Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Business

Gestaltungsorientierte Wirtschaftsinformatik: Ein Plädoyer Für Rigor Und Relevanz, Hubert Oesterle, Robert Winter, Walter Brenner Jan 2010

Gestaltungsorientierte Wirtschaftsinformatik: Ein Plädoyer Für Rigor Und Relevanz, Hubert Oesterle, Robert Winter, Walter Brenner

Hubert Oesterle

No abstract provided.


A Method For Consortial Research, Hubert Österle, Boris Otto Jun 2009

A Method For Consortial Research, Hubert Österle, Boris Otto

Boris Otto

Design oriented research in information systems faces two major challenges: the effort to capture practitioners’ knowledge on one hand (relevance) and the evidence to fulfill scientific requirements (rigor). In practice, businesses employ at least a centuple of the resources which are available in research for the design and implementation of innovative solutions based on information technology. For the researcher, it is almost impossible just to oversee the state of practice, in addition to the scientific body of knowledge. Since based on a single case, the engagement of an individual company in a collaborative research environment, e.g. in action research, is …


A Method For Consortial Research, Hubert Oesterle, Boris Otto Jun 2009

A Method For Consortial Research, Hubert Oesterle, Boris Otto

Hubert Oesterle

Design oriented research in information systems faces two major challenges: the effort to capture practitioners’ knowledge on one hand (relevance) and the evidence to fulfill scientific requirements (rigor). In practice, businesses employ at least a centuple of the resources which are available in research for the design and implementation of innovative solutions based on information technology. For the researcher, it is almost impossible just to oversee the state of practice, in addition to the scientific body of knowledge. Since based on a single case, the engagement of an individual company in a collaborative research environment, e.g. in action research, is …


More Secure Passwords, Scott Magruder, Stanley X. Lewis Jr Jan 2007

More Secure Passwords, Scott Magruder, Stanley X. Lewis Jr

Journal of International Technology and Information Management

Passwords are often the first line of defense against hackers trying to logon to a user’s account. Due to this, the password that a user selects for protection of their account is critical. These passwords must be “good” passwords that are not easily cracked. However, how does the network administrator enforce this? A simple change to the login process can make the passwords chosen by users much more secure. A description of this simple process is given in this paper. The normal login process is described. A description of the how hackers attempt to crack passwords is given. The simple …