Academy of Information and Management Sciences Journal

Articles from Vol. 12, No. 1/2, 2009

Functional Requirements for Secure Code: The Reference Monitor and Use Case
ABSTRACTInformation assurance, data security, and corresponding issues are traditionally presented in Systems Analysis and Design textbooks as non-functional requirements. Systems analysts can enforce secure design and code as one of the essential goals...
Information Systems Security and Safety Measures: The Dichotomy between Students' Familiarity and Practice
ABSTRACTInformation systems security and safety measures (ISSSM) are attributes that, if properly implemented, contribute to the safety of computer systems, networks and information. This proper implementation will prohibit or delay viruses, malware...
Instant Messenger Communication in a Multinational Corporation
ABSTRACTThis research investigates contemporary business communication practices regarding instant messaging. The research will explore the strengths, weaknesses and best management practices of instant messaging in a small multinational company in the...
It Workers on Outsourcing: What about Me? What about the Profession?
ABSTRACTTo date, there have been numerous studies examining the impact of outsourcing on the IT function within and across organizations. Practitioners and researchers have focused tremendous efforts on understanding how to enter into and maintain relationships...
Semi-Automated Identification of Faceted Categories from Large Corpora
ABSTRACTSeveral studies, suggest that interfaces that present results organized into categories or faceted hierarchies meaningful to users may help them make sense of their information problem as well as the information system itself.This paper describes...
The Impact of Stopping Rules on Hierarchical Capacitated Clustering in Location Routing Problems
ABSTRACTThe objective of the multiple depot location routing problems (MDLRP) is to minimize warehousing and transportation costs by selecting warehouses out of a set of possible warehouses and to assign customers to routes serviced from these warehouses....
The Machinist's Sequencing Dilemma
ABSTRACTWe examine a single machine sequencing problem of n-jobs which are applied to a single product. While each job adds value to the product, the accumulated product value is always at risk due to a given chance that the next job will fail. Once...
Understanding the Lack of Minority Representation in Graduate Programs in Computer Science and Information Technology: A Focus Group Study of Student Perceptions
ABSTRACTThis paper is an effort to delineate factors impacting lack of representation of minority students at the graduate level education in information technology fields: computer science and computer information systems. The research was conducted...
Author Advanced search

Oops!

An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.