In this paper the authors present the results of a research project that strives to fill a literature gap in IT offshore outsourcing research by analyzing clientside managerial me...
The paper proposes two automatic voltage controllers for the South Korean power system. Simulation results from detailed Korean power-flow models show that the controllers can pro...
In this paper we show how action research contributes to the design of health information systems by constructing knowledge addressing users’ concerns in a timely manner. Our ai...
This paper describes a social network site designed to support employees within an enterprise in connecting and learning about each other through personal and professional sharing...
Joan Morris DiMicco, Werner Geyer, David R. Millen...
One of the persistent topics in digital forensic research in recent years has been the problem of finding all things similar. Developed tools usually take on the form of similarit...
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
The definition of “boundary” in the context of multiorganizational information sharing and integration initiatives is developed in the paper. Both current literature and a cas...
Lei Zheng, Tung-Mou Yang, Theresa A. Pardo, Yuanfu...
The need for professionals to make informed ethical choices in design and management of information systems is more important than ever. However, the relative newness of the infor...
Recently, it appears on the agenda of many organizations the concept of IT governance in order to justify and mainly optimize IT investments. Some studies have shown that companie...