Joan K. Pierson
James Madison University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Joan K. Pierson.
Internet Research | 1997
Alicia Aldridge; Karen A. Forcht; Joan K. Pierson
Develops detailed marketing strategy recommendations for online commerce based on the general popularity of the Internet, the unique nature of doing business there, and how its attributes may be utilized for a successful marketing presence.
Proceedings of the ACM SIGCPR conference on Management of information systems personnel | 1988
Karen A. Forcht; Joan K. Pierson; Ben M. Bauman
The most important factor in effective computer security is people—their attitudes, their actions, and their sense of right and wrong. This workshop will explore the ethical problems and issues raised in the computing environment. Topics to be discussed include misuse of computers, concepts of privacy, codes of conduct for computer professionals, disputed rights to products, defining ethical, moral, and legal parameters, and what security practitioners should do about ethics. Audience opinions will be welcome as they will aid in developing ethical standards for the information systems profession.
Information & Management | 1990
Joan K. Pierson; Karen A. Forcht; Faye P. Teer
Abstract Adequate documentation of user-developed applications is important to insure that they are developed in accordance with appropriate quality assurance methods, that they can be properly used, and that they can be maintained. A study of opinions of information center personnel indicates that not all user-developed applications have the same level of documentation requirements. Thirteen factors affecting the documentation requirement level of an application are identified and ranked. The top-ranked factors are: maintenance requirements, the use of output by another system, financial impact, scope of application, and its complexity. Forms of documentation preferred for different application types — modelling, data analysis, simple query, report preparation, transaction processing, and graphics — are also identified and ranked for applications with low and high documentation requirements. Two forms of documentation, users instructions and narrative descriptions, are recommended as appropriate for all applications, regardless of their type or documentation requirement level. The appropriateness of other forms of documentation such as output layouts, design documents, and hardware/software requirements depends on the level of documentation requirements, and the type of application.
Industrial Management and Data Systems | 1994
Karen A. Forcht; Joan K. Pierson
Looks at the wide‐ranging changes which are taking place in the computer industry and what this means for security issues. Highlights current computer crimes and looks at why computer crime has been able to increase, e.g. computer terrorism, sale of contaminated software, and why today there is a greater need for computer security. Refers to the Berne Convention and the “gold card proposal”. Discusses the attitudes for and against trans‐border data flow, and the now very public issue of privacy, including how the buying of information is being tackled and the consequences of the cashless society.
international conference on design of communication | 1988
Joan K. Pierson; Karen A. Forcht; Jorge Moser
Nontraditional systems development by end users has become commonplace during the last decade. The roots of this phenomenon lie in the development of easy-to-use software tools, the widespread availability of computer power, and the increasing sophistication of computer users with primary job responsibilities outside the realm of software development.
IEEE Transactions on Professional Communication | 1988
Joan K. Pierson; Karen A. Forcht; William H. Moates
Characteristics of user-developed software applications and their documentation requirements are reviewed, and the results of a study undertaken to identify factors affecting the level of documentation required by these applications are reported. The results provide a framework to guide computer-using management in formulating standards for a broad spectrum of such applications. >
technical symposium on computer science education | 1993
Paul M. Leidig; Mary J. Granger; Asad Khailany; Joan K. Pierson; Dean Sanders
The recommendations of the ACM Curriculum Committee on Information Systems indicate an attempt to keep abreast of both curricular changes in academia and job skill demands of the computing profession. As tie needs of both changed, new recommendations were made. The latest modell published in 1981, was the culmination of a process to update the ACM 1973 recommendations for undergraduate programs. It has been more than a decade however, since the publication of the 1981 model curriculum. Much has changed over the last dozen years in the job skills demands of undergraduate students and the curricular offerings of universities. The makeup of information systems has changed quite dramatically, with an increasing use of microcomputers and advances in telecommunications as evidence. As part of the process to keep the information systems curriculum up-to-date, this panel reviews the recommendations of 1981. The purpose of this panel is to address the following issues: (1) changes in the information systems profession which demand a response in curricular change, (2) the adequacy of the 1981 model in meeting the needs of the IS graduate in the 90s, and (3) specific recommendations for an Information System Curriculum for the 90s. 1 Jay F. Nunarnaker, Jr., J. Daniel Couger, and Gordon B. Davis, “Information Systems Curriculum Recommendations for the 80s: Undergraduate and Graduate Programs, A Report of the ACM Curriculum Cornnrittee on Information Systems”, ACM Cwricufa Recommen&tions for Information Systems, Volume 11, Association for Computing Machinery, 1983 2 J. Daniel Couger, “Curricrrhrm Recommendations for Undergraduate programs in Information Systems”, Association for Computing Machinery, 1973
Proceedings of the ACM SIGCPR conference on Management of information systems personnel | 1988
Joan K. Pierson; Karen A. Forcht; Jack D. Shorter
Jxk Snrter, Assistant Ft-ofessx schccJlofwlsiness Bnpia state university %=h Kansas Astkincidenceof nontraditknal system develomtby persons with primry job responsibilities other than softmre developllenthas bma~ canmnplace, additio& roleshwe been d by inform&ion system professionals. Acting as education specialistsand as consuhnts for end userswho directly controltkircanpltingactivities aretwoof thenew roles. Guidance provided by infonmticm system personnel is particularly crucialhen usersdesign, develop, mdmintain theirown applicaticns. nie llIm?lmt of lEel=develo~ applications is asourceofhumsingcomernastkirnmber increase. Gmpreknsive and well defined prccedures for developingandmmghg wer-developedapplicaticms for thenmt part do not exist [2] even ttmgh their need iswidely recognized. k factors cqA.ainat least in psrt ths lackofeffective controlSoflEer canplltjng. 1. lherelativ~ newneaaofuser~ting. %lansba5icstage tmdel of informtion systm growth PI identifies four phases: initiation, expansion (Won), formlization (control), and lmttity (integration). lhefirsti~ stagesare characti by a lack of control, anwessity inencouragiqg mperinmtation that precedes effectiveuse ofsnynew technology [26]. It is in the third stage that organimtionalcontrols areestablished to contxingrcwth and to apply cost-effectiveness criteria. Lkercompu~in-Y organizatims is apprmching or is in the third-forlmlizati on-stage, the tiw to institute controls
Information Systems Management | 1988
Joan K. Pierson; Karen A. Forcht; William H. Moates
Abstract Without documentation, applications developed by users will probably not achieve their fullest potential. With proper documentation, the investments in writing and testing user-developed applications can pay dividends far beyond original expectations.
technical symposium on computer science education | 1987
Joan K. Pierson; Jack D. Shorter
A survey of business schools accredited by the Assembly of American Collegiate Schools of Business has provided data on the hardware and software used in introductory database courses. Survey results show that the size computer used most often in the course is the microcomputer, followed in popularity by upper-end minicomputers. Relational database management software is used in preference over hierarchical and network DBMS.