Search results

1 – 5 of 5
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 1 February 1993

Michel Plaisent and Prosper M. Bernard

Examines the efficiency of electronic mail and its effectiveness inaiding decision making. Highlights its main functions and typical usageand also its advantages to the executive…

152

Abstract

Examines the efficiency of electronic mail and its effectiveness in aiding decision making. Highlights its main functions and typical usage and also its advantages to the executive. Concludes that electronic mail does increase efficiency in the decision‐making process and is not a fad since executives prefer it to other media.

Details

European Business Review, vol. 93 no. 2
Type: Research Article
ISSN: 0955-534X

Keywords

Access Restricted. View access options
Article
Publication date: 1 December 2005

Kyle Kucera, Michel Plaisent, Prosper Bernard and Lassana Maguiraga

Spyware is a controversial software technology that allows the surreptitious collection of personal information from computers linked to the internet. The purpose of this study…

836

Abstract

Purpose

Spyware is a controversial software technology that allows the surreptitious collection of personal information from computers linked to the internet. The purpose of this study was to determine the prevalence of spyware in internet shareware and freeware and to investigate the personal information collected.

Design/methodology/approach

The methodology was a two‐phase, multi‐case study. The first phase determined that five of the 50 most popular pieces of Windows®‐based freeware and shareware available to internet users from CNETDownload.com were suspected of containing spyware: these were included as data sources for phase two. The purpose of phase two was to confirm the existence of spyware and to identify the types and frequencies of any personal data transmissions. For this phase, data were collected and analyzed utilizing a passive network monitor program to examine packets of data transmitted from a personal computer to external destinations on the internet.

Findings

The findings confirmed the existence and use of spyware in three of five suspected cases. However, the data indicated that there was a low occurrence of spyware and that these programs have the capability to collect numerous types of personal data. The main limitation is that these results are based on a snapshot of data obtained during five days.

Practical implications

The study has practical implications for internet users, who should be aware that spyware exists and understand its potential threat. Spyware developers should provide the user with an effective removal tool. Finally, marketers are cautioned that spyware might alienate customers.

Originality/value

This paper confirms the potential for misuse of these programs.

Details

Journal of Enterprise Information Management, vol. 18 no. 6
Type: Research Article
ISSN: 1741-0398

Keywords

Access Restricted. View access options
Article
Publication date: 1 May 2005

Leafy Tu, Michel Plaisent, Prosper Bernard and Lassana Maguiraga

The study aims to examine the age differences of job satisfaction between Taiwanese and Chinese higher education faculty.

2714

Abstract

Purpose

The study aims to examine the age differences of job satisfaction between Taiwanese and Chinese higher education faculty.

Design/methodology/approach

The data on job satisfaction were obtained from 194 Taiwanese faculty and 211 Chinese faculty at college levels in one city.

Findings

No statistically significant differences were found for full‐time Taiwanese and Chinese faculty in the overall job satisfaction of age at higher education after educational reforms, but differences exist between countries.

Originality/value

This article applies to strategies on job satisfaction for the current Taiwanese and Chinese faculty at colleges.

Details

International Journal of Educational Management, vol. 19 no. 3
Type: Research Article
ISSN: 0951-354X

Keywords

Available. Content available
Article
Publication date: 2 September 2014

52

Abstract

Details

Journal of Management Development, vol. 33 no. 8/9
Type: Research Article
ISSN: 0262-1711

Access Restricted. View access options
Article
Publication date: 31 July 2007

Marie Bia and Michel Kalika

Following the example of Anglo‐Saxon companies, French companies are increasingly establishing codes of conduct specific to the use of information and communication technologies…

2437

Abstract

Purpose

Following the example of Anglo‐Saxon companies, French companies are increasingly establishing codes of conduct specific to the use of information and communication technologies (ICT). A review of literature reveals that such codes have multiple goals, such as improving efficiency of use, IS security awareness, and ethics. This paper aims to identify organizational factors influencing the adoption and diffusion of a formal code of conduct.

Design/methodology/approach

A survey was administered to 505 companies. In order to highlight the emerging nature of this practice, the study was conducted in similar conditions for two consecutive years (2002 and 2003).

Findings

Results indicate that though still marginal, the adoption of ICT codes of conduct concerns an increasing number of companies. This practice is related to the degree of standardization, technological context (the degree of virtualization and the strategic importance placed on ICT by the management) and size of the organization. However, the adoption of ICT codes of conduct is not associated with specific industry sectors and nationalities.

Research limitations/implications

The study was conducted in France and a generalization of the results to other countries may be questionable.

Originality/value

The paper deals with a topic that has received little attention to date. The contribution of this paper is two‐fold: a previously unperformed review of research involving ICT codes of conduct, and empirical results describing the organizational factors of an ICT code of conduct diffusion. It allows a better understanding of this emerging IS management practice.

Details

Journal of Enterprise Information Management, vol. 20 no. 4
Type: Research Article
ISSN: 1741-0398

Keywords

1 – 5 of 5
Per page
102050