Large financial firms with thousands of employees face many challenges ensuring workers have access to the right information, yet controlling access to unneeded data. We examine the problems of role lifecycle management and entitlement review processes in the context of large financial institutions. We describe observations from field study research in both… (More)
In this paper, we examine the impact of eProcurement and strategic alliances on corporate sourcing strategies. We present a framework we developed to help managers focus on the relevant issues for sourcing decisions. We illustrate the framework with different types of sourcing relationships in practice and provide advice on what type of relationship may be… (More)
Managing information risk means building risk analysis into every business decision. Chief information security officers widely agree that action plans must include risk categorization, communication, and measurement.
OBJECTIVE To determine whether the use of computerized physician order entry (CPOE) and electronic medication administration records (eMAR) is associated with better quality of medication administration at medium-to-large acute-care hospitals. DATA/STUDY SETTING: A retrospective cross-sectional analysis of data from three sources: CPOE/eMAR usage from HIMSS… (More)
Peer-to-peer file sharing is a growing security risk for firms and individuals. Users who participate in these networks to share music, pictures, and video are subject to many security risks including inadvertent publishing of private information, exposure to viruses and worms, and the consequences of spyware. In this paper, we examine the peer-to-peer file… (More)