Journal of Management Information Systems, Vol. 22, No. 4, Spring 2006: 109-142. An Information Systems Security Risk Assessment Model under Dempster-Shafer Theory of Belief Functions Lili Sun Rutgers, The State University of New Jersey Rajendra P. Srivastava The University of Kansas and Theodore J. Mock University of Southern California and University of Maastricht Acknowledgements: We would like to thank the audit firm for making their audit work papers available for the study
Words: 15140 - Pages: 61
EBT1 Task 1 Critique of a Nursing Research Article A1. Article Ford, Y. , Heyman, A., Chapman, Y. (2014). Patients’ perceptions of bedside handoff; the need for a culture of always. Journal of Nursing Care Quality, 29(4), 371-378. A2. Graphic Background Information | The purpose of this article was to identify patient perceptions of bedside handover through directly asking patients about their
Words: 4724 - Pages: 19
Austin and Boxerman’s Information Systems for Healthcare Management Seventh Edition Gerald L. Glandon Detlev H. Smaltz Donna J. Slovensky 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 [First Page] [-1], (1) Lines: 0 to 27 * 516.0pt PgVar ——— ——— Normal Page * PgEnds: PageBreak [-1], (1) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38
Words: 123678 - Pages: 495
Communications of the Association for Information Systems (Volume 15, 2004)713-729 713 INTRODUCING e-GOV: HISTORY, DEFINITIONS, AND ISSUES Åke Grönlund Örebro University, ake.gronlund@esi.oru.se Thomas A. Horan Claremont Graduate University, ABSTRACT The e-Gov field (also called Electronic Government, Digital Government, Electronic Governance, and similar names) emerged in the late 1990´s. Since then it spurred several scientific conferences and journals. Because the field grew considerably in
Words: 8545 - Pages: 35
Australia Australian government calls for international collaboration to cope with information perpetration and to establish constricting norms on the state use of ICT, relieving international instability and enhancing the freedom of information. Communication and cooperation among (1) Committed $125.8 million to cyber safety measures. (2) Cyber Security Strategy was ensued; (3) Completed the strategy with CERT Australia and the Cyber Security Operations Centre (CSOP). Brazil (1) ApprovedBill
Words: 4012 - Pages: 17
School of Marketing Curtin Business School Consumer Acceptance and Response to SMS Advertising Kyle Jamieson This thesis is presented for the degree of the Master’s of Philosophy of Curtin University 1 March 2012 DECLARATION To the best of my knowledge and belief this thesis contains no material previously published by any other person except where due acknowledgement has been made. This thesis contains no material which has been accepted for the award of
Words: 45852 - Pages: 184
Research Proposal Provisional title- Social media and the hidden spaces of online identity management Topic: Social Networking and Interaction This project is concerned with computer mediated communication (CMC) between individuals via the social networking platform, Facebook. Created by Mark Zuckerberg in 2004, Facebook is a social networking forum wherein individuals can share photographs, personal information, conversations and friends (Buckman, 2005). Although other online sites such as
Words: 4280 - Pages: 18
International Journal of Education and Development using Information and Communication Technology (IJEDICT), 2008, Vol. 4, Issue 1, pp. 49-65. The Internet in developing countries: a medium of economic, cultural and political domination Abdulkafi Albirini University of Illinois at Urbana-Champaign, USA ABSTRACT The last decade has witnessed an unprecedented diffusion of network technologies into developing countries. The technological discourse attending this diffusion has presented the new
Words: 9084 - Pages: 37
® Academy o/ Management Executive. 2004. Vol. 18. No. 2 Business ethics and customer stakeholders O.C. Ferrell A common view of the firm holds that employees, customers, shareholders, and suppliers are key organizational stakeholders.^ While obligations to these stakeholders are sometimes considered to be motivated by organizational self-interest, the ethical perspective asserts the rightness or wrongness of specific firm actions independently of any social or stakeholder obligations.^ Customers
Words: 2793 - Pages: 12
stemming from the work environment external to the task, usually applied by others (managers), not long lasting Content theories of motivation – WHAT motivates (Maslow’s theory, Alderfer’s ERG theory, McClelland’s theory) Process theories – focus on the underlying processes involved in motivating employees – HOW motivation occurs (Expectancy theory, equity theory, goal setting theory) Maslow’s Hierarchy of Needs Physiological Needs – food, water, warmth, rest Safety Needs – security, safety
Words: 6463 - Pages: 26