115
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

Understanding and Prioritizing Technology Management Challenges

, &
Pages 91-98 | Received 25 Jan 2010, Accepted 22 Mar 2010, Published online: 11 Dec 2015

References

  • Anonymous. (2008). Digital risk trends 2008. Risk Management, 55(10), p. 32–36.
  • Anonymous. (2009a). HIPAA violation costs CVS $2.25 million. Information Management Journal, 43(3), p. 15.
  • Anonymous. (2009b). Mass. passes tough data security law. Information Management Journal, 43(1), p. 8.
  • Calvasina, E., Ramaswamy, M., Calvasina, R., & Calvasina, G. (2008). Executive information for strategic decision making. Issues in Information Systems, 9(2), 80–86.
  • Chang, S. E., & Lin, C. (2007). Exploring organizational culture for information security management. Industrial Management and Data Systems, 107(3), 438–458.
  • Chisholm, P. (2008). Disaster recovery planning is business-critical. The CPA Journal, 78(7), 11.
  • Cleary, B. (2008). How safe is your data? Strategic Finance, 90(4), 33–37.
  • Clitherow, D., Brookbanks, M., Clayton, N., & Spears, G. (2008). Combining high availability and disaster recovery solutions for critical IT environments. IBM Systems Journal, 47(4), 563–575.
  • Conger, S. (2009). Personal information privacy: A multiparty endeavor. Journal of Electronic Commerce in Organizations, 7(1), 71–82.
  • Dionne, M., & Carboni, A. (2009). How to successfully implement an e-records management program. Information Management Journal, 43(2), 49–53.
  • Foltz, C. B., Schwager, P. H., & Anderson, J. E. (2008). Why users (fail to) read computer usage policies. Industrial Management & Data Systems, 108(6), 701–712.
  • Grudman, R. (2008). Mapping an approach for successful content management. Information Management Journal, 42(5), p. 60–64.
  • Montana, J. (2008). Records and information management in the post-bailout world. Information Management Journal, 42(6), 26–30.
  • Morris, S. A., & Strickland, T.H. (2008/2009). Exploration of information system process improvements and firm performance. The Journal of Computer Information Systems, 49(2), 86–91.
  • Rae, K., & Subramaniam, N. (2008). Quality of internal control procedures: Antecedents and moderating effect on organisational justice and employee fraud. Managerial Auditing Journal, 23(2), 104–124.
  • Robinson, S. (2009). The nature of responsibility in a professional setting. Journal of Business Ethics, 88, 11–19.
  • Rotvold, G. (2008). How to create a security culture in your organization. Information Management Journal, 42(6), 32–38.
  • Skovira, R. J. (2007). Framing the corporate security problem: The ecology of security. Issues in Informing Science and Information Technology, 4, 45–52.
  • Totterdale, R. L. (2008). Enterprise content management: A usability study. Issues in Information Systems, 9(2), 330–336.
  • Wang, W., Hsieh, J. P., Butler, J. E., & Hsu, S. (2008). Innovate with complex information technologies: A theoretical model and empirical examination. The Journal of Computer Information Systems, 49(1), 27–36.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.