Brett J. L. Landry
University of Dallas
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Brett J. L. Landry.
Communications of The ACM | 2006
Dinah Payne; Brett J. L. Landry
Business and IT professionals have enough in common that they can share a universal code of ethics.
Information Resources Management Journal | 2011
Sathiadev Mahesh; Brett J. L. Landry; T. Sridhar; Kenneth R. Walsh
An issue facing the manager of a small business is the use of cloud computing to meet the information technology IT needs of the firm. These businesses typically have limited in-house IT capabilities and often outsource much of their IT. This paper discusses this rapidly evolving technology and provides a framework for businesses to decide on harnessing the power of cloud computing. It recommends the appropriate decision based on the way in which IT is currently used in the enterprise and future needs to meet competitive challenges. The potential cost savings, technology insurance from cloud computing, and security risks are discussed and factored into the decision.
ACM Transactions on Computing Education \/ ACM Journal of Educational Resources in Computing | 2006
Brett J. L. Landry; M. Scott Koger
Disasters happen all the time; yet despite this, many organizations are caught unprepared or make unrealistic assumptions. These factors create environments that will fail during a disaster. Most information technology (IT) curricula do not cover disaster recovery (DR) plans and strategies in depth. The unfortunate result is that most new computer systems are implemented without sufficient disaster recovery plans and testing. Courses on network security need to examine DR as a real threat and cover it as a core module. By dispelling the 10 common myths, organizations can better plan, develop, and test true DR plans.
Journal of Healthcare Management | 2010
Elizabeth McGrady; Sue Conger; Sandra J. Blanke; Brett J. L. Landry
EXECUTIVESUMMARY The purpose of this prescriptive research is to help decision makers become better informed about three technologies emerging in the healthcare arena by providing a basic description of the technology and describing their current applications, future healthcare deployment, potential risks, and related managerial issues. Two of the technologies, radio frequency identification (RFID) and global positioning systems (GPS), are currently available to healthcare organizations and appear capable of decreasing cost but may require significant initial investment and have disruptive potential. The third technology, nanotechnology, has limited current use but may revolutionize both the delivery of medicine and hospital infrastructure management. With cautious attention to managerial issues and meticulous attention to implementation details, healthcare organizations that can successfully navigate the coming technologically driven paradigm shifts will emerge more resilient organizations.
International Journal of Services and Standards | 2007
Brett J. L. Landry; Dinah Payne
Peer-to-Peer (P2P) applications are easy to use and pervasive at a variety of institutions, both public and private, business, governmental and academic. They cause major problems with the networks upon which they are applied: viruses, worms, spyware and adware can cause crippling congestion of the network resources. Additionally, P2P file sharing applications typically violate the copyright law, as well as create legal liability through the concepts found in tort law. This paper will present very basic definitions of P2P technology, a review of the pervasiveness of the use of IP2PFS and a brief survey of legal measures designed to prevent illegal usage.
Information Security Journal: A Global Perspective | 2009
Brett J. L. Landry; M. Scott Koger; Sandra J. Blanke; Christian Nielsen
ABSTRACT There is a common misconception that internal IP networks (intranets) are secure and that only external networks such as the Internet and extranets are vulnerable and unsecured. The truth is that information on a network is not secure. With increases in network connectivity, the potential of bridging multiple networks on a single device, shared knowledge bases, and Web 2.0 integration of legacy applications, the problems are compounded. Traditional reliance on perimeter devices and security has proven to be ineffective in securing information in todays highly connected environments. This lack of security on increasingly powerful handheld devices, which tap into our information assets, will lead inevitably to increased exposure for our enterprise networks. The very nature of devices being networked makes them vulnerable on an IP network to various attacks and spoofs. This paper proposes a new model to identify and examine threats to information assets from private, Internet, and enterprise sources.
Journal of Enterprise Information Management | 2016
Matthew D. Dean; Dinah M. Payne; Brett J. L. Landry
Purpose – The purpose of this paper is to advocate for and provide guidance for the development of a code of ethical conduct surrounding online privacy policies, including those concerning data mining. The hope is that this research generates thoughtful discussion on the issue of how to make data mining more effective for the business stakeholder while at the same time making it a process done in an ethical way that remains effective for the consumer. The recognition of the privacy rights of data mining subjects is paramount within this discussion. Design/methodology/approach – The authors derive foundational principles for ethical data mining. First, philosophical literature on moral principles is used as the theoretical foundation. Then, using existing frameworks, including legislation and regulations from a range of jurisdictions, a compilation of foundational principles was derived. This compilation was then evaluated and honed through the integration of stakeholder perspective and the assimilation of...
The International Journal of Management Education | 2008
Brett J. L. Landry; Dinah Payne; M. Scott Koger
Archive | 2010
Keith Ivy; Sue Conger; Brett J. L. Landry
Archive | 2009
Sue Conger; Brett J. L. Landry