Charles Sturt University

Displaying 1-7 of 7 results

  • White Papers // Jun 2013

    The Effect of IT Complementary Resources on Fast Growth Small-to-Medium Enterprise Performance: A Resource-Based View

    Owing to limited resources available to Small-to-Medium Enterprises (SMEs) to take advantage of technologies, IT is regarded as less important to SMEs compared with larger firms. Understanding whether and how IT helps SMEs to achieve business advantage still remains unclear. Drawing upon the resource-based view theory, the Information Systems (IS)...

    Provided By Charles Sturt University

  • White Papers // May 2013

    The Security Challenges and Countermeasures of Virtual Cloud

    The adaption of cloud computing is on a rise these days, due to the various effects that it has on enterprise. As it allows the users to have scalable infrastructure and economical benefits which indeed a way to boost any enterprise mind in opting for such service. Cloud Computing offers...

    Provided By Charles Sturt University

  • White Papers // Feb 2012

    New Computing Paradigm: Software Testing in Cloud, Issues, Challenges and Need of Cloud Testing in Today's World

    The massive proliferation of affordable computers, Internet broadband connectivity and rich education content has created a global phenomenon in which Information and Communication Technology (ICT) is being used to transform education. Therefore, there is a need to redesign the educational system to meet the needs better. The advent of computers...

    Provided By Charles Sturt University

  • White Papers // Dec 2011

    An Empirical Study of Challenges in Managing the Security in Cloud Computing

    Cloud computing is being heralded as an important trend in information technology throughout the world. Benefits for business and IT include reducing costs and increasing productivity. The downside is that many organizations are moving swiftly to the cloud without making sure that the information they put in the cloud is...

    Provided By Charles Sturt University

  • White Papers // May 2011

    ESaaS: A New Education Software Model in e-Learning Systems

    SaaS solutions have recently been gaining in popularity. As a software distribution model in which applications are hosted by a vendor or service provider, SaaS is available to users over the Internet in a form of the \"Cloud.\" Introducing a new concept of ESaaS that is defined as Education Software-as-a-Service,...

    Provided By Charles Sturt University

  • White Papers // Dec 2010

    The Economics of Developing Security Embedded Software

    Market models for software vulnerabilities have been disparaged in the past citing how these do little to lower the risk of insecure software. In this paper, the authors argue that the market models proposed are flawed and not the concept of a market itself. A well-defined software risk derivative market...

    Provided By Charles Sturt University

  • White Papers // Dec 2010

    An Analytical Study of IT Security Governance and Its Adoption on Australian Organisations

    Contemporary organisations are at infancy stages of adopting IT governance processes in Australia. Organisations who have adopted these processes underestimate the security processes within the governance framework. If the security processes are designed, they are often flawed with operational level implementation. This paper investigates IT security governance broadly and in...

    Provided By Charles Sturt University

  • White Papers // May 2013

    The Security Challenges and Countermeasures of Virtual Cloud

    The adaption of cloud computing is on a rise these days, due to the various effects that it has on enterprise. As it allows the users to have scalable infrastructure and economical benefits which indeed a way to boost any enterprise mind in opting for such service. Cloud Computing offers...

    Provided By Charles Sturt University

  • White Papers // Jun 2013

    The Effect of IT Complementary Resources on Fast Growth Small-to-Medium Enterprise Performance: A Resource-Based View

    Owing to limited resources available to Small-to-Medium Enterprises (SMEs) to take advantage of technologies, IT is regarded as less important to SMEs compared with larger firms. Understanding whether and how IT helps SMEs to achieve business advantage still remains unclear. Drawing upon the resource-based view theory, the Information Systems (IS)...

    Provided By Charles Sturt University

  • White Papers // May 2011

    ESaaS: A New Education Software Model in e-Learning Systems

    SaaS solutions have recently been gaining in popularity. As a software distribution model in which applications are hosted by a vendor or service provider, SaaS is available to users over the Internet in a form of the \"Cloud.\" Introducing a new concept of ESaaS that is defined as Education Software-as-a-Service,...

    Provided By Charles Sturt University

  • White Papers // Feb 2012

    New Computing Paradigm: Software Testing in Cloud, Issues, Challenges and Need of Cloud Testing in Today's World

    The massive proliferation of affordable computers, Internet broadband connectivity and rich education content has created a global phenomenon in which Information and Communication Technology (ICT) is being used to transform education. Therefore, there is a need to redesign the educational system to meet the needs better. The advent of computers...

    Provided By Charles Sturt University

  • White Papers // Dec 2010

    The Economics of Developing Security Embedded Software

    Market models for software vulnerabilities have been disparaged in the past citing how these do little to lower the risk of insecure software. In this paper, the authors argue that the market models proposed are flawed and not the concept of a market itself. A well-defined software risk derivative market...

    Provided By Charles Sturt University

  • White Papers // Dec 2010

    An Analytical Study of IT Security Governance and Its Adoption on Australian Organisations

    Contemporary organisations are at infancy stages of adopting IT governance processes in Australia. Organisations who have adopted these processes underestimate the security processes within the governance framework. If the security processes are designed, they are often flawed with operational level implementation. This paper investigates IT security governance broadly and in...

    Provided By Charles Sturt University

  • White Papers // Dec 2011

    An Empirical Study of Challenges in Managing the Security in Cloud Computing

    Cloud computing is being heralded as an important trend in information technology throughout the world. Benefits for business and IT include reducing costs and increasing productivity. The downside is that many organizations are moving swiftly to the cloud without making sure that the information they put in the cloud is...

    Provided By Charles Sturt University