Academy of Information and Management Sciences Journal

Articles from Vol. 12, No. 1-2, January-July

Functional Requirements for Secure Code: The Reference Monitor and Use Case
INTRODUCTION Failure to incorporate security into systems requirements is a concern dating back at least a quarter of a century (Schell, Downey & Popek, 1973, Pipkin, 2000). Compounding this oversight is the lack of attention paid to security...
Information Systems Security and Safety Measures: The Dichotomy between Students' Familiarity and Practice
INTRODUCTION One burning issue concerning information security and safety in contemporary digital computing is how university students' computing behaviors enhance or depreciate the safety and security of information in their domain. The overwhelming...
Instant Messenger Communication in a Multinational Corporation
INTRODUCTION In the 1990's software developers released a communication tool called instant messaging. This new communication method allowed users to communicate through a common instant messaging program. America Online was the first company to...
It Workers on Outsourcing: What about Me? What about the Profession?
INTRODUCTION IT outsourcing is not by any means a new phenomenon. Outsourcing of IT functions can be traced back to the early 1960's when EDS took over the data processing functions of two large companies: Frito-Lay and Blue Cross (Lacity &...
Semi-Automated Identification of Faceted Categories from Large Corpora
INTRODUCTION This paper describes FFID (Fast Facet Identifier), a system that can be used to compute facets from a corpus of documents. FFID uses a fast simplified clustering algorithm that allows the identification of hundreds of facet clusters...
The Impact of Stopping Rules on Hierarchical Capacitated Clustering in Location Routing Problems
INTRODUCTION The objective of clustering in a location routing setting is to identify the underlying structure (i.e., distribution of customers over the area). Mojena (1977) provides evidence that hierarchical clustering has been used successfully...
The Machinist's Sequencing Dilemma
INTRODUCTION A highly qualified machinist complained to one of the authors of this paper that his job was intolerably stressful. He routinely performed a difficult machining procedure at the end of a sequence of other machining processes on a particular...
Understanding the Lack of Minority Representation in Graduate Programs in Computer Science and Information Technology: A Focus Group Study of Student Perceptions
INTRODUCTION AND LITERATURE REVIEW There is a growing concern over the under representation of women and minorities in the natural sciences and engineering fields, including computer science. There is a large body of research material which documents...