Skip to main content
The growing Internet and mobile technologies create opportunities for efficient communication and coordination among individuals and institutions. However, these technologies also pose security challenges. Although users’ understanding... more
    • by  and +1
    •   3  
      Computer SecurityHispanic StudiesSoftware Upgrades
Information Security (InfoSec) research is far reaching and includes many approaches to deal with protecting and mitigating threats to the information assets and technical resources available within computer based systems. Although a... more
    • by  and +2
Research examining the information security behavior of individuals with respect to risk has focused primarily on only a handful of constructs; most of which have their roots in Protection Motivation Theory (PMT). However, there is still... more
    • by  and +1
Since the early 1970s, decision support systems (DSS) technology and applications have evolved significantly. Many 12 technological and organizational developments have exerted an impact on this evolution. DSS once utilized more limited... more
    • by  and +2
    •   7  
      Information SystemsVirtual TeamsOrganizational DevelopmentData Warehouse
ABSTRACT Many organizations are forming “virtual teams” of geographically distributed knowledge workers to collaborate on a variety of workplace tasks. But how effective are these virtual teams compared to traditional face-to-face groups?... more
    • by 
Abstract: Evaluates the increase in inter-and intra-organizational knowledge sharing capabilities brought about by the Internet-driven “new economy” technologies and the resulting managerial implications. Presents a framework for... more
    • by 
Abstract Many technologies and applications have appeared recently which are directed at mobile computing and the wireless Web. Wireless (or mobile) e-commerce is concerned with conducting transactions and other business activity with... more
    • by 
The growing interest in e-Government raises the question of how governments can increase citizen adoption and usage of their online government services. e-Government becomes especially important given its potential to reduce costs and... more
    • by  and +1
Traditional business models are increasingly being replaced by newer business models based on relationships enabled by information technologies. In this chapter, we survey and categorize many of these new business models enabled by... more
    • by 
Information systems security remains high on the list of key issues facing information systems executives. Traditional concerns range from forced entry into computer and storage rooms to destruction by fire, earthquake, flood, and... more
    • by 
Abstract Information technology executives strive to align the actions of end users with the desired security posture of management and of the firm through persuasive communication. In many cases, some element of fear is incorporated... more
    • by 
Abstract Instant messaging (IM) technologies are being rapidly deployed in the workplace. Current studies largely focus on the adoption of IM and how IM is used. Little research has been conducted to understand the potential impact of... more
    • by 
ABSTRACT Traditional supply chain management utilized traditional media and channels to link firms in linear, inefficient relationships. The advent of electronic commerce over the Internet has facilitated new relationships for connecting... more
    • by 
Abstract Mobile and wireless technologies continue to advance in terms of their capabilities and sophistication. There has been increasing emphasis on using these technologies as part of electronic commerce systems. But with this shift... more
    • by 
Abstract The Technology Acceptance Model (TAM) and the Unified Theory of Acceptance and Use of Technology (UTAUT) provide insights into how and why individual computer users form a behavioral intent to adopt and use various information... more
    • by 
Abstract System Dynamics modeling is used as an instructional aid for the teaching of production and inventory management techniques. The roles of Material Requirements Planning (MRP) and just-in-time (JIT) systems in production and... more
    • by 
Abstract If companies are to enjoy long-term success in the Internet marketplace, they must effectively manage the complex, multidimensional process of building online consumer trust. eMerchants must understand the characteristics of web... more
    • by 
ABSTRACT Computer security has become a central concern in this age of technology. Myriad risks threaten the security of computers, data, information systems, and websites. Vast and ever-increasing amounts of confidential and/or... more
    • by 
The Domain Name System (DNS) is a critical component of the global Internet infrastructure. Throughout its history, its design and administration has experienced significant dynamic changes as the Internet itself has evolved. The history... more
    • by 
ABSTRACT Mobile communication systems have revolutionized business communication and become common communication tools within business organizations. The dramatic increase in the use of mobile communication systems would not have been... more
    • by