Search
Now showing items 11-20 of 35
Linking threat avoidance and security adoption: a theoretical model For SMEs
(AIS Electronic Library (AISeL), 2015-06-07)
A deficiency exists in the Information Systems Security literature because of the tendency to regard IT threat avoidance and IT security adoption as separate behaviours. In addressing the deficiency this research in progress ...
The use of web-based international surveys in information systems research
(2002)
There has been much interest of late in the use of Web-based surveys. However, the methodological issues of Web-based surveys are poorly understood. While this new medium permits low-cost wide-scale access to international ...
Reconciling Usability and Security: Interaction Design Guidance and Practices for On-Line User Authentication.
(2010)
Usability and security are often portrayed as though they are competing priorities in information systems development. Given that both are essential to the design of an effective system, it is important that ...
Having a Customer Focus in Agile Software Development
(2010)
This research looks at the customer focus of agile software development teams. The study is part of a larger study examining how the twelve principles of Beyond Budgeting are operationalised in the context of an agile ...
Using Web-based Surveys for Information Systems Research: An Experience Report.
(2005)
There has been much interest of late in the use of Web-based surveys. However, the methodological issues of Web-based surveys are poorly understood. This paper reports on the experiences gained from a recently conducted ...
The Paradox of "Structured" Methods for Software Requirements Management: A Case Study of an E-Government Development Project
(2009)
This paper outlines the alternative perspectives of "rationalism" and "improvisation" within information systems development, and describes the major shortcomings of each. It then discusses how these shortcomings ...
Contextualising the insider threat: a mixed method study
(AIS Electronic Library (AISeL), 2016-12-10)
The insider threat is potentially the most damaging and costly threat to organisations, and
while there is a considerable body of literature aimed at understanding this phenomenon, we
contend that the theories contained ...
Cost Estimation in Agile Software Development Projects
(2011)
Numerous studies over the years have shown that information systems development (ISD)
projects often run over budget or fail entirely. Such failures are not restricted to certain industry sectors
or project types; rather ...
Data Protection and Employee Behaviour: The Role of Information Systems Security Culture
(2012)
The proliferation of information in modern society, as enabled by technologies such as portable personal devices, social media, and 'cloud'-based services, presents a potentially serious threat to individual privacy and ...
Having a Customer Focus in Agile Software Development
(2010)
This research looks at the customer focus of agile software development
teams. The study is part of a larger study examining how the twelve
principles of Beyond Budgeting are operationalised in the context of an
agile ...