IS Management HandbookCRC Press, 2003. gada 26. jūn. - 944 lappuses IT management and staff are called upon to perform the almost-impossible tasks of evaluating, purchasing, integrating, and maintaining complex IT systems, and directing these systems to meet the ever-changing goals of an organization. Add to that the spending restraints of a down economy, and IT managers find themselves in need of a thoughtful, rea |
Saturs
7 | |
21 | |
25 | |
37 | |
47 | |
73 | |
Chapter 7 Performance Metrics for IT Human Resource Alignment | 89 |
Chapter 8 Is It Time for an IT Ethics Program? | 101 |
Happier Users Mean Greater Profits | 465 |
The Good the Bad and the Ugly | 483 |
Chapter 40 Use Case Modeling | 499 |
Chapter 41 Extreme Programming and Agile Software Development Methodologies | 511 |
Chapter 42 ComponentBased IS Architecture | 531 |
Chapter 43 Does Your Project Risk Management System Do the Job? | 545 |
Chapter 44 Managing Development in the Era of Complex Systems | 555 |
Chapter 45 Reducing IT Project Complexity | 561 |
Chapter 9 The CIO Role in the Era of Dislocation | 111 |
The Role of the CIO | 119 |
Chapter 11 Designing a ProcessBased IT Organization | 125 |
Chapter 12 Preparing for the Outsourcing Challenge | 135 |
Chapter 13 Managing Information Systems Outsourcing | 145 |
Building Relatioships across International Boundaries | 153 |
Chapter 15 Application Service Providers | 159 |
Designing and Operating an Enterprise Infrastructure | 169 |
Chapter 16 The New Enabling Role of the IT Infrastructure | 175 |
Chapter 17 US Telecommunications Today | 191 |
Chapter 18 Information Everywhere | 213 |
Chapter 19 Designing and Provisioning an Enterprise Network | 223 |
Personalized Services | 241 |
Chapter 21 Virtual Private Networks with Quality of Service | 257 |
Chapter 22 Storage Area Networks Meet Enterprise Data Networks | 269 |
Chapter 23 Data Warehousing Concepts and Strategies | 279 |
Plan Big Build Small | 301 |
Exploring the Corporate Asset | 307 |
Chapter 26 Data Conversion Fundamentals | 315 |
Chapter 27 Service Level Management Links IT to the Business | 331 |
Whats in It for Executives? | 341 |
Chapter 29 CostEffective IS Security via Dynamic Prevention and Protection | 349 |
Chapter 30 Reengineering the Business Continuity Planning Process | 361 |
Here We Go Again | 379 |
Chapter 32 Understanding Intrusion Detection Systems | 389 |
Providing Application Solutions | 399 |
Extending Your Web | 405 |
An Application Development Perspective | 415 |
Information Interchange | 425 |
A New Paradigm | 435 |
A New Paradigm | 457 |
Chapter 46 Software Quality Assurance Activities | 573 |
Chapter 47 Six Myths about Managing Software Development | 581 |
Chapter 48 Ethical Responsibility for Software Development | 589 |
Leveraging EBusiness Opportunities | 599 |
Chapter 49 Building an EBusiness Strategy | 603 |
New Rules of Survival | 625 |
Business and Technical Issues | 637 |
Chapter 52 Evaluating the Options for BusinesstoBusiness ECommerce | 651 |
Chapter 53 The Role of Corporate Intranets | 663 |
Chapter 54 Integrating WebBased Data into a Data Warehouse | 671 |
NET Redefines the Way Systems Interact | 691 |
An Issue for the 21st Century | 697 |
Chaptre 57 A Strategic Response to the Broad Spectrum of Internet Abuse | 715 |
Chapter 58 World Wide Web Application Security | 729 |
Facilitating Knowledge Work | 749 |
Chapter 59 Improving Satisfaction with EndUser Support | 753 |
Chapter 60 Internet Acceptable Usage Policies | 761 |
Chapter 61 Managing Risks in User Computing | 771 |
Chapter 62 Reviewing UserDeveloped Applications | 781 |
What To Do When Downsizing | 799 |
Obstacles and Solutions | 807 |
The CrossCultural Dimension | 819 |
Chapter 66 When Meeting FacetoFace Is Not the Best Option | 827 |
Success in an Information Economy | 835 |
Coming Up the Learning Curve | 843 |
Chapter 69 Building Knowledge Management Systems | 857 |
Process Mapping | 873 |
Index | 891 |
Back cover | 925 |
Citi izdevumi - Skatīt visu
Bieži izmantoti vārdi un frāzes
activities addition agent allow analysis applications approach assessment associated audit become benefits build called chapter communication complex components continue corporate cost create critical data warehouse database decision defined determine devices discussed documents effective effort employees enable ensure enterprise environment example exchange executives Exhibit existing firms function goals identify implementation important improve increase individual industry infrastructure initial integration internal Internet involved issues knowledge measure meet ment methods objectives operating organization organizational performance planning potential practices present problems requirements response risk role shared solutions specific standards strategy structure success suppliers tasks testing tion types understand United vendor
Populāri fragmenti
120. lappuse - But of a good leader, who talks little, when his work is done, his aim fulfilled, they will all say, 'We did this ourselves.
700. lappuse - ... processing is necessary for the performance of a task carried out in the public interest or in the exercise of official authority vested in the controller or in a third party to whom the data are disclosed...
700. lappuse - ... processing is necessary for the purposes of the legitimate interests pursued by the controller or by the third party or parties to whom the data are disclosed, except where such interests are overridden by the interests for fundamental rights and freedoms of the data subject...
109. lappuse - Whom could your decision or action injure? 8. Can you discuss the problem with the affected parties before you make your decision? 9. Are you confident that your position will be as valid over a long period of time as it seems now?
120. lappuse - The first responsibility of a leader is to define reality. The last is to say thank you.
30. lappuse - I shall not today attempt further to define the kinds of material I understand to be embraced within that shorthand description, and perhaps I could never succeed in intelligibly doing so. But I know it when I see it, and the motion picture involved in this case is not that.
363. lappuse - System An assembly of procedures, processes, methods, routines or techniques united by some form of regulated interaction to form an organized whole.
160. lappuse - As a precursor to more detailed discussion, a virtual organization can be defined as: . . . composed of several business partners sharing costs and resources for the purpose of producing a product or service. [It] can be temporary ... or it can be permanent. Each partner contributes complementary resources that reflect its strengths, and determines its role in the virtual corporation.
698. lappuse - October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, OJ L 281, 23 November 1995. [6] Directive 2002/58/EC of 12 July 2002, concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communication), OJ L 201/37, 3 1 July 2002.
188. lappuse - Broadbent, M., & Weill, P. (1997). Management by maxim: How business and IT managers can create IT infrastructures.
Atsauces uz šo grāmatu
Call Center Operation: Design, Operation, and Maintenance Duane Sharp Ierobežota priekšskatīšana - 2003 |
Implementing a Data Warehouse: A Methodology that Worked Bruce Russell Ullrey Ierobežota priekšskatīšana - 2007 |