IS Management Handbook
IT management and staff are called upon to perform the almost-impossible tasks of evaluating, purchasing, integrating, and maintaining complex IT systems, and directing these systems to meet the ever-changing goals of an organization. Add to that the spending restraints of a down economy, and IT managers find themselves in need of a thoughtful, rea
Lietotāju komentāri - Rakstīt atsauksmi
Ierastajās vietās neesam atraduši nevienu atsauksmi.
Chapter 7 Performance Metrics for IT Human Resource Alignment
Chapter 8 Is It Time for an IT Ethics Program?
Happier Users Mean Greater Profits
The Good the Bad and the Ugly
Chapter 40 Use Case Modeling
Chapter 41 Extreme Programming and Agile Software Development Methodologies
Chapter 42 ComponentBased IS Architecture
Chapter 43 Does Your Project Risk Management System Do the Job?
Chapter 44 Managing Development in the Era of Complex Systems
Chapter 45 Reducing IT Project Complexity
Chapter 9 The CIO Role in the Era of Dislocation
The Role of the CIO
Chapter 11 Designing a ProcessBased IT Organization
Chapter 12 Preparing for the Outsourcing Challenge
Chapter 13 Managing Information Systems Outsourcing
Building Relatioships across International Boundaries
Chapter 15 Application Service Providers
Designing and Operating an Enterprise Infrastructure
Chapter 16 The New Enabling Role of the IT Infrastructure
Chapter 17 US Telecommunications Today
Chapter 18 Information Everywhere
Chapter 19 Designing and Provisioning an Enterprise Network
Chapter 21 Virtual Private Networks with Quality of Service
Chapter 22 Storage Area Networks Meet Enterprise Data Networks
Chapter 23 Data Warehousing Concepts and Strategies
Plan Big Build Small
Exploring the Corporate Asset
Chapter 26 Data Conversion Fundamentals
Chapter 27 Service Level Management Links IT to the Business
Whats in It for Executives?
Chapter 29 CostEffective IS Security via Dynamic Prevention and Protection
Chapter 30 Reengineering the Business Continuity Planning Process
Here We Go Again
Chapter 32 Understanding Intrusion Detection Systems
Providing Application Solutions
Extending Your Web
An Application Development Perspective
A New Paradigm
A New Paradigm
Chapter 46 Software Quality Assurance Activities
Chapter 47 Six Myths about Managing Software Development
Chapter 48 Ethical Responsibility for Software Development
Leveraging EBusiness Opportunities
Chapter 49 Building an EBusiness Strategy
New Rules of Survival
Business and Technical Issues
Chapter 52 Evaluating the Options for BusinesstoBusiness ECommerce
Chapter 53 The Role of Corporate Intranets
Chapter 54 Integrating WebBased Data into a Data Warehouse
NET Redefines the Way Systems Interact
An Issue for the 21st Century
Chaptre 57 A Strategic Response to the Broad Spectrum of Internet Abuse
Chapter 58 World Wide Web Application Security
Facilitating Knowledge Work
Chapter 59 Improving Satisfaction with EndUser Support
Chapter 60 Internet Acceptable Usage Policies
Chapter 61 Managing Risks in User Computing
Chapter 62 Reviewing UserDeveloped Applications
What To Do When Downsizing
Obstacles and Solutions
The CrossCultural Dimension
Chapter 66 When Meeting FacetoFace Is Not the Best Option
Success in an Information Economy
Coming Up the Learning Curve
Chapter 69 Building Knowledge Management Systems
Citi izdevumi - Skatīt visu
activities addition agent allow analysis applications approach assessment associated audit become benefits build called chapter communication complex components continue corporate cost create critical data warehouse database decision defined determine devices discussed documents effective effort employees enable ensure enterprise environment example exchange executives Exhibit existing firms function goals identify implementation important improve increase individual industry infrastructure initial integration internal Internet involved issues knowledge measure meet ment methods objectives operating organization organizational performance planning potential practices present problems requirements response risk role shared solutions specific standards strategy structure success suppliers tasks testing tion types understand United vendor
120. lappuse - But of a good leader, who talks little, when his work is done, his aim fulfilled, they will all say, 'We did this ourselves.
700. lappuse - ... processing is necessary for the performance of a task carried out in the public interest or in the exercise of official authority vested in the controller or in a third party to whom the data are disclosed...
700. lappuse - ... processing is necessary for the purposes of the legitimate interests pursued by the controller or by the third party or parties to whom the data are disclosed, except where such interests are overridden by the interests for fundamental rights and freedoms of the data subject...
109. lappuse - Whom could your decision or action injure? 8. Can you discuss the problem with the affected parties before you make your decision? 9. Are you confident that your position will be as valid over a long period of time as it seems now?
120. lappuse - The first responsibility of a leader is to define reality. The last is to say thank you.
30. lappuse - I shall not today attempt further to define the kinds of material I understand to be embraced within that shorthand description, and perhaps I could never succeed in intelligibly doing so. But I know it when I see it, and the motion picture involved in this case is not that.
363. lappuse - System An assembly of procedures, processes, methods, routines or techniques united by some form of regulated interaction to form an organized whole.
160. lappuse - As a precursor to more detailed discussion, a virtual organization can be defined as: . . . composed of several business partners sharing costs and resources for the purpose of producing a product or service. [It] can be temporary ... or it can be permanent. Each partner contributes complementary resources that reflect its strengths, and determines its role in the virtual corporation.
698. lappuse - October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, OJ L 281, 23 November 1995.  Directive 2002/58/EC of 12 July 2002, concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communication), OJ L 201/37, 3 1 July 2002.
188. lappuse - Broadbent, M., & Weill, P. (1997). Management by maxim: How business and IT managers can create IT infrastructures.
Call Center Operation: Design, Operation, and Maintenance
Ierobežota priekšskatīšana - 2003
Implementing a Data Warehouse: A Methodology that Worked
Bruce Russell Ullrey
Ierobežota priekšskatīšana - 2007