73,449 research outputs found
Profiling research published in the journal of enterprise information management (JEIM)
Purpose – The purpose of this paper is to analyse research published in the Journal of Enterprise Information Management (JEIM) in the last ten years (1999 to 2008).
Design/methodology/approach – Employing a profiling approach, the analysis of the 381 JEIM publications includes examining variables such as the most active authors, geographic diversity, authors' backgrounds, co-author analysis, research methods and keyword analysis.
Findings – All the finding are in relation to the period of analysis (1999 to 2008). (a) Research categorised under descriptive, theoretical and conceptual methods is the most dominant research approach followed by JEIM authors. This is followed by case study research. (b) The largest proportion of contributions came from researchers and practitioners with an information systems background, followed by those with a background in business and computer science and IT. (c) The keyword analysis suggests that ‘information systems’, ‘electronic commerce’, ‘internet’, ‘logistics’, ‘supply chain management’, ‘decision making’, ‘small to medium-sized enterprises’, ‘information management’, ‘outsourcing’, and ‘modelling’ were the most frequently investigated keywords. (d) The paper presents and discusses the findings obtained from the citation analysis that determines the impact of the research published in the JEIM.
Originality/value – The primary value of this paper lies in extending the understanding of the evolution and patterns of IS research. This has been achieved by analysing and synthesising existing JEIM publications
Recommended from our members
Integrity protection for code-on-demand mobile agents in e-commerce
The mobile agent paradigm has been proposed as a promising solution to facilitate distributed computing over open and heterogeneous networks. Mobility, autonomy, and intelligence are identified as key features of mobile agent systems and enabling characteristics for the next-generation smart electronic commerce on the Internet. However, security-related issues, especially integrity protection in mobile agent technology, still hinder the widespread use of software agents: from the agent’s perspective, mobile agent integrity should be protected against attacks from malicious hosts and other agents. In this paper, we present Code-on-Demand(CoD) mobile agents and a corresponding agent integrity protection scheme. Compared to the traditional assumption that mobile agents consist of invariant code parts, we propose the use of dynamically upgradeable agent code, in which new agent function modules can be added and redundant ones can be deleted at runtime. This approach will reduce the weight of agent programs, equip mobile agents with more flexibility, enhance code privacy and help the recoverability of agents after attack. In order to meet the security challenges for agent integrity protection, we propose agent code change authorization protocols and a double integrity verification scheme. Finally, we discuss the Java implementation of CoD mobile agents and integrity protection
Factors Affecting U.S. Trade and Shipments of Information Technology Products: Computer Equipment, Telecommunications Equipment, and Semiconductors
Despite a recent downturn, the information technology (IT) products sector experienced a tremendous expansion in trade and shipments during the last decade and became an increasingly important component of the U.S. economy. This expansion was driven by a variety of factors such as the globalization of IT production, constant technological innovation, rapid growth in worldwide consumption, and global trade liberalization. This working paper will examine these factors, providing particular attention to the computer equipment, telecommunications equipment, and semiconductor industries.International Development,
Channels of published research communication used by Malaysian authors in computer science and information technology
Analyse 389 records retrieved from Inspec (1990-1999), Compendex (1987-1999) and IEL (IEE/IEEE Electronic library)(1987-1999). The records comprised 159 journal articles, 229 conference papers and 1 monograph chapter. The subject coverage was computer science and information technology. The yearly output of Malaysian publications indicated a gentle upward trend. The highest contributions was 87 published in 1997. The channels used to publish differ slightly from the norm for scientists. Conference papers were preferred to journal articles. The spread of conference papers used to publish indicate three zonal distributions; the nucleus, moderate and low productivity in the ratio of 19 : 41 : 88, leading to a clustering index of 2.15. This shows that Malaysian conference contributions were concentrated in a few proceedings. No clear core journals can be identified for the journal articles and contributions were distributed in a wide variety of journal titles. Malaysian Journal of Computer Science published the highest number of journal articles. More than 83 of the articles were published in journals from the UK, USA, the Netherlands and Malaysia
Managing global expansion of media products and brands: A case study of FHM
By focusing on the case study of For Him Magazine (FHM)—a magazine that currently sells in 30 editions across 5 continents—this article explores the economics and main managerial challenges associated with global expansion of media products. The success of FHM demonstrates that, to calculate the full returns available from the brand image created by a magazine title, publishers will take into account not only opportunities for domestic and international exploitation of the magazine, but also the potential to extend the brand across additional media platforms and additional complementary product markets. This study focuses on how global expansion of FHM has been managed
- …