scholarly journals Erratum to: Organizational and Social Perspectives on Information Technology

Author(s):  
Richard Baskerville ◽  
Jan Stage ◽  
Janice I. DeGross
Author(s):  
C. Richard Baker

This chapter adds to the discussion of human and social perspectives in information technology by examining the existence and extent of fraudulent activities conducted through the Internet. The principal question addressed by this chapter is whether fraudulent activities perpetuated using the Internet constitute a new type of fraud, or whether they are classic forms of fraud appearing in a new medium. Three areas of fraud are investigated, namely: securities fraud, fraud in electronic commerce, and fraud arising from the rapid growth of Internet companies. The U.S. Securities and Exchange Commission (SEC) has cited more than 100 companies for committing securities fraud using the Internet. Actions prohibited under U.S. securities laws are now being conducted through the Internet, and the SEC has taken steps to suppress these frauds (SEC, 2001). The rapid growth of electronic commerce, and the natural desire on the part of consumers to feel secure while engaging in electronic commerce, has prompted the creation of mechanisms, such as web site seals and logos, to reduce concerns about fraudulent use of information. It is, however, questionable whether these mechanisms are effective in reducing fraud conducted through the Internet. A third potential area for fraud on the Internet involves the rapid growth of Internet companies, often with little economic substance and lacking in traditional managerial controls. This chapter seeks to examine areas with significant potential for fraud on the Internet and to assess implications of such activities for the management of information technology.


Author(s):  
Joao Carlos Lopes Batista ◽  
Rui Pedro Figueiredo Marques

This chapter presents an overview on information and communication overload. The theme is contextualized and the main concepts are discussed based on the published literature. The individual, the organizational and the social perspectives are considered. To deepen this discussion, the authors developed a bibliometric analysis, which demonstrated the steady increase of interest in this topic, apparently enhanced by new developments in information technology. These technologies have presented solutions for some problems, but at the same time they have raised new issues of information overload. The bibliometric analysis also shows that many of these new issues are communication issues, contributing to justify our argument that, currently, the problems of information overload and communication overload are interrelated.


Author(s):  
C. Richard Baker

This chapter adds to the discussion of human and social perspectives in information technology by examining the existence and extent of fraudulent activities conducted through the Internet. The principal question addressed by this chapter is whether fraudulent activities perpetuated using the Internet constitute a new type of fraud, or whether they are classic forms of fraud appearing in a new medium. Three areas of fraud are investigated, namely: securities fraud, fraud in electronic commerce, and fraud arising from the rapid growth of Internet companies. The U.S. Securities and Exchange Commission (SEC) has cited more than 100 companies for committing securities fraud using the Internet. Actions prohibited under U.S. securities laws are now being conducted through the Internet, and the SEC has taken steps to suppress these frauds (SEC, 2001). The rapid growth of electronic commerce, and the natural desire on the part of consumers to feel secure while engaging in electronic commerce, has prompted the creation of mechanisms, such as web site seals and logos, to reduce concerns about fraudulent use of information. It is, however, questionable whether these mechanisms are effective in reducing fraud conducted through the Internet. A third potential area for fraud on the Internet involves the rapid growth of Internet companies, often with little economic substance and lacking in traditional managerial controls. This chapter seeks to examine areas with significant potential for fraud on the Internet and to assess implications of such activities for the management of information technology.


2011 ◽  
Vol 21 (1) ◽  
pp. 18-22
Author(s):  
Rosemary Griffin

National legislation is in place to facilitate reform of the United States health care industry. The Health Care Information Technology and Clinical Health Act (HITECH) offers financial incentives to hospitals, physicians, and individual providers to establish an electronic health record that ultimately will link with the health information technology of other health care systems and providers. The information collected will facilitate patient safety, promote best practice, and track health trends such as smoking and childhood obesity.


Sign in / Sign up

Export Citation Format

Share Document