Search
Now showing items 41-50 of 55
Contextualising the insider threat: a mixed method study
(AIS Electronic Library (AISeL), 2016-12-10)
The insider threat is potentially the most damaging and costly threat to organisations, and
while there is a considerable body of literature aimed at understanding this phenomenon, we
contend that the theories contained ...
Cost Estimation in Agile Software Development Projects
(2011)
Numerous studies over the years have shown that information systems development (ISD)
projects often run over budget or fail entirely. Such failures are not restricted to certain industry sectors
or project types; rather ...
Data Protection and Employee Behaviour: The Role of Information Systems Security Culture
(2012)
The proliferation of information in modern society, as enabled by technologies such as portable personal devices, social media, and 'cloud'-based services, presents a potentially serious threat to individual privacy and ...
Having a Customer Focus in Agile Software Development
(2010)
This research looks at the customer focus of agile software development
teams. The study is part of a larger study examining how the twelve
principles of Beyond Budgeting are operationalised in the context of an
agile ...
What Determines E-Loyalty? An Analysis of Factors Affecting On-Line Customer Retention
(2012)
The objective of this research was to identify, assess and rank the determinants of e-Loyalty for the benefit of online stores so that they may have a better understanding as to what factors customers consider most important ...
Being Agile When It Really Matters: How ICT can Facilitate Rapid Response to Cardiac Emergencies
(2010)
Sudden cardiac death is a serious public health issue in Ireland, especially within rural communities that cannot be quickly reached by emergency ambulance services. When a person suffers a cardiac ...
(Still) Up to no Good: Reconfiguring the boundaries of worker resistance and misbehaviour in an increasingly non-union world
(International Labour Process Conference, 2010-03)
There has been significant development in the way industrial conflict and worker resistance has been analysed over the past fifteen years. While researchers have observed the quantitative decline of traditional forms of ...
The insider threat - understanding the aberrant thinking of the rogue" Trusted Agent"
(AIS Electronic Library (AISeL), 2015-05-29)
A deficiency exists in the Information Systems Security literature because of the paucity of research
aimed at understanding the mind of the insider criminal . Much of the academic and popular press
focuses on external ...
Cloud security consciousness: a need for realisation in entrepreneurial small firms
(AIS Electronic Library (AISeL), 2014-04-09)
Cloud computing represents a fundamental shift in the way information services are
provided but with its unique architecture comes additional security challenges, many of
which are technical in nature. However, the ...
Proceedings of the 1st IAIS workshop on Cloud computing research
(NUI Galway, 2013-09-27)
National University of Ireland, Galway is proud to host the first IAIS Workshop on
Cloud Computing Research (IWCCR) on Sep 27, 2013. The workshop is supported
by the Irish chapter of the Association for Information Systems ...