Table of contents
Escalation and premature termination in MIS projects: the role of real options
Dmitriy V. Chulkov, Mayur S. DesaiThe purpose of this paper is to examine how the real option theory is applicable to evaluation of cases of escalation and premature termination of Management Information Systems…
Managed IT services: the role of IT standards
Narayanan KumbakaraThe purpose of this paper is to explore the practical issues regarding standards and the management of IT services delivered by external or outsourced service providers called…
A cross‐cultural investigation of situational information security awareness programs
Charlie C. Chen, B. Dawn Medlin, R.S. ShawThe aim of this research is to make users aware of the importance surrounding the issue of security and security awareness while at the same time making educators as well as other…
Implementation and effectiveness of organizational information security measures
Janne Merete Hagen, Eirik Albrechtsen, Jan HovdenThe purpose of this paper is to study the implementation of organizational information security measures and assess the effectiveness of such measures.
Securing SCADA systems
Sandip C. Patel, Pritimoy SanyalSupervisory control and data acquisition (SCADA) systems are widely used by utility companies during the production and distribution of oil, gas, chemicals, electric power, and…
Biometrics in banking security: a case study
Sitalakshmi Venkatraman, Indika DelpachitraTo identify and discuss the issues and success factors surrounding biometrics, especially in the context of user authentication and controls in the banking sector, using a case…