This study presents an IT assessment tool that aims at capturing the level of IT sophistication in hospitals. In order to develop a measure that reflects IT capacities in hospital...
The use of formal methods has long been advocated in the development of secure systems. Yet, methods for deriving design from requirements that guarantee retention of the intended...
Riham Hassan, Shawn A. Bohner, Sherif El-Kassas, M...
Within the information systems discipline, three streams have emerged that address the issue of information technology adoption, diffusion and use. The first examines the factors ...
Stacie N. Nwabueze, Peter Meso, Victor Wacham A. M...
In this paper the authors present the results of a research project that strives to fill a literature gap in IT offshore outsourcing research by analyzing clientside managerial me...
The paper proposes two automatic voltage controllers for the South Korean power system. Simulation results from detailed Korean power-flow models show that the controllers can pro...
In this paper we show how action research contributes to the design of health information systems by constructing knowledge addressing users’ concerns in a timely manner. Our ai...
This paper describes a social network site designed to support employees within an enterprise in connecting and learning about each other through personal and professional sharing...
Joan Morris DiMicco, Werner Geyer, David R. Millen...
One of the persistent topics in digital forensic research in recent years has been the problem of finding all things similar. Developed tools usually take on the form of similarit...
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...