Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Business

An Exploration Of Human Resource Management Information Systems Security, Humayun Zafar, Jan Guynes Clark, Myung Ko Nov 2011

An Exploration Of Human Resource Management Information Systems Security, Humayun Zafar, Jan Guynes Clark, Myung Ko

Faculty and Research Publications

In this exploratory study we investigate differences in perception between management and staff with regard to overall information security risk management and human resources security risk management at two Fortune 500 companies. This study is part of a much larger study with regard to organizational information security issues. To our knowledge, this is the first time the issue of security risk management has been discussed in the context of human resource systems. We found significant differences between management and staff perceptions regarding overall security risk management and human resources security risk management. Our findings lay the ground work for future …


Deployment Evaluation Of Accounting Information Systems In Libyan Commercial Banks, Omar Sharkasi, Martin George Wynn Nov 2011

Deployment Evaluation Of Accounting Information Systems In Libyan Commercial Banks, Omar Sharkasi, Martin George Wynn

The African Journal of Information Systems

This article reports on the recent implementation and current deployment of accounting information systems in Libyan commercial banks. A case study approach is adopted that moves from an initial screening of the 14 main Libyan banks to a final in-depth study of just three banks. Business process modeling and systems profiling are used to assess the status of the banks in terms of systems use, process change and information systems strategy development. Libyan banks are well advanced in their installation of modern packaged software but could be used to greater effect to optimize business processes and improve efficiencies. Training and …


Decision Support Systems For Strategic Dispute Resolution, Anurag Agarwal, Sridhar Ramamoorti, Vaidyanathan Jayaraman Oct 2011

Decision Support Systems For Strategic Dispute Resolution, Anurag Agarwal, Sridhar Ramamoorti, Vaidyanathan Jayaraman

Faculty and Research Publications

Disputes and lawsuits are quite common in business and are often a source of significant liabilities. We conjecture that measurement challenges and lack of adequate analysis tools have greatly inhibited the ability of the General Counsel's offices in selecting the best mode for the resolution (i.e. litigation vs. out-of-court settlement) of business conflicts and disputes. Easily quantified direct costs (e.g., out-of-pocket expenses related to pursuing and defending against litigation) tend to be considered, whereas the more difficult-to-quantify indirect risks and costs (e.g., damaged relationships with customers and potential alliance partners, including reputational harm) which may be quite significant, tend to …


Information Security Culture In Public Hospitals: The Case Of Hawassa Referral Hospital, Temesgen Gebrasilase, Lemma Ferede Lessa Oct 2011

Information Security Culture In Public Hospitals: The Case Of Hawassa Referral Hospital, Temesgen Gebrasilase, Lemma Ferede Lessa

The African Journal of Information Systems

Information security culture is mainly considered as a set of information security characteristics that the organization values. In this paper, an attempt has been made to assess the information security culture of Hawassa Referral Hospital located in the south central part of Ethiopia. The study aimed at identifying determinant factors or issues impacting the implementation of an effective culture of information security in the hospital with an intention of improving the existing information security practice in the hospital. To that end, an information security culture assessment model and instrument were adopted from previous studies. The instrument (customized for the current …


Factors Influencing Successful Use Of Mobile Technologies To Facilitate E-Commerce In Small Enterprises: The Case Of Kenya, Patrick Kanyi Wamuyu, Manoj Maharaj Sep 2011

Factors Influencing Successful Use Of Mobile Technologies To Facilitate E-Commerce In Small Enterprises: The Case Of Kenya, Patrick Kanyi Wamuyu, Manoj Maharaj

The African Journal of Information Systems

This paper interrogates the suitability of Mobile Technologies to facilitate e-commerce in Kenyan Micro and Small Enterprises (MSEs). The study proposed a theoretical model and empirically tested it using a sample selected using proportionate stratified sampling within well-defined geographic clusters. The study revealed that, while there is massive use of mobile Internet Services (MIS), there is limited use of Mobile Money Transfer Services (MMTS) for B2B and B2C transactions as opposed to C2C and C2B e-commerce transactions. Results also indicated that utilizing MIS and MMTS, positively and significantly influenced organization’s performance through operational, transactional and interactional benefits. On the research …


End-User Computing Applications, Mary C. Hill, W. Alan Barnes Jul 2011

End-User Computing Applications, Mary C. Hill, W. Alan Barnes

Faculty and Research Publications

Businesses today rely on the work being done by staff using personal computers. The proliferation of personal computers has led to widespread implementation of end-user computing applications. As their name implies, end-user applications are designed, implemented, and controlled by users rather than by IT professionals. End-user applications can be risky for organizations, both with respect to management decision making and to financial reporting. For public companies, the risk involved in these applications has been increased by the requirements of the Sarbanes-Oxley Act of 2002, which call for management to document end-to-end financial operations and internal control structures. This article review …


Audit Committees Oversight Of Information Technology Risk, Linda M. Hadden, Dana Hermanson, F. Todd Dezoort Jun 2011

Audit Committees Oversight Of Information Technology Risk, Linda M. Hadden, Dana Hermanson, F. Todd Dezoort

Faculty and Research Publications

This exploratory study examines the role of the audit committee in overseeing information technology (IT) risk. We address the degree of audit committee oversight of specific IT risks, as well as factors associated with variations in audit committee IT oversight. Based on responses from 39 audit committee members, we found (1) little audit committee emphasis on oversight of IT risks, (2) audit committees involved with IT oversight focus on more traditional risks (e.g., monitoring), while very little attention is devoted to IT acquisition and implementation, and (3) the amount of IT oversight is positively associated with the responding members auditing …


“E-Commerce Institutionalization Is Not For Us”: Smes Perception Of E-Commerce In Tanzania, Salah Kabanda Apr 2011

“E-Commerce Institutionalization Is Not For Us”: Smes Perception Of E-Commerce In Tanzania, Salah Kabanda

The African Journal of Information Systems

E-Commerce in least developing countries (LDCs) is believed to be non-existent because few businesses, especially Small and Medium Enterprises (SMEs) who are usually the vanguard of the LDCs economy, have adopted E-Commerce and even those that have, none have institutionalized the technology. Using structuration theory as a lens, this study attempts to provide an explanation as to what E-Commerce means to SMEs with the purpose of unraveling the underlying cause for the lack of E-Commerce institutionalization in LDC - Tanzania. Results indicate that SMEs use their social context to create symbolic interpretive schemes that facilitate their shared understanding of E-Commerce. …


On The Origins Of Advance Fee Fraud Electronic Mails: A Technical Investigation Using Internet Protocol Address Tracers, Olumide Longe, Adenike Osofisan Apr 2011

On The Origins Of Advance Fee Fraud Electronic Mails: A Technical Investigation Using Internet Protocol Address Tracers, Olumide Longe, Adenike Osofisan

The African Journal of Information Systems

One issue that is concerning to the web security community is the correct identification of the origins of advance fee fraud mails. This has serious implications for directing concerted efforts towards mitigating the malaise in the right direction. Although previous research (Cuckier et al, 2007, Gbenga, 2007; Igwe, 2007; Progame, 2007) opined that these mails originate mainly from Nigeria and other West African Countries, research is warranted using available tracking tools to validate previously held notions about the issue of advance fee e-fraud mails. We harvested in real-time aggregated advance fraud e-mails over a two year period using the sinkhole …


Japan’S Model Of Mobile Ecosystem Success: The Case Of Ntt Docomo, D. Amoroso, M. Ogawa Jan 2011

Japan’S Model Of Mobile Ecosystem Success: The Case Of Ntt Docomo, D. Amoroso, M. Ogawa

Faculty and Research Publications

This research looks at the adoption of Internet and mobile applications in the United States and Japan. It is the intent ofthis meta-exploratory study to examine factors of success with Japan’s mobile industry over the past decade. Takeshi Natsuno defined the ecosystem as a collection of roles in a collaborative balance. It is here that we began to search for the factors that have had an impact on the success of the mobile industry in Japan over the past two decades. It is the intent of this study to identify and discuss those factors to validate the ecosystem research model …