Browsing Business Information Systems by Title
Now showing items 69-88 of 133
-
Information security behavior: A cross-cultural comparison of Irish and US employees
(Taylor and Francis, 2019-08-09)This study explores how aspects of perceived national culture affect the information security attitudes and behavior of employees. Data was collected using 19 semi-structured interviews in Ireland and the United States of ... -
Information System Development over Time - More Lessons from the Field.
(Irish Academy of Management, 2005)This paper presents further results from a longitudinal research study that has been conducted with one organization, the Western Financial Services (WFS) Group, over a six-year period (Barry 2004). They operate in the ... -
Innovating in the Cloud
(Center for Innovations in Business & Management Practice, 2013)This paper describes salient issues in cloud computing capable of facilitating innovation in organisations. The holy grail of the attainment of sustained competitive advantage has long featured in business strategy and has ... -
The insider threat - understanding the aberrant thinking of the rogue" Trusted Agent"
(AIS Electronic Library (AISeL), 2015-05-29)A deficiency exists in the Information Systems Security literature because of the paucity of research aimed at understanding the mind of the insider criminal . Much of the academic and popular press focuses on external ... -
Insights from preliminary analysis of online classroom chat logs during the COVID-19 pandemic
(Association for Information Systems (AIS), 2021-12-16)This work-in-progress practice paper reports on the experiences of using Microsoft Teams to teach a large postgraduate class on database systems during the 2020/’21 academic year, under conditions when students and ... -
An investigation into the impact and use of project management methodologies in organisations in Ireland
(2006)The purpose of this study is to examine the impact of the implementation of a project management methodology on organisations, specifically in relation to the impact on the project manager, the project team and the ... -
Investigation of employee security behaviour: A grounded theory approach
(Springer, 2015-05-09)At a time of rapid business globalisation, it is necessary to understand employee security behaviour within diverse cultural settings. While general deterrence theory has been extensively used in Behavioural Informatio ... -
An Investigation of Factors Affecting Satisfactory Student Learning via On-Line Discussion Boards
(2009)This paper explores the factors which affect students¿ learning using on-line discussion boards. Following prior research into the use and acceptance of information technology in general, and of educational ... -
Is boredom proneness related to social media overload and fatigue? A stress–strain–outcome approach
(Emerald, 2020-02-21)Purpose Social media overload and fatigue have become common phenomena that are negatively affecting people's well-being and productivity. It is, therefore, important to understand the causes of social media overload and ... -
Keeping an eye on how users perceive optionality in purchasing decisions
(IADIS International Association for Development of the Information Society, 2015)Previous research indicated the design of certain decision constructs could be unclear to users in the business to consumer (B2C) transactional process. This pilot study, using eye tracking and cued RTA sessions, examines ... -
Learning analytics for measuring engagement and academic performance: a case study and future directions
(Editorial Universitat Politècnica de València, 2022-06-17)This paper presents an analysis of various metrics of student engagement and academic performance, based on data extracted from a virtual learning environment (VLE) and other supporting technologies. The level of ... -
Linking threat avoidance and security adoption: a theoretical model For SMEs
(AIS Electronic Library (AISeL), 2015-06-07)A deficiency exists in the Information Systems Security literature because of the tendency to regard IT threat avoidance and IT security adoption as separate behaviours. In addressing the deficiency this research in progress ... -
Managing (In)Stability in complex and dynamic software teams: A sporting momentum perspective
(NUI Galway, 2018-04-27)How should complex and dynamic software teams manage stability and instability? Contemporary information systems development (ISD) methods such as agile have been commonly cited as the answer to this question. However, ... -
Men, individualism, and process: A Pardoner’s Tale
(Palgrave MacMillan, 2021-08-04)Taking a long look back through the philosophical underpinnings of contemporary hyper-masculinity, from renaissance writers such as Hobbes and Locke up to modern American philosopher, Nozick, this chapter maps out the key ... -
mHealth and gamification
(2016-12-11)The use of mobile health (mHealth) applications for incentivizing health behaviour change continues to grow at an unprecedented rate. This growth has been accelerated by recent advancements in smart mobile technology ... -
Multidisciplinary perspectives on cybersecurity research, practice and education: Proceedings of the 1st Cyber Research Conference Ireland
(University of Galway, 2022)[No abstract available] -
New Branches, Old Roots: A Study of Methods and Techniques in Web/Hypermedia Systems Design
(Auerbach Publishers Inc., 2006) -
Opaque web practices among low-cost carriers
(Elsevier, 2009-04-01)The low-cost airlines' adoption of Web technologies to facilitate direct sales has accelerated their market penetration. However, some low-cost carriers are increasingly using Websites to create distance between themselves ... -
Opaque web practices among low-cost carriers
(Elsevier Ltd., 2009-11)The low-cost airlines' adoption of Web technologies to facilitate direct sales has accelerated their market penetration. However, some low-cost carriers are increasingly using Websites to create distance between themselves ... -
Open innovation as a route to value in cloud computing
(AIS Electronic Library (AISeL), 2013-06-09)Both the cloud computing and open innovation paradigms represent recent phenomenon and as such many unanswered questions still persist. Indeed cloud computing s full innovation potential may only be fully realised through ...