-------- Original-Nachricht -------- Betreff: [isworld] Journal of Organizational and End User Computing. 21,2, 2008 Abstracts Datum: Fri, 13 Mar 2009 16:51:17 -0600 Von: Mahmood, M. Adam mmahmood@utep.edu Antwort an: Mahmood, M. Adam mmahmood@utep.edu An: AISWORLD Information Systems World Network isworld@lyris.isworld.org
The contents of the latest issue of: Journal of Organizational and End User Computing (JOEUC) Official Publication of the Information Resources Management Association Volume 21, Issue 2, April-June 2009 Published: Quarterly in Print and Electronically ISSN: 1546-2234 EISSN: 1546-5012 Published by IGI Publishing, Hershey-New York, USA www.igi-global.com/joeuc
Editor-in-Chief: M. Adam Mahmood, University of Texas at El Paso, USA
EDITORIAL NOTE
An extended version of the abstracts for the latest JOEUC issue is provided below for your information and perusal. If you would like to submit a manuscript to JOEUC for publication consideration, please consult the manuscript submission guidelines provided at http://www.igi-pub.com/. After reviewing the guidelines, please send an electronic version of your manuscript to us.
PAPER ONE:
Using Metaphors for Making Sense of End-User Attitudes and Behavior during Information Systems Development
Zahid Hussain, University of Bradford, UK Khalid Hafeez, The University of York, UK
This article describes the use of Morgan's (1997) metaphors for making sense of end-user attitudes and behavior in an information systems development project, in a UK National Health Service hospital. The authors employ a case study approach, which they elicit the attitudes using a questionnaire and infer the behavior using observations and interviews. This article presents the results in the form of a journey, tracking the metaphorical shift for each end-user, over the project duration. The authors show how individual journeys can be combined to capture organizations' shift in metaphorical position.
To obtain a copy of the entire article, click on the link below. http://www.infosci-on-demand.com/content/details.asp?ID=30858
PAPER TWO:
End User Authentication (EUA) Model and Password for Security
George S. Oreku, Harbin Institute of Technology, China Jianzhong Li, Harbin Institute of Technology and Heilongjiang University, China
Authentication is one among a set of services that constitute a security subsystem in a modern computing or communications infrastructure. This article proposes an end user authentication flexibility model that allows the user to have multiple authentications with varying levels of guarantee and for suppliers to request and rely on mechanisms appropriate to the service requested. The authors describe the ticket used by clients, servers, models, and algorithms to achieve authentication toward the prevention of unauthorized access to in sourced data on applications level. A simple three level ticket request model solution in an open distributed environment is proposed, and the authors develop an analytical password for the proposed mechanism and validate this approach through experiment. Furthermore, the authors explore the approach to end user authentication and demonstrate the conception of a textual password and analyze the deffie-hellman exchange weakness. The authors base their approach on the use of the kerberos authentication technique and the diffie-hellman key exchange.
To obtain a copy of the entire article, click on the link below. http://www.infosci-on-demand.com/content/details.asp?ID=30859
PAPER THREE:
A Model of the Relationship among Consumer Trust, Web Design and User Attributes
Xiaoni Zhang, Northern Kentucky University, USA Victor R. Prybutok, University of North Texas, USA Sherry Ryan, University of North Texas, USA Robert Pavur, University of North Texas, USA
Conducting business on the Web is relatively new compared to traditional business, and many of the factors related to consumer trust related to the Web remain unexplored. To increase our understanding about trust building on the internet, this article studies trust with a focus on its relationship to Web design characteristics, specifically perceived quality of presentation, perceived ease of navigation, and several user attributes. A research model is proposed that builds upon prior research on trust, and a survey is developed based on the constructs and relationships in the model. This article provides theoretical and practical implications.
To obtain a copy of the entire article, click on the link below. http://www.infosci-on-demand.com/content/details.asp?ID=30860
PAPER FOUR:
Capturing and Comprehending the Behavioral/Dynamical Interactions within an ERP Implementation
James R. Burns, Texas Tech University, USA Don G. Jung, MyongJi University, Korea James J. Hoffman, Texas Tech University, USA
The behavioral and dynamic implications of an ERP deployment are, to say the least, not well understood. Getting the switches set to enable the ERP software to go live is tedious, but the difficult part is understanding the dynamic interactions that accrue as a consequence. Connectionist and causal models are proposed in this article to facilitate an understanding of the dynamics and to enable control of the information-enhanced processes to take place. The connectionist model facilitates the understanding of the dynamic behavioral implications of the larger ERP implementation installation. The underlying connectionist model observes and detects information transfers and workflow. Once maps of the total infrastructure are determined by the models, an analyst suggests improvements. The models then become decision support aids for process analysts in situations where ideal process flows/information transfers are sought.
To obtain a copy of the entire article, click on the link below. http://www.infosci-on-demand.com/content/details.asp?ID=30861
Sincerely,
M. Adam Mahmood
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann@wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.