USING INNOVATIVE APPROACHES WHEN ANALYZING INFORMATION SYSTEMS (IS) FAILURE STORIES
Published In: 5TH INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL SCIENCE, MANAGEMENT AND HUMAN BEHAVIOUR
Author(s): LYNETTE DREVIN
Abstract: We are living and functioning in an ever-changing environment where technology plays a big role – in businesses and in individuals’ lives. Often information systems have to support a variety of these functions. However, failures within these systems are evident and often reported on. In this paper, certain results of a study are discussed where case histories were investigated in which IS stakeholders were asked to share their experiences concerning the development and use of an Information System (IS). They shared stories from their own perspective and context within the organization, focusing on failure situations. These narratives were analyzed making use of three approaches and taking into account the views of multiple-user groups. The contribution of this work was to use a multi-perspective lens in order to gain insight into different users’ experiences, to interpret the complexity of the situation, and to listen to the often small voices of lower level users. The benefit of using
- Publication Date: 28-May-2017
- DOI: 10.15224/978-1-63248-124-5-21
- Views: 0
- Downloads: 0
MANAGING USERS GROUP, PASSWORDS, DOMAIN POLICIES, DEPARTMENT RIGHTS POLICIES)
Published In: 5TH INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL SCIENCE, MANAGEMENT AND HUMAN BEHAVIOUR
Author(s): ASIF KAMRAN , USMAN UZ ZAMAN
Abstract: This study is to examine the Management science in the field of Information Security and Domain Admins. These departments have all access control of the corporate organization by this model research in which 4 variables are defined as dependent variable upon management who controls Networks, System applications, manages infrastructure, creating Servers where Domain ID’s and IP’s are being created through MS- windows tool for creating access credential by rule of the IP’s which was created in designed areas, regions, zone and main office to give right User Identity. The given information by this model, Groups created were to predict for which access security is to define for users role and privilege to Centralized applications and Log-in Access to server which is connected to server based applications for logs save and all activity logs from one centralized backup server.
- Publication Date: 28-May-2017
- DOI: 10.15224/978-1-63248-124-5-22
- Views: 0
- Downloads: 0