To ensure that safeguards are implemented to protect against a majority of known threats, industry leaders are requiring information processing systems to comply with security stan...
Computer security has traditionally been assessed from a technical point of view. Another way to assess it is by investigating the role played by legitimate users of systems in imp...
In these years, the security problem becomes more important to everyone using computers. However, vulnerabilities on computers are found so frequently that system managers can not...
Rapid system understanding is required in the planning, feasibility assessment and cost estimating phases of a system renovation project. In this paper, we apply a number of analy...
IT value remains a serious concern of management today, especially how it should be measured and how it is created. Although we have made significant progress at the firm and aggre...
Prabu Davamanirajan, Robert J. Kauffman, Charles H...