This site uses cookies to deliver our services and to ensure you get the best experience. By continuing to use this site, you consent to our use of cookies and acknowledge that you have read and understand our Privacy Policy, Cookie Policy, and Terms
Information Technology system administrators (sysadmins) perform the crucial and never-ending work of maintaining the technical infrastructure on which our society depends. Comput...
Growth, adaptability, innovation, and cost control are leading concerns of businesses, especially with respect to use of information technology (IT). Though standards such as the ...
John H. Bailey, Eser Kandogan, Eben M. Haber, Paul...
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
We are investigating how to empower nonprofit community organizations to develop the information technology management practices required to carry out their civic goals. We highli...
Cecelia Merkel, Umer Farooq, Lu Xiao, Craig H. Gan...
poster we present several methods for abstracting data into information and then integrating and organizing it for the purpose of display. We use an example from analysis of pilot...
Network-centricity is a concept under consideration as a useful paradigm for complex organizational operations, combining the strengths of bureaucracy with the innovative possibil...
This paper presents an innovative approach to solve the problem of missing transparency of competencies within virtual organizations. We based our work on empirical studies to cop...