451,902 research outputs found

    Perceptions of gender balance of IS journal editorial positions

    Get PDF
    An analysis of 18,854 editorial positions on IS journals was undertaken to examine the perceived gender balance of those positions as an indication of their contribution towards a positive role model for females considering an IS academic career. The nature and extent of perceived gender balance is examined in terms of overall composition of editorial positions, journal prestige and the specific area within IS covered by a journal. The results indicate that perceived gender balance of editorial positions reflects that of ICT academia generally, and that female representation appears to be concentrated in journals covering areas that are traditionally seen as female occupations, e.g., health, education, librarianship. As such, little or no encouragement is given to females considering an IS academic career.<br /

    Research Agenda for Studying Open Source II: View Through the Lens of Referent Discipline Theories

    Get PDF
    In a companion paper [Niederman et al., 2006] we presented a multi-level research agenda for studying information systems using open source software. This paper examines open source in terms of MIS and referent discipline theories that are the base needed for rigorous study of the research agenda

    A Research Agenda for Studying Open Source I: A Multi-Level Framework

    Get PDF
    This paper presents a research agenda for studying information systems using open source software A multi-level research model is developed at five discrete levels of analysis: (1) the artifact; (2) the individual; (3) the team, project, and community; (4) the organization; and (5) society. Each level is discussed in terms of key issues within the level. Examples are based on prior research. In a companion paper, [Niederman, et al 2006], we view the agenda through the lens of referent discipline theories

    Control, Process Facilitation, and Requirements Change in Offshore Requirements Analysis: The Provider Perspective

    Get PDF
    Process, technology, and project factors have been increasingly driving organizations to offshore early software development phases, such as requirements analysis. This emerging trend necessitates greater control and process facilitation between client and vendor sites. The effectiveness of control and facilitation has, however, not been examined within the context of requirements analysis and change. In this study, we examine the role of control and facilitation in managing changing requirements and on success of requirements gathering in the Indian offshore software development environment. Firms found that control by client-site coordinators had a positive impact on requirements analysis success while vender site-coordinators did not have similar influence. Process facilitation by client site-coordinators affected requirements phase success indirectly through control. The study concludes with recommendations for research and practice

    Password Cracking and Countermeasures in Computer Security: A Survey

    Full text link
    With the rapid development of internet technologies, social networks, and other related areas, user authentication becomes more and more important to protect the data of the users. Password authentication is one of the widely used methods to achieve authentication for legal users and defense against intruders. There have been many password cracking methods developed during the past years, and people have been designing the countermeasures against password cracking all the time. However, we find that the survey work on the password cracking research has not been done very much. This paper is mainly to give a brief review of the password cracking methods, import technologies of password cracking, and the countermeasures against password cracking that are usually designed at two stages including the password design stage (e.g. user education, dynamic password, use of tokens, computer generations) and after the design (e.g. reactive password checking, proactive password checking, password encryption, access control). The main objective of this work is offering the abecedarian IT security professionals and the common audiences with some knowledge about the computer security and password cracking, and promoting the development of this area.Comment: add copyright to the tables to the original authors, add acknowledgement to helpe

    Aerospace bibliography, fifth edition

    Get PDF
    Bibliography of references, periodicals, and educational materials related to space fligh
    • …
    corecore