Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Brett J. L. Landry is active.

Publication


Featured researches published by Brett J. L. Landry.


Communications of The ACM | 2006

A uniform code of ethics: business and IT professional ethics

Dinah Payne; Brett J. L. Landry

Business and IT professionals have enough in common that they can share a universal code of ethics.


Information Resources Management Journal | 2011

A Decision Table for the Cloud Computing Decision in Small Business

Sathiadev Mahesh; Brett J. L. Landry; T. Sridhar; Kenneth R. Walsh

An issue facing the manager of a small business is the use of cloud computing to meet the information technology IT needs of the firm. These businesses typically have limited in-house IT capabilities and often outsource much of their IT. This paper discusses this rapidly evolving technology and provides a framework for businesses to decide on harnessing the power of cloud computing. It recommends the appropriate decision based on the way in which IT is currently used in the enterprise and future needs to meet competitive challenges. The potential cost savings, technology insurance from cloud computing, and security risks are discussed and factored into the decision.


ACM Transactions on Computing Education \/ ACM Journal of Educational Resources in Computing | 2006

Dispelling 10 common disaster recovery myths: Lessons learned from Hurricane Katrina and other disasters

Brett J. L. Landry; M. Scott Koger

Disasters happen all the time; yet despite this, many organizations are caught unprepared or make unrealistic assumptions. These factors create environments that will fail during a disaster. Most information technology (IT) curricula do not cover disaster recovery (DR) plans and strategies in depth. The unfortunate result is that most new computer systems are implemented without sufficient disaster recovery plans and testing. Courses on network security need to examine DR as a real threat and cover it as a core module. By dispelling the 10 common myths, organizations can better plan, develop, and test true DR plans.


Journal of Healthcare Management | 2010

Emerging Technologies in Healthcare: Navigating Risks, Evaluating Rewards

Elizabeth McGrady; Sue Conger; Sandra J. Blanke; Brett J. L. Landry

EXECUTIVESUMMARY The purpose of this prescriptive research is to help decision makers become better informed about three technologies emerging in the healthcare arena by providing a basic description of the technology and describing their current applications, future healthcare deployment, potential risks, and related managerial issues. Two of the technologies, radio frequency identification (RFID) and global positioning systems (GPS), are currently available to healthcare organizations and appear capable of decreasing cost but may require significant initial investment and have disruptive potential. The third technology, nanotechnology, has limited current use but may revolutionize both the delivery of medicine and hospital infrastructure management. With cautious attention to managerial issues and meticulous attention to implementation details, healthcare organizations that can successfully navigate the coming technologically driven paradigm shifts will emerge more resilient organizations.


International Journal of Services and Standards | 2007

P2P file sharing and the law: a brief survey of legislation and jurisprudence

Brett J. L. Landry; Dinah Payne

Peer-to-Peer (P2P) applications are easy to use and pervasive at a variety of institutions, both public and private, business, governmental and academic. They cause major problems with the networks upon which they are applied: viruses, worms, spyware and adware can cause crippling congestion of the network resources. Additionally, P2P file sharing applications typically violate the copyright law, as well as create legal liability through the concepts found in tort law. This paper will present very basic definitions of P2P technology, a review of the pervasiveness of the use of IP2PFS and a brief survey of legal measures designed to prevent illegal usage.


Information Security Journal: A Global Perspective | 2009

Using the Private-Internet-Enterprise (PIE) Model to Examine IT Risks and Threats Due to Porous Perimeters

Brett J. L. Landry; M. Scott Koger; Sandra J. Blanke; Christian Nielsen

ABSTRACT There is a common misconception that internal IP networks (intranets) are secure and that only external networks such as the Internet and extranets are vulnerable and unsecured. The truth is that information on a network is not secure. With increases in network connectivity, the potential of bridging multiple networks on a single device, shared knowledge bases, and Web 2.0 integration of legacy applications, the problems are compounded. Traditional reliance on perimeter devices and security has proven to be ineffective in securing information in todays highly connected environments. This lack of security on increasingly powerful handheld devices, which tap into our information assets, will lead inevitably to increased exposure for our enterprise networks. The very nature of devices being networked makes them vulnerable on an IP network to various attacks and spoofs. This paper proposes a new model to identify and examine threats to information assets from private, Internet, and enterprise sources.


Journal of Enterprise Information Management | 2016

Data mining: an ethical baseline for online privacy policies

Matthew D. Dean; Dinah M. Payne; Brett J. L. Landry

Purpose – The purpose of this paper is to advocate for and provide guidance for the development of a code of ethical conduct surrounding online privacy policies, including those concerning data mining. The hope is that this research generates thoughtful discussion on the issue of how to make data mining more effective for the business stakeholder while at the same time making it a process done in an ethical way that remains effective for the consumer. The recognition of the privacy rights of data mining subjects is paramount within this discussion. Design/methodology/approach – The authors derive foundational principles for ethical data mining. First, philosophical literature on moral principles is used as the theoretical foundation. Then, using existing frameworks, including legislation and regulations from a range of jurisdictions, a compilation of foundational principles was derived. This compilation was then evaluated and honed through the integration of stakeholder perspective and the assimilation of...


The International Journal of Management Education | 2008

From 'chalk and talk' to online offerings: keeping pace with technology in education

Brett J. L. Landry; Dinah Payne; M. Scott Koger


Archive | 2010

30P. Federated Identity Management: Why is Adoption so Low?

Keith Ivy; Sue Conger; Brett J. L. Landry


Archive | 2009

The Intersection of Privacy and Security

Sue Conger; Brett J. L. Landry

Collaboration


Dive into the Brett J. L. Landry's collaboration.

Top Co-Authors

Avatar

Dinah Payne

University of New Orleans

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

M. Scott Koger

Western Carolina University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Elizabeth McGrady

Appalachian State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Matthew D. Dean

University of Southern Maine

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dinah M. Payne

College of Business Administration

View shared research outputs
Researchain Logo
Decentralizing Knowledge