IS

Carr, Houston H.

Topic Weight Topic Terms
0.779 computing end-user center support euc centers management provided users user services organizations end satisfaction applications
0.503 factors success information critical management implementation study factor successful systems support quality variables related results
0.331 support decision dss systems guidance process making environments decisional users features capabilities provide decision-making user
0.242 issues management systems information key managers executives senior corporate important importance survey critical corporations multinational
0.215 risk risks management associated managing financial appropriate losses expected future literature reduce loss approach alternative
0.167 information security interview threats attacks theory fear vulnerability visibility president vulnerabilities pmt behaviors enforcement appeals
0.146 information research literature systems framework review paper theoretical based potential future implications practice discussed current
0.136 approach analysis application approaches new used paper methodology simulation traditional techniques systems process based using
0.133 mis problems article systems management edp managers organizations ;br> data survey application examines need experiences
0.116 technology research information individual context acceptance use technologies suggests need better personality factors new traits
0.105 qualitative methods quantitative approaches approach selection analysis criteria used mixed methodological aspects recent selecting combining

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Watson, Hugh J. 2 Loch, Karen D. 1 Magal, Simha R. 1 Rainer, Rex Kelly 1
Snyder, Charles A. 1 Warkentin, Merrill E. 1
computer security 2 Information center 2 critical success factors 1 computer laws 1
computer viruses 1 Decision support systems (Dss) 1 end-user computing. 1 end- user computing. 1
information resources management 1 information systems security 1 management of information systems 1 Management Information System risk analysis 1
organizing for DSS 1 stages of growth 1 Threats 1

Articles (5)

Threats to Information Systems: Today's Reality, Yesterday's Understanding. (MIS Quarterly, 1992)
Authors: Abstract:
    In formation systems security remains high on the list of key issues facing information systems executives. Traditional concerns range from forced entry into computer and storage rooms to destruction by fire, earthquake, flood, and hurricane. Recent attention focuses on protecting information systems and data from accidental or intentional unauthorized access, disclosure, modification, or destruction. The consequences of these events can range from degraded or disrupted service to customers to corporate failure. This article reports on a study investigating MIS executives' concern about a variety of threats. A relatively new threat, computer viruses, was found to be a particular concern. The results highlight a gap between the use of modern technology and the understanding of the security implications inherent in its use. Many of responding information systems managers have migrated their organizations into the highly interconnected environment of modern technology but continue to view threats from a perspective of a pre-connectivity era. They expose theft firms to unfamiliar risks of which they are unaware, refuse to acknowledge, or are often poorly equipped to manage.
Risk Analysis for Information Technology. (Journal of Management Information Systems, 1991)
Authors: Abstract:
    As Information Technology (IT) has become increasingly important to the competitive position of firms, managers have grown more sensitive to their organization's overall IT risk management. Recent publicity concerning losses incurred by companies because of problems with their sophisticated information systems has focused attention on the importance of these systems to the organization. In an attempt to minimize or avoid such losses, managers are employing various qualitative and quantitative risk analysis methodologies. The risk analysis literature, however, suggests that these managers typically utilize a single methodology, not a combination of methodologies. This paper proposes a risk analysis process that employs a combination of qualitative and quantitative methodologies. This process should provide managers with a better approximation of their organization's overall information technology risk posture. Practicing managers can use this proposed process as a guideline in formulating new risk analysis procedures and/or evaluating their current risk analysis procedures.
Critical Success Factors for Information Center Managers. (MIS Quarterly, 1988)
Authors: Abstract:
    A stage hypothesis for information centers (ICs) is proposed and 26 critical success factors (CSFs) for IC managers are investigated. Based on 311 responses from IC managers, support is found for the proposed stages and information is provided about the importance of the CSFs. A principal components analysis is performed on the 26 CSFs which identifies five composite CSFs: (1) commitment to the IC concept; (2) quality of IC support services; (3) facilitation of end-user computing; (4) role clarity; and (5) coordination of end-user computing. Statistical tests show that the importance of these composite CSFs tend to vary among themselves but is relatively constant individually across the IC stages.
Organizing for Decision Support System Support: The End-User Services Alternative. (Journal of Management Information Systems, 1987)
Authors: Abstract:
    There are a number of organization structure alternatives for supporting decision support systems, and each alternative has its advantages and disadvantages. One emerging alternative, that of providing support through an end-user services group, is being successfully used by the Oglethorpe Power Corporation.
Information Centers: The IBM Model vs. Practice. (MIS Quarterly, 1987)
Authors: Abstract:
    The information center concept originated in the mid-seventies as IBM attempted to respond to the growing backlog of requests for MIS service. IBM, like many firms, discovered that the DP/MIS organization was unable to respond to the large number of requests for new systems. As a partial solution, information centers were installed at IBM and other firms to support end-user computing--the environment in which users address information needs directly. This concept of support for end-user computing has been well accepted. This research studied the way 20 firms in the Dallas-Fort Worth, Texas area operationalized the concept, comparing their information centers with the IBM/Hammond model. This paper compares the findings of empirical research to the contentions made by Hammond in his IBM Systems Journal article of 1982 [11]. Agreement was found with only one-half of Hammond's propositions. The areas of disagreement are considered important.