[AISWorld] Journal of Organizational and End User Computing - Volume 25 Issue 3

Tanya McGill T.Mcgill at murdoch.edu.au
Sat Sep 14 05:36:25 EDT 2013


The contents of the latest issue of:

Journal of Organizational and End User Computing (JOEUC)

Official Publication of the Information Resources Management Association

Volume 25, Issue 3, July - September 2013

Published: Quarterly in Print and Electronically

ISSN: 1546-2234 EISSN: 1546-5012

Published by IGI Publishing, Hershey, Pennsylvania, USA

www.igi-global.com/joeuc<http://www.igi-global.com/joeuc>



Editor of special issue: Raymond Panko (University of Hawaii, Honolulu, HI, USA)

Editor-in-Chief: Tanya McGill<http://www.igi-global.com/affiliate/tanya-mcgill/500/> (Murdoch University, Australia)





PAPER ONE



End User Computing: The Dark Matter (and Dark Energy) of Corporate IT



Raymond R. Panko (Shidler College of Business Administration, University of Hawaii, Honolulu, HI, USA) and Daniel N. Port (Department of Information Technology Management, University of Hawaii, Honolulu, HI, USA)



End user computing (EUC) is like dark matter in physics. EUC is enormous in quantity and importance yet has been largely invisible to corporate IT departments, information systems (IS) researchers, and corporate management. EUC applications, especially spreadsheet applications, are also "dark" in the sense that they pose a number of overlooked risks for organizations, including errors, privacy violations, trade secret extrusions, and compliance violations. On the positive side, EUC applications are also like the dark energy of physics. They are supporting critical gains in decision making, computing by scientists and engineers, operational systems, and other important processes in every corner of the firm. It is time to stop ignoring end user computing in general and spreadsheets in particular. The purpose of this paper is to document to the extent possible today then importance of end user computing relative to the concerns of corporate IT departments and IS researchers.





To obtain a copy of the entire article, click on the link below.

http://www.igi-global.com/article/end-user-computing/81295



To view a sample PDF of this article, click on the link below.

http://www.igi-global.com/viewtitlesample.aspx?id=81295





PAPER TWO



The Misuse of Spreadsheets in the Nuclear Fuel Industry: The Falsification of Safety Critical Data Using Spreadsheets at British Nuclear Fuels Limited (BNFL)



Simon Thorne (Cardiff Metropolitan University, Cardiff, Wales, UK)



This paper considers the management, technological and human factor issues that led to the BNFL fuel rod spreadsheet data falsification incident in 1999. BNFL discovered in 1999 that some data supporting quality assurance and safety processes had been falsified by BNFL workers using spreadsheets. The implication of this finding was that some of the Mixed Oxide Fuel Pellets shipped to customers in Japan for use in nuclear reactors were of an unknown mass and quality. This meant that the use of the MOX pellets fuel produced by BNFL would introduce uncontrolled factors into the safe operation of nuclear reactors. This paper will examine the production of MOX pellets at the Sellafield site, the falsification of data and the report commissioned by HM Nuclear Inspectorate. The paper will then identify a number of managerial and technological failings that led BNFL to use spreadsheets for recording such data. Finally the paper analyses other cases of spreadsheet fraud and explores some strategies for reducing the likelihood and impact of spreadsheet errors and fraud.





To obtain a copy of the entire article, click on the link below.

http://www.igi-global.com/article/the-misuse-of-spreadsheets-in-the-nuclear-fuel-industry/81296



To view a sample PDF of this article, click on the link below.

http://www.igi-global.com/viewtitlesample.aspx?id=81296





PAPER THREE


A Composite Framework for Behavioral Compliance with Information Security Policies



Salvatore Aurigemma (Communication and Information Sciences (CIS) PhD Program, University of Hawaii at Manoa, Honolulu, HI, USA)



To combat potential security threats, organizations rely upon information security policies to guide employee actions. Unfortunately, employee violations of such policies are common and costly enough that users are often considered the weakest link in information security. This paper presents a composite theoretical framework for understanding employee behavioral compliance with organizational information security policies. Building off of the theory of planned behavior, a composite model is presented that incorporates the strengths of previous studies while minimizing theoretical gaps present in other behavioral compliance models. In building the framework, related operational constructs are examined and normalized to allow better comparison of past studies and help focus future research efforts.





To obtain a copy of the entire article, click on the link below.

http://www.igi-global.com/article/a-composite-framework-for-behavioral-compliance-with-information-security-policies/81297



To view a sample PDF of this article, click on the link below.

http://www.igi-global.com/viewtitlesample.aspx?id=81297





PAPER FOUR


Simplicity is Bliss: Controlling Extraneous Cognitive Load in Online Security Training to Promote Secure Behavior



Jeffrey L. Jenkins (Marriott School of Management, Brigham Young University, Provo, UT, USA), Alexandra Durcikova (Price College of Business, The University of Oklahoma, Norman, OK, USA) and Mary B. Burns (Jake Jabs College of Business & Entrepreneurship, Montana State University, Bozeman, MT, USA)



User-initiated security breaches are common and can be very costly to organizations. Information security training can be used as an effective tool to improve users' secure behavior and thus alleviate security breaches. Via the lens of learning, working memory, and cognitive load theories, this research examines how to improve the effectiveness of security training through decreasing extraneous stimuli in the presentation of online security training. The authors conducted a realistic laboratory experiment to examine the influence of training with different levels of extraneous stimuli on secure behavior. They found that training presented with low levels of extraneous stimuli improved secure behavior more than training presented with high levels. The results question the effectiveness of elaborate training programs, and rather suggest that simple, direct training modules are most effective.





To obtain a copy of the entire article, click on the link below.

http://www.igi-global.com/article/simplicity-is-bliss/81298



To view a sample PDF of this article, click on the link below.

http://www.igi-global.com/viewtitlesample.aspx?id=81298





PAPER FIVE


Involving End Users to Mitigate Risk in IS Development Projects



Chintan Amrit (Department of Industrial Engineering and Business Information Systems, School of Management and Governance, University of Twente, Enschede, The Netherlands), Jos van Hillegersberg (Department of Industrial Engineering and Business Information Systems, School of Management and Governance, University of Twente, Enschede, The Netherlands) and Bart van Diest (First Consulting B.V., Enschede, The Netherlands)



In this paper the authors aim to gain insight into the relationship between user participation modes and project risk factors, and then they constructed a model that can be used to determine how user participation can be successfully applied in ISD projects with a given set of risk factors. The authors performed an in-depth literature review, which aims to clarify the concept of user participation as part of risk management. They then report on the results of a case study in Cap Gemini where we conduct an exploratory research of the application of user participation in practice. For this exploratory research, a quantitative and qualitative research method was designed in the form of a survey and interviews. Through the results from their case study, the authors gained insight into the relationship between user participation and IS project risk and also determine how user participation can be used to mitigate such risk.





To obtain a copy of the entire article, click on the link below.

http://www.igi-global.com/article/involving-end-users-to-mitigate-risk-in-is-development-projects/81299



To view a sample PDF of this article, click on the link below.

http://www.igi-global.com/viewtitlesample.aspx?id=81299



*****************************************************

For full copies of the above articles, check for this issue of the Journal of Organizational and End User Computing (JOEUC) in your institution's library. This journal is also included in the IGI Global aggregated "InfoSci-Journals" database: http://www.igi-global.com/EResources/InfoSciJournals.aspx.



*****************************************************



Coverage

Topics should be drawn from, but not limited to, the following areas, with major emphasis on how to increase organizational and end user productivity and performance, and how to achieve organizational strategic and competitive advantage:


*         OEUC controls for security and privacy

*         OEUC affects of organizational strategic and competitive advantage

*         OEUC hardware and software

*         OEUC in various management functions

*         OEUC management

*         OEUC privacy, security, and copyright issues

*         OEUC productivity and performance

*         OEUC relation to information resources management

*         OEUC risk factors

*         OEUC satisfaction

*         OEUC success factors

*         OEUC support and training

*         OEUC usage

*         Using and managing emerging OEUC technologies



IGI Global is pleased to offer a special Multi-Year Subscription Loyalty Program. In this program, customers who subscribe to one or more journals for a minimum of two years will qualify for secure subscription pricing. IGI Global pledges to cap their annual price increase at 5%, which guarantees that the subscription rates for these customers will not increase by more than 5% annually.



Submission

Prospective authors should note that only original and previously unpublished articles will be considered. Interested authors must consult the journal's guidelines for manuscript submissions at http://www.igi-global.com/development/author_info/guide.asp prior to submission. All article submissions will be forwarded to at least 3 members of the Editorial Review Board of the journal for double-blind, peer review. Final decision regarding acceptance/revision/rejection will be based on the reviews received from the reviewers. All submissions must be forwarded electronically.



Subscribe to the RSS feed of this issue.

http://www.igi-global.com/rss/currentissue/feed.aspx?titleid=1071



Subscribe to the RSS feed of the entire journal.

http://www.igi-global.com/rss/journals/feed.aspx?titleid=1071



All submissions and inquiries should be directed to the attention of:


Editor-in-Chief:  Tanya McGill at t.mcgill at murdoch.edu.au<mailto:t.mcgill at murdoch.edu.au>
-----------------------------------------------------------------
Associate Professor Tanya McGill
Editor-in-Chief, Journal of Organizational and End User Computing
School of Engineering and Information Technology
Murdoch University
Murdoch WA 6150 AUSTRALIA

Phone: (61) 8 9360 2798
Fax: (61) 8 9360 2941
t.mcgill at murdoch.edu.au<mailto:t.mcgill at murdoch.edu.au>
www.igi-global.com/joeuc<http://www.igi-global.com/joeuc>


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20130914/cea49e1f/attachment.html>


More information about the AISWorld mailing list