-
1
-
-
71549129041
-
A microeconomic approach to the measurement of information technology value
-
Alpar, P. and Kim, M.A. (1990), "A microeconomic approach to the measurement of information technology value", Journal of Management Information Systems, Vol. 7 No. 2, pp. 55-69.
-
(1990)
Journal of Management Information Systems
, vol.7
, Issue.2
, pp. 55-69
-
-
Alpar, P.1
Kim, M.A.2
-
2
-
-
53349174733
-
The use of decision criteria in selecting information systems/technology investments
-
Bacon, C.J. (1992), "The use of decision criteria in selecting information systems/technology investments", MIS Quarterly, Vol. 16 No. 3, pp. 335-53.
-
(1992)
MIS Quarterly
, vol.16
, Issue.3
, pp. 335-53
-
-
Bacon, C.J.1
-
3
-
-
0012083431
-
-
Carnegie Mellon University Pittsburgh, PA
-
Barua, A., Kriebel, C.H. and Mukhopadhyay, T. (1991), Information Technologies and Business Value: An Analytic and Empirical Investigation, Carnegie Mellon University, Pittsburgh, PA.
-
(1991)
Information Technologies and Business Value: An Analytic and Empirical Investigation
-
-
Barua, A.1
Kriebel, C.H.2
Mukhopadhyay, T.3
-
4
-
-
24944459600
-
-
McGraw-Hill New York, NY
-
Bates, R.J. (1992), Disaster Recovery Planning: Networks, Telecommunications, and Data Communications, McGraw-Hill, New York, NY.
-
(1992)
Disaster Recovery Planning: Networks, Telecommunications, and Data Communications
-
-
Bates, R.J.1
-
5
-
-
3242691287
-
Gaining and sustaining competitive advantage with activity based cost management system
-
Beheshti, H.M. (2004), "Gaining and sustaining competitive advantage with activity based cost management system", Industrial Management & Data Systems, Vol. 104 No. 5, pp. 377-83.
-
(2004)
Industrial Management & Data Systems
, vol.104
, Issue.5
, pp. 377-83
-
-
Beheshti, H.M.1
-
6
-
-
24944590863
-
Return on security investment: An imprecise but necessary calculation
-
available at: www.sbq.com/sbq/rosi/sbqrosicalculation.pdf
-
Blakley, B. (2001), "Return on security investment: an imprecise but necessary calculation", Secure Business Quarterly, Vol. 1 No. 2, pp. 1-3, available at: www.sbq.com/sbq/rosi/sbqrosicalculation.pdf.
-
(2001)
Secure Business Quarterly
, vol.1
, Issue.2
, pp. 1-3
-
-
Blakley, B.1
-
7
-
-
0031707661
-
The internet as a competitive knowledge tool for top managers
-
Brabston, M.E. and McNamara, G. (1998), "The internet as a competitive knowledge tool for top managers", Industrial Management & Data Systems, Vol. 98 No. 4, pp. 158-64.
-
(1998)
Industrial Management & Data Systems
, vol.98
, Issue.4
, pp. 158-64
-
-
Brabston, M.E.1
McNamara, G.2
-
8
-
-
0346788758
-
Paradox lost? Firm-level evidence on the returns to information systems spending
-
Brynjolfsson, E. and Hitt, L. (1996), "Paradox lost? Firm-level evidence on the returns to information systems spending", Management Science, Vol. 42 No. 4, pp. 541-58.
-
(1996)
Management Science
, vol.42
, Issue.4
, pp. 541-58
-
-
Brynjolfsson, E.1
Hitt, L.2
-
9
-
-
0031656298
-
The use of the world wide web for commercial purposes
-
Cheung, W. (1998), "The use of the world wide web for commercial purposes", Industrial Management & Data Systems, Vol. 98 No. 4, pp. 172-7.
-
(1998)
Industrial Management & Data Systems
, vol.98
, Issue.4
, pp. 172-7
-
-
Cheung, W.1
-
10
-
-
2842562928
-
-
Computer Science Press Rockville, MD
-
Fites, P.E., Kratz, M.P.J. and Brebner, A.F. (1989), Controls and Security of Computer Information Systems, Computer Science Press, Rockville, MD.
-
(1989)
Controls and Security of Computer Information Systems
-
-
Fites, P.E.1
Kratz, M.P.J.2
Brebner, A.F.3
-
12
-
-
3342883858
-
Justifying office automation: Benefits and problems
-
Grantham, L. (1995), "Justifying office automation: benefits and problems", Industrial Management & Data Systems, Vol. 95 No. 8, pp. 10-13.
-
(1995)
Industrial Management & Data Systems
, vol.95
, Issue.8
, pp. 10-13
-
-
Grantham, L.1
-
13
-
-
0011918264
-
-
CSIRO Collingwood available at: www.netalert.net.au/00379-CSIRO-Filter- Report.pdf
-
Greenfield, P., Rickwood, P. and Tran, H.C. (2001), Effectiveness of Internet Filtering Software Products, CSIRO, Collingwood, available at: www.netalert.net.au/00379-CSIRO-Filter-Report.pdf.
-
(2001)
Effectiveness of Internet Filtering Software Products
-
-
Greenfield, P.1
Rickwood, P.2
Tran, H.C.3
-
15
-
-
0032621976
-
Information technology to support any-time, any-place team meetings in Korean organizations
-
Hong, I.B. (1999), "Information technology to support any-time, any-place team meetings in Korean organizations", Industrial Management & Data Systems, Vol. 99 No. 1, pp. 18-24.
-
(1999)
Industrial Management & Data Systems
, vol.99
, Issue.1
, pp. 18-24
-
-
Hong, I.B.1
-
16
-
-
10444244093
-
Determinants of continued use of the WWW: An integration of two theoretical models
-
Hsu, M.H., Chiu, C.M. and Ju, T.L. (2004), "Determinants of continued use of the WWW: an integration of two theoretical models", Industrial Management & Data Systems, Vol. 104 No. 9, pp. 766-75.
-
(2004)
Industrial Management & Data Systems
, vol.104
, Issue.9
, pp. 766-75
-
-
Hsu, M.H.1
Chiu, C.M.2
Ju, T.L.3
-
17
-
-
18844453659
-
Management's roles in computer security
-
Hutt, A.E. Hoyt, D.B. Bosworth, S. 2nd ed. Macmillan New York, NY
-
Hutt, A.E. (1987), "Management's roles in computer security", in Hutt, A.E., Hoyt, D.B. and Bosworth, S. (Eds), Computer Security Handbook, 2nd ed., Macmillan, New York, NY.
-
(1987)
Computer Security Handbook
-
-
Hutt, A.E.1
-
18
-
-
0030658185
-
Using the internet for competitive advantage
-
Jemmeson, P. (1997), "Using the internet for competitive advantage", Industrial Management & Data Systems, Vol. 97 No. 4, pp. 139-42.
-
(1997)
Industrial Management & Data Systems
, vol.97
, Issue.4
, pp. 139-42
-
-
Jemmeson, P.1
-
19
-
-
33747477320
-
-
"A study on enterprise information system investment evaluation", Master thesis, Program in Cognitive Science and Engineering, Yonsei University, Seoul
-
Kim, S. (2000), "A study on enterprise information system investment evaluation", Master thesis, Program in Cognitive Science and Engineering, Yonsei University, Seoul.
-
(2000)
-
-
Kim, S.1
-
20
-
-
33745315671
-
Implementation of the security system for instant messengers
-
Kim, S. and Leem, C.S. (2004), "Implementation of the security system for instant messengers", Lecture Notes in Computer Science, No. 3314, pp. 739-44.
-
(2004)
Lecture Notes in Computer Science
, Issue.3314
, pp. 739-44
-
-
Kim, S.1
Leem, C.S.2
-
21
-
-
18844441444
-
Security of the internet-based instant messenger: Risks and safeguards
-
Kim, S. and Leem, C.S. (2005), "Security of the internet-based instant messenger: risks and safeguards", Internet Research, Vol. 15 No. 1, pp. 88-98.
-
(2005)
Internet Research
, vol.15
, Issue.1
, pp. 88-98
-
-
Kim, S.1
Leem, C.S.2
-
22
-
-
33747473804
-
-
"A road map of the optimized process for security engineering", paper presented at the Fifth International Conference on Operations and Quantitative Management, Seoul
-
Kim, S., Lee, H.J. and Choi, B.K. (2004), "A road map of the optimized process for security engineering", paper presented at the Fifth International Conference on Operations and Quantitative Management, Seoul.
-
(2004)
-
-
Kim, S.1
Lee, H.J.2
Choi, B.K.3
-
23
-
-
18844362137
-
Business use of the internet: A longitudinal study from a value chain perspective
-
Koh, C.E. and Nam, K.T. (2005), "Business use of the internet: a longitudinal study from a value chain perspective", Industrial Management & Data Systems, Vol. 105 No. 1, pp. 82-95.
-
(2005)
Industrial Management & Data Systems
, vol.105
, Issue.1
, pp. 82-95
-
-
Koh, C.E.1
Nam, K.T.2
-
25
-
-
0033339441
-
An empirical study of the characteristics of internet traffic
-
Kushida, T. (1999), "An empirical study of the characteristics of internet traffic", Computer Communications, Vol. 22 No. 17, pp. 1607-18.
-
(1999)
Computer Communications
, vol.22
, Issue.17
, pp. 1607-18
-
-
Kushida, T.1
-
26
-
-
0037083539
-
Introduction to an integrated methodology for development and implementation of enterprise information systems
-
Leem, C.S. and Kim, S. (2002), "Introduction to an integrated methodology for development and implementation of enterprise information systems", Journal of Systems and Software, Vol. 60 No. 3, pp. 249-61.
-
(2002)
Journal of Systems and Software
, vol.60
, Issue.3
, pp. 249-61
-
-
Leem, C.S.1
Kim, S.2
-
27
-
-
0345549550
-
A constraint-based framework for strategic cost management
-
Lockamy, A. (2003), "A constraint-based framework for strategic cost management", Industrial Management & Data Systems, Vol. 103 No. 8, pp. 591-9.
-
(2003)
Industrial Management & Data Systems
, vol.103
, Issue.8
, pp. 591-9
-
-
Lockamy, A.1
-
28
-
-
1842766183
-
Measuring the organizational impact of information technology investment: An exploratory study
-
Mahmood, M.A. and Mann, G.J. (1993), "Measuring the organizational impact of information technology investment: an exploratory study", Journal of Management Information Systems, Vol. 10 No. 1, pp. 97-122.
-
(1993)
Journal of Management Information Systems
, vol.10
, Issue.1
, pp. 97-122
-
-
Mahmood, M.A.1
Mann, G.J.2
-
29
-
-
0030307381
-
Analyzing cost-effectiveness of organizations: The impact of information technology spending
-
Mitra, S. and Chaya, A.K. (1996), "Analyzing cost-effectiveness of organizations: the impact of information technology spending", Journal of Management Information Systems, Vol. 13 No. 2, pp. 29-57.
-
(1996)
Journal of Management Information Systems
, vol.13
, Issue.2
, pp. 29-57
-
-
Mitra, S.1
Chaya, A.K.2
-
30
-
-
0001672981
-
How competitive forces shape strategy
-
Porter, M.E. (1979), "How competitive forces shape strategy", Harvard Business Review, Vol. 57 No. 2, pp. 137-45.
-
(1979)
Harvard Business Review
, vol.57
, Issue.2
, pp. 137-45
-
-
Porter, M.E.1
-
31
-
-
0042484572
-
2002 CSI/FBI computer crime and security survey
-
Power, R. (2002), "2002 CSI/FBI computer crime and security survey", Computer Security Issues & Trends, Vol. 8 No. 1, pp. 1-22, available at: www.reddshell.com/docs/csifbi2002.pdf.
-
(2002)
Computer Security Issues & Trends
, vol.8
, Issue.1
, pp. 1-22
-
-
Power, R.1
-
32
-
-
0348198469
-
Technology investment and business performance
-
Rai, A., Patnayakuni, R. and Patanayakuni, N. (1997), "Technology investment and business performance", Communications of the ACM, Vol. 40 No. 7, pp. 89-97.
-
(1997)
Communications of the ACM
, vol.40
, Issue.7
, pp. 89-97
-
-
Rai, A.1
Patnayakuni, R.2
Patanayakuni, N.3
-
33
-
-
0003741930
-
-
2nd ed. Butterworth-Heinemann Boston, MA
-
Remenyi, D., Money, A.H., Sherwood-Smith, M. and Irani, Z. (2000), The Effective Measurement and Management of IT Costs and Benefits, 2nd ed., Butterworth-Heinemann, Boston, MA.
-
(2000)
The Effective Measurement and Management of IT Costs and Benefits
-
-
Remenyi, D.1
Money, A.H.2
Sherwood-Smith, M.3
Irani, Z.4
-
34
-
-
0030732211
-
Methodologies for information systems investment evaluation at the proposal stage: A comparative review
-
Renkema, T.J.W. and Berghout, E.W. (1997), "Methodologies for information systems investment evaluation at the proposal stage: a comparative review", Information and Software Technology, Vol. 39 No. 1, pp. 1-13.
-
(1997)
Information and Software Technology
, vol.39
, Issue.1
, pp. 1-13
-
-
Renkema, T.J.W.1
Berghout, E.W.2
-
36
-
-
24944511362
-
Controlling access to the internet: The role of filtering
-
available at: www.copacommission.org/papers/rosenberg.pdf
-
Rosenberg, R.S. (2001), "Controlling access to the internet: the role of filtering", Ethics and Information Technology, Vol. 3 No. 1, pp. 35-54, available at: www.copacommission.org/papers/rosenberg.pdf.
-
(2001)
Ethics and Information Technology
, vol.3
, Issue.1
, pp. 35-54
-
-
Rosenberg, R.S.1
-
39
-
-
33747519397
-
-
"Best practices and trends in business continuity planning", paper presented at the US Symposium/ITxpo, Orlando, FL, available at: http://symposium.gartner.com/docs/symposium/itxpoorlando2002/documentation/ sym1215a.pdf
-
Scott, D. (2002), "Best practices and trends in business continuity planning", paper presented at the US Symposium/ITxpo, Orlando, FL, available at: http://symposium.gartner.com/docs/symposium/itxpoorlando2002/ documentation/sym1215a.pdf.
-
(2002)
-
-
Scott, D.1
-
41
-
-
33747470426
-
-
Gartner Inc. Stamford, CT available at: www.gartner.com/
-
Witty, R.J. et al. (2001), The Price of Information Security, Gartner Inc., Stamford, CT, available at: www.gartner.com/.
-
(2001)
The Price of Information Security
-
-
Witty, R.J.1
|