Browsing by Subject "Business information systems"
Now showing items 1-14 of 14
-
Control in E-Government Projects - An Exploratory Study
(2010)This study highlights a distinct lack of research on control in e-Government projects and provides a framework using control theory to address this. The paper draws on four exploratory case studies, highlighting a number ... -
Framing or gaming? Constructing a study to explore the impact of option presentation on consumers
(2016-02-18)The manner in which choice is framed influences individuals’ decision-making. This research examines the impact of different decision constructs on decision-making by focusing on the more problematic decision constructs: ... -
Having a Customer Focus in Agile Software Development
(2010)This research looks at the customer focus of agile software development teams. The study is part of a larger study examining how the twelve principles of Beyond Budgeting are operationalised in the context of an agile ... -
How do firms present choice to consumers? Some unusual decision constructs along the B2C transaction process
(2015)Certain features amongst some online retailers are atypical of ‘good’ design; the transaction process presents consumers with optional extras that not only slowed the process down, but also stressed and agitated consumers. ... -
The impact of cloud computing on IT service providers’ business models
(2016-03-15)This study’s objective is to understand how cloud computing impacts information technology service providers’ business models. Cloud computing has accelerated business model evolution for delivering information technology ... -
Information systems project portfolio management as a complex adaptive system: The CAPPP framework
(2018-01-29)Project portfolio management (PPM) has been subject to very little investigation in information systems (IS) research. This is surprising, given the huge global expenditure on IS, the high levels of failure at the project ... -
An investigation of employee security behaviour in organisational settings: the effect of procedural security countermeasures and cultural factors
(2015-08-18)An increasing number of information security breaches in organisations presents a serious threat to the security of personal and commercially sensitive information. Recent research shows that humans are the weakest link ... -
Reconciling Usability and Security: Interaction Design Guidance and Practices for On-Line User Authentication.
(2010)Usability and security are often portrayed as though they are competing priorities in information systems development. Given that both are essential to the design of an effective system, it is important that ... -
Right To Be Forgotten Survey - Results
(2013-12-09)This report provides a summary of the findings for 260 internet users who completed the online survey between August and September 2013. The survey instrument contained 24 questions, the majority of which were either ... -
A study of first click behaviour and user interaction on the Google SERP
(2010)Firms use Search Engine Marketing (SEM) to drive users to their Website. Some are prepared to pay for placement; others use Search Engine Optimization (SEO) hoping their result percolates up the organic SERP. Despite ... -
A study of XP & Scrum: A Project Management Perspective
(2008)This research examines agile software development from a project manager's perspective. It specifically investigates four different areas namely: project planning and scheduling; team selection; communication; and documentation ... -
Using Agile Practices to Build Trust in an Agile Team: A Case Study.
(2010)Trust is an important aspect of any software development team, but particularly with self-managing teams as team members are very dependent on one another. Agile teams are considered to be self-managing and they employ ...