Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Engineering

2012

Information

Articles 1 - 2 of 2

Full-Text Articles in Business

Effective Virtual Teams For New Product Development, Nader Ale Ebrahim, Shamsuddin Ahmed, Salwa Hanim Abdul Rashid, Zahari Taha Jun 2012

Effective Virtual Teams For New Product Development, Nader Ale Ebrahim, Shamsuddin Ahmed, Salwa Hanim Abdul Rashid, Zahari Taha

Nader Ale Ebrahim

At present, the existing literature shows that the factors which influence the effectiveness of virtual teams for new product development are still ambiguous. To address this problem, a research design was developed, which includes detailed literature review, preliminary model and field survey. From literature review, the factors which influence the effectiveness of virtual teams are identified and these factors are modified using a field survey. The relationship between knowledge workers (people), process and technology in virtual teams is explored in this study. The results of the study suggest that technology and process are tightly correlated and need to be considered …


Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael Apr 2012

Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael

Professor Katina Michael

Dr Jason Andress (ISSAP, CISSP, GPEN, CEH) has written a timely book on Information Security. Andress who is a seasoned security professional with experience in both the academic and business worlds, categorically demonstrates through his book that underlying the operation of any successful business today is how to protect your most valuable asset- “information”. Andress completed his doctorate in computer science in the area of data protection, and presently works for a major software company, providing global information security oversight and performing penetration testing and risks assessment.