From the Editor.
I am pleased to introduce this issue, which includes four regular articles. The first article, “Information Security Threats: A Comparative Analysis of Impact, Probability, and Preparedness,” authored by Mary Sumner, addresses the assessment of information security risks and risk mitigation strategies used to manage and minimize these information security risks. The results, based on a survey of 102 IT professionals representing diverse industries, showed that for many of the highimpact, high-probability risks, the level of preparedness was aligned with the level of risk. In the second article, “Content and Design of Corporate Governance Web Sites,” by Yabing Jiang, Vijayalakshmi Raghupathi, and Wullianallur Raghupathi, the authors investigate the effectiveness of various web site features and content in providing transparency to the investors of S&P 100 companies. Their findings can be used as a checklist for executives when planning the content for corporate governance websites. The third article, “Narrative- Based Collaboration Systems for Distributed Teams: Nine Research Questions for Information Managers,” by Stephen M. Fiore, Rudy McDaniel, and Florian Jentsch, explores how elements of narrative may be useful in combating the negative effects of geographically-diverse teams. The authors conclude that story-telling can be a form of contextual glue that unites team members over space and time. In the fourth article, entitled “ENUM: Is it time to get ready for Orwellian ID?,” authors Ranjan Kini and Michael W. Wilson document, summarize, and analyze the issues associated with Electronic Numbering, such as privacy concerns. The final answer to the study question is dependent on the outcome of many trials that are currently underway around the world. The fifth article, “Theories: For Academics and Practitioners” authored by Scott L. Schneberger, Carol E. Pollard, and Hugh J. Watson, presents the debate between academic researchers and practical- minded business leaders regarding the role of theoretical research. The authors argue that theories can actually provide the basis for synergism between these two groups of people. In the sixth article, “Using Social Network Analysis to Measure IT-Enabled Business Process Performance,” author Nik R. Hassan proposes a seven-step methodology to facilitate the decision-making process involving IT investment tradeoffs using social network analysis. The author concludes with a discussion of the benefits and limitations of SNA. Also included in this issue are three columns. In the first column, IT Strategy and Innovation, William R. King focuses on “Text Analytics: Boon to Knowledge Management?” Bill discusses the prospects of text analytics as a useful tool for reducing the labor intensity of knowledge management. In the second column, Through a Glass, Darkly, Robert L. Glass explores the issue of “Creativity vs. the Law.” Bob presents both sides of the dispute and how it relates to the development of new IT products, but he leaves the conclusion up to you, the reader! In the third and final column, BOOKISMS, Paul Gray reviews three books in “Math, Data or Hype Driven?” Paul views these three books as providing three different perspectives about the part of the problem with which each author is familiar. The first two books address data and how it can be manipulated for influence or profit. The third book presents a new way of looking at adoption of an innovation. As always, I believe you will enjoy Paul s lively reviews.
|Main Author:||Sipior, Janice C.|