메뉴 건너뛰기




Volumn 19, Issue 3, 2006, Pages 124-138

Economics of employee internet management

Author keywords

Communication technologies; Cost benefit analysis; Economics; Employees; Information management; Internet

Indexed keywords


EID: 33747506542     PISSN: 0888045X     EISSN: None     Source Type: Journal    
DOI: 10.1108/08880450610682545     Document Type: Article
Times cited : (4)

References (41)
  • 1
    • 71549129041 scopus 로고
    • A microeconomic approach to the measurement of information technology value
    • Alpar, P. and Kim, M.A. (1990), "A microeconomic approach to the measurement of information technology value", Journal of Management Information Systems, Vol. 7 No. 2, pp. 55-69.
    • (1990) Journal of Management Information Systems , vol.7 , Issue.2 , pp. 55-69
    • Alpar, P.1    Kim, M.A.2
  • 2
    • 53349174733 scopus 로고
    • The use of decision criteria in selecting information systems/technology investments
    • Bacon, C.J. (1992), "The use of decision criteria in selecting information systems/technology investments", MIS Quarterly, Vol. 16 No. 3, pp. 335-53.
    • (1992) MIS Quarterly , vol.16 , Issue.3 , pp. 335-53
    • Bacon, C.J.1
  • 5
    • 3242691287 scopus 로고    scopus 로고
    • Gaining and sustaining competitive advantage with activity based cost management system
    • Beheshti, H.M. (2004), "Gaining and sustaining competitive advantage with activity based cost management system", Industrial Management & Data Systems, Vol. 104 No. 5, pp. 377-83.
    • (2004) Industrial Management & Data Systems , vol.104 , Issue.5 , pp. 377-83
    • Beheshti, H.M.1
  • 6
    • 24944590863 scopus 로고    scopus 로고
    • Return on security investment: An imprecise but necessary calculation
    • available at: www.sbq.com/sbq/rosi/sbqrosicalculation.pdf
    • Blakley, B. (2001), "Return on security investment: an imprecise but necessary calculation", Secure Business Quarterly, Vol. 1 No. 2, pp. 1-3, available at: www.sbq.com/sbq/rosi/sbqrosicalculation.pdf.
    • (2001) Secure Business Quarterly , vol.1 , Issue.2 , pp. 1-3
    • Blakley, B.1
  • 7
    • 0031707661 scopus 로고    scopus 로고
    • The internet as a competitive knowledge tool for top managers
    • Brabston, M.E. and McNamara, G. (1998), "The internet as a competitive knowledge tool for top managers", Industrial Management & Data Systems, Vol. 98 No. 4, pp. 158-64.
    • (1998) Industrial Management & Data Systems , vol.98 , Issue.4 , pp. 158-64
    • Brabston, M.E.1    McNamara, G.2
  • 8
    • 0346788758 scopus 로고    scopus 로고
    • Paradox lost? Firm-level evidence on the returns to information systems spending
    • Brynjolfsson, E. and Hitt, L. (1996), "Paradox lost? Firm-level evidence on the returns to information systems spending", Management Science, Vol. 42 No. 4, pp. 541-58.
    • (1996) Management Science , vol.42 , Issue.4 , pp. 541-58
    • Brynjolfsson, E.1    Hitt, L.2
  • 9
    • 0031656298 scopus 로고    scopus 로고
    • The use of the world wide web for commercial purposes
    • Cheung, W. (1998), "The use of the world wide web for commercial purposes", Industrial Management & Data Systems, Vol. 98 No. 4, pp. 172-7.
    • (1998) Industrial Management & Data Systems , vol.98 , Issue.4 , pp. 172-7
    • Cheung, W.1
  • 12
    • 3342883858 scopus 로고
    • Justifying office automation: Benefits and problems
    • Grantham, L. (1995), "Justifying office automation: benefits and problems", Industrial Management & Data Systems, Vol. 95 No. 8, pp. 10-13.
    • (1995) Industrial Management & Data Systems , vol.95 , Issue.8 , pp. 10-13
    • Grantham, L.1
  • 15
    • 0032621976 scopus 로고    scopus 로고
    • Information technology to support any-time, any-place team meetings in Korean organizations
    • Hong, I.B. (1999), "Information technology to support any-time, any-place team meetings in Korean organizations", Industrial Management & Data Systems, Vol. 99 No. 1, pp. 18-24.
    • (1999) Industrial Management & Data Systems , vol.99 , Issue.1 , pp. 18-24
    • Hong, I.B.1
  • 16
    • 10444244093 scopus 로고    scopus 로고
    • Determinants of continued use of the WWW: An integration of two theoretical models
    • Hsu, M.H., Chiu, C.M. and Ju, T.L. (2004), "Determinants of continued use of the WWW: an integration of two theoretical models", Industrial Management & Data Systems, Vol. 104 No. 9, pp. 766-75.
    • (2004) Industrial Management & Data Systems , vol.104 , Issue.9 , pp. 766-75
    • Hsu, M.H.1    Chiu, C.M.2    Ju, T.L.3
  • 17
    • 18844453659 scopus 로고
    • Management's roles in computer security
    • Hutt, A.E. Hoyt, D.B. Bosworth, S. 2nd ed. Macmillan New York, NY
    • Hutt, A.E. (1987), "Management's roles in computer security", in Hutt, A.E., Hoyt, D.B. and Bosworth, S. (Eds), Computer Security Handbook, 2nd ed., Macmillan, New York, NY.
    • (1987) Computer Security Handbook
    • Hutt, A.E.1
  • 18
    • 0030658185 scopus 로고    scopus 로고
    • Using the internet for competitive advantage
    • Jemmeson, P. (1997), "Using the internet for competitive advantage", Industrial Management & Data Systems, Vol. 97 No. 4, pp. 139-42.
    • (1997) Industrial Management & Data Systems , vol.97 , Issue.4 , pp. 139-42
    • Jemmeson, P.1
  • 19
    • 33747477320 scopus 로고    scopus 로고
    • "A study on enterprise information system investment evaluation", Master thesis, Program in Cognitive Science and Engineering, Yonsei University, Seoul
    • Kim, S. (2000), "A study on enterprise information system investment evaluation", Master thesis, Program in Cognitive Science and Engineering, Yonsei University, Seoul.
    • (2000)
    • Kim, S.1
  • 20
    • 33745315671 scopus 로고    scopus 로고
    • Implementation of the security system for instant messengers
    • Kim, S. and Leem, C.S. (2004), "Implementation of the security system for instant messengers", Lecture Notes in Computer Science, No. 3314, pp. 739-44.
    • (2004) Lecture Notes in Computer Science , Issue.3314 , pp. 739-44
    • Kim, S.1    Leem, C.S.2
  • 21
    • 18844441444 scopus 로고    scopus 로고
    • Security of the internet-based instant messenger: Risks and safeguards
    • Kim, S. and Leem, C.S. (2005), "Security of the internet-based instant messenger: risks and safeguards", Internet Research, Vol. 15 No. 1, pp. 88-98.
    • (2005) Internet Research , vol.15 , Issue.1 , pp. 88-98
    • Kim, S.1    Leem, C.S.2
  • 22
    • 33747473804 scopus 로고    scopus 로고
    • "A road map of the optimized process for security engineering", paper presented at the Fifth International Conference on Operations and Quantitative Management, Seoul
    • Kim, S., Lee, H.J. and Choi, B.K. (2004), "A road map of the optimized process for security engineering", paper presented at the Fifth International Conference on Operations and Quantitative Management, Seoul.
    • (2004)
    • Kim, S.1    Lee, H.J.2    Choi, B.K.3
  • 23
    • 18844362137 scopus 로고    scopus 로고
    • Business use of the internet: A longitudinal study from a value chain perspective
    • Koh, C.E. and Nam, K.T. (2005), "Business use of the internet: a longitudinal study from a value chain perspective", Industrial Management & Data Systems, Vol. 105 No. 1, pp. 82-95.
    • (2005) Industrial Management & Data Systems , vol.105 , Issue.1 , pp. 82-95
    • Koh, C.E.1    Nam, K.T.2
  • 25
    • 0033339441 scopus 로고    scopus 로고
    • An empirical study of the characteristics of internet traffic
    • Kushida, T. (1999), "An empirical study of the characteristics of internet traffic", Computer Communications, Vol. 22 No. 17, pp. 1607-18.
    • (1999) Computer Communications , vol.22 , Issue.17 , pp. 1607-18
    • Kushida, T.1
  • 26
    • 0037083539 scopus 로고    scopus 로고
    • Introduction to an integrated methodology for development and implementation of enterprise information systems
    • Leem, C.S. and Kim, S. (2002), "Introduction to an integrated methodology for development and implementation of enterprise information systems", Journal of Systems and Software, Vol. 60 No. 3, pp. 249-61.
    • (2002) Journal of Systems and Software , vol.60 , Issue.3 , pp. 249-61
    • Leem, C.S.1    Kim, S.2
  • 27
    • 0345549550 scopus 로고    scopus 로고
    • A constraint-based framework for strategic cost management
    • Lockamy, A. (2003), "A constraint-based framework for strategic cost management", Industrial Management & Data Systems, Vol. 103 No. 8, pp. 591-9.
    • (2003) Industrial Management & Data Systems , vol.103 , Issue.8 , pp. 591-9
    • Lockamy, A.1
  • 28
    • 1842766183 scopus 로고
    • Measuring the organizational impact of information technology investment: An exploratory study
    • Mahmood, M.A. and Mann, G.J. (1993), "Measuring the organizational impact of information technology investment: an exploratory study", Journal of Management Information Systems, Vol. 10 No. 1, pp. 97-122.
    • (1993) Journal of Management Information Systems , vol.10 , Issue.1 , pp. 97-122
    • Mahmood, M.A.1    Mann, G.J.2
  • 29
    • 0030307381 scopus 로고    scopus 로고
    • Analyzing cost-effectiveness of organizations: The impact of information technology spending
    • Mitra, S. and Chaya, A.K. (1996), "Analyzing cost-effectiveness of organizations: the impact of information technology spending", Journal of Management Information Systems, Vol. 13 No. 2, pp. 29-57.
    • (1996) Journal of Management Information Systems , vol.13 , Issue.2 , pp. 29-57
    • Mitra, S.1    Chaya, A.K.2
  • 30
    • 0001672981 scopus 로고
    • How competitive forces shape strategy
    • Porter, M.E. (1979), "How competitive forces shape strategy", Harvard Business Review, Vol. 57 No. 2, pp. 137-45.
    • (1979) Harvard Business Review , vol.57 , Issue.2 , pp. 137-45
    • Porter, M.E.1
  • 31
    • 0042484572 scopus 로고    scopus 로고
    • 2002 CSI/FBI computer crime and security survey
    • Power, R. (2002), "2002 CSI/FBI computer crime and security survey", Computer Security Issues & Trends, Vol. 8 No. 1, pp. 1-22, available at: www.reddshell.com/docs/csifbi2002.pdf.
    • (2002) Computer Security Issues & Trends , vol.8 , Issue.1 , pp. 1-22
    • Power, R.1
  • 32
    • 0348198469 scopus 로고    scopus 로고
    • Technology investment and business performance
    • Rai, A., Patnayakuni, R. and Patanayakuni, N. (1997), "Technology investment and business performance", Communications of the ACM, Vol. 40 No. 7, pp. 89-97.
    • (1997) Communications of the ACM , vol.40 , Issue.7 , pp. 89-97
    • Rai, A.1    Patnayakuni, R.2    Patanayakuni, N.3
  • 34
    • 0030732211 scopus 로고    scopus 로고
    • Methodologies for information systems investment evaluation at the proposal stage: A comparative review
    • Renkema, T.J.W. and Berghout, E.W. (1997), "Methodologies for information systems investment evaluation at the proposal stage: a comparative review", Information and Software Technology, Vol. 39 No. 1, pp. 1-13.
    • (1997) Information and Software Technology , vol.39 , Issue.1 , pp. 1-13
    • Renkema, T.J.W.1    Berghout, E.W.2
  • 36
    • 24944511362 scopus 로고    scopus 로고
    • Controlling access to the internet: The role of filtering
    • available at: www.copacommission.org/papers/rosenberg.pdf
    • Rosenberg, R.S. (2001), "Controlling access to the internet: the role of filtering", Ethics and Information Technology, Vol. 3 No. 1, pp. 35-54, available at: www.copacommission.org/papers/rosenberg.pdf.
    • (2001) Ethics and Information Technology , vol.3 , Issue.1 , pp. 35-54
    • Rosenberg, R.S.1
  • 39
    • 33747519397 scopus 로고    scopus 로고
    • "Best practices and trends in business continuity planning", paper presented at the US Symposium/ITxpo, Orlando, FL, available at: http://symposium.gartner.com/docs/symposium/itxpoorlando2002/documentation/ sym1215a.pdf
    • Scott, D. (2002), "Best practices and trends in business continuity planning", paper presented at the US Symposium/ITxpo, Orlando, FL, available at: http://symposium.gartner.com/docs/symposium/itxpoorlando2002/ documentation/sym1215a.pdf.
    • (2002)
    • Scott, D.1
  • 41
    • 33747470426 scopus 로고    scopus 로고
    • Gartner Inc. Stamford, CT available at: www.gartner.com/
    • Witty, R.J. et al. (2001), The Price of Information Security, Gartner Inc., Stamford, CT, available at: www.gartner.com/.
    • (2001) The Price of Information Security
    • Witty, R.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.