2016),"Information skills training through mobile devices: practical applications of QR codes in academic libraries", The Electronic Library, Vol. 34 Iss 1 pp. -Access to this document was granted through an Emerald subscription provided by emerald-srm:123705 [] For AuthorsIf you would like to write for this, or any other Emerald publication, then please use our Emerald for Authors service information about how to choose which publication to write for and submission guidelines are available for all. Please visit www.emeraldinsight.com/authors for more information. About Emerald www.emeraldinsight.comEmerald is a global publisher linking research and practice to the benefit of society. The company manages a portfolio of more than 290 journals and over 2,350 books and book series volumes, as well as providing an extensive range of online products and additional customer resources and services.Emerald is both COUNTER 4 and TRANSFER compliant. The organization is a partner of the Committee on Publication Ethics (COPE) and also works with Portico and the LOCKSS initiative for digital archive preservation.
In today's technologically advanced business environments, Information Technology (IT) has
Numerous factors exist that may contribute to the unsuccessful completion of application software package implementation projects. The most significant contributor to application software package project failure lies in the misalignment of the organisations business processes with the functionality of the application software package. While various IT control frameworks that may assist in the implementation of application software packages are available, the question arises why industry still reports that the success rate of application software package implementation projects remains low. The purpose of this study was to examine the extent to which the Projects in Controlled Environment (PRINCE2) framework assists in the alignment of the organisations business processes with the functionality provided by the application software package implemented. This study investigated whether PRINCE2 addresses all the reasons for project failure. It identifies the shortcomings and weaknesses in PRINCE2 which may contribute to the misalignment between the business processes of the organisation and the functionality of the application software package implemented. The study recommends how these weaknesses identified in PRINCE2 can be addressed. By taking these recommendations into account when using PRINCE2 to implement application software packages, proper alignment between the organisations business processes and the functionality of the application software package may be achieved. This results in a more successful application software package implementation.
PurposeThe purpose of this paper is to identify and investigate the security issues an organisation operating in the “new” online environment is exposed to through Web 2.0 applications, with specific focus on unauthorised access (encompassing hackers). The study aims to recommend possible safeguards to mitigate these incremental risks to an acceptable level.Design/methodology/approachAn extensive literature review was performed to obtain an understanding of the technologies driving Web 2.0 applications. Thereafter, the technologies were mapped against Control Objectives for Information and Related Technology (CobiT) and Trust Service Principles and Criteria and associated control objectives relating to security risks, specifically to hacker risks. These objectives were used to identify relevant risks and formulate appropriate internal control measures.FindingsThe findings show that every organisation, technology and application is unique and the safeguards depend on the nature of the organisation, information at stake, degree of vulnerability and risks. A comprehensive security program, including a multi‐layer technological, as well as an administrative component, should be implemented. User training on acceptable practices should also be conducted.Originality/valueObtaining an understanding of Web 2.0 and Web 2.0 security is important, as Web 2.0 is a new, poorly understood technology and with the growing mobility of users, the potential surface area of attack increases and should be managed. The paper will help organisations, information repository managers, information technology (IT) professionals, librarians and internal and external auditors to understand the “new” risks relating to unauthorised access, which previously did not exist in an on‐line environment, and will assist the development of a framework to limit the most significant risks.
The South African Institute of Chartered Accountants and the International Federation of Accountants require Information Technology (IT) to be integrated with the professional subjects, including Auditing, qualified chartered accountants need. Internationally, people want changes to Auditing teaching. The Accounting Department of Stellenbosch University developed an audit simulation of the whole audit process from client acceptance to completion. Students must prepare working papers, using substantive procedures focusing on stock and a database large enough for students to use IT. The simulation's learning objectives are integrating auditing with IT, and exposing students to as authentic an audit as possible. A questionnaire tested students' perceptions on the simulation. Responses were favourable. Respondents felt that the simulation helped them to understand auditing and showed them the practical application of IT functionalities. However, respondents complained that the simulation took too long. The principles and findings apply to simulations and the use of case studies in any environment.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.