Open Access. Powered by Scholars. Published by Universities.®
- Publication
- Publication Type
Articles 1 - 4 of 4
Full-Text Articles in Business
Gestaltungsorientierte Wirtschaftsinformatik: Ein Plädoyer Für Rigor Und Relevanz, Hubert Oesterle, Robert Winter, Walter Brenner
Gestaltungsorientierte Wirtschaftsinformatik: Ein Plädoyer Für Rigor Und Relevanz, Hubert Oesterle, Robert Winter, Walter Brenner
Hubert Oesterle
No abstract provided.
A Method For Consortial Research, Hubert Österle, Boris Otto
A Method For Consortial Research, Hubert Österle, Boris Otto
Boris Otto
Design oriented research in information systems faces two major challenges: the effort to capture practitioners’ knowledge on one hand (relevance) and the evidence to fulfill scientific requirements (rigor). In practice, businesses employ at least a centuple of the resources which are available in research for the design and implementation of innovative solutions based on information technology. For the researcher, it is almost impossible just to oversee the state of practice, in addition to the scientific body of knowledge. Since based on a single case, the engagement of an individual company in a collaborative research environment, e.g. in action research, is …
A Method For Consortial Research, Hubert Oesterle, Boris Otto
A Method For Consortial Research, Hubert Oesterle, Boris Otto
Hubert Oesterle
Design oriented research in information systems faces two major challenges: the effort to capture practitioners’ knowledge on one hand (relevance) and the evidence to fulfill scientific requirements (rigor). In practice, businesses employ at least a centuple of the resources which are available in research for the design and implementation of innovative solutions based on information technology. For the researcher, it is almost impossible just to oversee the state of practice, in addition to the scientific body of knowledge. Since based on a single case, the engagement of an individual company in a collaborative research environment, e.g. in action research, is …
More Secure Passwords, Scott Magruder, Stanley X. Lewis Jr
More Secure Passwords, Scott Magruder, Stanley X. Lewis Jr
Journal of International Technology and Information Management
Passwords are often the first line of defense against hackers trying to logon to a user’s account. Due to this, the password that a user selects for protection of their account is critical. These passwords must be “good” passwords that are not easily cracked. However, how does the network administrator enforce this? A simple change to the login process can make the passwords chosen by users much more secure. A description of this simple process is given in this paper. The normal login process is described. A description of the how hackers attempt to crack passwords is given. The simple …