Search
Now showing items 21-30 of 35
What Determines E-Loyalty? An Analysis of Factors Affecting On-Line Customer Retention
(2012)
The objective of this research was to identify, assess and rank the determinants of e-Loyalty for the benefit of online stores so that they may have a better understanding as to what factors customers consider most important ...
Being Agile When It Really Matters: How ICT can Facilitate Rapid Response to Cardiac Emergencies
(2010)
Sudden cardiac death is a serious public health issue in Ireland, especially within rural communities that cannot be quickly reached by emergency ambulance services. When a person suffers a cardiac ...
Web-Based Information Systems Development: An Empirical Study of Requirements Engineering Approaches
(2002)
No system is perfect in so far as requirements are always the subject of ongoing negotiation, and there will generally be a subset of the requirements that get pushed aside. This is especially true of the volatile environments ...
The insider threat - understanding the aberrant thinking of the rogue" Trusted Agent"
(AIS Electronic Library (AISeL), 2015-05-29)
A deficiency exists in the Information Systems Security literature because of the paucity of research
aimed at understanding the mind of the insider criminal . Much of the academic and popular press
focuses on external ...
Cloud security consciousness: a need for realisation in entrepreneurial small firms
(AIS Electronic Library (AISeL), 2014-04-09)
Cloud computing represents a fundamental shift in the way information services are
provided but with its unique architecture comes additional security challenges, many of
which are technical in nature. However, the ...
The impact of procedural security countermeasures on employee security behaviour: A qualitative study
(Association for Information Systems (AIS), 2017-09-08)
The growing number of information security breaches in organisations presents a serious risk to the confidentiality of personal and commercially sensitive data. Current research studies indicate that humans are the weakest ...
Investigation of employee security behaviour: A grounded theory approach
(Springer, 2015-05-09)
At a time of rapid business globalisation, it is necessary to
understand employee security behaviour within diverse cultural settings. While
general deterrence theory has been extensively used in Behavioural Informatio ...
The effect of organisational and national culture on employee security behaviour: A qualitative study
(Centre for Security, Communications & Network Research, Plymouth University, 2016-07)
An increasing number of information security breaches in organisations presents a serious
threat to the confidentiality of personal and commercially sensitive data. Recent research
shows that humans are the weakest link ...
Insights from preliminary analysis of online classroom chat logs during the COVID-19 pandemic
(Association for Information Systems (AIS), 2021-12-16)
This work-in-progress practice paper reports on the experiences of using Microsoft Teams to
teach a large postgraduate class on database systems during the 2020/’21 academic year, under
conditions when students and ...
A survey of cyberbullying amongst students in Ireland's higher education sector
(International Association for Development of the Information Society, 2015-10-26)
Cyberbullying is an extension of traditional bullying where victims are harassed via the internet or mobile phones. This
study investigated the victims’ experiences of cyberbullying including the prevalence, type and ...