Premium Essay

Call for Papers for a Special Issue of Journal of Information Technology

In: Miscellaneous

Submitted By rmdelmando
Words 494
Pages 2
Call for Papers for a Special Issue of Journal of Information Technology Information Systems and the Financial Crisis and After
Special Issue Editors: Chrisanthi Avgerou, Alexandros-Andreas Kyrtsis and Frank Land

In various reports and newspaper articles – however only sporadically in academic publications – questions have been raised regarding the relationship between ICT and the 2007-2009 financial crisis and its continuing fallout on the financial markets. The expansion of electronic delivery channels for financial products and services as a consequence of the overbanking of the wealthier societies, the accelerating dependence of public finances on the operations of international computer supported financial networks, the growing importance of derivatives for investment and hedging, the exponential growth of the trading of complex financial instruments in globally interlinked exchanges; algorithmic trading; the break in the traditional link between debtor and lender, the use of electronic platforms for over-the-counter trading; the digitization of clearing, settlement and custody services, are among the developments which have revolutionized the technological landscapes of finance. These developments of the last thirty years have created not only advantages; they have also exposed the financial system to technological and managerial risks on top of the main financial risks. Does this mean that we are justified to blame technology for at least part of the processes which have led to the complications financial systems and economies are facing on a global scale? Was this the result of the way information systems development has tried to cope with the continuous innovation in the financial sector in the last three decades? What are the challenges concerning the manageability of information infrastructures; and what are the pressures for new enterprise...

Similar Documents

Free Essay

Apa Reference Writing

...REFERENCE WRITING Reference List References cited in the text of a research paper must appear in a Reference List or bibliography. This list provides the information necessary to identify and retrieve each source. • Entries should be arranged in alphabetical order by authors' last names. Sources without authors are arranged alphabetically by title within the same list. • Write out the last name and initials for all authors of a particular work. • Capitalize only the first word of a title or subtitle, and any proper names that are part of a title. • Use an ampersand (&) instead of the word "and" when listing multiple authors of a single work. • Use the abbreviation p. or pp. to designate page numbers of articles from periodicals that do not use volume numbers, especially newspapers. These abbreviations are also used to designate pages in encyclopedia articles and chapters from edited books. • Indentation *: The first line of the entry is flush with the left margin, and all subsequent lines are indented (5 to 7 spaces) to form a "hanging indent." • Underlining vs. Italics *: It is appropriate to use italics instead of underlining for titles of books and journals. • The APA has special formatting standards for the use of indentation and italics in manuscripts or papers that will be typeset or submitted for official publication. Examples: Articles in Journals, Magazines, and Newspapers References to periodical articles must......

Words: 1658 - Pages: 7

Premium Essay

Innovation Management

...Unit 403–Managing Information Systems Welcome to Managing Information Systems – Unit 403 • Managing information systems is a critical skill in today’s fast-paced business environments. Remember that technology underpins almost all business models in what we now call a knowledge era or network economy. As distinct from IT, the field of information systems (IS) transcends the technology in order to make business performance the principle driving factor. 1 May, 2013 Session 1 - MIS Fundamentals 1 • • Unit 403–Managing Information Systems Topic Learning Objectives • Explain why managing information systems is important in today’s business world • Define concepts from the hierarchy of data and IS, as distinct from IT. • Describe the major challenges facing today’s business and IS managers. • Analyse and report on an organisation’s ITinvestment profile. • Describe an organisation’s learning curve when applying IS or IT. 1 May, 2013 Session 1 - MIS Fundamentals 2 Unit 403–Managing Information Systems Who Am I ? Dr Tony Jewels •Bachelor of Business Management (Management Economics) •Certified Member Australian Computer Society (Project Management) •Master of Information Technology (Professional) •PhD (Increasing the chances of project success through sharing knowledge) 1 May, 2013 Session 1 - MIS Fundamentals 3 Unit 403–Managing Information Systems •30 years industry experience •Operated “Inventory Management Services” •Designed and implemented......

Words: 1485 - Pages: 6

Free Essay

Communication Channels

...Communications Channel Paper Kristen Peoples & Rebecca Mckeeth HCS/320 Health Care Communications Professor Paul Woods May 7th 2012 Communication Channels Communication is something very important no matter what organization or workplace one might reside. It is something that is absolutely necessary in a business model and as described by the lay networks website the essential components include encoding, medium of transmission, decoding, and feedback ("The Process of Communication", n.d.). With everyday living, comes communicating with others. Some people are great communicators, some people are horrible communicators and some just need to be pushed a little and learn the ropes of how great communication can be. Communication doesn't just come to us as human beings. We are born knowing we have a voice, but there are things we need to learn along the way to perfect and make ourselves the best we can be. With that being said, there is no stopping to our communication skills. Even as working adults, we are still learning different ways to communicate within our jobs. In this brief paper that will outline all forms of communication and how we use it on an everyday basis, we will be able to educate the reader on the different ways we as students use communication at our workplaces and everyday life. Although we all come from different areas of living and study we will concentrate on the different types of formal and informal communication and how we use it every......

Words: 1466 - Pages: 6

Premium Essay

Admistrative Ethics Paper

...Jessica Turner Administrative Ethics Paper  Katherine Rossiter  HCS/335 9/21/2013 One of the current administrative issue that is arising in the newspaper regarding patient privacy is the ability to email your physician. While technology is constantly growing every day to ability to email your physician is more convenient and getting direct results is more convenient then awaiting his phone call but is this always the most ethical decision to make? Hackers breaks into computer systems each and every day even though the fire walls are built to reduce or eliminate occurrences that happen due to the growing technology this isn’t always the best decision. This issue goes hand and hand with the ability to have patient records stored electronically while this is currently present in most hospitals the issue that occur is that anyone have access to the patient records within and outside the hospitals and numerous of other locations. The ability to share patient’s records to other hospitals via online has decreased the patient privacy dramatically. I am going to get into the issue and its impact on the population it affects most. I’m going to get into different viewpoints arguments or facts that are used in the article to support the proposed solution. I’m going to get into some of the ethical and legal issues reported for my administrative issue. I’m also going to explain the managerial responsibilities related to administrative ethical issues. And lastly I am going to......

Words: 1180 - Pages: 5

Premium Essay

Doc, Docx, Pdf, Wps,

...Journal of Information Technology (2014), 1–4 palgrave-journals.com/jit/ © 2014 JIT Palgrave Macmillan All rights reserved 0268-3962/14 Commentary Is theory king?: a rejoinder David Avison, Julien Malaurent ESSEC Business School, Paris, France Correspondence: D Avison ESSEC Business School, Cergy-Pontoise, 95021 France. E-mail: avison@essec.fr Abstract In this rejoinder we discuss six commentaries to our earlier debates and perspectives paper `Is theory king?: questioning the theory fetish in information systems’. We argue again for theory light rather than theory free papers, we discuss the potential scope of theories in information systems, we reflect on our terminology and exemplar paper, and we discuss the relevance of our arguments on quantitative research before looking at potential further opportunities to debate this important issue for information systems. Journal of Information Technology advance online publication, 7 October 2014; doi:10.1057/jit.2014.24 Keywords: Theory; theory light; qualitative research; journals W Introduction e are fortunate indeed to be able to respond to six commentaries on our insights and perspectives article ‘Is theory king?: questioning the theory fetish in information systems’, where we advocated what we called ‘theorylight’ papers. Five of the respondents are leading scholars and researchers in the field of information systems (IS) – Deborah Compeau with Fernando Olivera (associate professor of organizational......

Words: 3135 - Pages: 13

Free Essay

Sql Injection Attacks: Techniques and Protection Mechanisms

...International Journal on Computer Science and Engineering (IJCSE) SQL Injection Attacks: Techniques and Protection Mechanisms Nikita Patel  Department of Info. Tech. Patel College of Science & Technology Bhopal, India Fahim Mohammed Department of Computer Science Research Scholar NIT Bhopal, India Santosh Soni  Department of Computer Science Patel College of Science & Technology Bhopal, India         Abstract--  When an internet user interacts in web environment by surfing the Net, sending electronic mail messages and participating in online forums lot of data is generated which may have user’s private information. If this information is captured by third party tools and techniques; it may cause a breach in end user privacy. In the Web environment, end user privacy is one of the most controversial legal issues. In this paper issues related to information leakage through SQL injection attacks are presented and protection mechanisms are also discussed.   Keywords: - Privacy, Security, Code Injection, SQL Injection, web application security, Malicious Code, Vulnerability. I. INTRODUCTION As the Internet is growing day by day, most of the people are not aware of security and privacy. Internet is a widespread information infrastructure; it is basically an insecure channel for exchanging information. Web security is the set of rules and measures taken against web security threats. Web privacy is the ability of hiding end user’s information. Nowadays......

Words: 1951 - Pages: 8

Premium Essay

Family Working in Yard

...increasingly affect Stihl's marketing performance. After couple decades, Stihl's two-step retail distribution channels and present products' designs will no longer be profitable. For keeping and improving Stihl's brand equity, I strongly suggest: First of all, create a  informative, highly functional Web sites, personalize notification and a mechanism for capturing and responding to customer feedback; Second and the huge move, create a new brand not only sell tools but also providing excellent home improvement experience to house owners and their families; Third, introducing new products that add style, technology and color to the mix in home improvement centers and mass merchants, for commercial buyers, using the web-site only. New brand, New products & New channels There are some unique characteristics of the new generation, such as: "want challenges" and " give me info, but I call shots". Also, "The present research takes an ethnographic perspective and considers the experiences and understandings of a set of families in one urban community as they attempt a variety of home improvement (do-it-yourself or DIY) projects. Although cultural and institutional representations of home improvement are found to be helpful, they frequently fail to capture the complexities of actual home improvement projects" (Goodsell, 2008)....

Words: 892 - Pages: 4

Premium Essay

Tools

...Communications of the Association for Information Systems (Volume 15, 2004)713-729 713 INTRODUCING e-GOV: HISTORY, DEFINITIONS, AND ISSUES Åke Grönlund Örebro University, ake.gronlund@esi.oru.se Thomas A. Horan Claremont Graduate University, ABSTRACT The e-Gov field (also called Electronic Government, Digital Government, Electronic Governance, and similar names) emerged in the late 1990´s. Since then it spurred several scientific conferences and journals. Because the field grew considerably in size, both its contents and position with respect to other research fields and disciplines need to be explained and discussed. What is e-Gov? What is e-Gov research? What does it mean for the field of Information Systems? This paper briefly sketches the short eGov history and current status, and discusses the content of the field as it appears in current research. We conclude with a discussion of e-Gov as a research field of interest both as a new application area for IS theories and methods and as a source of new insight. Keywords: electronic government, governance I. INTRODUCTION The e-Gov (Electronic Government or Electronic Governance) field1 emerged in the late 1990´s as a context within which to share experiences among practitioners. Over the past few years eGov gave rise to several conferences with more and more scientific content. Some specialized journals now appear. Because the field grew to considerable size, both its contents and position with respect to other research......

Words: 8545 - Pages: 35

Premium Essay

Ethical Healthcare Issue

...Ethical Healthcare Issues HCS545 May 11th, 2015 Ethical Healthcare Issues Ethical issues arise in all types of industry no matter the magnitude of the issue decisions will have to be made regarding it. The health care industry is no different, some of those ethical issues include patient privacy (or lack of), transplant allocation, refusal of care, patient dumping, access of care, biomedical research and patient noncompliance with treatment. For this paper I will focus on patient privacy, the ethical issue of patient privacy is how patient information is getting leaked unintentionally. An examination of how each of the four major ethical principles can be applied towards this issue will be provided. Patient Privacy The Health Insurance Portability and Accountability Act of 1996 (HIPAA) original intents were to enable workers to change jobs without fear of losing health care coverage (Liebler & McConnell, 2012), but HIPAA is more commonly known for protecting patient privacy. When organizations had to be HIPAA compliant by April 14, 2003 those organizations were required to train employees in the proper handling of protected health information (PHI), publish policies and procedures addressing the handling of patient medical information (Liebler & McConnell, 2012) . Any release of patient information for purposes other than treatment, payment, or operations requires written authorization (Buppert, 2002). Under the patient privacy rule EVERYTHING is protected,......

Words: 1230 - Pages: 5

Free Essay

Satyam

...Indian Information Technology and Information Technology Enabled Services (IT-ITES) industry has been contributing its role in the economic development of India since post liberalization era. The pace growth of this industry is considered as a growth driver for the economy. India has become as “IT Super Power”. The performance of IT industry can be revealed with the evidence of its contribution to the GDP (Gross Domestic Product) of the country, provision of employment opportunities all over the country, IT services and software exports and revenue to the country. This paper examines how does the IT industry is playing its predominant role in Indian economy with its various trends in the contribution to the GDP of India , IT exports, IT revenue trends and employment opportunities. Keywords - IT-ITES, Contribution to GDP, Employment, Exports and Revenue. I. utilities and services for globally oriented businesses. The SEZ Act 2005 envisages key role for the State Governments in Export Promotion and creation of related infrastructure. A few salient features of SEZ scheme are as under: INTRODUCTION The Government of India has identified IT industry as one of the major industries in India and it plays an important role in achieving the policy objectives like economic development. Top companies like Microsoft, IBM, Motorola Oracle, Dell, Nokia, Google, Sathyam, Infosis and Wipro set up their operations. Information Technology has made the information......

Words: 2019 - Pages: 9

Premium Essay

Consulting

...a strategic level. They identify five key cross-functional CRM processes: a strategy development process, a value creation process, a multichannel integration process, an information management process, and a performance assessment process. They develop a new conceptual framework based on these processes and explore the role and function of each element in the framework. The synthesis of the diverse concepts within the literature on CRM and relationship marketing into a single, process-based framework should provide deeper insight into achieving success with CRM strategy and implementation. ver the past decade, there has been an explosion of interest in customer relationship management (CRM) by both academics and executives. However, despite an increasing amount of published material, most of which is practitioner oriented, there remains a lack of agreement about what CRM is and how CRM strategy should be developed. The purpose of this article is to develop a process-oriented conceptual framework that positions CRM at a strategic level by identifying the key crossfunctional processes involved in the development of CRM strategy. More specifically, the aims of this article are O cize the severe lack of CRM research that takes a broader, more strategic focus. The article does not explore people issues related to CRM implementation. Customer...

Words: 7859 - Pages: 32

Premium Essay

Case-1-Dep-Gard

...strategic level. They identify five key cross-functional CRM processes: a strategy development process, a value creation process, a multichannel integration process, an information management process, and a performance assessment process. They develop a new conceptual framework based on these processes and explore the role and function of each element in the framework. The synthesis of the diverse concepts within the literature on CRM and relationship marketing into a single, process-based framework should provide deeper insight into achieving success with CRM strategy and implementation. ver the past decade, there has been an explosion of interest in customer relationship management (CRM) by both academics and executives. However, despite an increasing amount of published material, most of which is practitioner oriented, there remains a lack of agreement about what CRM is and how CRM strategy should be developed. The purpose of this article is to develop a process-oriented conceptual framework that positions CRM at a strategic level by identifying the key crossfunctional processes involved in the development of CRM strategy. More specifically, the aims of this article are cize the severe lack of CRM research that takes a broader, more strategic focus. The article does not explore people issues related to CRM implementation....

Words: 7859 - Pages: 32

Premium Essay

Business Intelligence

...SPECIAL ISSUE: BUSINESS INTELLIGENCE RESEARCH BUSINESS INTELLIGENCE AND ANALYTICS: FROM BIG DATA TO BIG IMPACT Hsinchun Chen Eller College of Management, University of Arizona, Tucson, AZ 85721 U.S.A. {hchen@eller.arizona.edu} Roger H. L. Chiang Carl H. Lindner College of Business, University of Cincinnati, Cincinnati, OH 45221-0211 U.S.A. {chianghl@ucmail.uc.edu} Veda C. Storey J. Mack Robinson College of Business, Georgia State University, Atlanta, GA 30302-4015 U.S.A. {vstorey@gsu.edu} Business intelligence and analytics (BI&A) has emerged as an important area of study for both practitioners and researchers, reflecting the magnitude and impact of data-related problems to be solved in contemporary business organizations. This introduction to the MIS Quarterly Special Issue on Business Intelligence Research first provides a framework that identifies the evolution, applications, and emerging research areas of BI&A. BI&A 1.0, BI&A 2.0, and BI&A 3.0 are defined and described in terms of their key characteristics and capabilities. Current research in BI&A is analyzed and challenges and opportunities associated with BI&A research and education are identified. We also report a bibliometric study of critical BI&A publications, researchers, and research topics based on more than a decade of related academic and industry publications. Finally, the six articles that comprise this special issue are introduced and characterized in terms of the proposed BI&A research......

Words: 16335 - Pages: 66

Free Essay

Intellectual Property Rights

...DR.V.MAHALAKSHMI M.L,MBA,Ph.D 7A, CID Quarters, V.K.Iyer Road, Mandaveli – 600 028. karunamaha@yahoo.co.in ; Phone: 95 – 044 – 4281 5557, 24615636, Cell: 98404 60478.98842 51564 Profile: [pic] • Dean, Panimalar Engineering College • 15 Years in the realm of Teaching & Training • 8.11 Years full time Legal Practice in various courts. • Currently guiding 6 research scholars in various universities • Legal consultant for corporate houses • Authored a book in Retail Management. • Authored a book in Operations Management(Under Publication) Work History: |Institution/Organisation |Time Period |Designation | |Panimalar Engg College, Chennai |From 2006 till date |Dean | |Panimalar Engg College, Chennai |From 2003 - 2006 |Head of the Department | |Panimalar Institute of Management Studies, Chennai. |From 1997 - 2003 |Head of the Department | |VGP School of Management Studies |From 1996 - 1997 |Lecturer | |Independent Practice |From 1989 - 1996 |Advocate | Concurrent Assignments: |Institution/Organisation ...

Words: 3300 - Pages: 14

Premium Essay

Hjkj

...result of liberalization and globalization. In such a ever changing scenario, expansion and maintaining the loyal customer base seems to be a great challenge for the mobile service providers. As a result of increased competition, customer loyalty and retention have become important goals for mobile service operators. Reacting to the pressures, most of the cellular mobile service providers are trying to attract subscribers by not only reducing their tariff rates but also giving attention to the quality of services delivered. In this context the present paper focuses on the customer loyalty and retention in cellular mobile communication. Literature review was carried out covering the theoretical and empirical work on the subject and exploring the relations with service quality. Exploratory interviews were conducted in order to gain practical insights of the subject. Based on the literature review and findings from the interviews, this paper presents a rich research agenda for further research. 1.0 INTRODUCTION T he forces of liberalization and globalization of telecommunication market have pressurized the companies to maintain their market share by focusing on retaining their current customers. They are being increasingly confronted with challenges to attract their subscribers by providing high quality services. With the increase in the cost of acquisition of new customers, cellular mobile companies continually seek new ways to acquire, retain and increase their......

Words: 4313 - Pages: 18