Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

2006

Electronic

Articles 1 - 3 of 3

Full-Text Articles in Management Information Systems

Determining Information Requirements For E-Business Systems From Activity Space To Information Space, Kecheng Liu, Lily Sun Jan 2006

Determining Information Requirements For E-Business Systems From Activity Space To Information Space, Kecheng Liu, Lily Sun

Journal of International Technology and Information Management

The study of information requirements for e-business systems reveals that the level of detail, granularity, format of presentation, and a broad range of information types are required for the applications. The provision of relevant information affects how e-business systems can efficiently support the business goals and processes. This paper presents an approach for determining information requirements for e-business systems (DIRES) which will allow the user to describe the core business processes, whose specification maps onto a business activity space. It further aids a configuration of information requirements into an information space. A case study of a logistics company in China …


The Effects Of Personal Innovativeness , Perceived Risk , And Computer Self -Efficacy On Online Purchasing Intent, Randall J. Boyle, Cynthia P. Ruppel Jan 2006

The Effects Of Personal Innovativeness , Perceived Risk , And Computer Self -Efficacy On Online Purchasing Intent, Randall J. Boyle, Cynthia P. Ruppel

Journal of International Technology and Information Management

The rapid growth of e-commerce makes it important for the success of companies to understand both the factors that facilitate and are barriers to these transactions. Therefore, the purpose of this study is to investigate the relationships between perceived Internet risk, personal innovativeness and computer/web self-efficacy, and online purchases intentions as three of these factors. Results indicate that perceived Internet risk, personal innovativeness and computer/web self-efficacy are all strongly related to online purchasing intentions. There is also a strong relationship between computer self- efficacy and personal innovativeness, two of the values-compatibility variables related to intention to purchase on-line. Suggestions for …


Computer Security Checklist For Non-Security Technology Professionals, Chlotia P. Garrison, Roderick B. Posey Jan 2006

Computer Security Checklist For Non-Security Technology Professionals, Chlotia P. Garrison, Roderick B. Posey

Journal of International Technology and Information Management

Networked computers and electronic data storage make computer security a fundamental component of a company’s survival. Security incidents can cause reputation damage, loss customers, or even liability. Companies that are unable or unwilling to hire certified security professionals often rely on non-security IT professionals for assistance. This paper provides a checklist the non-security professional can use to assist the company in the critical areas of conducting risk analysis, performing vulnerability assessments, educating employees and developing computer security policies and procedures