Search
Now showing items 31-40 of 51
Value creation and capture with cloud computing: A theoretical framework
(AIS Electronic Library (AISeL), 2013-03-19)
This paper describes research-in-progress that explores the applicability and implications of cloud computing in the creation and subsequent capture of value. The quest for the silver bullet of the attainment of sustained ...
An analysis of the 2016 American presidential nominees' tweets: A magical realism perspective
(NUI Galway, 2017)
Twitter is the latest social networking tool said to be reshaping political presidential campaigns. In order to maximize the influence of their messages to voters, presidential nominees often use various techniques to ...
Reconciling Usability and Security: Interaction Design Guidance and Practices for On-Line User Authentication.
(2010)
Usability and security are often portrayed as though they are competing priorities in information systems development. Given that both are essential to the design of an effective system, it is important that ...
Having a Customer Focus in Agile Software Development
(2010)
This research looks at the customer focus of agile software development teams. The study is part of a larger study examining how the twelve principles of Beyond Budgeting are operationalised in the context of an agile ...
Pension provision by small employers in Ireland: an analysis of PRSAs using bounded rationality theory
(2014)
This paper applies the theory of bounded rationality to study small employer pension provision decision-making in Ireland. PRSA pension products were intended to provide inexpensive, flexible pension options, particularly ...
Counterpoising non-union representation: union organising and the managerial agenda
(British Universities Industrial Relations Association, 2010-07)
Non-union employee representation is an area which has attracted much interest in the voice literature. Much of the relevant literature has been shaped by a dialogue which considers NERs as a means of union avoidance. More ...
Occupation as resistance: The case of worker sit-ins in the Irish Republic
(International Industrial Relations Association (IIRA), 2010-06)
Replicating global trends, the Irish Republic has been mired in a deepening fiscal and economic crisis since 2008. At workplace level there has been a steady increase in cash-strapped firms forced to restructure and/or ...
Contextualising the insider threat: a mixed method study
(AIS Electronic Library (AISeL), 2016-12-10)
The insider threat is potentially the most damaging and costly threat to organisations, and
while there is a considerable body of literature aimed at understanding this phenomenon, we
contend that the theories contained ...
Cost Estimation in Agile Software Development Projects
(2011)
Numerous studies over the years have shown that information systems development (ISD)
projects often run over budget or fail entirely. Such failures are not restricted to certain industry sectors
or project types; rather ...
Data Protection and Employee Behaviour: The Role of Information Systems Security Culture
(2012)
The proliferation of information in modern society, as enabled by technologies such as portable personal devices, social media, and 'cloud'-based services, presents a potentially serious threat to individual privacy and ...