-
Key IT Process Management Areas Need Help
For any IT organization to run properly there are several key processes that must run efficiently and effectively. However, a recent study conducted by Computer Economics indicates that there is a lot of room for improvement.
December, 2002
-
Return on Investment for CRM Systems Remains Elusive
Customer Relationship Management (CRM) systems are approaching their tenth birthday and, even so, there is still a lot of confusion over what constitutes a CRM system.
December, 2002
-
Misuse of Computer Equipment and Networks Is a Growing Problem
Many companies now require employees to sign âappropriate useâ agreements if they have access to company-owned computer equipment and networks.
December, 2002
-
IT Salary Survey Data Shows Declines
The continuing layoffs by technology companies, the dotcom bust, and the past few years of flat IT spending has taken its toll on IS salary trends, especially for positions on the higher end of the scale.
December, 2002
-
IT Equipment Disposal Costs Continue to Rise
Today, the sheer volume of used computer equipment that must be disposed of has made this a problematic issue--and one that has attracted upper management attention. As a result, the computer recycling business is booming and the price of using these services is on the upswing.
November, 2002
-
IT Contractor/Temp Use Falls Dramatically in Utility Companies
Although most industries have experienced a significant decrease in the use of IT contractor/temp personnel, utility companies have been more aggressive than most in pulling in the reins on this spending category.
November, 2002
-
Nearly One-Third of Polled Firms Have No Written IT Security Policy
A survey conducted in June 2002 by Computer Economics revealed that 30% of the organizations polled do not have written IT security policies in place, despite the fact that written policies are key to a successful security effort.
October, 2002
-
IT Contract and Consulting Providers Receive Mediocre Report Cards
A newly released study conducted by Computer Economics indicates that most end user organizations do not feel their contract and consulting service providers are delivering as high a quality of service as they would like.
October, 2002
-
Malicious Code Attacks Had $13.2 Billion Economic Impact in 2001
Malicious code attacks continued to have significant economic impact during 2001. The following figures show the Computer Economics analysis of the worldwide economic impact of malicious code attacks. Data is provided by year and for specific high profile incidents.
September, 2002
-
IS Budget Allocations in Organizations with E-Commerce Applications in Place
Internet users are beginning to show their preferences. There has been a considerable amount of research accumulating from credible sources that indicate significant emerging patterns of Internet usage. We have also started to grasp what works and what flops on the Web.
September, 2002
-
Expectations About Cyberattacks (Aug 2002)
Computer Economics developed and conducted a survey on IT security perceptions, awareness, and practices during May and June of 2002. One finding is that considerably more people think that large-scale cyberattacks will be launched by terrorists than by a military.
August, 2002
-
Battles Over Spam Continue
Bulk commercial email (spam) has become a common practice that is almost always an intrusion and a nuisance for the recipient. Legislators in many states have responded to the public outcry with laws designed to bring some accountability to the spammers and some recourse for the recipients.
August, 2002
-
Management Tools and IP Move Into Enterprise Storage
Among the hottest issues of enterprise storage are far less interoperability among storage vendors than in other IT applications, competing transfer technologies, and an ever-growing need for larger capacities and faster data transfers. Despite the difficulty managers encounter in configuring their storage systems, the outcome...
June, 2002
-
Deep Linking Lingers On
One of the most fundamental characteristics of the Internet--perhaps the one feature which defines the vast, interconnected array of communications and computer systems--is the ability to direct users seamlessly from one point to another. That feature is generically referred to as "linking," and the practice gives rise to many legal issues and several unresolved questions.
June, 2002