This paper develops a theoretical perspective on gender and information technology (IT) by examining socio-cultural influences on women who are members of the information technolog...
According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of cryptographic protocols, approved ...
Most published research in information systems is underpinned by a positivist or empiricist philosophy. This generally involves the collection of quantitative data and its subsequ...
A successful IT Company is characterized by its ability to put the right information in front of the right decision-makers at the right time while concerns about security issues. ...
When we model a phenomenon we apply a perspective on the phenomenon. The perspective decides which properties we include in the model. It also decides how we conceive a phenomenon ...