20 research outputs found

    Measuring IS User Satisfaction: Review and Implications

    Get PDF
    Demand for a means of measuring the success of information systems (IS) grew with the accelerated use of these systems. Defining success in this context is difficult. This paper reviews the literature on measuring IS user satisfaction, the most prevalent measure of IS success, and its implications. We present the problematic aspects of the IS user satisfaction tools, and discuss the need to develop up-to-date tools suitable for the sophisticated and complex systems developed today

    Identification and Authentication: Technology and Implementation Issues

    Get PDF
    Computer-based information systems in general, and Internet e-commerce and e-business systems in particular, employ many types of resources that need to be protected against access by unauthorized users. Three main components of access control are used in most information systems: identification, authentication, and authorization. In this paper we focus on authentication, which is the most problematic component. The three main approaches to user authentication are: knowledge-based, possession-based, and biometric-based. We review and compare the various authentication mechanisms of these approaches and the technology and implementation issues they involve. Our conclusion is that there is no silver bullet solution to user authentication problems. Authentication practices need improvement. Further research should lead to a better understanding of user behavior and the applied psychology aspects of computer security

    Key issues in information system management: The DoD perspective

    Get PDF
    The article of record as published may be found at https://doi.org/10.1080/0743017930840558

    A Comprehensive Methodology for Computer-Family Selection

    Get PDF
    This paper presents a selection methodology for a computer-family. The proposed methodology incorporates the Analytic Hierarchy Process in the evaluation procedure and aims at helping organizations in selecting a family of computers from a manufacturer's product line, rather than a specific computer model. The practice of computer selection and the existing solutions for a computer-family selection procedure are briefly described. Then, Saaty's Analytic Hierarchy Process is presented and incorporated into the selection methodology. The result is a structured and comprehensive methodology that allows decision makers to rank the alternatives more objectively and select a computer-family that best fits the needs of the entire organization. Illustrative examples are embedded in the text to demonstrate the application of the various steps in the proposed methodology. (kr)Research Council of the Naval Postgraduate School.http://archive.org/details/comprehensivemet00zvirO&MN, Direct FundingNAApproved for public release; distribution is unlimited

    What Can Be Learned from CMMi Failures?

    Get PDF
    The software crisis has been around since 1968 when NATO first identified the problematic nature of software development. In recognition of the need to manage the process of software development many methodologies have been proposed over the years. A recent contribution to this rich set of rigorous software development methodologies is the Software Engineering Institute\u27s (SEI) Capability Maturity Model Integration (CMMi) methodology. While the minimal previous research on CMMi has extolled it, learning how to implement CMMi successfully requires leaning also from its failures. And yet, despite apparent anecdotes, little is known on this topic possibly because of the reluctance of many companies to wash their dirty linen in public. Based on a set of in-depth interviews accompanied with survey verification, this study examines the assessed effectiveness and efficiency of CMMi as implemented in several projects in a large high tech company in which only low levels of CMMi maturity were reached. In an exploratory manner this study shows the need to differentiate between the quality of the software product developed through CMMi and the quality of the process involved. The study also shows that whether the product is an off the shelf product or a customized one has a direct bearing of the quality of the product developed under CMMi methodology and the process itself. In particular, we discuss why some projects reach only a low maturity level of CMMi even though the organization as a whole might typically reach high maturity levels

    Resume of Moshe E. Zviran, 1993-10

    Get PDF
    Naval Postgraduate School Faculty Resum

    Password Security: An Empirical Study

    Get PDF
    Organizations are more dependent than ever on the reliable operation of their information systems, which have become a key to their success and effectiveness. While the growing dependence on information systems creates an urgent need to collect information and make it accessible, the proliferation of computer technology has also spawned opportunities for ill-intentioned individuals to violate the information systems' integrity and validity. One of the most common control mechanisms for authenticating users of computerized information systems is the use of passwords. However, despite the widespread use of passwords, little attention has been given to the characteristics of their actual use. This paper addresses the gap in evaluating the characteristics of real-life passwords and presents the results of an empirical study on password usage. It investigates the core characteristics of user-generated passwords and associations among those characteristics

    A Comparison of Password Techniques for Multilevel Authentication Mechanisms

    Get PDF
    Various mechanisms for authenticating users of computer-based information systems have been proposed. These include traditional, user-selected passwords, system-generated passwords, passphrases, cognitive passwords and associative passwords. While the mechanisms employed im primary passwords are determined by the operating systems' manufacturers, system designers can select any password mechanism for secondary passwords, to further protect sensitive applications and data files. This paper reports on the results of an empirically based study of passwords characteristics. It provides a comparative evaluation on the memorability and users' subjective preferences of the various passwords mechanisms, and suggest that cognitive passwords and associative passwords seem the most appropriate for secondary passwords. Keywords: Computer security. (kr)Research Council of the Naval Postgraduate School.http://archive.org/details/comparisonofpass00zvirO&MN, Direct FundingNAApproved for public release; distribution is unlimited

    Securing PC applications: the relay race approach

    No full text

    Resume of Moshe E. Zviran, 1988-12

    Get PDF
    Naval Postgraduate School Faculty Resum
    corecore