This paper describes a social network site designed to support employees within an enterprise in connecting and learning about each other through personal and professional sharing...
Joan Morris DiMicco, Werner Geyer, David R. Millen...
One of the persistent topics in digital forensic research in recent years has been the problem of finding all things similar. Developed tools usually take on the form of similarit...
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
The definition of “boundary” in the context of multiorganizational information sharing and integration initiatives is developed in the paper. Both current literature and a cas...
Lei Zheng, Tung-Mou Yang, Theresa A. Pardo, Yuanfu...
The need for professionals to make informed ethical choices in design and management of information systems is more important than ever. However, the relative newness of the infor...
Recently, it appears on the agenda of many organizations the concept of IT governance in order to justify and mainly optimize IT investments. Some studies have shown that companie...
Three training modules were designed to decrease ingroup dynamics in Partially Distributed Teams, which have two or more geographically separated subteams. The action research ori...
Rosalie J. Ocker, Dana Kracaw, Starr Roxanne Hiltz...
The challenges driven by multi-culture, multidiscipline stakeholders collaborating in a rapidly changing global environment necessitates an easily approachable mechanism for negot...
Di Wu, Da Yang, Supannika Koolmanojwong, Barry W. ...
A new form of computer mediated communication that promises to revolutionize the way organizations communicate is internal corporate blogs. However, the academic literature on thi...