نتایج جستجو برای: it discourages non

تعداد نتایج: 3816769  

2014
Philippe Jacquart

Our review of the evidence found that the notion that higher pay leads to the selection of better executives is undermined by the prevalence of poor recruiting methods. Moreover, higher pay fails to promote better performance. Instead, it undermines the intrinsic motivation of executives, inhibits their learning, leads them to ignore other stakeholders, and discourages them from considering the...

2015
Steffi Haag Andreas Eckhardt

Employees and/or functional managers increasingly adopt and use IT systems and services that the IS management of the organization does neither provide nor approve. To effectively counteract such shadow IT in organizations, the understanding of employees’ motivations and drivers is necessary. However, the scant literature on this topic primarily focused on various governance approaches at firm ...

2017
Sabine Khalil Till J. Winkler Xiao Xiao

While cloud computing is becoming a mainstream IT sourcing option, especially large companies struggle with the internal governance of cloud and the issue of shadow IT. This study takes a technological frames perspective to contrast the knowledge and expectations that business versus IT stakeholders have regarding cloud IT. Our interview data from 20 business and IT managers display the incongr...

Journal: :Simulation Modelling Practice and Theory 2012
Ozhan Alper Almaz Tayfur Altiok

This paper deals with simulation modeling of the vessel traffic in Delaware River. The purpose is to study the impact of deepening on the navigational efficiency in the River. In this regard, vessel calls to terminals, lightering and barge operations, tidal and navigational rules in the River, terminal and anchorage properties as well as vessel profiles are considered in the model. The simulati...

2013
Limao Zhang Miroslaw J. Skibniewski Xianguo Wu Yueqing Chen Qianli Deng

2008
Stefan Sackmann

The economic relevance of IT risks is increasing due to various operational, technical as well as regulatory reasons. Increasing flexibility of business processes and increasing dependability on IT require continuous risk assessment, challenging current methods for risk management. Extending IT risk management by a business process-oriented view is a promising approach for taking the occurring ...

Journal: :First Monday 2002
Rich Ling Kristin Thrane

This paper is an analysis of how Norwegians use television and the Internet in their leisure time. It sets up a taxonomy using the degree of engagement in the mediated information on one axis and the degree of sociability on the other. Within this matrix one can examine the similarities and differences between the two media and also differences between the generations. The analysis is based on ...

2015
Manuel Wiesche Michael Schermann Helmut Krcmar

Although managing information technology (IT) risks is widely regarded as a critical in organizations, stakeholders often question the value provided by IT risk management (ITRM) to an organization. Organizational research suggests the concept of ‘enabling formalization’ to design highly formalized organizational processes. Processes like IT-RM that are designed in an enabling way support organ...

2008
Bastian Schlaak Scott Dynes Lutz Kolbe Ragnar Schierholz

IT security issues and outsourcing of business processes are common but largely disjoint themes in the literature; common consideration is rare even though information security risk becomes a shared risk both through IS-based processes at outsourcing partners and potentially tightly-integrated IS systems. This paper explores this lack of an integrated model combining IT risk management view wit...

2005
Stefanie Jahner Helmut Krcmar

Increasing numbers of security incidents such as malware or hacker attacks prompt companies to spend billions of dollars on protecting their information systems. In this context IT risk management (ITRM) has become an important organizational function to control internal and external risks associated with IT. Much effort has been put on mitigating IT risks by means of physical, procedural, and ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید