Applied Information Management
News and Updates

AIM eBriefings

As part of the AIM master's degree requirements, students write a substantive research paper that joins professional and academic interests. These research papers offer timely, in-depth reviews of topics important in the field today. AIM eBriefings are white papers, which provide a snapshot of these comprehensive research projects, for quick review.

Volume 17 (Spring, 2014) includes:

Behavior and Information Security Compliance (2014)

Volume 16 (Fall, 2013) includes:

Trust Inclusion in Virtual Teams (2013)

Enterprise-wide Techniques to Manage E-mail Overload (2013)

Volume 15 (Spring, 2013) includes:

Visualizing Big Data (2013)

Information Technology Solutions for Community Oriented Policing (2013)

Volume 14 (Fall, 2012) includes:

What CIOs and CTOs Need to Know About Big Data (2012)

Volume 13 (Spring, 2012) includes:

Mobile Instructional Design Principles for Adult Learners (2012)

Using Agile Practices to Protect the Intellectual Capital of the Subject Matter Expert (2012)

Information and Communication Technologies (ICT) and Food Security Management (2012)

Volume 12 (Fall, 2011) includes:

Adopting Software Design Patterns (2011)

Vanilla ERP: Strategy, Business Alignment, and Customization (2011)

Securing e-PHI During Data Exchanges (2011)

Faculty-Centered Online Course Development Models (2011)

Volume 11 (Spring, 2011) includes:

Data-at-Rest (DAR): Protecting Sensitive Information in Mobile Information Systems (ISs) (2011)

Performance Reviews for Teleworkers (2011)

Volume 10 (Fall, 2010) includes:

Communication Tactics that Describe Innovation Advocacy Leadership as a Way to Inform Organizational Strategic Planning by Leveraging Networks and Building Consensus (2010)

Employing the Generally Accepted Recordkeeping Principles® (GARP®) to Identify Practices for Efficient and Compliant Electronic Records and Information Management (2010)

Framing, Defining, and Implementing a Copyright Compliance Policy to Manage Risk in a Digital Publishing Environment (2010)

Volume 9 (Spring, 2010) includes:

Lowering the Carbon Emissions Footprint of Enterprise Data Centers Through Energy Efficiency Gains (2010)

Cloud Computing: Key IT-Related Risks and Mitigation Strategies for Consideration by IT Security Practitioners (2010)

Emergent Practice in Online Corporate Reputation Management (2010)

Volume 8 (Fall, 2009) includes:

Implementation of Effective Change Management for Successful Integration of Health Information Technology (HIT) Systems in Hospitals (2009)

Key Components of an Information Security Metrics Program Plan (2009)

Volume 7 (Spring, 2009) includes:

Disaster Recovery Planning for Time-critical Business Information Technology Systems (2009)

Integrating Platform—Virtualization in the Enterprise: Cost and Efficiency (2009)

Volume 6 (Fall, 2008) includes:

Clarifying Expectations—How to Build Better Service Level Agreements Among Distributed Stakeholders (2008)

Critical Elements of an Information Security Management Strategy (2008)

Strategic Project Management: Aligning Business Objectives with Project Management (2008)

Volume 5 (Spring, 2008) includes:

Implementing Enterprise Content Management Using Microsoft SharePoint™ (2008)

Designing Successful Anti-Phishing Applications To Protect Home Computer Users (2008)

Volume 4 (Fall, 2007) includes:

Practical ways to enhance mobile software applications by using readily available contextual data (2007)

Eleven specific solutions to today’s most common database security threats and vulnerabilities (2007)

Using content tagging and recommender systems to enhance collecting relevant user data from social software (2007)

Volume 3 (Spring, 2007) includes:

Investigative Strategies for Internet-based Hate, Bias, and Terror Crimes (2004)

Contract Management Techniques: Managing the Progress, Quality and Coordination of Outsourced Software Development (2005)

Identification of Unique ePortfolio System Features: Benefits to Students, Faculty and Educational Institutions (2005)

Volume 2 (Fall, 2006) includes:

Improving the Data Warehouse: Metadata Management, Data Cleansing and Information Stewardship (2005)

From Architect to Provocateur: The Many Hats of the CIO (2006)

Change Management: The Defining Factor in Customer Relationship Management Success (2005)

When Disaster Strikes: Recovery Planning for the Mid-Sized Organization (2006)

Linking Knowledge to Resource-Based Strategic Management for Competitive Success (2004)

Delivering Accurate Evaluation Data in Not-for-Profit Reports (2005)

Volume 1 (Spring, 2006) includes:

Choosing an Enterprise Architecture Model (2005)

Teaching E-mail to the Elderly (2005)

AIM alumnus Julie Rhodes
Julie Rhodes ('15) and Dr. Kara McFall
Julie Rhodes received the 2015 Capstone award from Dr. Kara McFall, AIM director, for her research paper Incorporating Collaborative Technologies Into the Pedagogy of Instructor-Led Training at the AIM graduation luncheon.