服务承诺
资金托管
原创保证
实力保障
24小时客服
使命必达
51Due提供Essay,Paper,Report,Assignment等学科作业的代写与辅导,同时涵盖Personal Statement,转学申请等留学文书代写。
51Due将让你达成学业目标
51Due将让你达成学业目标
51Due将让你达成学业目标
51Due将让你达成学业目标私人订制你的未来职场 世界名企,高端行业岗位等 在新的起点上实现更高水平的发展
积累工作经验
多元化文化交流
专业实操技能
建立人际资源圈Impacts_of_Cyber_Technological_Trends_and_Digital_Economics_on_Small_&_Medium_Size_Industries
2013-11-13 来源: 类别: 更多范文
Abstract
This paper seeks to explore the impacts of Cyber Technological trends and Digital Economics on small and medium size industries. Another aspect covered by the paper is assessing the technological challenges faced by the industries, and how developments are being undertaken to overcome these.
The ability of organizations to cope with Cyber security issues and strategies being incorporated by the businesses to use information technology as a medium to increase economic welfare.
The paper also addresses the pros and cons of electronic commerce and recent developments in Information technology and its impact on the consumer behavior and global economy.
Concept
Since technology plays a vital role in the growth and development of a business, the risk is growing with the increasing use of insecure Cyber technology. Organizations are not only facing threats from the outside hackers but stakeholders can also bring risk through mishandling of information and corruption. Nowadays businesses are facing issues from well-organized cyber criminals who tend to steal personal and corporate financial information which leads towards damaging company’s brand image and reputation.
For any business to succeed, they need to make sure the secure use of Cyber Technology and electronic commerce. Although security is not a new concern for IT but ability to manage and protect enterprise across resources has changed. Sound security processes needs to be used in day-to-day business operations.
The value of security has tremendously increased and it demands to set new business and IT priorities to protect existing as well as potential business. The first objective is to identify the data that is valuable for an organization and than protecting that data from cyber criminals by implementing effective cyber security procedures. The need to implement these procedures is not only important for large scale business organizations but this is also considered essential for small and medium size industries in today’s economic environment. Small businesses have effected on a large scale because cyber security threats have multiplied and become more complex.
Objectives
The aims of this paper are:
To identify the cyber security threats and risks which small and medium size industries are facing at the moment and implementation of strategies to effectively utilize security related processes to minimize those threats;
Issues in conducting research on cyber security information assurance; and
To evaluate the challenges and opportunities that exist for electronic businesses, and how they can be overcome through developments in Information technology.
Methodology
According to University Research Council,
“Research is any original and systematic investigation undertaken in order to increase knowledge and understanding and to establish facts and principles. It comprises the creation of ideas and generation of knowledge that lead to new and substantial improved insights and the development of new materials, devices, products and processes. It should have the potential to produce results that are sufficiently relevant to increase knowledge. Good reflective inquiry produces theories and hypotheses and benefits any intellectual attempt to analyze facts and phenomena. This search for individual facts or data requires an open-ended question for which there is no ready answer. Data are gathered through experiments, surveys or other methodologies”.
According to Saunders et al (2007:610), research is defined as “the systematic collection and interpretation of information with a clear purpose, to find things out”.
When conducting research, there are two approaches that can be used: Quantitative and Qualitative. Quantitative research methods usually involve large randomized samples, more application of statistical, and few applications of cases demonstrating findings (Saunders et al, 2007). The objective of quantitative research is to determine the covariance or relationship factor between two variables or entities. Qualitative research methods focus on providing a complete picture of the situation with the aim of understanding of behavior and inter-relations (Saunders et al, 2007).
For this study, the writer has chosen to go with quantitative research to accurately collect the data as it allows for clear objectives to be defined for research, eases the data comparison process, and allows for a quick and cheap way to collect information.
The research for this paper was conducted through literature review, without any empirical work being conducted. A large resource of written material was used, which included books, magazine articles, academic journals, as well as the websites of various companies. Further research was conducted by considering existing literature on measuring the economic benefits from information technology, emphasizing comparative issues and user studies.
The research also focuses on the cyber security issues which organizations are facing in the daily business operations and suggests measures to over come these issues. Further growth in the economy due to wide use of electronic commerce have also discussed.
Introduction
In the global business world, technology have become an important aspect of success for companies, the productive functions of electronic commerce and wide use of trading on Internet have increased cyber threats for the organizations. Large corporations have taken the active step of investing heavily into cyber technology but small and medium size businesses are still relying on the traditional processes due to budget constraints. Lack of proper IT infrastructure leads towards cyber security issues and effects organizational growth and development in the long run.
A single individual anywhere in the world can try to penetrate systems containing important financial and corporate information of the organization. Hackers are inventing tools on daily basis to exploit the loops holes in the weak IT infrastructures. Cyber security has also gained importance after the Anti-money laundering and Anti-terrorism legislations. Terrorist groups are known to have included not only engineers, computer scientists, and business people with backgrounds in computers, networks and computer-based systems but also people with access to hardware and software producers. Several researches has been done on cyber crime preventions and enforcement of adequate laws. The purpose of these researches are to suggest methods, to avoid the criminal use of information communication technology. Cyber attacks with a financial motivation leads towards great disasters to organizational repute. The need is to develop and implement proper system and procedures to improve cyber security and information assurance. The following are the pre-requisites of a strategy which can help to stop hackers and criminals to attack on confidential data bases of an organization:
Support research, development and evaluation of cyber security and information assurance technologies aimed at preventing cyber attacks that may have large scale consequences.
Address research & development needs to ensure cyber security and allocation of sufficient budgets for the research.
Develop proper IT infrastructures to help IT departments implementing procedures according to organizational technological needs.
Train and educate employees on the latest technological trends and ensure the deployment of effective security procedures to avoid mishandling of information.
Develop and deployment of new communication protocols that better assure the security of information transmitted over networks.
Support the establishment of experimental environments that allow IT researchers to conduct a broad range of cyber security and information assurance development and assessment activities.
Provide a foundation for the long-term goal of economically informed, risk-based cyber security and information assurance decision making.
Provide novel and next-generation secure IT concepts and architectures through long-term research.
Literature Review
According to Bresnahan and Trajtenberg (1995),
“The technological invention associated with customizing the technological frontier to the unique needs of users in particular regions “co-invention”, placing emphasis on understanding how its determinants vary across users in different regions. These processes make measuring the welfare benefits from advances in information technology particularly difficult. The metrics currently available for measuring the economic pay-out of the IT revolution and identify which of these vary meaningfully in a comparative regional context”.
The purpose of cyber security is to provide protection against unauthorized modification of information, improves confidentiality and assurance of timely and reliable access to and use of systems, networks and information.
Nowadays organizations are relying heavily on Information technology in their day-to-day business operations, any performance issue results in huge financial losses and sometimes the image and reputation of the organization is at stake. Although small and medium size businesses are now making investments in cyber security related researches but still their work is directed primarily at short-term efforts driven by market demands to address immediate security problems. The need of the time demands to develop a long term strategy because cyber security is a discipline that can no longer be ignored. Short term measures should not be considered as sufficient and the primary focus should be on the achievement of strategic objectives which benefits company in the long run.
Findings
Although substantial progress has been made in raising levels of awareness about cyber security across industry but still securing confidential information and IT infrastructures remains a significant challenge for the organizations and IT managers.
In order for businesses to be successful, it is essential to provide a foundation for the long-term goal of economically informed, risk-based cyber security and information assurance decision making. An effective Cyber Threat Intelligence (CTI) program needs to be implemented which is systemic, well-funded and well communicated with in the organization.
The increasing availability of techniques to attack the economy through the IT infrastructure provide relatively easy, low-cost advantage to hackers and cyber criminals of all kinds around the globe. The technical advances will provide a number of opportunities for improvement in the productivity and growth of organizations.
Cyber-security must be a central component of any enterprise risk management strategy, not just a technology responsibility. Continuous monitoring, logging and event correlation are elements of sound security strategies.
Condoleezza Rice, President George W. Bush's national security advisor said,
“The very technology that makes our economy so dynamic and our military forces so dominating also makes us more vulnerable."
According to the Alliance for Telecommunications Industry Solutions,
"Cyber security refers to the protection of information against unauthorized disclosure, transfer, modification, or destruction, whether accidental or intentional."
Another aspect of cyber security is to use strategies and techniques which are less complex and can be communicated easily with in an organization. Increasing public awareness on cyber security issues is also important. The importance of cyber security can be examine from this fact that UK and US governments have declared cyber attacks as a major security threat.
Most network security issues occurred due to access to network control information or computing system. In recent years, Internet was mostly used by research and education community but as the Internet has grown the number of users from diversify groups have increased and similarly the security threats has multiplied. Internet service providers should be monitored by law enforcement agencies to minimize risks.
Cyber Technology Impacts
According to Northrop Grumman,
“Nearly every day our nation is discovering new threats and attacks against our country’s networks. Inadequate cyber security and loss of information has inflicted unacceptable damage to U.S. national and economic security”.
In most of the industries, business seems impossible without Information technology but still it is widely accepted that information technology is complex and many people are unwilling or unaware as how they can protect their data and their machines. Therefore, addressing the problem of cyber crime requires creativity, innovative thinking and collaboration to improve the cyber security procedures. The inability of most small and medium size organizations to cope with modern cyber security procedures is a huge barrier in business growth. The most important thing is that organization should have proper IT infrastructure, tools, qualified human capital, and skills to properly manage security issues and minimize the risks. Although budget constraint for small organizations is still there but technological investments are now a days as important and investments in raw material.
According to recent FBI studies,
Cyber crime with over $1 trillion in annual revenues has outpaced drug trafficking as the largest illicit global business.
The global financial crisis had a direct impact on a number of IT trends in 2009. With most IT budgets were reduced, and an increased focus on cost reduction opportunities, IT operational excellence became top of mind for many organizations.
According to Kula,
“If you think about the economy, with layoffs and cutbacks at the same time incidents are increasing exponentially, people are literally overwhelmed with all of their responsibilities.”
Balancing the need to understand and manage the technical parameters of the enterprise network with the need to protect network infrastructure and information while maintaining connectivity and availability of services through a cyber attack is vital. Experience in risk and impact management and an ability to select suppliers and service providers, who have a sophisticated understanding of and deep experience managing, IT and acquisition managers must have tools and techniques available to them to better assess how strongly suppliers meet these necessary criteria. Below mentioned are important factors which need to be considered before executing a strategy to cope with cyber threats and network security issues:
Proper understanding of and experience in dealing with cyber security threats.
A working knowledge of emerging trends in network protection.
Experience in providing cyber security based on effective risk management.
A demonstrated understanding of how to make improvements in cyber security.
An evaluation of how to apply above philosophies with in the organization.
Proper update on going criminal activities and threats on the Internet and continuous research to prevent those threats.
Gartner, Inc. (NYSE: IT) is the world's leading information technology research and advisory company, According to Mr. Armit Williams from North America research director at Gartner,
“Cyber attacks are not new, but what is changing is the motivation behind them. They are no longer just executed by hackers for hobby or cyber vandilism, but by professionals with a targeted aim at one person, one company or one industry, “For example, we have recently seen several companies hiring private investigators to spy on their competitors. Private investigators used Trojans to install targeted spy ware on competitors’ computers to gather confidential information about such things as upcoming bids and customers.”
The incidence of cyber attacks has increased and the consequences of these attacks cost corporations a significant amount of money, reputation and time therefore it is important to suggest the ways to cope with these issues and minimize risks.
Organizations need to properly monitor the non-traditional work arrangements and temporary employees to avoid exposure of customer sensitive data which can damage the organizational repute.
Most of the hackers can attack computer systems because of system misconfiguration so qualified IT staff is very important and shortage of qualified staff is also a matter of concern for organizations.
Proper allocation of IT budgets to prevent potential security issues. Most of the researches which has been done on cyber security issues suggests that the frequency of cyber attacks will continue to increase for the next years and it could have serious implications on businesses as well as individuals therefore investment in cyber security is very important.
A paper by Howard and Longstaff defines an attack as an “event that occurs on a computer or network that is intended to result in something that is not authorized to happen.” (1998)
Threats to Industries
Following are some of the threats which small and medium size industries are facing:
Increasing risk due to use of insecure social media.
Financial losses.
Corporate image and good will.
Unskilled and Disloyal employees.
Security Institute and the FBI report that cyber security attacks have become a leading cause of financial loss by US companies, with businesses reporting an average of more than $160,000 for each security breach. According to the Internet Crime Complaint Center, the total dollar loss from all cases of Internet fraud referred to US law enforcement in 2007 was $239 million.
With the increasing threats for organizations in the corporate world, organizations have started recruiting Chief Security Officers (CSOs) with a combination of technology and business skills and importance of skilled human capital has also increased.
Cyber attacks are more dangerous because it can be made by some one from inside the organization (a disloyal worker) and also some one from outside the organization (a hacker). More recent statistics suggest that fighting viruses cost businesses worldwide $7.6 billion in the first year of 1999. (Futurework,1999) In addition, a DataPro Information Services study estimated that the average hacker attack costs companies $500,000. (Lowry, 1999) In the case where corporate or customer information is stolen or destroyed, the company suffers both the loss of the good as well as the loss of reputation.
Increasing IT outsourcing trends is also one of the reasons for cyber security threats. Exposure of organization systems and information to outsourcing services provider can also increase risks. Research has proved that threats for cyber security and information leakage are always there in the business world. These threats and risks cannot be avoided fully but they can be minimized by identifying the threats and opportunities for the organization. Priorities and shared responsibilities must be communicated across the organization. Communications must be translated into day-to-day activities to the stakeholders. The organizations must adopt continuous improvement approach because cyber security threats and risks of tomorrow may be substantially different from today as hackers and web criminals are inventing tools and new processes on daily basis to steal important corporate and financial information of the organizations. Research & Development and HR department must be strengthened especially the roll of HR is very crucial in this regard. People are considered to the most important asset for any organization, if human capital of the organization is capable enough to meet the challenges of a modern business world than organizations can easily touches new heights of success.
Clark urges enterprises to join and collaborate with industry associations to share security knowledge and concerns. Training can go a long way in today’s economic environment, in which staff is expected to do more with less. Not all organizations are fully equipped with the available latest technologies and mean to avoid cyber security threats but if staff meets the security and performance requirements, it will make a difference. Experience in risk and management and an ability of HR to recruit employees, who have a sophisticated and deep understanding of managing security issues is important. HR managers must have tools and techniques available to them to better assess how strongly skilled employees meet these necessary criteria.
Functional Cyber Security and Information Assurance
Authentication, authorization, and trust management.
Access control and privilege management.
Attack protection, prevention, and preemption.
Large-scale cyber situational awareness.
Automated attack detection, warning, and response.
Insider threat detection and mitigation.
Detection of hidden information and covert information flows.
Recovery and reconstitution.
Forensics, trace back, and attribution.
Securing the Infrastructure.
Secure Domain Name System.
Secure routing protocols.
Internet protocols.
Secure process control systems.
Domain-Specific Security.
Wireless security.
Secure radio frequency identification.
Security of converged networks and heterogeneous traffic.
Next-generation priority services.
Digital Economics Impacts
The introduction of electronic commerce is considered as revolution for the businesses. It is now becoming much easier for the customers to access the mainstream products and increasing flexibility and adaptability that technology advances bring to mainstream products will make it more practical and cost effective to build accessibility directly into these products, often in ways that increase their mass market appeal. It is perceived as less costly and more effective. The intelligent software agents, provided by Excite or Yahoo!, which help the consumer search for a particular product. These agents save the customer’s time and effort he otherwise would have to spend ‘visiting’ every single virtual shop or shopping mall. Other additional values would be the given transparency, the greater freedom of priority choices and the individualization of the on-line shopping experience. It saves time and money and lead to a higher customer satisfaction.
An increase in electronic business provides growth to the small and medium size industries especially with fewer budgets to construct a huge physical infrastructure and recruit sales representatives. Further the product and services are easily accessible to the large number of customers.
However there are some disadvantages of electronic commerce as well. Face to face interaction is missing in electronic commerce; some product features needs to be explained directly to the customer which is not possible in case of Internet trade.
Economies of Scales
The internet is the first medium that allows for a rich, unique and flexible communication, to many people simultaneously. Each customer controls the type of information it receives, based on individual needs. Internet marketing also helps to communicate a message to a large audience for a longer period of time as compared to a TV commercial message that can be conveyed in a 30 seconds and might not have more effect on the target market. Further most of times, sales personnel is only able to communicate with one customer at a time which shows high richness and low reach.
The unique path each customer takes through a web-site presents a unique set of information for that person. With the rapid use of electronic commerce, it helps the businesses to achieve economies of scale. It is very fruitful for small firms as cost is low and customer satisfaction is high. It also helps the organizations to deliver customize products to the individual customers which results in increase in sales and contribution margin.
There are also vast changes in marketing and advertising strategies or the new forms of management, company’s orientation, cooperation and interdependence between firms, which are actually the core of the economic high speed evolution.
To ensure financial security secure methods of payment are vital for widespread commercial use of the Internet trade. Below are some methods of payments widely used in electronic commerce:
Methods of Payments
Credit Cards and Cheques.
Electronic cash or digital cash.
Micro payments.
Smart cards.
Internet trade has also changed the pricing behaviors. Although retailers and research institutes claim that better prices are seen as a positive side effect with many customers the main reasons for Internet shopping are still convenience, ease of research, availability and product variety (U.S. Department of Commerce, 1998).
In case of digital products, cost structure also differs from the traditional manufactured goods. Digital products typically have small variable costs, and can have zero variable costs, assuming the product (software for instance) is being marketed directly from the web-site, with no distribution or packaging costs.
Electronic Commerce
Electronic commerce has developed at a very fast pace in the last few years. It is a general perception that electronic commerce is just about buying and selling things over the Internet, however in a broader term it can be described as electronic exchange of business data between two or more organizations.
“The primary technological goal of e-commerce is to integrate businesses, government agencies, and contractors into a single community with the ability to communicate with one another across any computer platform.”(Edwards, 1998)
Many information technology driven companies are providing software solutions to the customers across the globe also falls in the category of electronic commerce. Electronic banking and transfer funds between accounts is also a way of doing Internet trade. The increasing use of credit card as payment method has changed the face of business. Electronic commerce also helps the companies to conduct business transactions and successful exchange of useful information even they are too far from each other.
”Dell Computers sells more than $14 million worth of computer equipment a day from its web-site. By taking their customer service department to the web Federal Express began saving $10,000 a day. The Internet provides businesses with the opportunity to sell their products to millions of people, 24 hours a day.” (Baxton, 1999)
Advantages of E-Commerce
Cost effective as cuts down the cost associated with marketing, customer care, processing, information storage and inventory management.
More Efficient as it increases productivity and customer care services.
Wide access to global market even by small enterprises.
No geographical limitations.
High speed transactions.
Very little investment required to start business on line without investing too much in physical infrastructure.
Minimum time restrictions to make transactions.
Customization of products to meet the demands of individual customers.
It collects and manages information related to customer behavior, which in turn helps develop and adopt an efficient marketing and promotional strategy.
Disadvantages of E-Commerce
One of the biggest disadvantage of e-commerce that still Internet is not in the access of the complete world population especially in developing and underdeveloped countries very few people are enjoying the facility of Internet.
Some people simply refuse to trust the authenticity of business transactions through Internet.
Not suitable for food items like vegetable, food etc.
Time period required to deliver products physically is also significant.
Returning of product and getting a refund is also difficult in case of Internet trade.
Lack of personal interaction with the customer.
Too much competition.
Lack of customer relationship management.
Many people consider shopping as social experience which cannot be enjoyed in case of Internet trade.
Transactions security issues.
Chances of fraud because of credit cards.
Customer cannot physically touch the product before buying like in case of fabric hand feel is very important which cannot be checked in electronic transaction.
Although the advantages of e-commerce are more than its disadvantages but proper strategy needs to be developed to address the technical issues and to increase the customer trust. Electronic commerce is really helpful in boosting the economy and plays an important role in economic growth.
Conclusion and Recommendations
The use of Information technology has been continuously increasing and small and medium size industries are not investing sufficiently in research and development to handle cyber security threats.
Organizations need to develop long term strategic cyber security objectives to improve the productivity of the businesses and to ensure that resources are available to support these objectives. Employees in the organizations need to be properly trained to avoid mishandling of information. In this case education and skills training is also essential. Literature regarding cyber-attacks and technology should be available at the workplace
Further research and development in cyber security and information assurance should be considered as strategic objective. Relying on short term strategy is not a substitute however it is important to strengthen the IT infrastructure. Companies needs to be identified what and where the valuable data is in the organization, the IT departments should take necessary measures to secure that data and information. Government role is also very important in this regard; laws should be made and implemented to secure electronic transactions, e-mail, and messaging.
The bottom line is that cyber security in a modern business world is a necessity. The speed at which threats are multiplying on daily basis, enterprises are not taking measures accordingly. Above all proper management and control requires equally deep understandings of network operations and cyber threats. IT managers and supporting contractors must have a thorough understanding of cyber threats and experience in risk and impact management and organizations which does not have proper IT infrastructure should take appropriate steps to reposition their IT infrastructure to improve operational IT excellence. Disciplined methods and tools can reduce the amount of effort required to achieve desired results. Continuous feedback is also important for technological improvements. Cyber security strategy should be considered as a core strategy for all organizations regardless of business scale. Effective means should be adopted to resolve the problems in sharing information between industry and the research community.
References
Adams, J. 1998. Keynote Address by James Adams, chief executive officer of the United Press International. Seybold Seminars, New York, 19 March 1998. Http://www.upi.com (July 1998).
and management issues. Paper presented at the XI World Forestry Congress. Antalya, Turkey, 13–22 October 1997. Volume 4, topic 21, part 1.
Anton, J., Hoeck, M., 2002, e-Business Customer Service, The Anton Press, Santa Monica, CA.
Athanassopoulos, A.D., 2000. Customer satisfaction cues to support market segmentation and explain switching behavior. Journal of Business Research 47 3, pp. 191Œ207.
Bell, D. (1976), 'The Coming of Post-Industrial Society'.
Bell, D. (1976), “The Coming of Post-Industrial Society: A Venture in Social Forecasting”, New York; Basic Books.
Benet, Harvey (2000), “Dynamic Pricing Reaches Most Industries”;
Benfield, B. (2005). ‘Smart clothing, convergence, and a new iPAQ’.
Berkley, B.J. and Gupta, A., 1994. Improving service quality with information technology.
Bose, R., 2002, "Customer relationship management: key components for IT success", Industrial Management & Data Systems, 102, 2, 89-97.
Brooks, D.J. 1997. Demand for wood and forest products: macroeconomic
Burg, Bob (1999), “Endless Referrals”, http://www.burg.com/f-er.html.
Burstein, J. (2008) 'Toward a culture of cyber security research'. Harvard Journal of Law and Technology.
Cairncross, F. (1997), “The Death of Distance : How the Communications Revolution Will Change Our Lives”, Harvard Business School Press.
Cardelli, L. (1995). 'A language with distributed scope'. In Proceedings of the 22nd ACM Symposium on Principles of Program-ming Languages.
Chamberlain, E.H.(1951), “Monopolistic Competition Revisted”, Económica, N.S.18; pp343-62.
Computers and Obtaining Electronic Evidence in Criminal
Corne, D and Ross, P. (1994). 'Fast practical evolutionary timetabling, Lecture Notes in Computer Science, LNCS 865, pp. 251-263.
Costa, D. (1994) A tabu search algorithm for computing an operational timetable, European Journal of Operational Research, vol. 76, pp. 98-110.
Coull, S., Collins, M., Wright, C., Monrose, F. and M.K. Reiter. (2007) On web browsing privacy in anonymized netflows. In Proceedings of the 16th USENIX Security Symposium, pages 339– 352.
CRM Magazine (2008) ‘Convergence of sales and marketing technologies leads to higher productivity’, CRM Magazine, Volume 12, Issue 3, pp. S8(1).
Csis.org (2000), The Center for Strategic and International Studies, http://www.csis.org.
Curry, James (1997), “The Dialectic of Knowledge-in-Production: Value Creation in Late Capitalism and the Rise of Knowledge-Centred Production”; Electronic Journal of Sociology.
D.C.: New Millennium Research Council. Vanderheiden Digital millennium paper.
Dean, D. and Wallach, D. (1995) 'Security aws in the HotJava browser. Technical Report 95-501, Department of Computer Science'.
DeWerra, D. (1985) An Introduction to Timetabling, European Journal of Operational Research, vol. 19, pp. 151-162.
Douglas, A. (2004). 'Deworming the Internet'. Texas Law Review, 83:279–329'.
Draft, National Institute of Standards and Technology Special Publication 800-82.
Dyson, E. (1997), Release 2.0: A Design for Living in the Digital Age”, New York: Broadway Books.
European Forest Institute, Joensuu. Varian, H. 1995. The Information Economy. Scientific American, September. Pp. 200–201.
Fahrion, R and Dollanski, G. (1992) Construction of university faculty timetables using logic programming techniques, Discrete Applied Mathematics, vol. 35, no. 3, pp. 221-236.
for Newspapers in Australia. Presentation to the 1997 PaperCom Asia-Pacific Conference by Russ Horner, Managing Director of Australian Newsprint Mills Ltd.
for the Future. Discussion Paper 97–42.
Gibbs, W. 1998. The Reinvention of Paper. Scientific American, September 1998. Http://www.sciam.com (August 1998).
Goodman, E. and Herbert, (2007). Toward a Safer and More Secure Cyberspace. National Academies Press.
Harberger, A. (March 1998), “A Vision of the Growth Process'.
Haynes C. and Friedman, D. (1987). Embedding continuations in procedural objects. ACM Transac- tions on Programming Languages and Systems.
Hildebrand, C., 1999, "One to a customer", CIO Magazine, 12.
Hintze,J. (2006), ‘CRM Systems Get an Institutional Flavor’, Securities Industry News, 10/9/2006, Volume 18 Issue 34, pp 1-33.
Holmund, M, Kock, S, 1998, "Relationships and the internationalisation of Finnish small and medium-sized companies", International Small Business Journal, 16, 64, 46-63.
Horner, R. 1997. Over the Fence or Down the Wire' The Outlook
Hsieh, C. & Lin, B. (1998). Internet commerce for small businesses. Industrial Management & Data systems, No.3, pp. 113-119
Huang, X., Brown, A., 1999, "An analysis and classification of problems in small business",
International Journal of Information Management 14 2, pp. 109œ121
International Small Business Journal, 18, 1, 73-85.
Investigations. 2002.
Ballantine, J. and Levy,M. (1998). 'Evaluating information systems in small and medium-sized enterprises: issues and evidence'. European Journal of Information Systems.
Keith, S. (2008). Guide to Industrial Control Systems (ICS) Security, Final Public
Kollin, J. (1993). 'A Retinal Display for Virtual-Environment Applications. In Proceedings'.
Kurzweil, R. (2001). 'The law of accelerating returns'.
Kurzweil, R. (2006). 'Why we can be confident of Turing test capability within a quarter century'.
Lancaster, K.J. (1996) 'A New Approach to Demand Theory'.
Laudon, K. & Laudon, J. (2007) Management Information Systems, 10th Edition, New York: Prentice Hall.
Liu, J. (2003). 'The DMCA and the Regulation of Scientific Research', Berkeley Technology Law Journal, 18:501.Management, 23(3), 199‐214.
Management: Administering Uncertainty in Norwegian Offshore Oil: Norwegian
March J.G. and Simon, H.A. (1958), Organizations, New York: Wiley.
Marshall, A. (1920), 'Principles of Economics'.
Nadvi K. (1996), 'Small Firm Industrial Districts in Pakistan'
Narayanan, A and Shmatikov, V (2006) How to break anonymity of the netflix prize dataset.
O'Brien, J. & Marakas, G. (2008) Management Information Systems, 8th edition, McGraw Hill Higher Educationof hearing Americans. Washington, D.C.: Gallaudet University Press’.
of the Motion Felten v. RIAA (Nov. 8, 2001), CV-01-2669 (GEB)
Ohm, P., Sicker, D. and Dirk Grunwald. (2007) Legal Issues Surrounding Monitoring (Invited Paper). In Internet Measurement Conference.Organization Science, 7 (5): 524‐543.organizations: an empirical examination of risk, performance and decline, Oxford: Oxford University Press.
Pang, R., Allman, M., Paxson, V. and Lee, J. (2006). 'The devil and packet trace anonymization. Computer Communication Review.
Peltz Strauss, K. (2006). ‘A new civil right : telecommunications equality for deaf and hard
Peppers, D. and Rogers, M., Enterprise One To One. Tools for competing in the Interactive age. Doubleday, 1997.
Peppers, D., Rogers, M., 2000, "Successful Web sites", DMReview.Com, 4 February
Perrow, C. (1984). Normal Accidents: Living with HighRisk
Pine, J., 1993. Mass customization. , Harvard Business School Press, Boston
Rajab,M., Zarfoss, J., Monrose, F. (2006) 'A multifaceted approach to understanding the botnet In Proceedings of the IMC. ACM'.
Rayport, J.F., Sviokla, J.J., 1995, "Exploiting the virtual value chain", Harvard Business Review, 75-85.
Rhys, D. G. (1989), The Motor Industry in the European Community (Hertford: IMI).
Romano, A.C. Jr, 2000, "Customer relations management in information systems research", Chung, H.M., Proceedings of the Americas Conference in Information Systems (AMCIS), 10-13 August, 811-9.
Rowley, Jennifer, 2002“ Using case studies in research“, Management Research News; Volume 25 No. 1; 2002
Salgado,R. (2004) Know Your Enemy, chapter Legal Issues, pages 228–252.
Sauders, M., Lewis, P. & Thornhil, A. (2007) Research Methods for Business Students, 4th edition, Prentice-Hall.
Schaerf, A. (1995) 'A survey of automated timetabling, Technical report: CS-R9567, Centrum voor Wiskunde en Informatica'.
Schmitt,H (2003) The Customer Experience Management: A Revolutionary Approach to Connecting with Your Customers, John Wiley & Sons.
Sedjo, R. 1997. The Forest Sector: Important Innovations. Resources
Shenhar, A. J. (1993). From low‐ to high‐tech project management. R&D
Solberg, B. (ed.) 1996. Long-Term Trends and Prospects in World
Solove, D and Chris Hoofnagle, J. (2006)). A model regime of privacy protection. University of Illinois Law Review, pages 356– 403.
Solove, D., (2002) 'Digital dossiers and the dissipation of fourth amendment privacy. Southern California Law Review', pages 1083–1167.
Stigler, G.J. (1961), 'The Economics of Information'.
Stinchcombe, A. L. and Heimer, C. A. (1985). Organization Theory and Project
Sullivan, K., & Sorenson, P. (2004). ‘Ease of Use/PC quality roundtable: Industry challenge
Supply and Demand for Wood. EFI Research Report 6.
Tardo, J and Valente, L. (1996) 'Mobile agent security and Telescript. In IEEE CompCon'.
Taubes, G. (1994). ‘Taking the data in hand literally with virtual reality science’.
Technologies, NewJersey: Princeton University Press.
to address costly problems’.
U.S. Department of Justice. Brief of the United States in Support
United States Department of Justice, editor. Searching and Seizing
Universal Design practices by consumer product manufacturers’.
University Press and Oxford University Press.
VanDam, C. (1999) “Encryption and Authentication: Securing Electronic Communication”, MIT.
Vanderheiden, G. C. (2003). Access to voice-over-internet protocol (“VoIP”). Washington,
Vanderheiden, G., & Tobias, J. (1998). ‘Barriers, incentives and facilitators for adoption of
Verity, John, (1997) “Vision Quest”, Computer World (15. December, 1997).
Viner, J. (1932) “Cost Curves and Supply Curves”, Zeitschrift für National-ökonomie.
Volverton, T. (2000), “MP3 player “sale” exposes Amazon’s flexible prices”, http://news.cnet.com/new
Wall Street Journal Americas (2000); “La Democratizacion Tecnologica: El Caballo Ganador para los Economias Emergentes”, El Mercurio, ( September 26, 2000).
Wallace, J. and J.Erickson (1992), “Hard Drive: Bill Gates and the Making of the Microsoft Empire”, New York: Harper Business.
Weber, M. (1947) “The Theory of Social & Economic Organization”, AM Henderson and Talcott Parsons, trans., Talcott Parsons, ed. Glencoe, Ill.: Free Press.
Weiss, G. (1999). 'The MIT Press, Cambridge, Massachusetts'.
Wickelgren, I. (2003). ‘Tapping the mind science’.
Wiseman, R.M. and Bromley, P. (1996). ‘Toward a model of risk in declining
Wolff, E. (1996) 'The Growth of Information Workers in the U.S. Economy'.
Wolff, E. (1996) “The Growth of Information Workers in the U.S. Economy, 1950-1990: The Role of Technological Change”, unpublished.
Woodall, Pam (2000) “Untangling e-conomics”, The Economist, A survey of the New Economy, September.
Woodward, J. (1965). Industrial Organization: Theory and Practice, 2nd edn.,
Wooldridge, M. Jennings, N. (1995) 'Intelligent agents: theory and practice, The Knowledge Engineering Review, vol. 10, no. 2, pp. 115-152.
Yin, R.K, (2004), Case Study Research: Design and Methods, London: Sage.
Zack, J.G. (1996). ‘”Risk‐Sharing” – Good Concept, Bad Name’, Cost Engineering,

