نتایج جستجو برای: by proposing it

تعداد نتایج: 8030324  

2015
Steffi Haag Andreas Eckhardt

Employees and/or functional managers increasingly adopt and use IT systems and services that the IS management of the organization does neither provide nor approve. To effectively counteract such shadow IT in organizations, the understanding of employees’ motivations and drivers is necessary. However, the scant literature on this topic primarily focused on various governance approaches at firm ...

2017
Sabine Khalil Till J. Winkler Xiao Xiao

While cloud computing is becoming a mainstream IT sourcing option, especially large companies struggle with the internal governance of cloud and the issue of shadow IT. This study takes a technological frames perspective to contrast the knowledge and expectations that business versus IT stakeholders have regarding cloud IT. Our interview data from 20 business and IT managers display the incongr...

Journal: :Simulation Modelling Practice and Theory 2012
Ozhan Alper Almaz Tayfur Altiok

This paper deals with simulation modeling of the vessel traffic in Delaware River. The purpose is to study the impact of deepening on the navigational efficiency in the River. In this regard, vessel calls to terminals, lightering and barge operations, tidal and navigational rules in the River, terminal and anchorage properties as well as vessel profiles are considered in the model. The simulati...

2013
Limao Zhang Miroslaw J. Skibniewski Xianguo Wu Yueqing Chen Qianli Deng

Journal: :International Journal For Applied Information Management 2021

Information technology (IT) industry in Vietnam has had steady development steps to continuously strengthen its position and role the sectors such as politics, social - economics, security defense for further integration into world. There are many companies now competing this area. In unpredictable competitive business environment, employee plays a vital nearly all organizations, thus important...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شاهد - دانشکده فنی و مهندسی 1387

abstract biometric access control is an automatic system that intelligently provides the access of special actions to predefined individuals. it may use one or more unique features of humans, like fingerprint, iris, gesture, 2d and 3d face images. 2d face image is one of the important features with useful and reliable information for recognition of individuals and systems based on this ...

2008
Stefan Sackmann

The economic relevance of IT risks is increasing due to various operational, technical as well as regulatory reasons. Increasing flexibility of business processes and increasing dependability on IT require continuous risk assessment, challenging current methods for risk management. Extending IT risk management by a business process-oriented view is a promising approach for taking the occurring ...

Journal: :First Monday 2002
Rich Ling Kristin Thrane

This paper is an analysis of how Norwegians use television and the Internet in their leisure time. It sets up a taxonomy using the degree of engagement in the mediated information on one axis and the degree of sociability on the other. Within this matrix one can examine the similarities and differences between the two media and also differences between the generations. The analysis is based on ...

2015
Manuel Wiesche Michael Schermann Helmut Krcmar

Although managing information technology (IT) risks is widely regarded as a critical in organizations, stakeholders often question the value provided by IT risk management (ITRM) to an organization. Organizational research suggests the concept of ‘enabling formalization’ to design highly formalized organizational processes. Processes like IT-RM that are designed in an enabling way support organ...

2008
Bastian Schlaak Scott Dynes Lutz Kolbe Ragnar Schierholz

IT security issues and outsourcing of business processes are common but largely disjoint themes in the literature; common consideration is rare even though information security risk becomes a shared risk both through IS-based processes at outsourcing partners and potentially tightly-integrated IS systems. This paper explores this lack of an integrated model combining IT risk management view wit...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید