情报学研究所
期刊
会议
图书
作者:Grandon Gill
来源:[J].Journal of Information Technology Education: Discussion Cases (JITE: DC), 2016, Vol.5ISI
摘要:JVAB, an elite small business that specializes in cybersecurity penetration testing has more demand for its services than it can handle. The skill set required for its activities is very specialized, however. It is also hard to find. How should it go about seeking new employees?
作者:Janene J Culumber
来源:[J].Journal of Information Technology Education: Discussion Cases (JITE: DC), 2016, Vol.5ISI
摘要:The Chief Information Office at Moffitt Cancer Center worries that his physicians may not be ready for the shift to electronic medical records (EMR). Could he get the organization to change its view from an IT driven project to an institutional change in clinical and operational ...
作者:Grandon Gill , Joni Jones
来源:[J].Journal of Information Technology Education: Discussion Cases (JITE: DC), 2016, Vol.5ISI
摘要:A supplier of marketing and logistics web sites has been approached by a customer wanting to incorporate multifactor authentication. What approach should be taken and how should it be configured so as not to disrupt existing customers?
作者:Gilbert Gonzalez
来源:[J].Journal of Information Technology Education: Discussion Cases (JITE: DC), 2016, Vol.5ISI
摘要:Should Mission Critical Solutions (MCS) stay converged in a functional organization strategy with capability-based teams, or organize into separate standalone entities with unique identities and separate overheads, focusing more on the individual capability-based technology speci...
作者:Manish Agrawal , Shivendu Shivendu
来源:[J].Journal of Information Technology Education: Discussion Cases (JITE: DC), 2016, Vol.5ISI
摘要:Does it make sense for the University of South Florida to acquire cyber insurance? This case study explores the issues involved and the nature of the cyber insurance product.
作者:Shane Collier
来源:[J].Journal of Information Technology Education: Discussion Cases (JITE: DC), 2016, Vol.5ISI
摘要:A small consulting business has the opportunity to work with a new age company interested in moving its proprietary psychological software to the cloud. But if the security of that software is compromised, it could seriously damage the client. Should he proceed?
作者:Grandon Gill
来源:[J].Journal of Information Technology Education: Discussion Cases (JITE: DC), 2016, Vol.5ISI
摘要:How do you balance flexibility and security in deploying a new online journal? Is WordPress the best solution? An information security case that was developed during the launch of the MCR and MBR journals and was also used in a cybersecurity program.
作者:Tamrin Amboala , Joan Richardson
来源:[J].Issues in Informing Science and Information Technology (IISIT), 2016, Vol.13, pp.279-290ISI
摘要:One effective way of accelerating the commercialization of university innovations (inventions) is to execute a “Technological Entrepreneurship” framework that helps the execution of agreements between universities and industry for commercialization. Academics have been encou...
作者:Herman Koppelman
来源:[J].Issues in Informing Science and Information Technology (IISIT), 2016, Vol.13, pp.269-277ISI
摘要:The number of online resources available for teaching and learning in higher education has been growing enormously during the last decade. A recent development is the emergence of Massive Open Online Courses (MOOCs) and of Open Educational Resources (OER). The result is a huge nu...
作者:Stephen Burgess , David A Banks , Scott Bingley
来源:[J].Issues in Informing Science and Information Technology (IISIT), 2016, Vol.13, pp.245-267ISI
摘要:Many higher education institutions are moving towards blended learning environments that seek to move towards a student-centred ethos, where students are stakeholders in the learning process. This often involves multi-modal learner-support technologies capable of operating in a r...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×