP 10973 101 25 _ _ NNP 10973 101 26 _ _ NNP 10973 101 27 _ _ NNP 10973 101 28 _ _ NNP 10973 101 29 _ _ NNP 10973 101 30 _ _ NNP 10973 101 31 _ _ NNP 10973 101 32 _ _ NNP 10973 101 33 . . . 10973 102 1 Response response NN 10973 102 2 acquired acquire VBD 10973 102 3 knowledge knowledge NN 10973 102 4 on on IN 10973 102 5 information information NN 10973 102 6 security security NN 10973 102 7 risks risk NNS 10973 102 8 within within IN 10973 102 9 the the DT 10973 102 10 organization organization NN 10973 102 11 . . . 10973 103 1 22 22 CD 10973 103 2 ( ( -LRB- 10973 103 3 100 100 CD 10973 103 4 % % NN 10973 103 5 ) ) -RRB- 10973 103 6 acquired acquire VBN 10973 103 7 knowledge knowledge NN 10973 103 8 on on IN 10973 103 9 solutions solution NNS 10973 103 10 to to TO 10973 103 11 manage manage VB 10973 103 12 information information NN 10973 103 13 security security NN 10973 103 14 risks risk NNS 10973 103 15 identified identify VBN 10973 103 16 within within IN 10973 103 17 my -PRON- PRP$ 10973 103 18 organization organization NN 10973 103 19 . . . 10973 104 1 22 22 CD 10973 104 2 ( ( -LRB- 10973 104 3 100 100 CD 10973 104 4 % % NN 10973 104 5 ) ) -RRB- 10973 104 6 gained gain VBD 10973 104 7 an an DT 10973 104 8 understanding understanding NN 10973 104 9 of of IN 10973 104 10 the the DT 10973 104 11 feasibility feasibility NN 10973 104 12 to to TO 10973 104 13 implement implement VB 10973 104 14 solutions solution NNS 10973 104 15 to to TO 10973 104 16 manage manage VB 10973 104 17 information information NN 10973 104 18 security security NN 10973 104 19 risks risk NNS 10973 104 20 identified identify VBN 10973 104 21 within within IN 10973 104 22 my -PRON- PRP$ 10973 104 23 organization organization NN 10973 104 24 . . . 10973 105 1 20 20 CD 10973 105 2 ( ( -LRB- 10973 105 3 90.90 90.90 CD 10973 105 4 % % NN 10973 105 5 ) ) -RRB- 10973 105 6 gained gain VBD 10973 105 7 an an DT 10973 105 8 understanding understanding NN 10973 105 9 of of IN 10973 105 10 the the DT 10973 105 11 potential potential JJ 10973 105 12 impact impact NN 10973 105 13 of of IN 10973 105 14 not not RB 10973 105 15 implementing implement VBG 10973 105 16 solutions solution NNS 10973 105 17 to to TO 10973 105 18 manage manage VB 10973 105 19 information information NN 10973 105 20 security security NN 10973 105 21 risks risk NNS 10973 105 22 identified identify VBN 10973 105 23 within within IN 10973 105 24 my -PRON- PRP$ 10973 105 25 organization organization NN 10973 105 26 . . . 10973 106 1 20 20 CD 10973 106 2 ( ( -LRB- 10973 106 3 90.90 90.90 CD 10973 106 4 % % NN 10973 106 5 ) ) -RRB- 10973 106 6 INFORMATION INFORMATION NNP 10973 106 7 TECHNOLOGY technology NN 10973 106 8 AND and CC 10973 106 9 LIBRARIES LIBRARIES NNP 10973 106 10 | | NNP 10973 106 11 JUNE JUNE NNP 10973 106 12 2019 2019 CD 10973 106 13 65 65 CD 10973 106 14 Table table NN 10973 106 15 4 4 CD 10973 106 16 . . . 10973 107 1 Indicators indicator NNS 10973 107 2 of of IN 10973 107 3 Knowledge Knowledge NNP 10973 107 4 Transfer Transfer NNP 10973 107 5 . . . 10973 108 1 Knowledge Knowledge NNP 10973 108 2 Utilization utilization NN 10973 108 3 The the DT 10973 108 4 desired desire VBN 10973 108 5 outcome outcome NN 10973 108 6 of of IN 10973 108 7 knowledge knowledge NN 10973 108 8 transfer transfer NN 10973 108 9 is be VBZ 10973 108 10 knowledge knowledge NN 10973 108 11 utilization.27 utilization.27 NNP 10973 108 12 This this DT 10973 108 13 study study NN 10973 108 14 is be VBZ 10973 108 15 interested interested JJ 10973 108 16 in in IN 10973 108 17 the the DT 10973 108 18 extent extent NN 10973 108 19 to to TO 10973 108 20 which which WDT 10973 108 21 cybersecurity cybersecurity NN 10973 108 22 students student NNS 10973 108 23 have have VBP 10973 108 24 been be VBN 10973 108 25 engaged engage VBN 10973 108 26 in in IN 10973 108 27 information information NN 10973 108 28 security security NN 10973 108 29 risk risk NN 10973 108 30 management management NN 10973 108 31 initiatives initiative NNS 10973 108 32 in in IN 10973 108 33 their -PRON- PRP$ 10973 108 34 workplace workplace NN 10973 108 35 since since IN 10973 108 36 the the DT 10973 108 37 completion completion NN 10973 108 38 of of IN 10973 108 39 the the DT 10973 108 40 cybersecurity cybersecurity NN 10973 108 41 course course NN 10973 108 42 . . . 10973 109 1 According accord VBG 10973 109 2 to to IN 10973 109 3 table table NN 10973 109 4 5 5 CD 10973 109 5 , , , 10973 109 6 twelve twelve CD 10973 109 7 of of IN 10973 109 8 the the DT 10973 109 9 twenty twenty CD 10973 109 10 - - HYPH 10973 109 11 two two CD 10973 109 12 survey survey NN 10973 109 13 participants participant NNS 10973 109 14 have have VBP 10973 109 15 utilized utilize VBN 10973 109 16 the the DT 10973 109 17 knowledge knowledge NN 10973 109 18 transferred transfer VBN 10973 109 19 to to IN 10973 109 20 them -PRON- PRP 10973 109 21 from from IN 10973 109 22 the the DT 10973 109 23 cybersecurity cybersecurity NN 10973 109 24 course course NN 10973 109 25 within within IN 10973 109 26 the the DT 10973 109 27 libraries library NNS 10973 109 28 in in IN 10973 109 29 which which WDT 10973 109 30 they -PRON- PRP 10973 109 31 work work VBP 10973 109 32 . . . 10973 110 1 Of of IN 10973 110 2 the the DT 10973 110 3 twelve twelve CD 10973 110 4 survey survey NN 10973 110 5 participants participant NNS 10973 110 6 , , , 10973 110 7 ten ten CD 10973 110 8 performed performed JJ 10973 110 9 security security NN 10973 110 10 procedures procedure NNS 10973 110 11 within within IN 10973 110 12 the the DT 10973 110 13 organization organization NN 10973 110 14 on on IN 10973 110 15 an an DT 10973 110 16 ad ad FW 10973 110 17 hoc hoc FW 10973 110 18 , , , 10973 110 19 informal informal JJ 10973 110 20 basis basis NN 10973 110 21 . . . 10973 111 1 Seven seven CD 10973 111 2 worked work VBD 10973 111 3 on on IN 10973 111 4 defining define VBG 10973 111 5 new new JJ 10973 111 6 or or CC 10973 111 7 revised revise VBN 10973 111 8 security security NN 10973 111 9 policies policy NNS 10973 111 10 . . . 10973 112 1 Four four CD 10973 112 2 implemented implement VBN 10973 112 3 new new JJ 10973 112 4 or or CC 10973 112 5 revised revise VBN 10973 112 6 security security NN 10973 112 7 procedures procedure NNS 10973 112 8 for for IN 10973 112 9 organizational organizational JJ 10973 112 10 staff staff NN 10973 112 11 to to TO 10973 112 12 follow follow VB 10973 112 13 , , , 10973 112 14 and and CC 10973 112 15 two two CD 10973 112 16 evaluated evaluate VBN 10973 112 17 at at RB 10973 112 18 least least RBS 10973 112 19 one one CD 10973 112 20 security security NN 10973 112 21 safeguard safeguard NN 10973 112 22 to to TO 10973 112 23 determine determine VB 10973 112 24 whether whether IN 10973 112 25 it -PRON- PRP 10973 112 26 is be VBZ 10973 112 27 being be VBG 10973 112 28 followed follow VBN 10973 112 29 by by IN 10973 112 30 organizational organizational JJ 10973 112 31 staff staff NN 10973 112 32 . . . 10973 113 1 Question question NN 10973 113 2 : : : 10973 113 3 Since since IN 10973 113 4 the the DT 10973 113 5 completion completion NN 10973 113 6 of of IN 10973 113 7 the the DT 10973 113 8 cybersecurity cybersecurity NN 10973 113 9 course course NN 10973 113 10 I -PRON- PRP 10973 113 11 took take VBD 10973 113 12 at at IN 10973 113 13 MVU MVU NNP 10973 113 14 , , , 10973 113 15 I -PRON- PRP 10973 113 16 have have VBP 10973 113 17 _ _ NNP 10973 113 18 _ _ NNP 10973 113 19 _ _ NNP 10973 113 20 _ _ NNP 10973 113 21 _ _ NNP 10973 113 22 _ _ NNP 10973 113 23 ( ( -LRB- 10973 113 24 please please UH 10973 113 25 check check VB 10973 113 26 all all PDT 10973 113 27 that that WDT 10973 113 28 apply apply VBP 10973 113 29 ) ) -RRB- 10973 113 30 . . . 10973 114 1 Response response NN 10973 114 2 performed perform VBD 10973 114 3 security security NN 10973 114 4 procedures procedure NNS 10973 114 5 within within IN 10973 114 6 the the DT 10973 114 7 organization organization NN 10973 114 8 on on IN 10973 114 9 an an DT 10973 114 10 ad ad FW 10973 114 11 hoc hoc FW 10973 114 12 , , , 10973 114 13 informal informal JJ 10973 114 14 basis basis NN 10973 114 15 . . . 10973 115 1 10 10 CD 10973 115 2 ( ( -LRB- 10973 115 3 83.33 83.33 CD 10973 115 4 % % NN 10973 115 5 ) ) -RRB- 10973 115 6 worked work VBD 10973 115 7 on on IN 10973 115 8 defining define VBG 10973 115 9 new new JJ 10973 115 10 or or CC 10973 115 11 revised revise VBN 10973 115 12 security security NN 10973 115 13 policies policy NNS 10973 115 14 . . . 10973 116 1 7 7 CD 10973 116 2 ( ( -LRB- 10973 116 3 58.33 58.33 CD 10973 116 4 % % NN 10973 116 5 ) ) -RRB- 10973 116 6 implemented implement VBD 10973 116 7 new new JJ 10973 116 8 or or CC 10973 116 9 revised revise VBN 10973 116 10 security security NN 10973 116 11 procedures procedure NNS 10973 116 12 for for IN 10973 116 13 organizational organizational JJ 10973 116 14 staff staff NN 10973 116 15 to to TO 10973 116 16 follow follow VB 10973 116 17 . . . 10973 117 1 4 4 CD 10973 117 2 ( ( -LRB- 10973 117 3 33.33 33.33 CD 10973 117 4 % % NN 10973 117 5 ) ) -RRB- 10973 117 6 evaluated evaluate VBD 10973 117 7 at at RB 10973 117 8 least least RBS 10973 117 9 one one CD 10973 117 10 security security NN 10973 117 11 safeguard safeguard NN 10973 117 12 to to TO 10973 117 13 determine determine VB 10973 117 14 whether whether IN 10973 117 15 it -PRON- PRP 10973 117 16 is be VBZ 10973 117 17 being be VBG 10973 117 18 followed follow VBN 10973 117 19 by by IN 10973 117 20 organizational organizational JJ 10973 117 21 staff staff NN 10973 117 22 . . . 10973 118 1 2 2 CD 10973 118 2 ( ( -LRB- 10973 118 3 16.66 16.66 CD 10973 118 4 % % NN 10973 118 5 ) ) -RRB- 10973 118 6 NOT not RB 10973 118 7 performed perform VBD 10973 118 8 any any DT 10973 118 9 security security NN 10973 118 10 procedures procedure NNS 10973 118 11 within within IN 10973 118 12 the the DT 10973 118 13 organization organization NN 10973 118 14 . . . 10973 119 1 10 10 CD 10973 119 2 ( ( -LRB- 10973 119 3 45.45 45.45 CD 10973 119 4 % % NN 10973 119 5 ) ) -RRB- 10973 119 6 Table table NN 10973 119 7 5 5 CD 10973 119 8 . . . 10973 120 1 Indicators indicator NNS 10973 120 2 of of IN 10973 120 3 knowledge knowledge NN 10973 120 4 utilization utilization NN 10973 120 5 in in IN 10973 120 6 the the DT 10973 120 7 library library NN 10973 120 8 . . . 10973 121 1 Participation participation NN 10973 121 2 Knowledge Knowledge NNP 10973 121 3 transfer transfer NN 10973 121 4 through through IN 10973 121 5 cybersecurity cybersecurity NN 10973 121 6 education education NN 10973 121 7 may may MD 10973 121 8 influence influence VB 10973 121 9 a a DT 10973 121 10 cybersecurity cybersecurity NN 10973 121 11 student student NN 10973 121 12 to to TO 10973 121 13 utilize utilize VB 10973 121 14 the the DT 10973 121 15 knowledge knowledge NN 10973 121 16 they -PRON- PRP 10973 121 17 have have VBP 10973 121 18 gained gain VBN 10973 121 19 by by IN 10973 121 20 participating participate VBG 10973 121 21 in in IN 10973 121 22 ISRM ISRM NNP 10973 121 23 activities activity NNS 10973 121 24 . . . 10973 122 1 According accord VBG 10973 122 2 to to IN 10973 122 3 table table NN 10973 122 4 6 6 CD 10973 122 5 , , , 10973 122 6 sixteen sixteen CD 10973 122 7 of of IN 10973 122 8 the the DT 10973 122 9 twenty twenty CD 10973 122 10 - - HYPH 10973 122 11 two two CD 10973 122 12 survey survey NN 10973 122 13 participants participant NNS 10973 122 14 have have VBP 10973 122 15 participated participate VBN 10973 122 16 in in IN 10973 122 17 ISRM ISRM NNP 10973 122 18 activities activity NNS 10973 122 19 in in IN 10973 122 20 the the DT 10973 122 21 library library NN 10973 122 22 in in IN 10973 122 23 which which WDT 10973 122 24 they -PRON- PRP 10973 122 25 work work VBP 10973 122 26 since since IN 10973 122 27 the the DT 10973 122 28 completion completion NN 10973 122 29 of of IN 10973 122 30 the the DT 10973 122 31 cybersecurity cybersecurity NN 10973 122 32 course course NN 10973 122 33 . . . 10973 123 1 Fifteen fifteen CD 10973 123 2 communicated communicate VBN 10973 123 3 with with IN 10973 123 4 internal internal JJ 10973 123 5 senior senior JJ 10973 123 6 management management NN 10973 123 7 on on IN 10973 123 8 training training NN 10973 123 9 materials material NNS 10973 123 10 . . . 10973 124 1 Seven seven CD 10973 124 2 performed perform VBD 10973 124 3 a a DT 10973 124 4 policy policy NN 10973 124 5 review review NN 10973 124 6 and and CC 10973 124 7 communicated communicate VBN 10973 124 8 with with IN 10973 124 9 internal internal JJ 10973 124 10 senior senior JJ 10973 124 11 management management NN 10973 124 12 on on IN 10973 124 13 training training NN 10973 124 14 materials material NNS 10973 124 15 . . . 10973 125 1 Five five CD 10973 125 2 worked work VBD 10973 125 3 on on IN 10973 125 4 a a DT 10973 125 5 security security NN 10973 125 6 questionnaire questionnaire NN 10973 125 7 , , , 10973 125 8 one one PRP 10973 125 9 had have VBD 10973 125 10 an an DT 10973 125 11 interview interview NN 10973 125 12 with with IN 10973 125 13 an an DT 10973 125 14 external external JJ 10973 125 15 collaborator collaborator NN 10973 125 16 , , , 10973 125 17 and and CC 10973 125 18 another another DT 10973 125 19 research research NN 10973 125 20 participant participant NN 10973 125 21 analyzed analyze VBD 10973 125 22 their -PRON- PRP$ 10973 125 23 library library NN 10973 125 24 ’s ’s POS 10973 125 25 business business NN 10973 125 26 or or CC 10973 125 27 IT it NN 10973 125 28 process process NN 10973 125 29 workflow workflow VB 10973 125 30 . . . 10973 126 1 Question question NN 10973 126 2 : : : 10973 126 3 Since since IN 10973 126 4 the the DT 10973 126 5 completion completion NN 10973 126 6 of of IN 10973 126 7 the the DT 10973 126 8 cybersecurity cybersecurity NN 10973 126 9 course course NN 10973 126 10 you -PRON- PRP 10973 126 11 took take VBD 10973 126 12 at at IN 10973 126 13 MVU MVU NNP 10973 126 14 , , , 10973 126 15 have have VBP 10973 126 16 you -PRON- PRP 10973 126 17 performed perform VBN 10973 126 18 any any DT 10973 126 19 of of IN 10973 126 20 the the DT 10973 126 21 following follow VBG 10973 126 22 activities activity NNS 10973 126 23 within within IN 10973 126 24 the the DT 10973 126 25 workplace workplace NN 10973 126 26 : : : 10973 126 27 ( ( -LRB- 10973 126 28 please please UH 10973 126 29 check check VB 10973 126 30 all all PDT 10973 126 31 that that WDT 10973 126 32 apply apply VBP 10973 126 33 ) ) -RRB- 10973 126 34 Response Response NNP 10973 126 35 Security Security NNP 10973 126 36 questionnaire questionnaire NN 10973 126 37 5 5 CD 10973 126 38 ( ( -LRB- 10973 126 39 31.25 31.25 CD 10973 126 40 % % NN 10973 126 41 ) ) -RRB- 10973 126 42 Interview Interview NNP 10973 126 43 with with IN 10973 126 44 external external JJ 10973 126 45 collaborator collaborator NN 10973 126 46 ( ( -LRB- 10973 126 47 i.e. i.e. FW 10973 127 1 trainers trainer NNS 10973 127 2 ) ) -RRB- 10973 127 3 1 1 CD 10973 127 4 ( ( -LRB- 10973 127 5 6.25 6.25 CD 10973 127 6 % % NN 10973 127 7 ) ) -RRB- 10973 127 8 Policy policy NN 10973 127 9 review review NN 10973 127 10 7 7 CD 10973 127 11 ( ( -LRB- 10973 127 12 43.75 43.75 CD 10973 127 13 % % NN 10973 127 14 ) ) -RRB- 10973 127 15 Business business NN 10973 127 16 or or CC 10973 127 17 IT it NN 10973 127 18 process process NN 10973 127 19 workflow workflow NN 10973 127 20 analysis analysis NN 10973 127 21 1 1 CD 10973 127 22 ( ( -LRB- 10973 127 23 6.25 6.25 CD 10973 127 24 % % NN 10973 127 25 ) ) -RRB- 10973 127 26 Communication communication NN 10973 127 27 with with IN 10973 127 28 internal internal JJ 10973 127 29 peers peer NNS 10973 127 30 or or CC 10973 127 31 staff staff NN 10973 127 32 on on IN 10973 127 33 training training NN 10973 127 34 materials material NNS 10973 127 35 15 15 CD 10973 127 36 ( ( -LRB- 10973 127 37 93.75 93.75 CD 10973 127 38 % % NN 10973 127 39 ) ) -RRB- 10973 127 40 Communicate communicate VB 10973 127 41 with with IN 10973 127 42 internal internal JJ 10973 127 43 senior senior JJ 10973 127 44 management management NN 10973 127 45 on on IN 10973 127 46 training training NN 10973 127 47 materials material NNS 10973 127 48 7 7 CD 10973 127 49 ( ( -LRB- 10973 127 50 43.75 43.75 CD 10973 127 51 % % NN 10973 127 52 ) ) -RRB- 10973 127 53 I -PRON- PRP 10973 127 54 have have VBP 10973 127 55 NOT not RB 10973 127 56 performed perform VBN 10973 127 57 any any DT 10973 127 58 security security NN 10973 127 59 activities activity NNS 10973 127 60 in in IN 10973 127 61 my -PRON- PRP$ 10973 127 62 workplace workplace NN 10973 127 63 6 6 CD 10973 127 64 ( ( -LRB- 10973 127 65 14.29 14.29 CD 10973 127 66 % % NN 10973 127 67 ) ) -RRB- 10973 127 68 Table table NN 10973 127 69 6 6 CD 10973 127 70 . . . 10973 128 1 Participation participation NN 10973 128 2 in in IN 10973 128 3 ISRM ISRM NNP 10973 128 4 activities activity NNS 10973 128 5 . . . 10973 129 1 Participation participation NN 10973 129 2 may may MD 10973 129 3 also also RB 10973 129 4 include include VB 10973 129 5 discussions discussion NNS 10973 129 6 on on IN 10973 129 7 ISRM ISRM NNP 10973 129 8 activities activity NNS 10973 129 9 . . . 10973 130 1 According accord VBG 10973 130 2 to to IN 10973 130 3 table table NN 10973 130 4 7 7 CD 10973 130 5 , , , 10973 130 6 sixteen sixteen CD 10973 130 7 of of IN 10973 130 8 the the DT 10973 130 9 twenty twenty CD 10973 130 10 - - HYPH 10973 130 11 two two CD 10973 130 12 survey survey NN 10973 130 13 participants participant NNS 10973 130 14 have have VBP 10973 130 15 participated participate VBN 10973 130 16 in in IN 10973 130 17 discussion discussion NN 10973 130 18 on on IN 10973 130 19 ISRM ISRM NNP 10973 130 20 activities activity NNS 10973 130 21 within within IN 10973 130 22 the the DT 10973 130 23 INFORMATION INFORMATION NNP 10973 130 24 SECURITY SECURITY NNP 10973 130 25 IN in IN 10973 130 26 LIBRARIES LIBRARIES NNP 10973 130 27 | | NNP 10973 130 28 SAN SAN NNP 10973 130 29 - - HYPH 10973 130 30 NICOLAS NICOLAS NNP 10973 130 31 - - HYPH 10973 130 32 ROCCA ROCCA NNP 10973 130 33 AND and CC 10973 130 34 BURKHARD BURKHARD NNP 10973 130 35 66 66 CD 10973 130 36 https://doi.org/10.6017/ital.v38i2.10973 https://doi.org/10.6017/ital.v38i2.10973 JJ 10973 130 37 libraries library NNS 10973 130 38 they -PRON- PRP 10973 130 39 are be VBP 10973 130 40 currently currently RB 10973 130 41 working work VBG 10973 130 42 at at IN 10973 130 43 . . . 10973 131 1 Fifteen fifteen CD 10973 131 2 survey survey NN 10973 131 3 participants participant NNS 10973 131 4 participated participate VBD 10973 131 5 in in IN 10973 131 6 discussions discussion NNS 10973 131 7 on on IN 10973 131 8 physical physical JJ 10973 131 9 security security NN 10973 131 10 , , , 10973 131 11 and and CC 10973 131 12 ten ten CD 10973 131 13 had have VBD 10973 131 14 discussions discussion NNS 10973 131 15 on on IN 10973 131 16 password password NN 10973 131 17 policy policy NN 10973 131 18 . . . 10973 132 1 Seven seven CD 10973 132 2 survey survey NN 10973 132 3 participants participant NNS 10973 132 4 had have VBD 10973 132 5 discussions discussion NNS 10973 132 6 on on IN 10973 132 7 user user NN 10973 132 8 provisioning provisioning NN 10973 132 9 , , , 10973 132 10 and and CC 10973 132 11 six six CD 10973 132 12 had have VBD 10973 132 13 discussions discussion NNS 10973 132 14 on on IN 10973 132 15 encryption encryption NN 10973 132 16 . . . 10973 133 1 Four four CD 10973 133 2 survey survey NN 10973 133 3 participants participant NNS 10973 133 4 had have VBD 10973 133 5 discussions discussion NNS 10973 133 6 on on IN 10973 133 7 mobile mobile JJ 10973 133 8 devices device NNS 10973 133 9 , , , 10973 133 10 and and CC 10973 133 11 another another DT 10973 133 12 four four CD 10973 133 13 had have VBD 10973 133 14 discussions discussion NNS 10973 133 15 on on IN 10973 133 16 vendor vendor NN 10973 133 17 security security NN 10973 133 18 Question question NN 10973 133 19 : : : 10973 133 20 Since since IN 10973 133 21 the the DT 10973 133 22 completion completion NN 10973 133 23 of of IN 10973 133 24 the the DT 10973 133 25 cybersecurity cybersecurity NN 10973 133 26 course course NN 10973 133 27 you -PRON- PRP 10973 133 28 took take VBD 10973 133 29 at at IN 10973 133 30 MVU MVU NNP 10973 133 31 , , , 10973 133 32 have have VBP 10973 133 33 you -PRON- PRP 10973 133 34 participated participate VBN 10973 133 35 in in IN 10973 133 36 discussions discussion NNS 10973 133 37 on on IN 10973 133 38 the the DT 10973 133 39 following follow VBG 10973 133 40 areas area NNS 10973 133 41 of of IN 10973 133 42 security security NN 10973 133 43 ? ? . 10973 134 1 ( ( -LRB- 10973 134 2 Check check VB 10973 134 3 all all PDT 10973 134 4 that that WDT 10973 134 5 apply apply VBP 10973 134 6 ) ) -RRB- 10973 134 7 Response Response NNP 10973 134 8 Password Password NNP 10973 134 9 policy policy NN 10973 134 10 10 10 CD 10973 134 11 ( ( -LRB- 10973 134 12 62.5 62.5 CD 10973 134 13 % % NN 10973 134 14 ) ) -RRB- 10973 134 15 User User NNP 10973 134 16 provisioning provision VBG 10973 134 17 ( ( -LRB- 10973 134 18 i.e. i.e. FW 10973 134 19 , , , 10973 134 20 establishing establish VBG 10973 134 21 or or CC 10973 134 22 revoking revoke VBG 10973 134 23 user user NN 10973 134 24 logons logon NNS 10973 134 25 and and CC 10973 134 26 system system NN 10973 134 27 authorization authorization NN 10973 134 28 ) ) -RRB- 10973 134 29 7 7 CD 10973 134 30 ( ( -LRB- 10973 134 31 43.75 43.75 CD 10973 134 32 % % NN 10973 134 33 ) ) -RRB- 10973 134 34 Mobile mobile JJ 10973 134 35 device device NN 10973 134 36 4 4 CD 10973 134 37 ( ( -LRB- 10973 134 38 25 25 CD 10973 134 39 % % NN 10973 134 40 ) ) -RRB- 10973 134 41 Encryption encryption NN 10973 134 42 6 6 CD 10973 134 43 ( ( -LRB- 10973 134 44 37.5 37.5 CD 10973 134 45 % % NN 10973 134 46 ) ) -RRB- 10973 134 47 Vendor vendor NN 10973 134 48 security security NN 10973 134 49 4 4 CD 10973 134 50 ( ( -LRB- 10973 134 51 25 25 CD 10973 134 52 % % NN 10973 134 53 ) ) -RRB- 10973 134 54 Physical physical JJ 10973 134 55 security security NN 10973 134 56 15 15 CD 10973 134 57 ( ( -LRB- 10973 134 58 93.75 93.75 CD 10973 134 59 % % NN 10973 134 60 ) ) -RRB- 10973 134 61 Disaster disaster NN 10973 134 62 recovery recovery NN 10973 134 63 , , , 10973 134 64 business business NN 10973 134 65 continuity continuity NN 10973 134 66 , , , 10973 134 67 or or CC 10973 134 68 security security NN 10973 134 69 incident incident NN 10973 134 70 response response NN 10973 134 71 6 6 CD 10973 134 72 ( ( -LRB- 10973 134 73 37.50 37.50 CD 10973 134 74 % % NN 10973 134 75 ) ) -RRB- 10973 134 76 I -PRON- PRP 10973 134 77 have have VBP 10973 134 78 NOT not RB 10973 134 79 participated participate VBN 10973 134 80 in in IN 10973 134 81 any any DT 10973 134 82 discussions discussion NNS 10973 134 83 relating relate VBG 10973 134 84 to to IN 10973 134 85 security security NN 10973 134 86 in in IN 10973 134 87 my -PRON- PRP$ 10973 134 88 workplace workplace NN 10973 134 89 6 6 CD 10973 134 90 ( ( -LRB- 10973 134 91 27.27 27.27 CD 10973 134 92 % % NN 10973 134 93 ) ) -RRB- 10973 134 94 Table table NN 10973 134 95 7 7 CD 10973 134 96 . . . 10973 135 1 Participation participation NN 10973 135 2 in in IN 10973 135 3 discussions discussion NNS 10973 135 4 on on IN 10973 135 5 ISRM ISRM NNP 10973 135 6 activities activity NNS 10973 135 7 . . . 10973 136 1 Participation participation NN 10973 136 2 in in IN 10973 136 3 cybersecurity cybersecurity NN 10973 136 4 education education NN 10973 136 5 may may MD 10973 136 6 lead lead VB 10973 136 7 to to IN 10973 136 8 formal formal JJ 10973 136 9 responsibility responsibility NN 10973 136 10 or or CC 10973 136 11 accountability accountability NN 10973 136 12 of of IN 10973 136 13 ISRM ISRM NNP 10973 136 14 activities activity NNS 10973 136 15 . . . 10973 137 1 According accord VBG 10973 137 2 to to IN 10973 137 3 table table NN 10973 137 4 8 8 CD 10973 137 5 , , , 10973 137 6 nine nine CD 10973 137 7 of of IN 10973 137 8 the the DT 10973 137 9 twenty twenty CD 10973 137 10 - - HYPH 10973 137 11 two two CD 10973 137 12 survey survey NN 10973 137 13 respondents respondent NNS 10973 137 14 stated state VBD 10973 137 15 that that IN 10973 137 16 since since IN 10973 137 17 the the DT 10973 137 18 completion completion NN 10973 137 19 of of IN 10973 137 20 the the DT 10973 137 21 cybersecurity cybersecurity NN 10973 137 22 course course NN 10973 137 23 , , , 10973 137 24 they -PRON- PRP 10973 137 25 are be VBP 10973 137 26 formally formally RB 10973 137 27 responsible responsible JJ 10973 137 28 or or CC 10973 137 29 accountable accountable JJ 10973 137 30 for for IN 10973 137 31 ISRM ISRM NNP 10973 137 32 in in IN 10973 137 33 the the DT 10973 137 34 libraries library NNS 10973 137 35 in in IN 10973 137 36 which which WDT 10973 137 37 they -PRON- PRP 10973 137 38 work work VBP 10973 137 39 . . . 10973 138 1 Three three CD 10973 138 2 research research NN 10973 138 3 participants participant NNS 10973 138 4 are be VBP 10973 138 5 responsible responsible JJ 10973 138 6 for for IN 10973 138 7 identifying identify VBG 10973 138 8 organizational organizational JJ 10973 138 9 members member NNS 10973 138 10 to to TO 10973 138 11 participate participate VB 10973 138 12 in in IN 10973 138 13 cybersecurity cybersecurity NN 10973 138 14 training training NN 10973 138 15 . . . 10973 139 1 Five five CD 10973 139 2 survey survey NN 10973 139 3 participants participant NNS 10973 139 4 stated state VBD 10973 139 5 that that IN 10973 139 6 they -PRON- PRP 10973 139 7 are be VBP 10973 139 8 responsible responsible JJ 10973 139 9 for for IN 10973 139 10 communicating communicate VBG 10973 139 11 results result NNS 10973 139 12 on on IN 10973 139 13 cybersecurity cybersecurity NN 10973 139 14 training training NN 10973 139 15 to to IN 10973 139 16 upper upper JJ 10973 139 17 management management NN 10973 139 18 , , , 10973 139 19 peers peer NNS 10973 139 20 , , , 10973 139 21 and and CC 10973 139 22 staff staff NN 10973 139 23 . . . 10973 140 1 Three three CD 10973 140 2 research research NN 10973 140 3 participants participant NNS 10973 140 4 are be VBP 10973 140 5 responsible responsible JJ 10973 140 6 for for IN 10973 140 7 organizational organizational JJ 10973 140 8 compliance compliance NN 10973 140 9 with with IN 10973 140 10 government government NN 10973 140 11 regulations regulation NNS 10973 140 12 . . . 10973 141 1 Two two CD 10973 141 2 are be VBP 10973 141 3 responsible responsible JJ 10973 141 4 for for IN 10973 141 5 communicating communicate VBG 10973 141 6 organizational organizational JJ 10973 141 7 risk risk NN 10973 141 8 to to IN 10973 141 9 the the DT 10973 141 10 board board NN 10973 141 11 of of IN 10973 141 12 directors director NNS 10973 141 13 , , , 10973 141 14 and and CC 10973 141 15 one one CD 10973 141 16 research research NN 10973 141 17 participant participant NN 10973 141 18 is be VBZ 10973 141 19 responsible responsible JJ 10973 141 20 for for IN 10973 141 21 organizational organizational JJ 10973 141 22 compliance compliance NN 10973 141 23 of of IN 10973 141 24 funder funder NN 10973 141 25 requirements requirement NNS 10973 141 26 . . . 10973 142 1 Question question NN 10973 142 2 : : : 10973 142 3 Since since IN 10973 142 4 the the DT 10973 142 5 completion completion NN 10973 142 6 of of IN 10973 142 7 the the DT 10973 142 8 cybersecurity cybersecurity NN 10973 142 9 course course NN 10973 142 10 you -PRON- PRP 10973 142 11 took take VBD 10973 142 12 at at IN 10973 142 13 MVU MVU NNP 10973 142 14 , , , 10973 142 15 are be VBP 10973 142 16 you -PRON- PRP 10973 142 17 formally formally RB 10973 142 18 responsible responsible JJ 10973 142 19 or or CC 10973 142 20 accountable accountable JJ 10973 142 21 in in IN 10973 142 22 the the DT 10973 142 23 following follow VBG 10973 142 24 ways way NNS 10973 142 25 ? ? . 10973 143 1 ( ( -LRB- 10973 143 2 Check check VB 10973 143 3 all all PDT 10973 143 4 that that WDT 10973 143 5 apply apply VBP 10973 143 6 ) ) -RRB- 10973 143 7 Response Response NNP 10973 143 8 Identifying identify VBG 10973 143 9 organizational organizational JJ 10973 143 10 members member NNS 10973 143 11 to to TO 10973 143 12 participate participate VB 10973 143 13 in in IN 10973 143 14 cybersecurity cybersecurity NN 10973 143 15 training training NN 10973 143 16 3 3 CD 10973 143 17 ( ( -LRB- 10973 143 18 33.33 33.33 CD 10973 143 19 % % NN 10973 143 20 ) ) -RRB- 10973 143 21 Communicating communicate VBG 10973 143 22 results result NNS 10973 143 23 to to IN 10973 143 24 upper upper JJ 10973 143 25 management management NN 10973 143 26 5 5 CD 10973 143 27 ( ( -LRB- 10973 143 28 55.56 55.56 CD 10973 143 29 % % NN 10973 143 30 ) ) -RRB- 10973 143 31 Communicating communicate VBG 10973 143 32 results result NNS 10973 143 33 to to IN 10973 143 34 peers peer NNS 10973 143 35 or or CC 10973 143 36 staff staff NN 10973 143 37 5 5 CD 10973 143 38 ( ( -LRB- 10973 143 39 55.56 55.56 CD 10973 143 40 % % NN 10973 143 41 ) ) -RRB- 10973 143 42 Responsible responsible JJ 10973 143 43 for for IN 10973 143 44 organizational organizational JJ 10973 143 45 compliance compliance NN 10973 143 46 of of IN 10973 143 47 funder funder NN 10973 143 48 requirements requirement NNS 10973 143 49 1 1 CD 10973 143 50 ( ( -LRB- 10973 143 51 1.11 1.11 CD 10973 143 52 % % NN 10973 143 53 ) ) -RRB- 10973 143 54 Responsible responsible JJ 10973 143 55 for for IN 10973 143 56 organizational organizational JJ 10973 143 57 compliance compliance NN 10973 143 58 with with IN 10973 143 59 government government NN 10973 143 60 regulations regulation NNS 10973 143 61 3 3 CD 10973 143 62 ( ( -LRB- 10973 143 63 33.33 33.33 CD 10973 143 64 % % NN 10973 143 65 ) ) -RRB- 10973 143 66 Responsible responsible JJ 10973 143 67 for for IN 10973 143 68 internal internal JJ 10973 143 69 audit audit NN 10973 143 70 0 0 CD 10973 143 71 ( ( -LRB- 10973 143 72 0 0 CD 10973 143 73 % % NN 10973 143 74 ) ) -RRB- 10973 143 75 Responsible responsible JJ 10973 143 76 for for IN 10973 143 77 communicating communicate VBG 10973 143 78 organizational organizational JJ 10973 143 79 risk risk NN 10973 143 80 to to IN 10973 143 81 the the DT 10973 143 82 board board NN 10973 143 83 of of IN 10973 143 84 directors director NNS 10973 143 85 2 2 CD 10973 143 86 ( ( -LRB- 10973 143 87 22.22 22.22 CD 10973 143 88 % % NN 10973 143 89 ) ) -RRB- 10973 143 90 I -PRON- PRP 10973 143 91 am be VBP 10973 143 92 NOT not RB 10973 143 93 formally formally RB 10973 143 94 responsible responsible JJ 10973 143 95 for for IN 10973 143 96 security security NN 10973 143 97 in in IN 10973 143 98 my -PRON- PRP$ 10973 143 99 workplace workplace NN 10973 143 100 13 13 CD 10973 143 101 ( ( -LRB- 10973 143 102 59.10 59.10 CD 10973 143 103 % % NN 10973 143 104 ) ) -RRB- 10973 143 105 Table table NN 10973 143 106 8 8 CD 10973 143 107 . . . 10973 144 1 Participation participation NN 10973 144 2 via via IN 10973 144 3 accountability accountability NN 10973 144 4 of of IN 10973 144 5 ISRM ISRM NNP 10973 144 6 activities activity NNS 10973 144 7 . . . 10973 145 1 Motivation Motivation NNP 10973 145 2 An an DT 10973 145 3 objective objective NN 10973 145 4 of of IN 10973 145 5 SETA SETA NNP 10973 145 6 programs program NNS 10973 145 7 is be VBZ 10973 145 8 to to TO 10973 145 9 motivate motivate VB 10973 145 10 knowledge knowledge NN 10973 145 11 recipients recipient NNS 10973 145 12 to to TO 10973 145 13 comply comply VB 10973 145 14 with with IN 10973 145 15 information information NN 10973 145 16 security security NN 10973 145 17 policies policy NNS 10973 145 18 that that WDT 10973 145 19 serve serve VBP 10973 145 20 to to TO 10973 145 21 protect protect VB 10973 145 22 information information NN 10973 145 23 and and CC 10973 145 24 information information NN 10973 145 25 resources resource NNS 10973 145 26 . . . 10973 146 1 As as IN 10973 146 2 such such JJ 10973 146 3 , , , 10973 146 4 cybersecurity cybersecurity NN 10973 146 5 education education NN 10973 146 6 may may MD 10973 146 7 motivate motivate VB 10973 146 8 students student NNS 10973 146 9 to to TO 10973 146 10 comply comply VB 10973 146 11 with with IN 10973 146 12 organizational organizational JJ 10973 146 13 information information NN 10973 146 14 security security NN 10973 146 15 policies policy NNS 10973 146 16 that that WDT 10973 146 17 serve serve VBP 10973 146 18 to to TO 10973 146 19 protect protect VB 10973 146 20 information information NN 10973 146 21 and and CC 10973 146 22 information information NN 10973 146 23 resources resource NNS 10973 146 24 . . . 10973 147 1 According accord VBG 10973 147 2 to to IN 10973 147 3 table table NN 10973 147 4 9 9 CD 10973 147 5 , , , 10973 147 6 INFORMATION INFORMATION NNP 10973 147 7 TECHNOLOGY TECHNOLOGY NNP 10973 147 8 AND and CC 10973 147 9 LIBRARIES LIBRARIES NNP 10973 147 10 | | NNP 10973 147 11 JUNE JUNE NNP 10973 147 12 2019 2019 CD 10973 147 13 67 67 CD 10973 147 14 since since IN 10973 147 15 the the DT 10973 147 16 completion completion NN 10973 147 17 of of IN 10973 147 18 the the DT 10973 147 19 cybersecurity cybersecurity NN 10973 147 20 course course NN 10973 147 21 , , , 10973 147 22 eighteen eighteen CD 10973 147 23 of of IN 10973 147 24 the the DT 10973 147 25 twenty twenty CD 10973 147 26 - - HYPH 10973 147 27 two two CD 10973 147 28 survey survey NN 10973 147 29 participants participant NNS 10973 147 30 stated state VBD 10973 147 31 that that IN 10973 147 32 they -PRON- PRP 10973 147 33 believe believe VBP 10973 147 34 it -PRON- PRP 10973 147 35 is be VBZ 10973 147 36 important important JJ 10973 147 37 to to TO 10973 147 38 protect protect VB 10973 147 39 patron patron NNP 10973 147 40 sensitive sensitive JJ 10973 147 41 data datum NNS 10973 147 42 . . . 10973 148 1 Two two CD 10973 148 2 respondents respondent NNS 10973 148 3 stated state VBD 10973 148 4 that that IN 10973 148 5 they -PRON- PRP 10973 148 6 wholeheartedly wholeheartedly RB 10973 148 7 feel feel VBP 10973 148 8 responsible responsible JJ 10973 148 9 to to TO 10973 148 10 protect protect VB 10973 148 11 their -PRON- PRP$ 10973 148 12 patrons patron NNS 10973 148 13 from from IN 10973 148 14 harm harm NN 10973 148 15 , , , 10973 148 16 and and CC 10973 148 17 another another DT 10973 148 18 two two CD 10973 148 19 stated state VBD 10973 148 20 that that IN 10973 148 21 they -PRON- PRP 10973 148 22 would would MD 10973 148 23 be be VB 10973 148 24 embarrassed embarrassed JJ 10973 148 25 if if IN 10973 148 26 their -PRON- PRP$ 10973 148 27 organization organization NN 10973 148 28 experienced experience VBD 10973 148 29 a a DT 10973 148 30 data data NN 10973 148 31 breach breach NN 10973 148 32 . . . 10973 149 1 Since since IN 10973 149 2 the the DT 10973 149 3 completion completion NN 10973 149 4 of of IN 10973 149 5 the the DT 10973 149 6 cybersecurity cybersecurity NN 10973 149 7 course course NN 10973 149 8 I -PRON- PRP 10973 149 9 took take VBD 10973 149 10 at at IN 10973 149 11 MVU MVU NNP 10973 149 12 , , , 10973 149 13 _ _ NNP 10973 149 14 _ _ NNP 10973 149 15 _ _ NNP 10973 149 16 _ _ NNP 10973 149 17 _ _ NNP 10973 149 18 _ _ NNP 10973 149 19 _ _ NNP 10973 149 20 _ _ NNP 10973 149 21 _ _ NNP 10973 149 22 . . . 10973 150 1 Response response NN 10973 150 2 I -PRON- PRP 10973 150 3 wholeheartedly wholeheartedly RB 10973 150 4 feel feel VBP 10973 150 5 responsible responsible JJ 10973 150 6 to to TO 10973 150 7 protect protect VB 10973 150 8 our -PRON- PRP$ 10973 150 9 patrons patron NNS 10973 150 10 from from IN 10973 150 11 harm harm NN 10973 150 12 . . . 10973 151 1 2 2 LS 10973 151 2 ( ( -LRB- 10973 151 3 9.10 9.10 CD 10973 151 4 % % NN 10973 151 5 ) ) -RRB- 10973 151 6 I -PRON- PRP 10973 151 7 believe believe VBP 10973 151 8 it -PRON- PRP 10973 151 9 is be VBZ 10973 151 10 important important JJ 10973 151 11 to to TO 10973 151 12 protect protect VB 10973 151 13 our -PRON- PRP$ 10973 151 14 patrons patron NNS 10973 151 15 ’ ’ POS 10973 151 16 sensitive sensitive JJ 10973 151 17 data datum NNS 10973 151 18 . . . 10973 152 1 18 18 CD 10973 152 2 ( ( -LRB- 10973 152 3 81.82 81.82 CD 10973 152 4 % % NN 10973 152 5 ) ) -RRB- 10973 152 6 I -PRON- PRP 10973 152 7 would would MD 10973 152 8 be be VB 10973 152 9 embarrassed embarrassed JJ 10973 152 10 if if IN 10973 152 11 my -PRON- PRP$ 10973 152 12 organization organization NN 10973 152 13 experienced experience VBD 10973 152 14 a a DT 10973 152 15 data data NN 10973 152 16 breach breach NN 10973 152 17 . . . 10973 153 1 2 2 LS 10973 153 2 ( ( -LRB- 10973 153 3 9.10 9.10 CD 10973 153 4 % % NN 10973 153 5 ) ) -RRB- 10973 153 6 my -PRON- PRP$ 10973 153 7 job job NN 10973 153 8 could could MD 10973 153 9 be be VB 10973 153 10 in in IN 10973 153 11 jeopardy jeopardy NN 10973 153 12 if if IN 10973 153 13 my -PRON- PRP$ 10973 153 14 organization organization NN 10973 153 15 were be VBD 10973 153 16 to to TO 10973 153 17 experience experience VB 10973 153 18 a a DT 10973 153 19 data data NN 10973 153 20 breach breach NN 10973 153 21 . . . 10973 154 1 0 0 NFP 10973 154 2 ( ( -LRB- 10973 154 3 0.00 0.00 CD 10973 154 4 % % NN 10973 154 5 ) ) -RRB- 10973 154 6 I -PRON- PRP 10973 154 7 do do VBP 10973 154 8 NOT not RB 10973 154 9 care care VB 10973 154 10 about about IN 10973 154 11 cybersecurity cybersecurity NN 10973 154 12 in in IN 10973 154 13 my -PRON- PRP$ 10973 154 14 organization organization NN 10973 154 15 . . . 10973 155 1 0 0 NFP 10973 155 2 ( ( -LRB- 10973 155 3 0.00 0.00 CD 10973 155 4 % % NN 10973 155 5 ) ) -RRB- 10973 155 6 Table table NN 10973 155 7 9 9 CD 10973 155 8 . . . 10973 156 1 Motivation motivation NN 10973 156 2 to to TO 10973 156 3 protect protect VB 10973 156 4 patron patron NN 10973 156 5 privacy privacy NN 10973 156 6 . . . 10973 157 1 DISCUSSION DISCUSSION NNP 10973 157 2 The the DT 10973 157 3 purpose purpose NN 10973 157 4 of of IN 10973 157 5 this this DT 10973 157 6 study study NN 10973 157 7 was be VBD 10973 157 8 to to TO 10973 157 9 evaluate evaluate VB 10973 157 10 the the DT 10973 157 11 effects effect NNS 10973 157 12 of of IN 10973 157 13 knowledge knowledge NN 10973 157 14 transfer transfer NN 10973 157 15 as as IN 10973 157 16 a a DT 10973 157 17 means means NN 10973 157 18 to to TO 10973 157 19 strengthen strengthen VB 10973 157 20 information information NN 10973 157 21 security security NN 10973 157 22 within within IN 10973 157 23 libraries library NNS 10973 157 24 . . . 10973 158 1 Given give VBN 10973 158 2 the the DT 10973 158 3 results result NNS 10973 158 4 from from IN 10973 158 5 the the DT 10973 158 6 survey survey NN 10973 158 7 instrument instrument NN 10973 158 8 , , , 10973 158 9 the the DT 10973 158 10 findings finding NNS 10973 158 11 suggest suggest VBP 10973 158 12 that that IN 10973 158 13 knowledge knowledge NN 10973 158 14 transfer transfer NN 10973 158 15 through through IN 10973 158 16 cybersecurity cybersecurity NN 10973 158 17 education education NN 10973 158 18 can can MD 10973 158 19 lead lead VB 10973 158 20 to to IN 10973 158 21 knowledge knowledge NN 10973 158 22 utilization utilization NN 10973 158 23 . . . 10973 159 1 Specifically specifically RB 10973 159 2 , , , 10973 159 3 knowledge knowledge NN 10973 159 4 transfer transfer NN 10973 159 5 through through IN 10973 159 6 cybersecurity cybersecurity NN 10973 159 7 education education NN 10973 159 8 may may MD 10973 159 9 influence influence VB 10973 159 10 a a DT 10973 159 11 library library NN 10973 159 12 employee employee NN 10973 159 13 to to TO 10973 159 14 utilize utilize VB 10973 159 15 the the DT 10973 159 16 knowledge knowledge NN 10973 159 17 they -PRON- PRP 10973 159 18 have have VBP 10973 159 19 gained gain VBN 10973 159 20 by by IN 10973 159 21 participating participate VBG 10973 159 22 in in IN 10973 159 23 discussions discussion NNS 10973 159 24 about about IN 10973 159 25 , , , 10973 159 26 and and CC 10973 159 27 the the DT 10973 159 28 accountability accountability NN 10973 159 29 and and CC 10973 159 30 responsibility responsibility NN 10973 159 31 of of IN 10973 159 32 ISRM ISRM NNP 10973 159 33 activities activity NNS 10973 159 34 . . . 10973 160 1 In in IN 10973 160 2 addition addition NN 10973 160 3 , , , 10973 160 4 participating participate VBG 10973 160 5 in in IN 10973 160 6 SETA SETA NNP 10973 160 7 programs program NNS 10973 160 8 . . . 10973 161 1 SETA seta NN 10973 161 2 programs program NNS 10973 161 3 are be VBP 10973 161 4 implemented implement VBN 10973 161 5 within within IN 10973 161 6 organizations organization NNS 10973 161 7 as as IN 10973 161 8 a a DT 10973 161 9 means means NN 10973 161 10 to to TO 10973 161 11 increase increase VB 10973 161 12 compliance compliance NN 10973 161 13 of of IN 10973 161 14 information information NN 10973 161 15 security security NN 10973 161 16 policies policy NNS 10973 161 17 . . . 10973 162 1 The the DT 10973 162 2 findings finding NNS 10973 162 3 suggest suggest VBP 10973 162 4 that that IN 10973 162 5 library library JJ 10973 162 6 employees employee NNS 10973 162 7 who who WP 10973 162 8 completed complete VBD 10973 162 9 a a DT 10973 162 10 cybersecurity cybersecurity NN 10973 162 11 education education NN 10973 162 12 course course NN 10973 162 13 believe believe VBP 10973 162 14 that that IN 10973 162 15 it -PRON- PRP 10973 162 16 is be VBZ 10973 162 17 important important JJ 10973 162 18 to to IN 10973 162 19 , , , 10973 162 20 or or CC 10973 162 21 feel feel VB 10973 162 22 that that IN 10973 162 23 they -PRON- PRP 10973 162 24 have have VBP 10973 162 25 a a DT 10973 162 26 responsibility responsibility NN 10973 162 27 to to TO 10973 162 28 , , , 10973 162 29 protect protect VB 10973 162 30 patron patron NN 10973 162 31 private private JJ 10973 162 32 information information NN 10973 162 33 . . . 10973 163 1 A a DT 10973 163 2 couple couple NN 10973 163 3 of of IN 10973 163 4 research research NN 10973 163 5 participants participant NNS 10973 163 6 stated state VBD 10973 163 7 that that IN 10973 163 8 they -PRON- PRP 10973 163 9 would would MD 10973 163 10 feel feel VB 10973 163 11 embarrassed embarrassed JJ 10973 163 12 if if IN 10973 163 13 their -PRON- PRP$ 10973 163 14 organization organization NN 10973 163 15 experienced experience VBD 10973 163 16 a a DT 10973 163 17 data data NN 10973 163 18 breach breach NN 10973 163 19 . . . 10973 164 1 A a DT 10973 164 2 student student NN 10973 164 3 enrolled enrol VBN 10973 164 4 in in IN 10973 164 5 a a DT 10973 164 6 cybersecurity cybersecurity NN 10973 164 7 education education NN 10973 164 8 course course NN 10973 164 9 may may MD 10973 164 10 develop develop VB 10973 164 11 an an DT 10973 164 12 understanding understanding NN 10973 164 13 of of IN 10973 164 14 and and CC 10973 164 15 value value VB 10973 164 16 the the DT 10973 164 17 information information NN 10973 164 18 that that WDT 10973 164 19 is be VBZ 10973 164 20 passed pass VBN 10973 164 21 on on RP 10973 164 22 from from IN 10973 164 23 the the DT 10973 164 24 knowledge knowledge NN 10973 164 25 source source NN 10973 164 26 about about IN 10973 164 27 ISRM ISRM NNP 10973 164 28 activities activity NNS 10973 164 29 . . . 10973 165 1 With with IN 10973 165 2 ongoing ongoing JJ 10973 165 3 development development NN 10973 165 4 and and CC 10973 165 5 implementation implementation NN 10973 165 6 of of IN 10973 165 7 SETA SETA NNP 10973 165 8 programs program NNS 10973 165 9 , , , 10973 165 10 activating activate VBG 10973 165 11 a a DT 10973 165 12 student student NN 10973 165 13 ’s ’s POS 10973 165 14 prior prior JJ 10973 165 15 knowledge knowledge NN 10973 165 16 of of IN 10973 165 17 ISRM ISRM NNP 10973 165 18 activities activity NNS 10973 165 19 could could MD 10973 165 20 enhance enhance VB 10973 165 21 their -PRON- PRP$ 10973 165 22 ability ability NN 10973 165 23 to to TO 10973 165 24 process process VB 10973 165 25 new new JJ 10973 165 26 information information NN 10973 165 27 and and CC 10973 165 28 apply apply VB 10973 165 29 to to IN 10973 165 30 their -PRON- PRP$ 10973 165 31 job job NN 10973 165 32 . . . 10973 166 1 LIMITATIONS limitations NN 10973 166 2 AND and CC 10973 166 3 FUTURE future NN 10973 166 4 RESEARCH research NN 10973 166 5 This this DT 10973 166 6 research research NN 10973 166 7 was be VBD 10973 166 8 conducted conduct VBN 10973 166 9 based base VBN 10973 166 10 on on IN 10973 166 11 an an DT 10973 166 12 online online JJ 10973 166 13 cybersecurity cybersecurity NN 10973 166 14 course course NN 10973 166 15 offered offer VBD 10973 166 16 at at IN 10973 166 17 a a DT 10973 166 18 university university NN 10973 166 19 located locate VBN 10973 166 20 in in IN 10973 166 21 the the DT 10973 166 22 western western JJ 10973 166 23 U.S. U.S. NNP 10973 167 1 Therefore therefore RB 10973 167 2 , , , 10973 167 3 future future JJ 10973 167 4 research research NN 10973 167 5 is be VBZ 10973 167 6 needed need VBN 10973 167 7 to to TO 10973 167 8 study study VB 10973 167 9 how how WRB 10973 167 10 cybersecurity cybersecurity NN 10973 167 11 courses course NNS 10973 167 12 in in IN 10973 167 13 other other JJ 10973 167 14 parts part NNS 10973 167 15 of of IN 10973 167 16 the the DT 10973 167 17 U.S U.S NNP 10973 167 18 and and CC 10973 167 19 internationally internationally RB 10973 167 20 affects affect VBZ 10973 167 21 knowledge knowledge NN 10973 167 22 transfer transfer NN 10973 167 23 as as IN 10973 167 24 a a DT 10973 167 25 means means NN 10973 167 26 to to TO 10973 167 27 strengthen strengthen VB 10973 167 28 ISRM ISRM NNP 10973 167 29 initiatives initiative NNS 10973 167 30 in in IN 10973 167 31 libraries library NNS 10973 167 32 , , , 10973 167 33 and and CC 10973 167 34 other other JJ 10973 167 35 information information NN 10973 167 36 organizations organization NNS 10973 167 37 . . . 10973 168 1 It -PRON- PRP 10973 168 2 would would MD 10973 168 3 also also RB 10973 168 4 be be VB 10973 168 5 valuable valuable JJ 10973 168 6 to to TO 10973 168 7 conduct conduct VB 10973 168 8 a a DT 10973 168 9 modified modify VBN 10973 168 10 version version NN 10973 168 11 of of IN 10973 168 12 this this DT 10973 168 13 research research NN 10973 168 14 within within IN 10973 168 15 a a DT 10973 168 16 classroom classroom NN 10973 168 17 - - HYPH 10973 168 18 based base VBN 10973 168 19 , , , 10973 168 20 face face NN 10973 168 21 - - HYPH 10973 168 22 to to IN 10973 168 23 - - HYPH 10973 168 24 face face NN 10973 168 25 cybersecurity cybersecurity NN 10973 168 26 course course NN 10973 168 27 . . . 10973 169 1 Furthermore furthermore RB 10973 169 2 , , , 10973 169 3 SETA seta NN 10973 169 4 programs program NNS 10973 169 5 implemented implement VBN 10973 169 6 in in IN 10973 169 7 libraries library NNS 10973 169 8 in in IN 10973 169 9 the the DT 10973 169 10 United United NNP 10973 169 11 States States NNP 10973 169 12 and and CC 10973 169 13 internationally internationally RB 10973 169 14 would would MD 10973 169 15 add add VB 10973 169 16 to to IN 10973 169 17 this this DT 10973 169 18 research research NN 10973 169 19 area area NN 10973 169 20 . . . 10973 170 1 There there EX 10973 170 2 were be VBD 10973 170 3 126 126 CD 10973 170 4 potential potential JJ 10973 170 5 research research NN 10973 170 6 participants participant NNS 10973 170 7 identified identify VBN 10973 170 8 , , , 10973 170 9 and and CC 10973 170 10 although although IN 10973 170 11 all all DT 10973 170 12 were be VBD 10973 170 13 asked ask VBN 10973 170 14 to to TO 10973 170 15 participate participate VB 10973 170 16 , , , 10973 170 17 only only RB 10973 170 18 thirty thirty CD 10973 170 19 - - HYPH 10973 170 20 eight eight CD 10973 170 21 completed complete VBN 10973 170 22 the the DT 10973 170 23 online online JJ 10973 170 24 survey survey NN 10973 170 25 . . . 10973 171 1 Of of IN 10973 171 2 the the DT 10973 171 3 thirty thirty CD 10973 171 4 - - HYPH 10973 171 5 eight eight CD 10973 171 6 completed complete VBN 10973 171 7 surveys survey NNS 10973 171 8 , , , 10973 171 9 responses response NNS 10973 171 10 from from IN 10973 171 11 twenty twenty CD 10973 171 12 - - HYPH 10973 171 13 two two CD 10973 171 14 participants participant NNS 10973 171 15 were be VBD 10973 171 16 reported report VBN 10973 171 17 in in IN 10973 171 18 this this DT 10973 171 19 article article NN 10973 171 20 . . . 10973 172 1 Participation participation NN 10973 172 2 from from IN 10973 172 3 additional additional JJ 10973 172 4 research research NN 10973 172 5 participants participant NNS 10973 172 6 may may MD 10973 172 7 have have VB 10973 172 8 generated generate VBN 10973 172 9 different different JJ 10973 172 10 results result NNS 10973 172 11 . . . 10973 173 1 INFORMATION INFORMATION NNP 10973 173 2 SECURITY SECURITY NNP 10973 173 3 IN in IN 10973 173 4 LIBRARIES LIBRARIES NNP 10973 173 5 | | NNP 10973 173 6 SAN SAN NNP 10973 173 7 - - HYPH 10973 173 8 NICOLAS NICOLAS NNP 10973 173 9 - - HYPH 10973 173 10 ROCCA ROCCA NNP 10973 173 11 AND and CC 10973 173 12 BURKHARD burkhard NN 10973 173 13 68 68 CD 10973 173 14 https://doi.org/10.6017/ital.v38i2.10973 https://doi.org/10.6017/ital.v38i2.10973 CD 10973 173 15 While while IN 10973 173 16 a a DT 10973 173 17 major major JJ 10973 173 18 limitation limitation NN 10973 173 19 of of IN 10973 173 20 this this DT 10973 173 21 study study NN 10973 173 22 is be VBZ 10973 173 23 its -PRON- PRP$ 10973 173 24 small small JJ 10973 173 25 pilot pilot NN 10973 173 26 study study NN 10973 173 27 and and CC 10973 173 28 exploratory exploratory JJ 10973 173 29 focus focus NN 10973 173 30 , , , 10973 173 31 a a DT 10973 173 32 next next JJ 10973 173 33 phase phase NN 10973 173 34 of of IN 10973 173 35 research research NN 10973 173 36 should should MD 10973 173 37 further far RBR 10973 173 38 investigate investigate VB 10973 173 39 what what WDT 10973 173 40 type type NN 10973 173 41 of of IN 10973 173 42 SETA SETA NNP 10973 173 43 programs program NNS 10973 173 44 would would MD 10973 173 45 be be VB 10973 173 46 most most RBS 10973 173 47 effective effective JJ 10973 173 48 in in IN 10973 173 49 different different JJ 10973 173 50 library library NN 10973 173 51 environments environment NNS 10973 173 52 . . . 10973 174 1 While while IN 10973 174 2 cybersecurity cybersecurity NN 10973 174 3 education education NN 10973 174 4 may may MD 10973 174 5 not not RB 10973 174 6 be be VB 10973 174 7 feasible feasible JJ 10973 174 8 for for IN 10973 174 9 all all DT 10973 174 10 library library NN 10973 174 11 employees employee NNS 10973 174 12 to to TO 10973 174 13 obtain obtain VB 10973 174 14 , , , 10973 174 15 examining examine VBG 10973 174 16 and and CC 10973 174 17 implementing implement VBG 10973 174 18 the the DT 10973 174 19 most most RBS 10973 174 20 effective effective JJ 10973 174 21 SETA SETA NNP 10973 174 22 program program NN 10973 174 23 for for IN 10973 174 24 each each DT 10973 174 25 library library JJ 10973 174 26 environment environment NN 10973 174 27 could could MD 10973 174 28 strengthen strengthen VB 10973 174 29 cybersecurity cybersecurity NN 10973 174 30 practices practice NNS 10973 174 31 in in IN 10973 174 32 libraries library NNS 10973 174 33 across across IN 10973 174 34 the the DT 10973 174 35 U.S. U.S. NNP 10973 174 36 A a DT 10973 174 37 future future JJ 10973 174 38 study study NN 10973 174 39 instrument instrument NN 10973 174 40 should should MD 10973 174 41 take take VB 10973 174 42 into into IN 10973 174 43 account account NN 10973 174 44 the the DT 10973 174 45 factors factor NNS 10973 174 46 that that WDT 10973 174 47 influence influence VBP 10973 174 48 knowledge knowledge NN 10973 174 49 transfer transfer NN 10973 174 50 ( ( -LRB- 10973 174 51 absorptive absorptive JJ 10973 174 52 capacity capacity NN 10973 174 53 , , , 10973 174 54 communication communication NN 10973 174 55 , , , 10973 174 56 motivation motivation NN 10973 174 57 , , , 10973 174 58 and and CC 10973 174 59 user user NN 10973 174 60 participation participation NN 10973 174 61 ) ) -RRB- 10973 174 62 as as IN 10973 174 63 a a DT 10973 174 64 means means NN 10973 174 65 to to TO 10973 174 66 strengthen strengthen VB 10973 174 67 ISRM ISRM NNP 10973 174 68 practices practice NNS 10973 174 69 . . . 10973 175 1 A a DT 10973 175 2 common common JJ 10973 175 3 an an DT 10973 175 4 important important JJ 10973 175 5 outcome outcome NN 10973 175 6 for for IN 10973 175 7 SETA SETA NNP 10973 175 8 programs program NNS 10973 175 9 is be VBZ 10973 175 10 user user NN 10973 175 11 compliance compliance NN 10973 175 12 to to IN 10973 175 13 information information NN 10973 175 14 security security NN 10973 175 15 policies policy NNS 10973 175 16 . . . 10973 176 1 As as IN 10973 176 2 such such JJ 10973 176 3 , , , 10973 176 4 a a DT 10973 176 5 future future JJ 10973 176 6 study study NN 10973 176 7 should should MD 10973 176 8 test test VB 10973 176 9 library library JJ 10973 176 10 employee employee NN 10973 176 11 knowledge knowledge NN 10973 176 12 of of IN 10973 176 13 , , , 10973 176 14 and and CC 10973 176 15 compliance compliance NN 10973 176 16 to to IN 10973 176 17 , , , 10973 176 18 information information NN 10973 176 19 security security NN 10973 176 20 policies policy NNS 10973 176 21 . . . 10973 177 1 CONCLUSION CONCLUSION NNP 10973 177 2 U.S. U.S. NNP 10973 177 3 libraries library NNS 10973 177 4 handle handle VBP 10973 177 5 sensitive sensitive JJ 10973 177 6 patron patron NN 10973 177 7 information information NN 10973 177 8 , , , 10973 177 9 including include VBG 10973 177 10 personally personally RB 10973 177 11 identifiable identifiable JJ 10973 177 12 information information NN 10973 177 13 and and CC 10973 177 14 circulation circulation NN 10973 177 15 records record NNS 10973 177 16 . . . 10973 178 1 With with IN 10973 178 2 libraries library NNS 10973 178 3 providing provide VBG 10973 178 4 services service NNS 10973 178 5 to to IN 10973 178 6 millions million NNS 10973 178 7 of of IN 10973 178 8 patrons patron NNS 10973 178 9 across across IN 10973 178 10 the the DT 10973 178 11 United United NNP 10973 178 12 States States NNP 10973 178 13 , , , 10973 178 14 it -PRON- PRP 10973 178 15 is be VBZ 10973 178 16 important important JJ 10973 178 17 that that IN 10973 178 18 they -PRON- PRP 10973 178 19 understand understand VBP 10973 178 20 the the DT 10973 178 21 importance importance NN 10973 178 22 of of IN 10973 178 23 patron patron NN 10973 178 24 privacy privacy NN 10973 178 25 and and CC 10973 178 26 how how WRB 10973 178 27 to to TO 10973 178 28 protect protect VB 10973 178 29 it -PRON- PRP 10973 178 30 . . . 10973 179 1 This this DT 10973 179 2 study study NN 10973 179 3 investigated investigate VBD 10973 179 4 how how WRB 10973 179 5 knowledge knowledge NN 10973 179 6 transferred transfer VBN 10973 179 7 within within IN 10973 179 8 an an DT 10973 179 9 online online JJ 10973 179 10 cybersecurity cybersecurity NN 10973 179 11 education education NN 10973 179 12 course course NN 10973 179 13 as as IN 10973 179 14 a a DT 10973 179 15 means means NN 10973 179 16 to to TO 10973 179 17 strengthen strengthen VB 10973 179 18 information information NN 10973 179 19 security security NN 10973 179 20 risk risk NN 10973 179 21 management management NN 10973 179 22 affects affect VBZ 10973 179 23 library library JJ 10973 179 24 employee employee NN 10973 179 25 information information NN 10973 179 26 security security NN 10973 179 27 practices practice NNS 10973 179 28 . . . 10973 180 1 The the DT 10973 180 2 results result NNS 10973 180 3 of of IN 10973 180 4 this this DT 10973 180 5 study study NN 10973 180 6 suggest suggest VBP 10973 180 7 that that IN 10973 180 8 knowledge knowledge NN 10973 180 9 transfer transfer NN 10973 180 10 does do VBZ 10973 180 11 have have VB 10973 180 12 a a DT 10973 180 13 positive positive JJ 10973 180 14 effect effect NN 10973 180 15 on on IN 10973 180 16 library library JJ 10973 180 17 employee employee NN 10973 180 18 information information NN 10973 180 19 security security NN 10973 180 20 and and CC 10973 180 21 risk risk NN 10973 180 22 management management NN 10973 180 23 practices practice NNS 10973 180 24 . . . 10973 181 1 REFERENCES reference NNS 10973 181 2 1 1 CD 10973 181 3 “ " `` 10973 181 4 Public Public NNP 10973 181 5 Library Library NNP 10973 181 6 Survey Survey NNP 10973 181 7 ( ( -LRB- 10973 181 8 PLS PLS NNP 10973 181 9 ) ) -RRB- 10973 181 10 Data Data NNPS 10973 181 11 and and CC 10973 181 12 Reports Reports NNPS 10973 181 13 , , , 10973 181 14 ” " '' 10973 181 15 Institute Institute NNP 10973 181 16 of of IN 10973 181 17 Museum Museum NNP 10973 181 18 and and CC 10973 181 19 Library Library NNP 10973 181 20 Services Services NNPS 10973 181 21 , , , 10973 181 22 Retrieved Retrieved NNP 10973 181 23 on on IN 10973 181 24 June June NNP 10973 181 25 10 10 CD 10973 181 26 , , , 10973 181 27 2018 2018 CD 10973 181 28 from from IN 10973 181 29 https://www.imls.gov/research-evaluation/data- https://www.imls.gov/research-evaluation/data- NNP 10973 181 30 collection collection NN 10973 181 31 / / SYM 10973 181 32 public public JJ 10973 181 33 - - HYPH 10973 181 34 libraries library NNS 10973 181 35 - - HYPH 10973 181 36 survey survey NN 10973 181 37 / / SYM 10973 181 38 explore explore NN 10973 181 39 - - HYPH 10973 181 40 pls pls NN 10973 181 41 - - HYPH 10973 181 42 data data NN 10973 181 43 / / SYM 10973 181 44 pls pls NN 10973 181 45 - - HYPH 10973 181 46 data datum NNS 10973 181 47 . . . 10973 182 1 2 2 LS 10973 182 2 “ " `` 10973 182 3 Policy policy NN 10973 182 4 concerning concern VBG 10973 182 5 Confidentiality confidentiality NN 10973 182 6 of of IN 10973 182 7 Personally personally RB 10973 182 8 Identifiable identifiable JJ 10973 182 9 Information information NN 10973 182 10 about about IN 10973 182 11 Library Library NNP 10973 182 12 Users user NNS 10973 182 13 , , , 10973 182 14 ” " '' 10973 182 15 American American NNP 10973 182 16 Library Library NNP 10973 182 17 Association Association NNP 10973 182 18 , , , 10973 182 19 July July NNP 10973 182 20 7 7 CD 10973 182 21 , , , 10973 182 22 2006 2006 CD 10973 182 23 , , , 10973 182 24 http://www.ala.org/advocacy/intfreedom/statementspols/otherpolicies/policyconcerning http://www.ala.org/advocacy/intfreedom/statementspols/otherpolicies/policyconcerne VBG 10973 182 25 ; ; : 10973 182 26 " " `` 10973 182 27 Professional Professional NNP 10973 182 28 Ethics Ethics NNPS 10973 182 29 , , , 10973 182 30 " " '' 10973 182 31 American American NNP 10973 182 32 Library Library NNP 10973 182 33 Association Association NNP 10973 182 34 , , , 10973 182 35 May May NNP 10973 182 36 19 19 CD 10973 182 37 , , , 10973 182 38 2017 2017 CD 10973 182 39 , , , 10973 182 40 http://www.ala.org/tools/ethics http://www.ala.org/tools/ethic NNS 10973 182 41 . . . 10973 183 1 3 3 LS 10973 183 2 “ " `` 10973 183 3 Privacy privacy NN 10973 183 4 : : : 10973 183 5 An an DT 10973 183 6 Interpretation interpretation NN 10973 183 7 of of IN 10973 183 8 the the DT 10973 183 9 Library Library NNP 10973 183 10 Bill Bill NNP 10973 183 11 of of IN 10973 183 12 Rights Rights NNPS 10973 183 13 , , , 10973 183 14 ” " '' 10973 183 15 American American NNP 10973 183 16 Library Library NNP 10973 183 17 Association Association NNP 10973 183 18 , , , 10973 183 19 amended amend VBD 10973 183 20 July July NNP 10973 183 21 1 1 CD 10973 183 22 , , , 10973 183 23 2014 2014 CD 10973 183 24 , , , 10973 183 25 http://www.ala.org/advocacy/intfreedom/librarybill/interpretations/privacy http://www.ala.org/advocacy/intfreedom/librarybill/interpretations/privacy NNP 10973 183 26 . . . 10973 184 1 4 4 CD 10973 184 2 Ibid Ibid NNP 10973 184 3 . . . 10973 185 1 5 5 LS 10973 185 2 “ " `` 10973 185 3 Policy policy NN 10973 185 4 concerning concern VBG 10973 185 5 Confidentiality confidentiality NN 10973 185 6 of of IN 10973 185 7 Personally personally RB 10973 185 8 Identifiable identifiable JJ 10973 185 9 Information information NN 10973 185 10 about about IN 10973 185 11 Library Library NNP 10973 185 12 Users user NNS 10973 185 13 , , , 10973 185 14 ” " '' 10973 185 15 American American NNP 10973 185 16 Library Library NNP 10973 185 17 Association Association NNP 10973 185 18 ; ; : 10973 185 19 “ " `` 10973 185 20 Code Code NNP 10973 185 21 of of IN 10973 185 22 Ethics Ethics NNP 10973 185 23 of of IN 10973 185 24 the the DT 10973 185 25 American American NNP 10973 185 26 Library Library NNP 10973 185 27 Association Association NNP 10973 185 28 , , , 10973 185 29 ” " '' 10973 185 30 American American NNP 10973 185 31 Library Library NNP 10973 185 32 Association Association NNP 10973 185 33 , , , 10973 185 34 amended amend VBN 10973 185 35 Jan. January NNP 10973 185 36 22 22 CD 10973 185 37 , , , 10973 185 38 2008 2008 CD 10973 185 39 , , , 10973 185 40 http://www.ala.org/advocacy/proethics/codeofethics/codeethics http://www.ala.org/advocacy/proethics/codeofethics/codeethic NNS 10973 185 41 . . . 10973 186 1 6 6 LS 10973 186 2 “ " `` 10973 186 3 Policy policy NN 10973 186 4 concerning concern VBG 10973 186 5 Confidentiality confidentiality NN 10973 186 6 of of IN 10973 186 7 Personally personally RB 10973 186 8 Identifiable identifiable JJ 10973 186 9 Information information NN 10973 186 10 about about IN 10973 186 11 Library Library NNP 10973 186 12 Users user NNS 10973 186 13 , , , 10973 186 14 ” " '' 10973 186 15 American American NNP 10973 186 16 Library Library NNP 10973 186 17 Association Association NNP 10973 186 18 ; ; : 10973 186 19 “ " `` 10973 186 20 Code Code NNP 10973 186 21 of of IN 10973 186 22 Ethics Ethics NNP 10973 186 23 of of IN 10973 186 24 the the DT 10973 186 25 American American NNP 10973 186 26 Library Library NNP 10973 186 27 Association Association NNP 10973 186 28 , , , 10973 186 29 ” " '' 10973 186 30 American American NNP 10973 186 31 Library Library NNP 10973 186 32 Association Association NNP 10973 186 33 . . . 10973 187 1 7 7 LS 10973 187 2 “ " `` 10973 187 3 Privacy privacy NN 10973 187 4 : : : 10973 187 5 An an DT 10973 187 6 Interpretation interpretation NN 10973 187 7 of of IN 10973 187 8 the the DT 10973 187 9 Library Library NNP 10973 187 10 Bill Bill NNP 10973 187 11 of of IN 10973 187 12 Rights Rights NNPS 10973 187 13 , , , 10973 187 14 ” " '' 10973 187 15 American American NNP 10973 187 16 Library Library NNP 10973 187 17 Association Association NNP 10973 187 18 . . . 10973 188 1 INFORMATION INFORMATION NNP 10973 188 2 TECHNOLOGY technology NN 10973 188 3 AND and CC 10973 188 4 LIBRARIES LIBRARIES NNP 10973 188 5 | | NNP 10973 188 6 JUNE JUNE NNP 10973 188 7 2019 2019 CD 10973 188 8 69 69 CD 10973 188 9 8 8 CD 10973 188 10 Samuel Samuel NNP 10973 188 11 T.C. T.C. NNP 10973 189 1 Thompson Thompson NNP 10973 189 2 , , , 10973 189 3 “ " `` 10973 189 4 Helping help VBG 10973 189 5 the the DT 10973 189 6 Hacker Hacker NNP 10973 189 7 ? ? . 10973 190 1 Library Library NNP 10973 190 2 Information Information NNP 10973 190 3 , , , 10973 190 4 Security Security NNP 10973 190 5 , , , 10973 190 6 and and CC 10973 190 7 Social Social NNP 10973 190 8 Engineering Engineering NNP 10973 190 9 , , , 10973 190 10 ” " '' 10973 190 11 Information Information NNP 10973 190 12 Technology Technology NNP 10973 190 13 and and CC 10973 190 14 Libraries Libraries NNP 10973 190 15 25 25 CD 10973 190 16 , , , 10973 190 17 no no UH 10973 190 18 . . . 10973 191 1 4 4 CD 10973 191 2 ( ( -LRB- 10973 191 3 2006 2006 CD 10973 191 4 ) ) -RRB- 10973 191 5 : : : 10973 191 6 222 222 CD 10973 191 7 - - SYM 10973 191 8 25 25 CD 10973 191 9 , , , 10973 191 10 https://doi.org/10.6017/ital.v25i4.3355 https://doi.org/10.6017/ital.v25i4.3355 NNP 10973 191 11 . . . 10973 192 1 9 9 CD 10973 192 2 Roesnita Roesnita NNP 10973 192 3 Ismail Ismail NNP 10973 192 4 and and CC 10973 192 5 Awang Awang NNP 10973 192 6 Ngah Ngah NNP 10973 192 7 Zainab Zainab NNP 10973 192 8 , , , 10973 192 9 “ " `` 10973 192 10 Assessing assess VBG 10973 192 11 the the DT 10973 192 12 Status Status NNP 10973 192 13 of of IN 10973 192 14 Library Library NNP 10973 192 15 Information Information NNP 10973 192 16 Systems Systems NNPS 10973 192 17 Security Security NNP 10973 192 18 , , , 10973 192 19 ” " '' 10973 192 20 Journal Journal NNP 10973 192 21 of of IN 10973 192 22 Librarianship Librarianship NNP 10973 192 23 and and CC 10973 192 24 Information Information NNP 10973 192 25 Science Science NNP 10973 192 26 45 45 CD 10973 192 27 , , , 10973 192 28 no no UH 10973 192 29 . . . 10973 193 1 3 3 CD 10973 193 2 ( ( -LRB- 10973 193 3 2013 2013 CD 10973 193 4 ) ) -RRB- 10973 193 5 : : : 10973 193 6 232 232 CD 10973 193 7 - - SYM 10973 193 8 47 47 CD 10973 193 9 , , , 10973 193 10 https://doi.org/10.1177/0961000613477676 https://doi.org/10.1177/0961000613477676 ADD 10973 193 11 . . . 10973 194 1 10 10 CD 10973 194 2 Ibid Ibid NNP 10973 194 3 . . . 10973 195 1 11 11 CD 10973 195 2 Shayna Shayna NNP 10973 195 3 Pekala Pekala NNP 10973 195 4 , , , 10973 195 5 “ " `` 10973 195 6 Privacy Privacy NNP 10973 195 7 and and CC 10973 195 8 User User NNP 10973 195 9 Experience Experience NNP 10973 195 10 in in IN 10973 195 11 21st 21st JJ 10973 195 12 Century Century NNP 10973 195 13 Library Library NNP 10973 195 14 Discovery Discovery NNP 10973 195 15 , , , 10973 195 16 ” " '' 10973 195 17 Information Information NNP 10973 195 18 Technology Technology NNP 10973 195 19 and and CC 10973 195 20 Libraries Libraries NNP 10973 195 21 36 36 CD 10973 195 22 , , , 10973 195 23 no no UH 10973 195 24 . . . 10973 196 1 2 2 CD 10973 196 2 ( ( -LRB- 10973 196 3 2017 2017 CD 10973 196 4 ) ) -RRB- 10973 196 5 : : : 10973 196 6 48–58 48–58 CD 10973 196 7 , , , 10973 196 8 https://doi.org/10.6017/ital.v36i2.9817 https://doi.org/10.6017/ital.v36i2.9817 NN 10973 196 9 . . . 10973 197 1 12 12 CD 10973 197 2 Tonia Tonia NNP 10973 197 3 San San NNP 10973 197 4 Nicolas Nicolas NNP 10973 197 5 - - HYPH 10973 197 6 Rocca Rocca NNP 10973 197 7 , , , 10973 197 8 Benjamin Benjamin NNP 10973 197 9 Schooley Schooley NNP 10973 197 10 and and CC 10973 197 11 Janine Janine NNP 10973 197 12 L. L. NNP 10973 197 13 Spears Spears NNP 10973 197 14 , , , 10973 197 15 “ " `` 10973 197 16 Exploring explore VBG 10973 197 17 the the DT 10973 197 18 Effect Effect NNP 10973 197 19 of of IN 10973 197 20 Knowledge Knowledge NNP 10973 197 21 Transfer Transfer NNP 10973 197 22 Practices Practices NNPS 10973 197 23 on on IN 10973 197 24 User User NNP 10973 197 25 Compliance Compliance NNP 10973 197 26 to to IN 10973 197 27 IS be VBZ 10973 197 28 Security Security NNP 10973 197 29 Practices Practices NNP 10973 197 30 , , , 10973 197 31 ” " '' 10973 197 32 International International NNP 10973 197 33 Journal Journal NNP 10973 197 34 of of IN 10973 197 35 Knowledge Knowledge NNP 10973 197 36 Management Management NNP 10973 197 37 10 10 CD 10973 197 38 , , , 10973 197 39 no no UH 10973 197 40 . . . 10973 198 1 2 2 CD 10973 198 2 , , , 10973 198 3 ( ( -LRB- 10973 198 4 2014 2014 CD 10973 198 5 ) ) -RRB- 10973 198 6 : : : 10973 198 7 62 62 CD 10973 198 8 - - SYM 10973 198 9 78 78 CD 10973 198 10 , , , 10973 198 11 https://doi.org/10.4018/ijkm.2014040105 https://doi.org/10.4018/ijkm.2014040105 NNP 10973 198 12 ; ; : 10973 198 13 Janine Janine NNP 10973 198 14 Spears Spears NNPS 10973 198 15 and and CC 10973 198 16 Tonia Tonia NNP 10973 198 17 San San NNP 10973 198 18 Nicolas Nicolas NNP 10973 198 19 - - HYPH 10973 198 20 Rocca Rocca NNP 10973 198 21 , , , 10973 198 22 “ " `` 10973 198 23 Knowledge Knowledge NNP 10973 198 24 Transfer Transfer NNP 10973 198 25 in in IN 10973 198 26 Information Information NNP 10973 198 27 Security Security NNP 10973 198 28 Capacity Capacity NNP 10973 198 29 Building Building NNP 10973 198 30 for for IN 10973 198 31 Community Community NNP 10973 198 32 - - HYPH 10973 198 33 Based base VBN 10973 198 34 Organizations Organizations NNP 10973 198 35 , , , 10973 198 36 ” " '' 10973 198 37 International International NNP 10973 198 38 Journal Journal NNP 10973 198 39 of of IN 10973 198 40 Knowledge Knowledge NNP 10973 198 41 Management Management NNP 10973 198 42 11 11 CD 10973 198 43 , , , 10973 198 44 no no UH 10973 198 45 . . . 10973 199 1 4 4 CD 10973 199 2 ( ( -LRB- 10973 199 3 2015 2015 CD 10973 199 4 ) ) -RRB- 10973 199 5 : : : 10973 199 6 52 52 CD 10973 199 7 - - SYM 10973 199 8 69 69 CD 10973 199 9 , , , 10973 199 10 https://doi.org/10.4018/IJKM.2015100104 https://doi.org/10.4018/IJKM.2015100104 NNP 10973 199 11 . . . 10973 200 1 13 13 CD 10973 200 2 Dong Dong NNP 10973 200 3 - - HYPH 10973 200 4 Gil Gil NNP 10973 200 5 Ko Ko NNP 10973 200 6 , , , 10973 200 7 Laurie Laurie NNP 10973 200 8 J. J. NNP 10973 200 9 Kirsch Kirsch NNP 10973 200 10 and and CC 10973 200 11 William William NNP 10973 200 12 R. R. NNP 10973 200 13 King King NNP 10973 200 14 , , , 10973 200 15 “ " `` 10973 200 16 Antecedents antecedent NNS 10973 200 17 of of IN 10973 200 18 Knowledge Knowledge NNP 10973 200 19 Transfer Transfer NNP 10973 200 20 from from IN 10973 200 21 Consultants consultant NNS 10973 200 22 to to IN 10973 200 23 Clients client NNS 10973 200 24 in in IN 10973 200 25 Enterprise Enterprise NNP 10973 200 26 System System NNP 10973 200 27 Implementations Implementations NNPS 10973 200 28 , , , 10973 200 29 ” " '' 10973 200 30 MIS MIS NNP 10973 200 31 Quarterly Quarterly NNP 10973 200 32 29 29 CD 10973 200 33 , , , 10973 200 34 no no UH 10973 200 35 . . . 10973 201 1 1 1 CD 10973 201 2 ( ( -LRB- 10973 201 3 2005 2005 CD 10973 201 4 ) ) -RRB- 10973 201 5 : : : 10973 201 6 59 59 CD 10973 201 7 - - SYM 10973 201 8 85 85 CD 10973 201 9 , , , 10973 201 10 https://doi.org/10.2307/25148668 https://doi.org/10.2307/25148668 ADD 10973 201 11 . . . 10973 202 1 14 14 CD 10973 202 2 Spears Spears NNPS 10973 202 3 and and CC 10973 202 4 San San NNP 10973 202 5 Nicolas Nicolas NNP 10973 202 6 - - HYPH 10973 202 7 Rocca Rocca NNP 10973 202 8 , , , 10973 202 9 “ " `` 10973 202 10 Knowledge Knowledge NNP 10973 202 11 Transfer Transfer NNP 10973 202 12 in in IN 10973 202 13 Information Information NNP 10973 202 14 Security Security NNP 10973 202 15 Capacity Capacity NNP 10973 202 16 Building Building NNP 10973 202 17 for for IN 10973 202 18 Community Community NNP 10973 202 19 - - HYPH 10973 202 20 Based base VBN 10973 202 21 Organizations Organizations NNP 10973 202 22 , , , 10973 202 23 ” " '' 10973 202 24 pp pp NN 10973 202 25 . . . 10973 203 1 52 52 CD 10973 203 2 - - SYM 10973 203 3 69 69 CD 10973 203 4 ; ; : 10973 203 5 Dana Dana NNP 10973 203 6 Minbaeva Minbaeva NNP 10973 203 7 et et FW 10973 203 8 al al NNP 10973 203 9 . . NNP 10973 203 10 , , , 10973 203 11 “ " `` 10973 203 12 MNC MNC NNP 10973 203 13 Knowledge Knowledge NNP 10973 203 14 Transfer Transfer NNP 10973 203 15 , , , 10973 203 16 Subsidiary Subsidiary NNP 10973 203 17 Absorptive Absorptive NNP 10973 203 18 Capacity Capacity NNP 10973 203 19 and and CC 10973 203 20 HRM HRM NNP 10973 203 21 , , , 10973 203 22 ” " '' 10973 203 23 Journal Journal NNP 10973 203 24 of of IN 10973 203 25 International International NNP 10973 203 26 Business Business NNP 10973 203 27 Studies Studies NNP 10973 203 28 45 45 CD 10973 203 29 , , , 10973 203 30 no no UH 10973 203 31 . . . 10973 204 1 1 1 CD 10973 204 2 ( ( -LRB- 10973 204 3 2014 2014 CD 10973 204 4 ) ) -RRB- 10973 204 5 : : : 10973 204 6 38 38 CD 10973 204 7 - - SYM 10973 204 8 51 51 CD 10973 204 9 , , , 10973 204 10 https://doi.org/10.1057/jibs.2013.43 https://doi.org/10.1057/jibs.2013.43 NN 10973 204 11 ; ; : 10973 204 12 Geordie Geordie NNP 10973 204 13 Stewart Stewart NNP 10973 204 14 and and CC 10973 204 15 David David NNP 10973 204 16 Lacey Lacey NNP 10973 204 17 , , , 10973 204 18 “ " `` 10973 204 19 Death death NN 10973 204 20 by by IN 10973 204 21 a a DT 10973 204 22 Thousand thousand CD 10973 204 23 Facts fact NNS 10973 204 24 : : : 10973 204 25 Criticising criticise VBG 10973 204 26 the the DT 10973 204 27 Technocratic Technocratic NNP 10973 204 28 Approach Approach NNP 10973 204 29 to to IN 10973 204 30 Information Information NNP 10973 204 31 Security Security NNP 10973 204 32 Awareness Awareness NNP 10973 204 33 , , , 10973 204 34 ” " '' 10973 204 35 Information Information NNP 10973 204 36 Management Management NNP 10973 204 37 & & CC 10973 204 38 Computer Computer NNP 10973 204 39 Security Security NNP 10973 204 40 20 20 CD 10973 204 41 , , , 10973 204 42 no no UH 10973 204 43 . . . 10973 205 1 1 1 CD 10973 205 2 ( ( -LRB- 10973 205 3 2012 2012 CD 10973 205 4 ) ) -RRB- 10973 205 5 : : : 10973 205 6 29 29 CD 10973 205 7 - - SYM 10973 205 8 38 38 CD 10973 205 9 , , , 10973 205 10 https://doi.org/10.1108/09685221211219182 https://doi.org/10.1108/09685221211219182 UH 10973 205 11 ; ; : 10973 205 12 Mark Mark NNP 10973 205 13 Wilson Wilson NNP 10973 205 14 et et NNP 10973 205 15 al al NNP 10973 205 16 . . NNP 10973 205 17 , , , 10973 205 18 “ " `` 10973 205 19 Information Information NNP 10973 205 20 Technology Technology NNP 10973 205 21 Training Training NNP 10973 205 22 Requirements Requirements NNPS 10973 205 23 : : : 10973 205 24 A a DT 10973 205 25 Role role NN 10973 205 26 - - : 10973 205 27 and and CC 10973 205 28 Performance Performance NNP 10973 205 29 - - HYPH 10973 205 30 Based base VBN 10973 205 31 Model Model NNP 10973 205 32 ” " '' 10973 205 33 ( ( -LRB- 10973 205 34 NIST NIST NNP 10973 205 35 Special Special NNP 10973 205 36 Publication Publication NNP 10973 205 37 800 800 CD 10973 205 38 - - SYM 10973 205 39 16 16 CD 10973 205 40 ) ) -RRB- 10973 205 41 , , , 10973 205 42 National National NNP 10973 205 43 Institute Institute NNP 10973 205 44 of of IN 10973 205 45 Standards Standards NNPS 10973 205 46 and and CC 10973 205 47 Technology Technology NNP 10973 205 48 , , , 10973 205 49 ( ( -LRB- 10973 205 50 2018 2018 CD 10973 205 51 ) ) -RRB- 10973 205 52 , , , 10973 205 53 https://www.nist.gov/publications/information-technology-security-training-requirements- https://www.nist.gov/publications/information-technology-security-training-requirements- NNP 10973 205 54 role role NN 10973 205 55 - - HYPH 10973 205 56 and and CC 10973 205 57 - - HYPH 10973 205 58 performance performance NN 10973 205 59 - - HYPH 10973 205 60 based base VBN 10973 205 61 - - HYPH 10973 205 62 model model NN 10973 205 63 ; ; : 10973 205 64 San San NNP 10973 205 65 Nicolas Nicolas NNP 10973 205 66 - - HYPH 10973 205 67 Rocca Rocca NNP 10973 205 68 , , , 10973 205 69 Schooley Schooley NNP 10973 205 70 and and CC 10973 205 71 Spears Spears NNPS 10973 205 72 , , , 10973 205 73 “ " `` 10973 205 74 Exploring explore VBG 10973 205 75 the the DT 10973 205 76 Effect Effect NNP 10973 205 77 of of IN 10973 205 78 Knowledge Knowledge NNP 10973 205 79 Transfer Transfer NNP 10973 205 80 Practices Practices NNPS 10973 205 81 on on IN 10973 205 82 User User NNP 10973 205 83 Compliance Compliance NNP 10973 205 84 to to IN 10973 205 85 IS be VBZ 10973 205 86 Security Security NNP 10973 205 87 Practices Practices NNP 10973 205 88 , , , 10973 205 89 ” " '' 10973 205 90 62 62 CD 10973 205 91 - - SYM 10973 205 92 78 78 CD 10973 205 93 . . . 10973 206 1 15 15 CD 10973 206 2 Spears Spears NNPS 10973 206 3 and and CC 10973 206 4 San San NNP 10973 206 5 Nicolas Nicolas NNP 10973 206 6 - - HYPH 10973 206 7 Rocca Rocca NNP 10973 206 8 , , , 10973 206 9 “ " `` 10973 206 10 Knowledge Knowledge NNP 10973 206 11 Transfer Transfer NNP 10973 206 12 in in IN 10973 206 13 Information Information NNP 10973 206 14 Security Security NNP 10973 206 15 Capacity Capacity NNP 10973 206 16 Building Building NNP 10973 206 17 for for IN 10973 206 18 Community Community NNP 10973 206 19 - - HYPH 10973 206 20 Based base VBN 10973 206 21 Organizations Organizations NNP 10973 206 22 , , , 10973 206 23 ” " '' 10973 206 24 52 52 CD 10973 206 25 - - SYM 10973 206 26 69 69 CD 10973 206 27 . . . 10973 207 1 16 16 CD 10973 207 2 Janine Janine NNP 10973 207 3 L. L. NNP 10973 207 4 Spears Spears NNP 10973 207 5 and and CC 10973 207 6 Henri Henri NNP 10973 207 7 Barki Barki NNP 10973 207 8 , , , 10973 207 9 “ " `` 10973 207 10 User User NNP 10973 207 11 Participation Participation NNP 10973 207 12 in in IN 10973 207 13 Information Information NNP 10973 207 14 Systems Systems NNPS 10973 207 15 Security Security NNP 10973 207 16 Risk Risk NNP 10973 207 17 Management Management NNP 10973 207 18 , , , 10973 207 19 ” " '' 10973 207 20 MIS MIS NNP 10973 207 21 Quarterly Quarterly NNP 10973 207 22 34 34 CD 10973 207 23 , , , 10973 207 24 no no UH 10973 207 25 . . . 10973 208 1 3 3 CD 10973 208 2 ( ( -LRB- 10973 208 3 2010 2010 CD 10973 208 4 ) ) -RRB- 10973 208 5 : : : 10973 208 6 503 503 CD 10973 208 7 - - SYM 10973 208 8 22 22 CD 10973 208 9 , , , 10973 208 10 https://doi.org/10.2307/25750689 https://doi.org/10.2307/25750689 NN 10973 208 11 ; ; : 10973 208 12 Piya Piya NNP 10973 208 13 Shedden Shedden NNP 10973 208 14 , , , 10973 208 15 Tobias Tobias NNP 10973 208 16 Ruighaver Ruighaver NNP 10973 208 17 , , , 10973 208 18 and and CC 10973 208 19 Atif Atif NNP 10973 208 20 Ahmad Ahmad NNP 10973 208 21 , , , 10973 208 22 “ " `` 10973 208 23 Risk Risk NNP 10973 208 24 Management Management NNP 10973 208 25 Standards Standards NNPS 10973 208 26 - - , 10973 208 27 the the DT 10973 208 28 Perception Perception NNP 10973 208 29 of of IN 10973 208 30 Ease Ease NNP 10973 208 31 of of IN 10973 208 32 Use Use NNP 10973 208 33 , , , 10973 208 34 ” " '' 10973 208 35 Journal Journal NNP 10973 208 36 of of IN 10973 208 37 Information Information NNP 10973 208 38 Systems Systems NNPS 10973 208 39 Security Security NNP 10973 208 40 6 6 CD 10973 208 41 , , , 10973 208 42 no no UH 10973 208 43 . . . 10973 209 1 3 3 CD 10973 209 2 ( ( -LRB- 10973 209 3 2010 2010 CD 10973 209 4 ) ) -RRB- 10973 209 5 : : : 10973 209 6 23–41 23–41 CD 10973 209 7 . . . 10973 210 1 INFORMATION INFORMATION NNP 10973 210 2 SECURITY SECURITY NNP 10973 210 3 IN in IN 10973 210 4 LIBRARIES LIBRARIES NNP 10973 210 5 | | NNP 10973 210 6 SAN SAN NNP 10973 210 7 - - HYPH 10973 210 8 NICOLAS NICOLAS NNP 10973 210 9 - - HYPH 10973 210 10 ROCCA ROCCA NNP 10973 210 11 AND and CC 10973 210 12 BURKHARD BURKHARD NNP 10973 210 13 70 70 CD 10973 210 14 https://doi.org/10.6017/ital.v38i2.10973 https://doi.org/10.6017/ital.v38i2.10973 VBG 10973 210 15 17 17 CD 10973 210 16 Shedden Shedden NNP 10973 210 17 , , , 10973 210 18 Ruighaver Ruighaver NNP 10973 210 19 and and CC 10973 210 20 Ahmad Ahmad NNP 10973 210 21 , , , 10973 210 22 “ " `` 10973 210 23 Risk Risk NNP 10973 210 24 Management Management NNP 10973 210 25 Standards Standards NNPS 10973 210 26 - - , 10973 210 27 the the DT 10973 210 28 Perception Perception NNP 10973 210 29 of of IN 10973 210 30 Ease Ease NNP 10973 210 31 of of IN 10973 210 32 Use Use NNP 10973 210 33 ” " '' 10973 210 34 pp pp NN 10973 210 35 . . . 10973 211 1 23 23 CD 10973 211 2 - - SYM 10973 211 3 42 42 CD 10973 211 4 ; ; : 10973 211 5 Janne Janne NNP 10973 211 6 Hagen Hagen NNP 10973 211 7 , , , 10973 211 8 Eirik Eirik NNP 10973 211 9 Albrechtsen Albrechtsen NNP 10973 211 10 , , , 10973 211 11 and and CC 10973 211 12 Stig Stig NNP 10973 211 13 Ole Ole NNP 10973 211 14 Johnsen Johnsen NNP 10973 211 15 , , , 10973 211 16 “ " `` 10973 211 17 The the DT 10973 211 18 Long long JJ 10973 211 19 - - HYPH 10973 211 20 term term NN 10973 211 21 Effects Effects NNPS 10973 211 22 of of IN 10973 211 23 Information Information NNP 10973 211 24 Security Security NNP 10973 211 25 e e NNP 10973 211 26 - - : 10973 211 27 Learning learning NN 10973 211 28 on on IN 10973 211 29 Organizational Organizational NNP 10973 211 30 Learning Learning NNP 10973 211 31 , , , 10973 211 32 ” " '' 10973 211 33 Information Information NNP 10973 211 34 Management Management NNP 10973 211 35 & & CC 10973 211 36 Computer Computer NNP 10973 211 37 Security Security NNP 10973 211 38 19 19 CD 10973 211 39 , , , 10973 211 40 no no UH 10973 211 41 . . . 10973 212 1 3 3 CD 10973 212 2 ( ( -LRB- 10973 212 3 2011 2011 CD 10973 212 4 ) ) -RRB- 10973 212 5 : : : 10973 212 6 140 140 CD 10973 212 7 - - SYM 10973 212 8 154 154 CD 10973 212 9 , , , 10973 212 10 https://doi.org/10.1108/09685221111153537 https://doi.org/10.1108/09685221111153537 NNP 10973 212 11 . . . 10973 213 1 18 18 CD 10973 213 2 “ " `` 10973 213 3 Code Code NNP 10973 213 4 of of IN 10973 213 5 Ethics Ethics NNP 10973 213 6 of of IN 10973 213 7 the the DT 10973 213 8 American American NNP 10973 213 9 Library Library NNP 10973 213 10 Association Association NNP 10973 213 11 , , , 10973 213 12 ” " '' 10973 213 13 American American NNP 10973 213 14 Library Library NNP 10973 213 15 Association Association NNP 10973 213 16 . . . 10973 214 1 19 19 CD 10973 214 2 Spears Spears NNPS 10973 214 3 and and CC 10973 214 4 San San NNP 10973 214 5 Nicolas Nicolas NNP 10973 214 6 - - HYPH 10973 214 7 Rocca Rocca NNP 10973 214 8 , , , 10973 214 9 “ " `` 10973 214 10 Knowledge Knowledge NNP 10973 214 11 Transfer Transfer NNP 10973 214 12 in in IN 10973 214 13 Information Information NNP 10973 214 14 Security Security NNP 10973 214 15 Capacity Capacity NNP 10973 214 16 Building Building NNP 10973 214 17 for for IN 10973 214 18 Community Community NNP 10973 214 19 - - HYPH 10973 214 20 Based base VBN 10973 214 21 Organizations Organizations NNP 10973 214 22 , , , 10973 214 23 ” " '' 10973 214 24 pp pp NN 10973 214 25 . . . 10973 215 1 52 52 CD 10973 215 2 - - SYM 10973 215 3 69 69 CD 10973 215 4 ; ; : 10973 215 5 Wilson Wilson NNP 10973 215 6 et et NNP 10973 215 7 al al NNP 10973 215 8 . . NNP 10973 215 9 , , , 10973 215 10 “ " `` 10973 215 11 Information Information NNP 10973 215 12 Technology Technology NNP 10973 215 13 Training Training NNP 10973 215 14 Requirements Requirements NNPS 10973 215 15 : : : 10973 215 16 A a DT 10973 215 17 Role- Role- NNPS 10973 215 18 and and CC 10973 215 19 Performance Performance NNP 10973 215 20 - - HYPH 10973 215 21 Based base VBN 10973 215 22 Model Model NNP 10973 215 23 ” " '' 10973 215 24 ( ( -LRB- 10973 215 25 NIST NIST NNP 10973 215 26 Special Special NNP 10973 215 27 Publication Publication NNP 10973 215 28 800 800 CD 10973 215 29 - - SYM 10973 215 30 16 16 CD 10973 215 31 ) ) -RRB- 10973 215 32 . . . 10973 216 1 20 20 CD 10973 216 2 Thompson Thompson NNP 10973 216 3 S.H. S.H. NNP 10973 217 1 Teo Teo NNP 10973 217 2 and and CC 10973 217 3 Anol Anol NNP 10973 217 4 Bhattacherjee Bhattacherjee NNP 10973 217 5 , , , 10973 217 6 “ " `` 10973 217 7 Knowledge Knowledge NNP 10973 217 8 Transfer Transfer NNP 10973 217 9 and and CC 10973 217 10 Utilization Utilization NNP 10973 217 11 in in IN 10973 217 12 IT IT NNP 10973 217 13 Outsourcing Outsourcing NNP 10973 217 14 Partnerships Partnerships NNPS 10973 217 15 : : : 10973 217 16 A a DT 10973 217 17 Preliminary Preliminary NNP 10973 217 18 Model Model NNP 10973 217 19 of of IN 10973 217 20 Antecedents Antecedents NNPS 10973 217 21 and and CC 10973 217 22 Outcomes Outcomes NNPS 10973 217 23 , , , 10973 217 24 ” " '' 10973 217 25 Information Information NNP 10973 217 26 & & CC 10973 217 27 Management Management NNP 10973 217 28 51 51 CD 10973 217 29 , , , 10973 217 30 no no UH 10973 217 31 . . . 10973 218 1 2 2 CD 10973 218 2 ( ( -LRB- 10973 218 3 2014 2014 CD 10973 218 4 ) ) -RRB- 10973 218 5 : : : 10973 218 6 177–86 177–86 CD 10973 218 7 , , , 10973 218 8 https://doi.org/10.1016/j.im.2013.12.001 https://doi.org/10.1016/j.im.2013.12.001 NNP 10973 218 9 ; ; : 10973 218 10 Ko Ko NNP 10973 218 11 , , , 10973 218 12 Kirsch Kirsch NNP 10973 218 13 , , , 10973 218 14 and and CC 10973 218 15 King King NNP 10973 218 16 , , , 10973 218 17 “ " `` 10973 218 18 Antecedents antecedent NNS 10973 218 19 of of IN 10973 218 20 Knowledge Knowledge NNP 10973 218 21 Transfer Transfer NNP 10973 218 22 from from IN 10973 218 23 Consultants consultant NNS 10973 218 24 to to IN 10973 218 25 Clients client NNS 10973 218 26 in in IN 10973 218 27 Enterprise Enterprise NNP 10973 218 28 System System NNP 10973 218 29 Implementations Implementations NNPS 10973 218 30 , , , 10973 218 31 ” " '' 10973 218 32 59 59 CD 10973 218 33 - - SYM 10973 218 34 85 85 CD 10973 218 35 ; ; : 10973 218 36 Minbaeva Minbaeva NNP 10973 218 37 et et FW 10973 218 38 al al NNP 10973 218 39 . . NNP 10973 218 40 , , , 10973 218 41 “ " `` 10973 218 42 MNC MNC NNP 10973 218 43 Knowledge Knowledge NNP 10973 218 44 Transfer Transfer NNP 10973 218 45 , , , 10973 218 46 Subsidiary Subsidiary NNP 10973 218 47 Absorptive Absorptive NNP 10973 218 48 Capacity Capacity NNP 10973 218 49 and and CC 10973 218 50 HRM HRM NNP 10973 218 51 , , , 10973 218 52 ” " '' 10973 218 53 38 38 CD 10973 218 54 - - SYM 10973 218 55 51 51 CD 10973 218 56 ; ; : 10973 218 57 Geordie Geordie NNP 10973 218 58 Stewart Stewart NNP 10973 218 59 and and CC 10973 218 60 David David NNP 10973 218 61 Lacey Lacey NNP 10973 218 62 , , , 10973 218 63 “ " `` 10973 218 64 Death death NN 10973 218 65 by by IN 10973 218 66 a a DT 10973 218 67 Thousand thousand CD 10973 218 68 Facts fact NNS 10973 218 69 : : : 10973 218 70 Criticising criticise VBG 10973 218 71 the the DT 10973 218 72 Technocratic Technocratic NNP 10973 218 73 Approach Approach NNP 10973 218 74 to to IN 10973 218 75 Information Information NNP 10973 218 76 Security Security NNP 10973 218 77 Awareness Awareness NNP 10973 218 78 , , , 10973 218 79 ” " '' 10973 218 80 Information Information NNP 10973 218 81 Management Management NNP 10973 218 82 & & CC 10973 218 83 Computer Computer NNP 10973 218 84 Security Security NNP 10973 218 85 20 20 CD 10973 218 86 , , , 10973 218 87 no no UH 10973 218 88 . . . 10973 219 1 1 1 CD 10973 219 2 ( ( -LRB- 10973 219 3 2012 2012 CD 10973 219 4 ) ) -RRB- 10973 219 5 : : : 10973 219 6 29 29 CD 10973 219 7 - - SYM 10973 219 8 38 38 CD 10973 219 9 , , , 10973 219 10 https://doi.org/10.1108/09685221211219182 https://doi.org/10.1108/09685221211219182 ADD 10973 219 11 . . . 10973 220 1 21 21 CD 10973 220 2 Martin Martin NNP 10973 220 3 Spraggon Spraggon NNP 10973 220 4 and and CC 10973 220 5 Virginia Virginia NNP 10973 220 6 Bodolica Bodolica NNP 10973 220 7 , , , 10973 220 8 “ " `` 10973 220 9 A a DT 10973 220 10 Multidimensional Multidimensional NNP 10973 220 11 Taxonomy Taxonomy NNP 10973 220 12 of of IN 10973 220 13 Intra intra JJ 10973 220 14 - - JJ 10973 220 15 firm firm JJ 10973 220 16 Knowledge Knowledge NNP 10973 220 17 Transfer Transfer NNP 10973 220 18 Processes Processes NNPS 10973 220 19 , , , 10973 220 20 ” " '' 10973 220 21 Journal Journal NNP 10973 220 22 of of IN 10973 220 23 Business Business NNP 10973 220 24 Research Research NNP 10973 220 25 65 65 CD 10973 220 26 , , , 10973 220 27 no no UH 10973 220 28 . . . 10973 221 1 9 9 CD 10973 221 2 ( ( -LRB- 10973 221 3 2012 2012 CD 10973 221 4 ) ) -RRB- 10973 221 5 1,273 1,273 CD 10973 221 6 - - SYM 10973 221 7 282 282 CD 10973 221 8 : : : 10973 221 9 https://doi.org/10.1016/j.jbusres.2011.10.043 https://doi.org/10.1016/j.jbusres.2011.10.043 ADD 10973 221 10 ; ; : 10973 221 11 Shizhong Shizhong NNP 10973 221 12 Chen Chen NNP 10973 221 13 et et NNP 10973 221 14 al al NNP 10973 221 15 . . NNP 10973 221 16 , , , 10973 221 17 “ " `` 10973 221 18 Toward toward IN 10973 221 19 Understanding Understanding NNP 10973 221 20 Inter inter JJ 10973 221 21 - - JJ 10973 221 22 organizational organizational JJ 10973 221 23 Knowledge Knowledge NNP 10973 221 24 Transfer Transfer NNP 10973 221 25 Needs Needs NNPS 10973 221 26 in in IN 10973 221 27 SMEs sme NNS 10973 221 28 : : : 10973 221 29 Insight insight NN 10973 221 30 from from IN 10973 221 31 a a DT 10973 221 32 UK UK NNP 10973 221 33 Investigation Investigation NNP 10973 221 34 , , , 10973 221 35 ” " '' 10973 221 36 Journal Journal NNP 10973 221 37 of of IN 10973 221 38 Knowledge Knowledge NNP 10973 221 39 Management Management NNP 10973 221 40 10 10 CD 10973 221 41 , , , 10973 221 42 no no UH 10973 221 43 . . . 10973 222 1 3 3 CD 10973 222 2 ( ( -LRB- 10973 222 3 2006 2006 CD 10973 222 4 ) ) -RRB- 10973 222 5 : : : 10973 222 6 6 6 CD 10973 222 7 - - SYM 10973 222 8 23 23 CD 10973 222 9 , , , 10973 222 10 https://doi.org/10.1108/13673270610670821 https://doi.org/10.1108/13673270610670821 NNP 10973 222 11 . . . 10973 223 1 22 22 CD 10973 223 2 Maryam Maryam NNP 10973 223 3 Alavi Alavi NNP 10973 223 4 and and CC 10973 223 5 Dorothy Dorothy NNP 10973 223 6 E. E. NNP 10973 223 7 Leidner Leidner NNP 10973 223 8 , , , 10973 223 9 “ " `` 10973 223 10 Review review NN 10973 223 11 : : : 10973 223 12 Knowledge Knowledge NNP 10973 223 13 Management Management NNP 10973 223 14 and and CC 10973 223 15 Knowledge Knowledge NNP 10973 223 16 Management Management NNP 10973 223 17 Systems Systems NNPS 10973 223 18 : : : 10973 223 19 Conceptual Conceptual NNP 10973 223 20 Foundations Foundations NNPS 10973 223 21 and and CC 10973 223 22 Research Research NNP 10973 223 23 Issues Issues NNPS 10973 223 24 , , , 10973 223 25 ” " '' 10973 223 26 MIS MIS NNP 10973 223 27 Quarterly Quarterly NNP 10973 223 28 25 25 CD 10973 223 29 , , , 10973 223 30 no no UH 10973 223 31 . . . 10973 224 1 1 1 CD 10973 224 2 ( ( -LRB- 10973 224 3 2001 2001 CD 10973 224 4 ) ) -RRB- 10973 224 5 : : : 10973 224 6 107 107 CD 10973 224 7 - - SYM 10973 224 8 36 36 CD 10973 224 9 , , , 10973 224 10 https://doi.org/10.2307/3250961 https://doi.org/10.2307/3250961 CD 10973 224 11 . . . 10973 225 1 23 23 CD 10973 225 2 Ko Ko NNP 10973 225 3 , , , 10973 225 4 Kirsch Kirsch NNP 10973 225 5 , , , 10973 225 6 and and CC 10973 225 7 King King NNP 10973 225 8 , , , 10973 225 9 “ " `` 10973 225 10 Antecedents antecedent NNS 10973 225 11 of of IN 10973 225 12 Knowledge Knowledge NNP 10973 225 13 Transfer Transfer NNP 10973 225 14 from from IN 10973 225 15 Consultants consultant NNS 10973 225 16 to to IN 10973 225 17 Clients client NNS 10973 225 18 in in IN 10973 225 19 Enterprise Enterprise NNP 10973 225 20 System System NNP 10973 225 21 Implementations Implementations NNPS 10973 225 22 , , , 10973 225 23 ” " '' 10973 225 24 59 59 CD 10973 225 25 - - SYM 10973 225 26 85 85 CD 10973 225 27 . . . 10973 226 1 24 24 CD 10973 226 2 San San NNP 10973 226 3 Nicolas Nicolas NNP 10973 226 4 - - HYPH 10973 226 5 Rocca Rocca NNP 10973 226 6 , , , 10973 226 7 Schooley Schooley NNP 10973 226 8 , , , 10973 226 9 and and CC 10973 226 10 Spears Spears NNPS 10973 226 11 , , , 10973 226 12 “ " `` 10973 226 13 Exploring explore VBG 10973 226 14 the the DT 10973 226 15 Effect Effect NNP 10973 226 16 of of IN 10973 226 17 Knowledge Knowledge NNP 10973 226 18 Transfer Transfer NNP 10973 226 19 Practices Practices NNPS 10973 226 20 on on IN 10973 226 21 User User NNP 10973 226 22 Compliance Compliance NNP 10973 226 23 to to IN 10973 226 24 IS be VBZ 10973 226 25 Security Security NNP 10973 226 26 Practices Practices NNP 10973 226 27 , , , 10973 226 28 ” " '' 10973 226 29 62 62 CD 10973 226 30 - - SYM 10973 226 31 78 78 CD 10973 226 32 ; ; : 10973 226 33 Spears Spears NNPS 10973 226 34 and and CC 10973 226 35 San San NNP 10973 226 36 Nicolas Nicolas NNP 10973 226 37 - - HYPH 10973 226 38 Rocca Rocca NNP 10973 226 39 , , , 10973 226 40 “ " `` 10973 226 41 Knowledge Knowledge NNP 10973 226 42 Transfer Transfer NNP 10973 226 43 in in IN 10973 226 44 Information Information NNP 10973 226 45 Security Security NNP 10973 226 46 Capacity Capacity NNP 10973 226 47 Building Building NNP 10973 226 48 for for IN 10973 226 49 Community Community NNP 10973 226 50 - - HYPH 10973 226 51 Based base VBN 10973 226 52 Organizations Organizations NNP 10973 226 53 , , , 10973 226 54 ” " '' 10973 226 55 52 52 CD 10973 226 56 - - SYM 10973 226 57 69 69 CD 10973 226 58 . . . 10973 227 1 25 25 CD 10973 227 2 Spears Spears NNPS 10973 227 3 and and CC 10973 227 4 San San NNP 10973 227 5 Nicolas Nicolas NNP 10973 227 6 - - HYPH 10973 227 7 Rocca Rocca NNP 10973 227 8 , , , 10973 227 9 “ " `` 10973 227 10 Knowledge Knowledge NNP 10973 227 11 Transfer Transfer NNP 10973 227 12 in in IN 10973 227 13 Information Information NNP 10973 227 14 Security Security NNP 10973 227 15 Capacity Capacity NNP 10973 227 16 Building Building NNP 10973 227 17 for for IN 10973 227 18 Community Community NNP 10973 227 19 - - HYPH 10973 227 20 Based base VBN 10973 227 21 Organizations Organizations NNP 10973 227 22 , , , 10973 227 23 ” " '' 10973 227 24 52 52 CD 10973 227 25 - - SYM 10973 227 26 69 69 CD 10973 227 27 ; ; : 10973 227 28 Spears Spears NNPS 10973 227 29 and and CC 10973 227 30 Barki Barki NNP 10973 227 31 , , , 10973 227 32 “ " `` 10973 227 33 User User NNP 10973 227 34 Participation Participation NNP 10973 227 35 in in IN 10973 227 36 Information Information NNP 10973 227 37 Systems Systems NNPS 10973 227 38 Security Security NNP 10973 227 39 Risk Risk NNP 10973 227 40 Management Management NNP 10973 227 41 , , , 10973 227 42 ” " '' 10973 227 43 503 503 CD 10973 227 44 - - HYPH 10973 227 45 22 22 CD 10973 227 46 . . . 10973 228 1 26 26 CD 10973 228 2 San San NNP 10973 228 3 Nicolas Nicolas NNP 10973 228 4 - - HYPH 10973 228 5 Rocca Rocca NNP 10973 228 6 , , , 10973 228 7 Schooley Schooley NNP 10973 228 8 , , , 10973 228 9 and and CC 10973 228 10 Spears Spears NNPS 10973 228 11 , , , 10973 228 12 “ " `` 10973 228 13 Exploring explore VBG 10973 228 14 the the DT 10973 228 15 Effect Effect NNP 10973 228 16 of of IN 10973 228 17 Knowledge Knowledge NNP 10973 228 18 Transfer Transfer NNP 10973 228 19 Practices Practices NNPS 10973 228 20 on on IN 10973 228 21 User User NNP 10973 228 22 Compliance Compliance NNP 10973 228 23 to to IN 10973 228 24 IS be VBZ 10973 228 25 Security Security NNP 10973 228 26 Practices Practices NNP 10973 228 27 , , , 10973 228 28 ” " '' 10973 228 29 62 62 CD 10973 228 30 - - SYM 10973 228 31 78 78 CD 10973 228 32 ; ; : 10973 228 33 Janine Janine NNP 10973 228 34 L. L. NNP 10973 228 35 Spears Spears NNP 10973 228 36 and and CC 10973 228 37 Tonia Tonia NNP 10973 228 38 San San NNP 10973 228 39 Nicolas- Nicolas- NNP 10973 228 40 Rocca Rocca NNP 10973 228 41 , , , 10973 228 42 “ " `` 10973 228 43 Information Information NNP 10973 228 44 Security Security NNP 10973 228 45 Capacity Capacity NNP 10973 228 46 Building Building NNP 10973 228 47 in in IN 10973 228 48 Community Community NNP 10973 228 49 - - HYPH 10973 228 50 Based base VBN 10973 228 51 Organizations Organizations NNPS 10973 228 52 : : : 10973 228 53 INFORMATION INFORMATION NNP 10973 228 54 TECHNOLOGY technology NN 10973 228 55 AND and CC 10973 228 56 LIBRARIES LIBRARIES NNP 10973 228 57 | | NNP 10973 228 58 JUNE JUNE NNP 10973 228 59 2019 2019 CD 10973 228 60 71 71 CD 10973 228 61 Examining examine VBG 10973 228 62 the the DT 10973 228 63 Effects Effects NNPS 10973 228 64 of of IN 10973 228 65 Knowledge Knowledge NNP 10973 228 66 Transfer Transfer NNP 10973 228 67 , , , 10973 228 68 ” " '' 10973 228 69 49th 49th NN 10973 228 70 Hawaii Hawaii NNP 10973 228 71 International International NNP 10973 228 72 Conference Conference NNP 10973 228 73 on on IN 10973 228 74 System System NNP 10973 228 75 Sciences Sciences NNPS 10973 228 76 ( ( -LRB- 10973 228 77 HICSS HICSS NNP 10973 228 78 ) ) -RRB- 10973 228 79 , , , 10973 228 80 Koloa Koloa NNP 10973 228 81 , , , 10973 228 82 HI HI NNP 10973 228 83 , , , 10973 228 84 2016 2016 CD 10973 228 85 , , , 10973 228 86 pp pp NNP 10973 228 87 . . . 10973 229 1 4,011 4,011 CD 10973 229 2 - - SYM 10973 229 3 20 20 CD 10973 229 4 , , , 10973 229 5 https://doi.org/10.1109/HICSS.2016.498 https://doi.org/10.1109/HICSS.2016.498 NNP 10973 229 6 ; ; : 10973 229 7 Ko Ko NNP 10973 229 8 , , , 10973 229 9 Kirsch Kirsch NNP 10973 229 10 , , , 10973 229 11 and and CC 10973 229 12 King King NNP 10973 229 13 , , , 10973 229 14 “ " `` 10973 229 15 Antecedents antecedent NNS 10973 229 16 of of IN 10973 229 17 Knowledge Knowledge NNP 10973 229 18 Transfer Transfer NNP 10973 229 19 from from IN 10973 229 20 Consultants consultant NNS 10973 229 21 to to IN 10973 229 22 Clients client NNS 10973 229 23 in in IN 10973 229 24 Enterprise Enterprise NNP 10973 229 25 System System NNP 10973 229 26 Implementations Implementations NNPS 10973 229 27 , , , 10973 229 28 ” " '' 10973 229 29 59 59 CD 10973 229 30 - - SYM 10973 229 31 85 85 CD 10973 229 32 . . . 10973 230 1 27 27 CD 10973 230 2 Ko Ko NNP 10973 230 3 , , , 10973 230 4 Kirsch Kirsch NNP 10973 230 5 , , , 10973 230 6 and and CC 10973 230 7 King King NNP 10973 230 8 , , , 10973 230 9 “ " `` 10973 230 10 Antecedents antecedent NNS 10973 230 11 of of IN 10973 230 12 Knowledge Knowledge NNP 10973 230 13 Transfer Transfer NNP 10973 230 14 from from IN 10973 230 15 Consultants consultant NNS 10973 230 16 to to IN 10973 230 17 Clients client NNS 10973 230 18 in in IN 10973 230 19 Enterprise Enterprise NNP 10973 230 20 System System NNP 10973 230 21 Implementations Implementations NNPS 10973 230 22 , , , 10973 230 23 ” " '' 10973 230 24 59 59 CD 10973 230 25 - - SYM 10973 230 26 85 85 CD 10973 230 27 ; ; : 10973 230 28 Teo Teo NNP 10973 230 29 and and CC 10973 230 30 Bhattacherjee Bhattacherjee NNP 10973 230 31 , , , 10973 230 32 “ " `` 10973 230 33 Knowledge Knowledge NNP 10973 230 34 Transfer Transfer NNP 10973 230 35 and and CC 10973 230 36 Utilization Utilization NNP 10973 230 37 in in IN 10973 230 38 IT IT NNP 10973 230 39 Outsourcing Outsourcing NNP 10973 230 40 Partnerships Partnerships NNPS 10973 230 41 : : : 10973 230 42 A a DT 10973 230 43 Preliminary Preliminary NNP 10973 230 44 Model Model NNP 10973 230 45 of of IN 10973 230 46 Antecedents Antecedents NNPS 10973 230 47 and and CC 10973 230 48 Outcomes Outcomes NNPS 10973 230 49 , , , 10973 230 50 ” " '' 10973 230 51 177–86 177–86 CD 10973 230 52 . . .