William J. Haga

Learn More
Various mechanisms for authenticating users of computer-based information systems have been proposed. These include traditional, user-selected passwords, system-generated passwords, passphrases, cognitive passwords and associative passwords. While the mechanisms employed in primary passwords are determined by the operating systems' manufacturers, system(More)
The increasing complexity of political, regulatory, and technological changes confronting many commercial as well as non-profit organizations has made radical organizational change and adaptation a central research issue. Along with these research issues a new awareness with regard to organization-internal existing knowledge and the necessity to exploit and(More)
Measuring the effectiveness of information systems (IS) is an issue that has generated debate and reiearch among academics and practitioners. This thesis consolidates the numerous and various approaches to measuring IS effectiveness into six general schools of thought: user satisfaction, system usage, performance/ usefulness, productivity, value analysis(More)
  • 1