@article{aram_clark_weiss_1997, title={International Cooperation: Lessons in Management Education}, volume={6}, journal={Management}, author={Aram, J and Clark, R and Weiss, I}, year={1997} } @article{aram_clarke_weiss_1996, title={Trends in international business thought and literature: Traversing the path to insolvency: Lessons from an international alliance in management education}, volume={38}, DOI={10.1002/tie.5060380207}, abstractNote={Abstract}, number={2}, journal={The International Executive}, author={Aram, J.D. and Clarke, R and Weiss, I.R.}, year={1996}, month={Mar}, pages={273–286} } @article{weiss_asaithambi_1993, title={How to Integrate Software Without A Hitch}, volume={175}, number={4}, journal={Journal of Accounting}, author={Weiss, I and Asaithambi, D}, year={1993}, month={Apr}, pages={67} } @article{weiss_nelson_yamazaki_1992, title={Information Resource Management within Multinational Corporations: A Cross-Cultural Comparison of the U.S and Japan}, volume={1}, number={4}, journal={International Information Systems}, author={Weiss, I and Nelson, RR and Yamazaki, K}, year={1992}, month={Oct} } @article{adams_weiss_1989, title={Organizational connectivity systems: is function being effectively managed?}, volume={20}, ISSN={0095-0033 1532-0936}, url={http://dx.doi.org/10.1145/71232.71236}, DOI={10.1145/71232.71236}, abstractNote={INTRODUU 1ION The function of the information systems (IS) department traditionally has been data stewardship. Data was collected from various parts of the organization, processe d and stored for subsequent use. As systems development an d processing moves out to the functional areas, IS ha s become more delivery oriented. Issues of concern seem t o be more associated with connectivity from machine to user and user to user rather than analysis and design o f production applications. While a great deal of data is stil l being centrally accumulated, access to and processing o f this information is gradually moving closer to the points o f final consumption. Consequently, the IS function is becoming responsible for information logistics within th e organization. Telecommunications are the key components and provide the organization infrastructure for thi s phenomena. Telecommunications provides links between a company and its suppliers and customers. It provides a conduit through which information can flow in support o f decision making. Telecommunications also includes the transportation of non-data signals as well. Voice and video communications directly impacts the day-today function s of the manager. It is estimated that 88% of a manager' s time is spent communicating (Mintzberg, (1973)). As the forms of communication become more diverse an d numerous (e .g ., facsimile, electronic mail, voice mail), the importance of effective communication managemen t becomes critical. The 1984 divestiture of AT&T has brought abou t changes to the structure and methods of telecommunicatio n management within large organizations. Prior to the divestiture, voice and data communication managemen t were frequently handled by different divisions and levels o f the firm. Voice communication management consisted o f purchase and implementation/operations decisions with th e local telephone company or similar firms. Data communications, usually operating under the aegis of MIS , was responsible for keeping terminal equipment and loca l lines operational. Although the ubiquitous telephone touched more employees than the computer, the dat a communications function was afforded more visibilit y because of its ties with MIS. After the divestiture, increase d competition and technological advances forced both areas t o consider broader functionality in the capabilities an d management of their telecommunication environments. I n fact, we are now witnessing a merger of the once disparat e 16 DATA BASE Spring 1989 groups into a single unit responsible for telecommunicatio n services to the firm. After the …}, number={1}, journal={ACM SIGMIS Database: the DATABASE for Advances in Information Systems}, publisher={Association for Computing Machinery (ACM)}, author={Adams, D. A. and Weiss, I. R.}, year={1989}, month={Apr}, pages={16–20} } @article{weiss_lacity_1989, title={The Organizational Exchange of Talent: Rotating MIS Professionals into User Areas}, volume={4}, number={1}, journal={The Journal of Information Systems}, author={Weiss, I and Lacity, M}, year={1989} } @article{alavi_nelson_weiss_1988, title={Managing End-User Computing as a Value-Added Resource}, volume={5}, ISSN={0739-9014}, url={http://dx.doi.org/10.1080/07399018808962923}, DOI={10.1080/07399018808962923}, abstractNote={Abstract Because end-user computing (EUC) is playing a more significant role in the overall performance of organizations, EUC and its associated technologies should be viewed as a set of distinct value activities — that is, activities that contribute to an organizations competitive advantage. Management should emphasize those EUC attributes that have a positive influence on the organization —direction, support, and control. This article discusses these attributes, the major issues associated with each, and the timing of each attribute in conjunction with organizational strategy.}, number={3}, journal={Journal of Information Systems Management}, publisher={Informa UK Limited}, author={Alavi, Maryam and Nelson, R. Ryan and Weiss, Ira R.}, year={1988}, month={Jan}, pages={26–35} } @article{van over_weiss_1988, title={Managing the application maintenance function: Problems, issues and opportunities}, volume={19}, ISSN={0095-0033 1532-0936}, url={http://dx.doi.org/10.1145/65766.65772}, DOI={10.1145/65766.65772}, abstractNote={As organizational computing moves from back roo m production processing to more highly visible areas such as computing for competitive advantage, expert systems , fourth generation technologies, local area networks, an d desktop publishing, one may assume that the vast majority of organizational effort should be spent on developing new applications to take advantage of these new technologies and development philosophies . As attractive as this migh t sound most organizations are faced with a much mor e glaring problem that is consuming the vast majority o f available resources . Resources that otherwise might b e dedicated to these new projects . The problem is how do w e manage and maintain a 30 year inventory of applicatio n software . The issue is not trivial since the software span s both hardware and software generations and is critical to the day-to-day operations of the business . A brief analysis of the problem indicates it will only get worse . For every new system placed in production we generate another piece of software to be added to the eclectic inventory . Admittedly maintenance can be classified as a technical problem and needs a technical solution . But the only hope of getting a handle on the issue and determinin g how to maintain the inventory, without sacrificing th e future of the organization, is to develop a manageria l solution. The solution needs to address such issues a s strategy, productivity, policy, procedures, and priorities . In an attempt to learn more about the practica l implications and organizational realities of managing th e maintenance function, 29 MIS directors and maintenanc e managers were assembled to discuss the issue. All of th e attendees represented member firms of the Informatio n System Research Center at the University of Houston . A round table discussion format was used to facilitat e interaction among the attendees . The objective of th e session was to establish the key elements of a mission statement for the information system (IS) maintenanc e function from hich organization specific action plans could be developed . The purpose of this article is to report on th e outcomes of the session and specifically to (1) describe th e key issues and questions raised by the group, (2) list a set of critical success factors for the maintenance functio n identified by the group, and (3) list a series of attributes that can be used to develop an organization's mission statemen t for the IS maintenance function .}, number={3-4}, journal={ACM SIGMIS Database: the DATABASE for Advances in Information Systems}, publisher={Association for Computing Machinery (ACM)}, author={van Over, L. David and Weiss, Ira R.}, year={1988}, month={Oct}, pages={42–48} } @article{alavi_nelson_weiss_1987, title={Strategies for End-User Computing: An Integrative Framework}, volume={4}, ISSN={0742-1222 1557-928X}, url={http://dx.doi.org/10.1080/07421222.1987.11517799}, DOI={10.1080/07421222.1987.11517799}, abstractNote={This paper develops a framework consisting of five core strategies or organizational postures vis-a-vis end-user computing (euc). Following a descrip- tion of each of the strategies, the authors employed a two-step process to represent}, number={3}, journal={Journal of Management Information Systems}, publisher={Informa UK Limited}, author={Alavi, Maryam and Nelson, R. Ryan and Weiss, Ira R.}, year={1987}, month={Dec}, pages={28–49} } @inproceedings{weiss_alavi_nelson_1987, title={The Management of End-User Computing: Critical Attributes for Organizational Success}, booktitle={Proceedings of the 20th Annual meeting of the Hawaii International Conference on Systems Sciences}, author={Weiss, I and Alavi, M and Nelson, RR}, year={1987}, month={Jan} } @article{weiss_helms_1986, title={The CISA Examination: A Critique}, volume={1}, journal={EDP Auditor}, author={Weiss, I and Helms, GL}, year={1986} } @article{helms_weiss_1986, title={The Cost of Internally Developed Applications: Analysis of Problems and Cost Control Methods}, volume={3}, ISSN={0742-1222 1557-928X}, url={http://dx.doi.org/10.1080/07421222.1986.11517759}, DOI={10.1080/07421222.1986.11517759}, abstractNote={Abstract:The organizational cost of developing software continues to be higher than is projected within the organizations’ budgets. Numerous design methods have been developed to assist in bringing the cost of development under control. The research reported in this article indicates that few of these methods have assisted in bringing costs under control and actually some have caused greater cost overruns.}, number={2}, journal={Journal of Management Information Systems}, publisher={Informa UK Limited}, author={Helms, Glenn L. and Weiss, Ira R.}, year={1986}, month={Sep}, pages={5–21} } @article{weiss_asaithambi_1985, title={Look Before You Leap on the Micro-Computer Bandwagon}, volume={1}, number={2}, journal={Computers and Accounting}, author={Weiss, I and Asaithambi, D}, year={1985}, month={Jan} } @article{alavi_weiss_1985, title={Managing the Risks Associated with End-User Computing}, volume={2}, ISSN={0742-1222 1557-928X}, url={http://dx.doi.org/10.1080/07421222.1985.11517734}, DOI={10.1080/07421222.1985.11517734}, abstractNote={Abstract:End-User Computing (euc) is a rapidly growing phenomenon in organizations. Euc will soon be a major segment of information systems in most large organizations. There is a growing concern about the potential organizational risks of euc activities. This article identifies the risks of euc associated with different stages of the end-user applications life cycle. Generic controls are then identified that address each of the risks enumerated in the article. Controls are introduced in a manner that allows euc management to select those most appropriate to their euc environment.}, number={3}, journal={Journal of Management Information Systems}, publisher={Informa UK Limited}, author={Alavi, Maryam and Weiss, Ira R.}, year={1985}, month={Dec}, pages={5–20} } @article{helms_weiss_1984, title={Application software maintenance: can it be controlled?}, volume={16}, ISSN={0095-0033 1532-0936}, url={http://dx.doi.org/10.1145/1040688.1040691}, DOI={10.1145/1040688.1040691}, abstractNote={Numerous studies have found that subsequent application software maintenance requires a significant amount of a data processing department's resources. Some of the major research in this area [1, 2, 3, 4] revealed the following:• in 1972, 30.1 percent of total programmer effort was devoted to maintenance• in 1978 twenty percent of the systems studied had allocated eighty-five percent of their annual analyst and programming hours to maintenance.• in 1979 as high as seventy-five percent of systems and data processing recourses were spent on application maintenance• a study determined that half of a data processing department's staff time was devoted to maintenance}, number={2}, journal={ACM SIGMIS Database: the DATABASE for Advances in Information Systems}, publisher={Association for Computing Machinery (ACM)}, author={Helms, Glenn L. and Weiss, Ira R.}, year={1984}, month={Dec}, pages={16–18} } @book{weiss_1984, place={Pennsauken, NJ}, series={Auerbach EDP Auditors Series}, title={Certification of Information Systems Auditors: An Update}, publisher={Auerbach Publishers}, author={Weiss, Ira}, year={1984}, month={Oct}, collection={Auerbach EDP Auditors Series} } @book{weiss_1984, title={The CISA Examination}, publisher={Auditing Computer Systems, FAIM Publications}, author={Weiss, Ira}, year={1984}, month={Mar} } @article{weiss_helms_1983, title={Audit Involvement in the Systems Development Life Cycle}, volume={XL}, number={6}, journal={The Internal Auditor}, author={Weiss, I and Helms, G}, year={1983}, month={Dec} } @book{weiss_friedman_1983, place={United States}, title={Practice Problem in Managerial Accounting}, publisher={Clean As Air Systems, Dame Publications}, author={Weiss, I and Friedman, ME}, year={1983} } @article{weiss_edmonds_porter_1982, title={Compilation and Review Reports}, volume={44}, number={4}, journal={The Woman CPA}, author={Weiss, I and Edmonds, T and Porter, M}, year={1982}, month={Oct} } @article{weiss_1982, title={Critical Factors in the Selection and Use of Financial Planning Systems}, volume={6}, number={2}, journal={MAS Communications}, author={Weiss, I}, year={1982}, month={Jul} } @article{weiss_helms_1982, title={Current Information Systems Auditor Involvement in Systems Development: A Survey}, journal={The EDP Auditor}, author={Weiss, I and Helms, G}, year={1982} } @book{weiss_friedman_1982, place={United States}, title={Practice Problem in Cost Accounting}, publisher={Hard B Nails Company, Dame Publications}, author={Weiss, I and Friedman, ME}, year={1982} } @article{weiss_1982, title={The Certified Information Systems Auditor Examination: A Description of Exam Development and Analysis of Result}, journal={The EDP Auditor}, author={Weiss, I}, year={1982} } @article{weiss_edmonds_porter_1982, title={The Implication of Changes in U.S. Financial Reporting Standards on Great Britain}, journal={Certified Accountant}, author={Weiss, I and Edmonds, T and Porter, M}, year={1982}, month={Oct} } @article{weiss_seiler_pearson_1982, title={Why do Management Accountants Feel Dislike?}, volume={LXIII}, number={9}, journal={Management Accounting}, publisher={Pearson}, author={Weiss, I and Seiler, R and Pearson, D}, year={1982}, month={Mar} } @article{weiss_boockholdt_1981, title={Complimentary EDP Audit Technique}, journal={The EDP Auditor}, author={Weiss, I and Boockholdt, K}, year={1981} } @article{weiss_edmonds_porter_1981, title={Do Bankers and CPAs Have Different Views of Reports on Financial Statements?}, volume={62}, number={10}, journal={The Journal of Commercial Bank Lending}, author={Weiss, I and Edmonds, T and Porter, M}, year={1981}, month={Jun} } @article{friedman_weiss_1981, series={Auerbach EDP Auditing Series}, title={Information Systems and Quantitative Methods in Accounting: An Analysis}, volume={5}, number={3}, journal={MAS Communications}, author={Friedman, M.E. and Weiss, I}, year={1981}, month={Oct}, collection={Auerbach EDP Auditing Series} } @misc{weiss_1981, title={Management Planning and Control of Information Systems}, volume={151}, number={1}, journal={Journal of Accountancy}, author={Weiss, I}, year={1981}, month={Jan}, pages={86} } @article{weiss_young_1981, title={Professional Certification Programs}, volume={26}, number={4}, journal={Personnel Administrator}, author={Weiss, I and Young, A}, year={1981}, month={Apr} } @article{weiss_1980, title={Auditability of Software: A Survey of Techniques and Costs}, volume={4}, ISSN={0276-7783}, url={http://dx.doi.org/10.2307/248959}, DOI={10.2307/248959}, abstractNote={Numerous techniques have been identified to assist EDP auditors in accomplishing audit objectives. Within this realm a major issue of interest is identifying methodologies to monitor the reliability and integrity of production software. This article presents a number of available techniques to audit software, and evaluates each on the basis of development cost, operational cost, appropriate timing of usage and effectiveness.}, number={4}, journal={MIS Quarterly}, publisher={JSTOR}, author={Weiss, Ira R.}, year={1980}, month={Dec}, pages={39–50} } @inproceedings{computer utilization by accounting firms: a survey_1980, booktitle={1980 Proceedings Southwest American Accounting Association}, year={1980}, month={Mar} } @article{weiss_friedman_1980, title={Computing Within the Accounting Curriculum: A Methodology for Integration}, volume={2}, number={1}, journal={Interface}, author={Weiss, I and Friedman, ME}, year={1980}, month={Mar} } @article{weiss_brief_merino_1980, title={Cumulative Financial Statements}, volume={LV}, number={3}, journal={The Accounting Review}, author={Weiss, I and Brief, R and Merino, B}, year={1980}, month={Jul} } @inproceedings{weiss_1979, title={Computer Based Auditing: Where is the University?}, booktitle={EDP Audit Symposium 1978 Proceedings}, author={Weiss, I}, year={1979}, month={May} } @inbook{weiss_lientz_1979, place={Houston, Texas}, title={The Vulnerability of Computer Auditing}, ISBN={9780931920127}, booktitle={Readings and Cases in Auditing}, publisher={Dame Publications}, author={Weiss, I and Lientz, B}, editor={Hubbard, T.D. and Ellison, D.J. and Strawser, R.H.Editors}, year={1979} } @article{lientz_weiss_1978, title={Trade-offs of secure processing in centralized versus distributed networks}, volume={2}, ISSN={0376-5075}, url={http://dx.doi.org/10.1016/0376-5075(78)90037-5}, DOI={10.1016/0376-5075(78)90037-5}, abstractNote={Simulation was performed for specific network configurations to assess the effect of imposing security measures on a portion of the workload. The results provide a methodology for performing trade off analysis. The trade-offs are presented in terms of the measures of response time, workload, and cost. Network types included distributed, semicentralized, and centralized configurations. The analysis was conducted using a simulation model which is briefly summarized. The results of the simulation for the cases considered indicate that economies of scale shift from centralized to semicentralized configurations for a fixed I/O bound workload. This occurs when throughput degrades, due to the imposition of security measures, approximately 15% (10%) when 10% (20%) of the workload requires secure processing. Degradation is also examined when certain centers process only secure workload versus distributing both secure and non-secure jobs across the network.}, number={1}, journal={Computer Networks}, publisher={Elsevier BV}, author={Lientz, Bennet P. and Weiss, Ira R.}, year={1978}, month={Feb}, pages={35–43} } @inbook{weiss_lientz_1977, place={Long Beach, California}, title={On the Evaluation of Reliability and Security Measures in a Computer Network}, booktitle={Tutorial on Computer Security and Integrity}, publisher={IEEE Computer Society}, author={Weiss, I and Lientz, BP}, editor={Abrams, Marshall D.Editor}, year={1977} } @article{weiss_lientz_1977, title={Vulnerability of Computer Auditing}, volume={XLVII}, number={3}, journal={CPA Journal}, author={Weiss, I and Lientz, BP}, year={1977}, month={Mar} }