Showing 1 - 10 of 16,879
evaluation and a methodology for doing so is suggested. Managers can no longer pay lip service to the concept of user involvement …
Persistent link: https://www.econbiz.de/10014825211
A guide to assist people along the path of software package selection, helping them avoid the pitfalls (including over‐enthusiastic salesmen) is presented. Guidelines to follow are: make sure that what you intend doing is compatible with your company′s strategic goals and plans; conduct a...
Persistent link: https://www.econbiz.de/10014824504
The article strongly advocates the need for management to rethink their attitudes to CIM: traditional strategic thinking and traditional costing and accounting systems are not a realistic means of evaluating it.
Persistent link: https://www.econbiz.de/10014824511
Warns computer users of the dangers they may face from the design faults that may be present in under‐tested software. Suggest that suppliers of software should be classified according to the level of maturity of the organization′s software development process. Explains the five proposed...
Persistent link: https://www.econbiz.de/10015033269
The dynamic vehicle scheduling problem for a shipper involves managing transport of freight originating at various locations to minimise transport costs. The job involves dynamic assignment of vehicles contracted from carriers to loads available at multiple locations on a real time basis. A...
Persistent link: https://www.econbiz.de/10014793947
Persistent link: https://www.econbiz.de/10004406495
This paper examines the role of financial development and financial structure in explaining cross-country diffusion of information communication technology (ICT). Using panel data for 76 emerging and advanced countries for the period 1990-2003, the paper finds that credit and stock market...
Persistent link: https://www.econbiz.de/10005263968
Purpose Using authentication to secure data and accounts has grown to be a natural part of computing. Even if several authentication methods are in existence, using passwords remain the most common type of authentication. As long and complex passwords are encouraged by research studies and...
Persistent link: https://www.econbiz.de/10014754785
Purpose – This paper aims to propose that more useful novel schemes could develop from a more principled examination and application of promising authentication features. Text passwords persist despite several decades of evidence of their security and usability challenges. It seems extremely...
Persistent link: https://www.econbiz.de/10014754805
Purpose – The purpose of this paper was to analyse existing theories from the social sciences to gain a better understanding of factors which contribute to student mobile phone users’ poor information security behaviour. Two key aspects associated with information security behaviour were...
Persistent link: https://www.econbiz.de/10014754853