Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Thomas C. Richards is active.

Publication


Featured researches published by Thomas C. Richards.


Information Management & Computer Security | 2003

E‐commerce policies and customer privacy

Mayur S. Desai; Thomas C. Richards; Kiran Desai

The rapid growth of the Internet and the number of online consumers have resulted in increased fears from privacy advocates, legislators and consumer groups regarding the guarantees of privacy when using e‐commerce and the Internet. Some companies collect marketing information on consumers’ Internet habits without their knowledge or consent. This study looks at stated policies appearing on the Web sites of a number of major e‐commerce companies regarding Internet privacy. This was accomplished by the examination of information related to current Internet policies posted on these firms’ Web sites. Also examined was whether these policies have been changed over a three‐year time period. Five policy categories were examined over this three‐year period using a consistent rating scale. These categories were privacy, returns, shipping, warranty, and security.


Empowerment in Organizations | 1996

Training, empowerment, and creating a culture for change

Leon A. Kappelman; Thomas C. Richards

Examines an innovative first step which one organization took on the road to employee empowerment. States that although this first step was a small one, it resulted in large benefits to the organization. Reveals that this field study was conducted during the information system conversion phase of a larger organizational change, at 52 recently‐acquired branches of a


Logistics Information Management | 1996

A manager’s guide to electronic data interchange: doing business on the information superhighway

Leon A. Kappelman; Thomas C. Richards; Ray J. Tsai

40‐billion interstate bank. Discovers that the payoffs were surprisingly large when employees are given a small empowering opportunity just before their training. Indicates that empowered employees are more able to adapt to change and less likely to resist it, and their need for control is being met through their empowerment, rather than by their resistance. Finds that even in small quantities, empowerment can be a large contributor to success. Also believes that small, low‐cost empowerments with large payoffs can almost always be found.


Information Management & Computer Security | 2002

System insecurity – firewalls

Mayur S. Desai; Thomas C. Richards; Thomas J. von der Embse

Provides an introduction to EDI for those managers who are new to the field and wish to know more about it. Covers what EDI is, how it works and the technology involved, and provides a comprehensive account of the development, implementation and use of EDI. Gives guidelines for the successful adoption of EDI, from planning, analysis and design to construction, installation and operations, and lists critical success factors for EDI projects.


ACM Sigsac Review | 1984

A computer fraud survey

Thomas C. Richards

The firewall is normally an intermediate system between the secure internal networks and the less secure external networks. It is intended to keep corporate systems safe from intruders, hackers, and accidental entry into the corporate system. The primary types of firewalls are screening routers, proxy servers, and stateful inspectors. Before choosing a firewall architecture, a company must have the right mind set regarding the threat. The purpose of this paper is to provide an introduction to firewall concepts and help develop this mind set.


ACM Sigsac Review | 1986

A historical prospective of computer related fraud

Thomas C. Richards

The informed reader will agree that it is very difficult to obtain hard facts regarding computer fraud. The literature contains many articles quoting one or two of the primary studies discussed below. One of these studies of computer related crime is the SRI project, which has been underway for over ten years. This study has resulted in the publication of numerous reports during the last ten years (3,4,8), plus a number of articles (6,7,8,9,10,11,12,13,14,15,16). The SRI project includes statistics from some 700 to 800 cases of computer crime. Unfortunately, for privacy and confidentiality reasons, the complete details of these cases are not readily available to the interested researcher. The National Computer Centre in Manchester, England is developing a case file similar to SRIs. The Caulfield Institute of Technology in Australia also has a file of computer crime cases. Another source of cases is the National Center for Computer Crime Data in Los Angeles. The General Accounting Office (17) produced a study of sixty-nine cases of improper use of computers within Federal Goverment agencies about ten years ago.


hawaii international conference on system sciences | 2006

Using Social Network Analysis to Test an IT-Enabled Business Process Reengineering Theory

Nik Rushdi Hassan; Thomas C. Richards; Jack D. Becker

Two sets of data on computer-related crime provide an interesting view of this type of fraud. One set of data appears in a study prepared for Lawrence Livermore Laboratories (18) during 1979 and lists characteristics of 461 cases collected by Stanford Research Institute between 1958 and 1978. Another report prepared by the Stanford Research Institute in 1973 gives the characteristics of 148 computer-related crime cases between 1958 and 1973. This investigation presents an analysis of these 551 cases. Duplicate cases reported in both studies have been eliminated.


American Journal of Distance Education | 2000

Distance education copyright, intellectual property, and antitrust concerns

Kenneth D. Smith; John Paul Eddy; Thomas C. Richards; Paul N. Dixon

After more than a decade of research in information technology-enabled business process reengineering (BPR), no clear theory explains the link between information technology (IT) and organizational transformation. This paper introduces the use of social network analysis (SNA) methods to analyze this link. SNA is a social structural approach that focuses on dynamic relationships among the technology, its adopters, and the social context they are in. It is used in this study to test Galbraith’s Organizational Information Processing Theory (OIPT) in describing three IT-enabled BPR efforts. The results of the research show that SNA coupled with the OIPT is capable of explaining how technological innovation and process innovation interact within the context of BPR. The results of the research also provide measures that can be used by practitioners and researchers as leading indicators of BPR success.


ACM Sigsac Review | 1991

Microcomputer software backup: legal and ethical considerations for the individual and small business user

Robert T. Watts; Thomas C. Richards

Abstract An empirical examination of accredited American higher education institutions was conducted to obtain baseline data regarding distance education copyright, intellectual property, and antitrust concerns. Additionally, a multiple‐case study involving ten of the top thirty accredited distance education institutions in America was conducted. Policy approaches were examined for all institutions, and differences were discussed between public and private institutions as well as between the following Carnegie Classification institutions: Research I and II, Doctorate I and II, and Masters I and II. Data indicated that, out of the schools surveyed, 22% of the institutions in these Carnegie Classification categories published copyright and intellectual property policies on their institutions Web site. In the case study, it was found that 90% of the institutions centrally controlled their distance education program administration as well as the copyright and intellectual property policies related to it.


ACM Sigsac Review | 1987

Computer crime legislation update

Thomas C. Richards

The software user is concerned with the acquisition of microcomputer software that provides ease of access in a manner that allows the completion of tasks with as much efficiency as possible. The ease of access includes readily available backup copies of software in case of the destruction the original copy.

Collaboration


Dive into the Thomas C. Richards's collaboration.

Top Co-Authors

Avatar

Mayur S. Desai

Texas Southern University

View shared research outputs
Top Co-Authors

Avatar

John Paul Eddy

University of North Texas

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ray J. Tsai

College of Business Administration

View shared research outputs
Top Co-Authors

Avatar

Jack D. Becker

University of North Texas

View shared research outputs
Top Co-Authors

Avatar

Leon Kappelman

University of North Texas

View shared research outputs
Top Co-Authors

Avatar

Steve Guynes

University of North Texas

View shared research outputs
Top Co-Authors

Avatar

Andrew Shiva

John Jay College of Criminal Justice

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

B. Thomas Gray

University of North Texas

View shared research outputs
Researchain Logo
Decentralizing Knowledge