Threats to Information Systems: Today's Reality, Yesterday's Understanding
- K. LochH. H. CarrMerrill Warkentin
- 1 June 1992
Computer Science
MIS Q.
A study investigating MIS executives' concern about a variety of threats found computer viruses to be a particular concern, highlighting a gap between the use of modern technology and the understanding of the security implications inherent in its use.
Risk Analysis for Information Technology
- R. RainerC. SnyderH. H. Carr
- 1 June 1991
Computer Science, Business
A risk analysis process that employs a combination of qualitative and quantitative methodologies is proposed that should provide managers with a better approximation of their organization's overall information technology risk posture.
An Investigation of the Effects of Age, Size, and Hardware Option on the Critical Success Factors Applicable to Information Centers
- Simha R. MagalH. H. Carr
- 1 April 1988
Business, Computer Science
The effect on the composite CSFS of the age, size, and hardware option supported of the critical success factor for information centers is reported.
Are information centers responsive to end user needs?
- R. RainerH. H. Carr
- 1 February 1992
Business, Computer Science
Implementing a Corporatewide Information Strategy Through CASE
- M. L. GibsonC. SnyderH. H. Carr
- 1990
Computer Science, Business
A detailed definition of CASE is provided, a distinction between CASE and integrated CASE (ICASE) is distinguished, and several strategies for ICASE implementation are provided.
Information Centers: The IBM Model vs. Practice
- H. H. Carr
- 1 September 1987
Business, Computer Science
MIS Q.
This research studied the way 20 firms in the Dallas-Fort Worth, Texas, area operationalized the information center concept, comparing their information centers with the IBM/Hammond model.
The OSI Model and the Seven Chakras of Hinduism: A Comparative Analysis
- Hudson AtwellD. McManusH. H. Carr
- 2013
Computer Science
The Open Systems Interconnection (OSI) Model and the Seven Chakras of Hinduism are both models that describe an intelligent networking system and their individual segments show similar characteristics when compared.
To the Editors of Information Systems Management
- Paramjit S. KahaiH. H. CarrC. Snyder
- 1 March 2006
Computer Science
Security Threats: Auditors and Technology
- H. H. CarrD. McManusNicole Gué
- 2013
Computer Science, Business
This work will discuss how companies can effectively manage this process while minimizing risk to the organization’s valuable information.
Designing an assistant export expert information system (EXIS) for an international manager
- A. KefalasH. H. Carr
- 1988
Business, Computer Science
Proceedings of the Twenty-First Annual Hawaii…
The EXIS export information expert system that facilitates the use of the UN's COMTRADE export-import database is described. It is based on the assumptions that business needs for international trade…
...
...