NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Washington, Mark Allen – ProQuest LLC, 2023
The need to protect confidential data stored in university enterprise information systems and to prevent infiltration through phishing cyber attacks by malicious individuals and organizations has emerged. The unfortunate target of phishing attacks is university employees and students with access to confidential information. This research specifies…
Descriptors: Systems Approach, Information Security, Computer Security, Confidentiality
DeShield, Leslie A. – ProQuest LLC, 2017
Research conducted by Tech Pro (2014) indicated that the Bring Your Own Device (BYOD) concept is gaining momentum with 74% of organizations already having some BYOD program or planning to implement one. While BYOD offers several benefits, it also presents challenges that concern information technology leaders and information security managers.…
Descriptors: Program Implementation, Technology Uses in Education, Handheld Devices, Telecommunications
Tomasino, Arthur P. – ProQuest LLC, 2013
In spite of the best efforts of researchers and practitioners, Information Systems (IS) developers are having problems "getting it right". IS developments are challenged by the emergence of unanticipated IS characteristics undermining managers ability to predict and manage IS change. Because IS are complex, development formulas, best…
Descriptors: Information Systems, Systems Development, Systems Approach, Models
Hwang, Woosang – ProQuest LLC, 2011
In a constantly changing global business environment, firms have no other choice but to continually expand their capabilities and sharpen their competitive edge. Toward this goal, an increasing number of organizations are turning to Enterprise Resource Planning (ERP) systems. An ERP system utilizes various kinds of information processing…
Descriptors: Foreign Countries, Organizational Effectiveness, Business Administration, Information Processing