Browsing Business Information Systems (Conference Papers) by Title
Now showing items 35-54 of 80
-
The impact of procedural security countermeasures on employee security behaviour: A qualitative study
(Association for Information Systems (AIS), 2017-09-08)The growing number of information security breaches in organisations presents a serious risk to the confidentiality of personal and commercially sensitive data. Current research studies indicate that humans are the weakest ... -
In search of search engine marketing strategy amongst SME s in Ireland
(Springer, 2009)Researchers have identified the Web as a searchers first port of call for locating information. Search Engine Marketing (SEM) strategies have been noted as a key consideration when developing, maintaining and managing Websites. ... -
Incorporating Ethics and Social Responsibility in IS Education
(2011)This paper discusses the importance of ethics and social responsibility in information systems (IS) education. The many public scandals of corporate misconduct have increased the need for more emphasis to be placed on ... -
The Influence of Short Project Timeframes on Web Development Practices: A Field Study
(2009)Abstract: A number of recent surveys of Web development have revealed that typical project timeframes are of the order of 3 months. This paper reports the findings of a field study conducted in Ireland which set out to ... -
Information System Development over Time - More Lessons from the Field.
(Irish Academy of Management, 2005)This paper presents further results from a longitudinal research study that has been conducted with one organization, the Western Financial Services (WFS) Group, over a six-year period (Barry 2004). They operate in the ... -
The insider threat - understanding the aberrant thinking of the rogue" Trusted Agent"
(AIS Electronic Library (AISeL), 2015-05-29)A deficiency exists in the Information Systems Security literature because of the paucity of research aimed at understanding the mind of the insider criminal . Much of the academic and popular press focuses on external ... -
Insights from preliminary analysis of online classroom chat logs during the COVID-19 pandemic
(Association for Information Systems (AIS), 2021-12-16)This work-in-progress practice paper reports on the experiences of using Microsoft Teams to teach a large postgraduate class on database systems during the 2020/’21 academic year, under conditions when students and ... -
An investigation into the impact and use of project management methodologies in organisations in Ireland
(2006)The purpose of this study is to examine the impact of the implementation of a project management methodology on organisations, specifically in relation to the impact on the project manager, the project team and the ... -
Investigation of employee security behaviour: A grounded theory approach
(Springer, 2015-05-09)At a time of rapid business globalisation, it is necessary to understand employee security behaviour within diverse cultural settings. While general deterrence theory has been extensively used in Behavioural Informatio ... -
An Investigation of Factors Affecting Satisfactory Student Learning via On-Line Discussion Boards
(2009)This paper explores the factors which affect students¿ learning using on-line discussion boards. Following prior research into the use and acceptance of information technology in general, and of educational ... -
Learning analytics for measuring engagement and academic performance: a case study and future directions
(Editorial Universitat Politècnica de València, 2022-06-17)This paper presents an analysis of various metrics of student engagement and academic performance, based on data extracted from a virtual learning environment (VLE) and other supporting technologies. The level of ... -
Linking threat avoidance and security adoption: a theoretical model For SMEs
(AIS Electronic Library (AISeL), 2015-06-07)A deficiency exists in the Information Systems Security literature because of the tendency to regard IT threat avoidance and IT security adoption as separate behaviours. In addressing the deficiency this research in progress ... -
Open innovation as a route to value in cloud computing
(AIS Electronic Library (AISeL), 2013-06-09)Both the cloud computing and open innovation paradigms represent recent phenomenon and as such many unanswered questions still persist. Indeed cloud computing s full innovation potential may only be fully realised through ... -
The Paradox of "Structured" Methods for Software Requirements Management: A Case Study of an E-Government Development Project
(2009)This paper outlines the alternative perspectives of "rationalism" and "improvisation" within information systems development, and describes the major shortcomings of each. It then discusses how these shortcomings ... -
Perceptions of low cost carriers compliance with EU legislation on optional extras
(2011)Low-cost carriers (LCCs) market their flights as low cost and, so, aim to garner as much additional revenue as possible from ancillary services such as baggage and priority boarding. The airlines therefore encourage purchase ... -
Proceedings of the 1st IAIS workshop on Cloud computing research
(NUI Galway, 2013-09-27)National University of Ireland, Galway is proud to host the first IAIS Workshop on Cloud Computing Research (IWCCR) on Sep 27, 2013. The workshop is supported by the Irish chapter of the Association for Information Systems ... -
Project managers - do they need to be certified?
(springer, 2008)The purpose of this study is to examine the drivers behind the certification of project managers in Irish organizations, to identify the benefits and drawbacks of project management certification and to determine whether ... -
Questioning the use of opaque web practices among low-cost airline carriers
(ECIS Standing Committee, 2008-06-09)Modest attention has been given to the subtle ethical issues of ¿best practice¿ on the Internet, such as the exploitation of Web technologies to inhibit or avoid customer service. Increasingly, some firms are using ... -
Reconciling Usability and Security: Interaction Design Guidance and Practices for On-Line User Authentication.
(2010)Usability and security are often portrayed as though they are competing priorities in information systems development. Given that both are essential to the design of an effective system, it is important that ...