Now showing items 81-90 of 92
Information System Development over Time - More Lessons from the Field.
(Irish Academy of Management, 2005)
This paper presents further results from a longitudinal research study that has been conducted with one organization, the Western Financial Services (WFS) Group, over a six-year period (Barry 2004). They operate in the ...
A review of ethics in the design of self-service websites amongst low-cost carriers in Ireland.
Although ethical issues related to the Internet has been a widely debated topic, little has been written on subtle ethical questions such as the exploitation of Web technologies to inhibit customer service. Increasingly, ...
Hesitancy in committing to large-scale enterprise systems solutions - experiences at a multi-national corporation.
While early cited benefits of Enterprise Resource Planning (ERP) or enterprise systems remain for the most part highly desirable, it is often the case that the promise of delivery differs from reality. Many now agree that ...
Being Agile When It Really Matters: How ICT can Facilitate Rapid Response to Cardiac Emergencies
Sudden cardiac death is a serious public health issue in Ireland, especially within rural communities that cannot be quickly reached by emergency ambulance services. When a person suffers a cardiac ...
Web-Based Information Systems Development: An Empirical Study of Requirements Engineering Approaches
No system is perfect in so far as requirements are always the subject of ongoing negotiation, and there will generally be a subset of the requirements that get pushed aside. This is especially true of the volatile environments ...
Put Up and Shut Up: social mobilisation and employee attitudes in non-union firms
(British Universities Industrial Relations Association Proceedings, 2001-06)
Cloud security consciousness: a need for realisation in entrepreneurial small firms
(AIS Electronic Library (AISeL), 2014-04-09)
Cloud computing represents a fundamental shift in the way information services are provided but with its unique architecture comes additional security challenges, many of which are technical in nature. However, the ...
The insider threat - understanding the aberrant thinking of the rogue" Trusted Agent"
(AIS Electronic Library (AISeL), 2015-05-29)
A deficiency exists in the Information Systems Security literature because of the paucity of research aimed at understanding the mind of the insider criminal . Much of the academic and popular press focuses on external ...
Contextualising the insider threat: a mixed method study
(AIS Electronic Library (AISeL), 2016-12-10)
The insider threat is potentially the most damaging and costly threat to organisations, and while there is a considerable body of literature aimed at understanding this phenomenon, we contend that the theories contained ...
Pension provision by small employers in Ireland: an analysis of PRSAs using bounded rationality theory
This paper applies the theory of bounded rationality to study small employer pension provision decision-making in Ireland. PRSA pension products were intended to provide inexpensive, flexible pension options, particularly ...