• Grid View
  • List View
  • IT Best Practices - OSHA's New Approach to Ergonomics (June 2002)

    OSHA’s New Approach to Ergonomics (June 2002)

    Even though the Congress squashed ergonomic requirements established when Bill Clinton was in office, ergonomics remains a critical issue. Furthermore, problems are likely to mount in the future, and within two decades the negative impact of poorly designed office furniture and information technology will result in considerable economic impact on individuals, corporations, the government, and ultimately the taxpayer.

    May, 2002

  • IT Best Practices - E-Business Practices in 2002 (May 2002)

    E-Business Practices in 2002 (May 2002)

    E-business practices are becoming rather widely adopted in most industry sectors according to the 13th annual Information Systems and E-Business Spending study conducted by Computer Economics. Virtually all of the organizations that participated in the 2002 study have web sites and large percentages of companies in every sector are using B2B or B2C applications.

    May, 2002

  • IT Best Practices - Internet Scams Cost Americans

    Internet Scams Cost Americans

    Nearly 43 percent of all reported Internet fraud comes from auction fraud, according to the Internet Fraud Complaint Center's (IFCC) annual data trends report.

    April, 2002

  • IT Best Practices - Security Management Update

    Security Management Update

    The importance of managing information systems as well as corporate security has been highlighted by the terrorist attacks of 2001. Computer Economics has been consistently reporting on significant research on security management and the perspectives of managers, security professionals, and consumers on security issues. The following studies and events have occurred over the last few months.

    April, 2002

  • IT Best Practices - Security Awareness Is Low (April 2002)

    Security Awareness Is Low (April 2002)

    PentaSafe Security Technologies has published its 2002 Security Awareness Index (SAI) Report based on results from a free online survey, designed to measure organizations’ information security awareness. Analyzing responses from 583 companies and 1,350 individual employees worldwide, the 2002 SAI Report indicates that 23% of security officers consider their organization’s security awareness as dangerously inadequate, while an additional 44% consider their security awareness inadequate. Nearly 6 out of 10 employees who have taken the survey score, on average, only a D or unsatisfactory grade when it comes to appropriate security awareness and behavior.

    April, 2002

  • IT Best Practices - The Computer Economics Security Review 2002 (April 2002)

    The Computer Economics Security Review 2002 (April 2002)

    The focus on security has been heightened by the September 11 terrorists attacks on the United States. The attention to improving security has been long overdue and it is tragic that it took such events to raise the awareness about the need for security.

    April, 2002

  • IT Best Practices - G10 Trends in Retail Payment Methods

    G10 Trends in Retail Payment Methods

    The Web may be worldwide but the differences in payment methods for non-cash transactions in the G10 countries vary considerably. This short report shows for the G10 countries in 1999, the percentage of payments by debit card, credit card, direct debit, credit transfer, and paper check.

    April, 2002

  • IT Best Practices - Global Tensions Heighten IT Security Awareness (March 2002)

    Global Tensions Heighten IT Security Awareness (March 2002)

    The war on terrorism has increased anxiety throughout the U.S. Not the least concerned are managers and users of IT systems. Numerous statistics show that this concern is well placed, but the source of attacks on IT systems is more likely to be domestic than foreign. Company employees, not hackers on the Internet, have caused the largest financial losses from security breaches. This fact should not be interpreted as recommending minimizing protecting against exterior security invasions but rather that good security must consider all potential points of attack.

    March, 2002

  • IT Best Practices - IT Accounting and Chargeback Systems

    IT Accounting and Chargeback Systems

    IT accounting and chargeback systems are integral for tracking IT resources. Computer Economics has researched and summarized IT accounting and chargeback systems of five major players in the cost accounting software space.

    March, 2002

  • IT Best Practices - Hot Site Fees for Disaster Recovery

    Hot Site Fees for Disaster Recovery

    This report shows hot site disaster recovery charges according to platform type. The monthly fee column represents the charge that the consumer of hot site services must pay per month to assure that the services are available when needed. The declaration charges column represents the amount of money that a consumer must pay to begin receiving hot site services when the disaster occurs, and the final, daily usage charges column represents the amount of money that the disaster-stricken consumer must pay during each day that the hot site is used. Prices are shown in U.S. dollars.

    March, 2002

  • IT Best Practices - Web Procurement Provides Major Operational and Maintenance Savings

    Web Procurement Provides Major Operational and Maintenance Savings

    Many organizations know that their paper-based procurement systems are expensive and inefficient, but too few realize that online procurement is a practical alternative. In particular, many small- to medium-size businesses fail to comprehend that cost-effective e-procurement for them is a reality today. This is not to say that IT managers should recommend that their organizations jump blindly into placing orders on the Web, but rather that a good plan will likely lead to a much improved procurement system. These improvements will not only cut costs but the quicker responses also will satisfy users.

    March, 2002

  • IT Best Practices - Financial Impact and Background Information on Distributed Denial of Service Attacks

    Financial Impact and Background Information on Distributed Denial of Service Attacks

    In early February 2000, seven top e-commerce websites in the private sector were attacked by distributed denial of service (DDoS) intrusions, resulting in a $10.6 million loss in unrealized revenues from sales and advertising. From our analysis of Securities and Exchange Commission (SEC) filings and Media Metrix data, we estimate that in a reporting quarter, there are 75 high-volume days. We estimate that DDoS attacks cost the e-commerce sites 24 hours worth of high-volume revenues.

    March, 2002

  • IT Best Practices - How to Report Internet and Computer-Related Crimes (Jul 2000)

    How to Report Internet and Computer-Related Crimes (Jul 2000)

    Internet and computer-related crimes should be reported to appropriate law enforcement investigative authorities at the local, state, federal, or international level.

    March, 2002

  • IT Best Practices - Biometric Security Moves Into the Real World

    Biometric Security Moves Into the Real World

    No system administrator wants to admit the vulnerability of IT systems protected merely by passwords. The need to protect valuable, proprietary information systems against unauthorized access is encouraging a number of organizations to introduce biometric security measures. This short report outlines six types of biometric security systems. (3 pp, 2 figs.)

    March, 2002

  • IT Best Practices - Software Pricing Innovations Can Cut Costs

    Software Pricing Innovations Can Cut Costs

    The Internet is impacting software prices in ways that many buyers will find attractive. Consequently, vendors are being forced to rethink their traditional application software pricing structures. Software vendors are experiencing negative pressures to the commonly encountered price-per-CPU pricing structure they have used in charging customers in the past. At the same time, more flexible pricing strategies are being introduced. These pricing strategies are being driven less by the software vendors themselves than by application service providers (ASP) and fall-outs of court cases such as Microsoft's recent setback. As a result, software buyers have an opportunity to reduce their application server costs if they are sufficiently informed and wise in their decisions.

    March, 2002