Search
Now showing items 31-40 of 57
Data Protection and Employee Behaviour: The Role of Information Systems Security Culture
(2012)
The proliferation of information in modern society, as enabled by technologies such as portable personal devices, social media, and 'cloud'-based services, presents a potentially serious threat to individual privacy and ...
Having a Customer Focus in Agile Software Development
(2010)
This research looks at the customer focus of agile software development
teams. The study is part of a larger study examining how the twelve
principles of Beyond Budgeting are operationalised in the context of an
agile ...
Examining Customer Focus in Agile Systems Development Teams - Findings from Irish and Norwegian Case Studies
(2011)
While an acute, continuous focus on customer needs is often cited as a key benefit of agile approaches, very little research has examined the customer focus construct in an agile project environment, or looked at the ...
An Analysis of Model-Driven Web Engineering Methodologies
(2012)
In the late 1990's there was substantial activity within the 'Web engineering' research community and a multitude of new Web approaches were proposed. However, numerous studies have revealed major gaps in these approaches, ...
Incorporating Ethics and Social Responsibility in IS Education
(2011)
This paper discusses the importance of ethics and social responsibility in information systems (IS) education. The many public scandals of corporate misconduct have increased the need for more emphasis to be placed on ...
What Determines E-Loyalty? An Analysis of Factors Affecting On-Line Customer Retention
(2012)
The objective of this research was to identify, assess and rank the determinants of e-Loyalty for the benefit of online stores so that they may have a better understanding as to what factors customers consider most important ...
Being Agile When It Really Matters: How ICT can Facilitate Rapid Response to Cardiac Emergencies
(2010)
Sudden cardiac death is a serious public health issue in Ireland, especially within rural communities that cannot be quickly reached by emergency ambulance services. When a person suffers a cardiac ...
Web-Based Information Systems Development: An Empirical Study of Requirements Engineering Approaches
(2002)
No system is perfect in so far as requirements are always the subject of ongoing negotiation, and there will generally be a subset of the requirements that get pushed aside. This is especially true of the volatile environments ...
The insider threat - understanding the aberrant thinking of the rogue" Trusted Agent"
(AIS Electronic Library (AISeL), 2015-05-29)
A deficiency exists in the Information Systems Security literature because of the paucity of research
aimed at understanding the mind of the insider criminal . Much of the academic and popular press
focuses on external ...
Cloud security consciousness: a need for realisation in entrepreneurial small firms
(AIS Electronic Library (AISeL), 2014-04-09)
Cloud computing represents a fundamental shift in the way information services are
provided but with its unique architecture comes additional security challenges, many of
which are technical in nature. However, the ...