Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Management Information Systems
Determining Information Requirements For E-Business Systems From Activity Space To Information Space, Kecheng Liu, Lily Sun
Determining Information Requirements For E-Business Systems From Activity Space To Information Space, Kecheng Liu, Lily Sun
Journal of International Technology and Information Management
The study of information requirements for e-business systems reveals that the level of detail, granularity, format of presentation, and a broad range of information types are required for the applications. The provision of relevant information affects how e-business systems can efficiently support the business goals and processes. This paper presents an approach for determining information requirements for e-business systems (DIRES) which will allow the user to describe the core business processes, whose specification maps onto a business activity space. It further aids a configuration of information requirements into an information space. A case study of a logistics company in China …
The Effects Of Personal Innovativeness , Perceived Risk , And Computer Self -Efficacy On Online Purchasing Intent, Randall J. Boyle, Cynthia P. Ruppel
The Effects Of Personal Innovativeness , Perceived Risk , And Computer Self -Efficacy On Online Purchasing Intent, Randall J. Boyle, Cynthia P. Ruppel
Journal of International Technology and Information Management
The rapid growth of e-commerce makes it important for the success of companies to understand both the factors that facilitate and are barriers to these transactions. Therefore, the purpose of this study is to investigate the relationships between perceived Internet risk, personal innovativeness and computer/web self-efficacy, and online purchases intentions as three of these factors. Results indicate that perceived Internet risk, personal innovativeness and computer/web self-efficacy are all strongly related to online purchasing intentions. There is also a strong relationship between computer self- efficacy and personal innovativeness, two of the values-compatibility variables related to intention to purchase on-line. Suggestions for …
Computer Security Checklist For Non-Security Technology Professionals, Chlotia P. Garrison, Roderick B. Posey
Computer Security Checklist For Non-Security Technology Professionals, Chlotia P. Garrison, Roderick B. Posey
Journal of International Technology and Information Management
Networked computers and electronic data storage make computer security a fundamental component of a company’s survival. Security incidents can cause reputation damage, loss customers, or even liability. Companies that are unable or unwilling to hire certified security professionals often rely on non-security IT professionals for assistance. This paper provides a checklist the non-security professional can use to assist the company in the critical areas of conducting risk analysis, performing vulnerability assessments, educating employees and developing computer security policies and procedures