• Grid View
  • List View
  • Research Bytes - Key IT Process Management Areas Need Help

    Key IT Process Management Areas Need Help

    For any IT organization to run properly there are several key processes that must run efficiently and effectively. However, a recent study conducted by Computer Economics indicates that there is a lot of room for improvement.

    December, 2002

  • Research Bytes - Return on Investment for CRM Systems Remains Elusive

    Return on Investment for CRM Systems Remains Elusive

    Customer Relationship Management (CRM) systems are approaching their tenth birthday and, even so, there is still a lot of confusion over what constitutes a CRM system.

    December, 2002

  • Research Bytes - Misuse of Computer Equipment and Networks Is a Growing Problem

    Misuse of Computer Equipment and Networks Is a Growing Problem

    Many companies now require employees to sign “appropriate use” agreements if they have access to company-owned computer equipment and networks.

    December, 2002

  • Research Bytes - IT Salary Survey Data Shows Declines

    IT Salary Survey Data Shows Declines

    The continuing layoffs by technology companies, the dotcom bust, and the past few years of flat IT spending has taken its toll on IS salary trends, especially for positions on the higher end of the scale.

    December, 2002

  • Research Bytes - IT Equipment Disposal Costs Continue to Rise

    IT Equipment Disposal Costs Continue to Rise

    Today, the sheer volume of used computer equipment that must be disposed of has made this a problematic issue--and one that has attracted upper management attention. As a result, the computer recycling business is booming and the price of using these services is on the upswing.

    November, 2002

  • Research Bytes - IT Contractor/Temp Use Falls Dramatically in Utility Companies

    IT Contractor/Temp Use Falls Dramatically in Utility Companies

    Although most industries have experienced a significant decrease in the use of IT contractor/temp personnel, utility companies have been more aggressive than most in pulling in the reins on this spending category.

    November, 2002

  • Research Bytes - Nearly One-Third of Polled Firms Have No Written IT Security Policy

    Nearly One-Third of Polled Firms Have No Written IT Security Policy

    A survey conducted in June 2002 by Computer Economics revealed that 30% of the organizations polled do not have written IT security policies in place, despite the fact that written policies are key to a successful security effort.

    October, 2002

  • Research Bytes - IT Contract and Consulting Providers Receive Mediocre Report Cards

    IT Contract and Consulting Providers Receive Mediocre Report Cards

    A newly released study conducted by Computer Economics indicates that most end user organizations do not feel their contract and consulting service providers are delivering as high a quality of service as they would like.

    October, 2002

  • Research Bytes - Malicious Code Attacks Had $13.2 Billion Economic Impact in 2001

    Malicious Code Attacks Had $13.2 Billion Economic Impact in 2001

    Malicious code attacks continued to have significant economic impact during 2001. The following figures show the Computer Economics analysis of the worldwide economic impact of malicious code attacks. Data is provided by year and for specific high profile incidents.

    September, 2002

  • Research Bytes - Socially Responsible Information Technology Management

    Socially Responsible Information Technology Management

    The rapid growth in the number of organizations and people using computers combined with global connectivity brings many new information technology management challenges. Many people feel that IT has gotten out of control.

    September, 2002

  • Research Bytes - IS Budget Allocations in Organizations with E-Commerce Applications in Place

    IS Budget Allocations in Organizations with E-Commerce Applications in Place

    Internet users are beginning to show their preferences. There has been a considerable amount of research accumulating from credible sources that indicate significant emerging patterns of Internet usage. We have also started to grasp what works and what flops on the Web.

    September, 2002

  • Research Bytes - Expectations About Cyberattacks (Aug 2002)

    Expectations About Cyberattacks (Aug 2002)

    Computer Economics developed and conducted a survey on IT security perceptions, awareness, and practices during May and June of 2002. One finding is that considerably more people think that large-scale cyberattacks will be launched by terrorists than by a military.

    August, 2002

  • Research Bytes - Battles Over Spam Continue

    Battles Over Spam Continue

    Bulk commercial email (spam) has become a common practice that is almost always an intrusion and a nuisance for the recipient. Legislators in many states have responded to the public outcry with laws designed to bring some accountability to the spammers and some recourse for the recipients.

    August, 2002

  • Research Bytes - Management Tools and IP Move Into Enterprise Storage

    Management Tools and IP Move Into Enterprise Storage

    Among the hottest issues of enterprise storage are far less interoperability among storage vendors than in other IT applications, competing transfer technologies, and an ever-growing need for larger capacities and faster data transfers.  Despite the difficulty managers encounter in configuring their storage systems, the outcome...

    June, 2002

  • Research Bytes - Deep Linking Lingers On

    Deep Linking Lingers On

    One of the most fundamental characteristics of the Internet--perhaps the one feature which defines the vast, interconnected array of communications and computer systems--is the ability to direct users seamlessly from one point to another. That feature is generically referred to as "linking," and the practice gives rise to many legal issues and several unresolved questions.

    June, 2002