Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Janice C. Sipior is active.

Publication


Featured researches published by Janice C. Sipior.


Communications of The ACM | 1995

The ethical and legal quandary of email privacy

Janice C. Sipior; Burke T. Ward

<italic>What should conscientious employees and their ethical employers expect? Its hard to say.</italic>


European Journal of Information Systems | 2011

The digital divide and t-government in the United States: using the technology acceptance model to understand usage

Janice C. Sipior; Burke T. Ward; Regina Connolly

This paper applies the technology acceptance model to explore the digital divide and transformational government (t-government) in the United States. Successful t-government is predicated on citizen adoption and usage of e-government services. The contribution of this research is to enhance our understanding of the factors associated with the usage of e-government services among members of a community on the unfortunate side of the divide. A questionnaire was administered to members, of a techno-disadvantaged public housing community and neighboring households, who partook in training or used the community computer lab. The results indicate that perceived access barriers and perceived ease of use (PEOU) are significantly associated with usage, while perceived usefulness (PU) is not. Among the demographic characteristics, educational level, employment status, and household income all have a significant impact on access barriers and employment is significantly associated with PEOU. Finally, PEOU is significantly related to PU. Overall, the results emphasize that t-government cannot cross the digital divide without accompanying employment programs and programs that enhance citizens’ ease in using such services.


Communications of The ACM | 2004

Should spam be on the menu

Janice C. Sipior; Burke T. Ward; P. Gregory Bonner

Email marketing is an excellent, low-cost way to reach consumers, but spammers are currently looting much of its potential. The challenge is to develop an email marketing process that is consensual, efficient, and constitutional.


Information Systems Management | 2010

The Internet Jurisdiction Risk of Cloud Computing

Burke T. Ward; Janice C. Sipior

Businesses currently use cloud-computing services with the uncertainty of jurisdiction, should legal action be initiated. Jurisdiction is the authority of a court to hear and decide a specific legal action. While standards, treaties and case law are developing worldwide, there currently is no simple test to determine jurisdiction for internet activities in the United States (US) or internationally, necessitating businesses to take the initiative to address cloud computing jurisdiction risk. Based upon our analysis of the applicable legal theories, we present recommended approaches for businesses to address cloud computing risks.


Information Systems Management | 2002

A Strategic Response to the Broad Spectrum of Internet Abuse

Janice C. Sipior; Burke T. Ward

Abstract The primary responsibility of the Chief Privacy Officer (CPO) is to protect online consumer privacy by developing an organizations privacy policy and ensuring compliance with privacy laws and regulations. However, the explosive growth of Internet use for business has brought about an escalation of concerns including reduced consumer confidence in Internet-related business activities, risk of financial loss, and legal liability from sources categorized as external and internal to the organization. Does the new CPO position provide adequate consideration of the increasing risks? This article discusses the far-reaching types of misconduct and risks organizations face. the article concludes by proposing the strategic response of an expanded role for the CPO. in addition to overseeing Internet privacy issues, the newly defined role of Chief Privacy and Integrity Officer (CPIO) would encompass Internet integrity. This entails formulating or reformulating an expressed Internet use policy, undertaking ongoing training and other means to maintain awareness of issues, monitoring internal sources, implementing defenses against external sources, and securing adequate liability insurance. the effectiveness of this new role, in overseeing these responsibilities, would be determined by assessing current operations, implementing proactive measures to reduce potential misuse, and continuously keeping abreast of technological advances, legislative and regulatory initiatives, and new areas of vulnerability.


Journal of Internet Commerce | 2011

Online Privacy Concerns Associated with Cookies, Flash Cookies, and Web Beacons

Janice C. Sipior; Burke T. Ward; Rubén A. Mendoza

Web-tracking and information-gathering technologies, including cookies, Flash cookies, and Web beacons, offer marketers the opportunity to collect a wealth of consumer information. The purpose of this article is to examine Web users’ privacy concerns associated with these tracking technologies. We first describe the capabilities of each of these tracking technologies. We then address whether the use of tracking technologies is an intrusion upon an expectation or right of privacy, within the United States and within the European Union. We conclude by offering directions for future research.


ACM Sigmis Database | 1992

Merging expert systems with multimedia technology

Janice C. Sipior; Edward J. Garrity

Traditional methods of interaction with ES can be a burden to users who are forced to translate conceptualizations of problem attributes and characteristics into text form and then convert back to conceptualizations in interpreting and recommending solutions. This burden can be relieved by merging ES with multimedia technology. In addition to text, the user would be able to selectively access information with graphics, full-motion video, or animation; and hear with stereo sound, voice recording, or music. Such a combination provides a powerful interactive interface enabling the various facets of expertise to be more fully communicated to the user. This article describes multimedia expert systems and considerations for implementing them.


Information Systems Management | 2007

Managing the Lifecycle of Electronically Stored Information

Linda Volonino; Janice C. Sipior; Burke T. Ward

ABSTRACT In December 2006, amendments to the Federal Rules of Civil Procedure took effect that changed the way companies must handle electronic documents, records, and messages—collectively defined as electronically stored information, or ESI. Any ESI that could become evidence in a federal case, such as interstate lawsuits, compliance regulations (e.g., Sarbanes-Oxley, HIPAA, and OSHA), EEOC and other employment issues, immigration cases, and actions by the Internal Revenue Service, are included. Actually, it is difficult to think of any business document that might not be covered. This article discusses the amended rules, how failure to manage ESI properly can lead to catastrophic results, and how to manage the lifecycle of ESI.


Archive | 2009

Visioning and Engineering the Knowledge Society - A Web Science Perspective

Miltiadis D. Lytras; Ernesto Damiani; John M. Carroll; Robert D. Tennyson; David E. Avison; Ambjörn Naeve; Adrian Dale; Paul Lefrere; Felix Tan; Janice C. Sipior; Gottfried Vossen

This book, in conjunction with the volume CCIS 49, constitutes the refereed proceedings of the Second World Summit, WSKS 2009, held in Chania, Crete, Greece, in September 2008.The 62 revised full p ...


Information Systems Management | 2009

Recognizing the Impact of E-Discovery Amendments on Electronic Records Management

Burke T. Ward; Carolyn Purwin; Janice C. Sipior; Linda Volonino

Abstract Amended rules to the Federal Rules of Civil Procedure (FRCP), which became law in December 2006, are aimed at a single issue—the discovery of electronically stored information (ESI), referred to as electronic discovery (e-discovery). All forms of ESI may be subject to discovery, the investigative phase of a legal case when the parties determine what evidence is, or might be, available. This article addresses concerns of organizations in responding to e-discovery requests and concludes with recommendations for the design and development of an electronic records management (ERM) policy that recognizes the duties imposed by the e-discovery amendments.

Collaboration


Dive into the Janice C. Sipior's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ryan T. Wright

University of Massachusetts Boston

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Gert-Jan de Vreede

University of Nebraska Omaha

View shared research outputs
Researchain Logo
Decentralizing Knowledge