نتایج جستجو برای: کسبوکارهای نوپای حوزۀ it
تعداد نتایج: 2842778 فیلتر نتایج به سال:
While cloud computing is becoming a mainstream IT sourcing option, especially large companies struggle with the internal governance of cloud and the issue of shadow IT. This study takes a technological frames perspective to contrast the knowledge and expectations that business versus IT stakeholders have regarding cloud IT. Our interview data from 20 business and IT managers display the incongr...
Simulation modeling of the vessel traffic in Delaware River: Impact of deepening on port performance
This paper deals with simulation modeling of the vessel traffic in Delaware River. The purpose is to study the impact of deepening on the navigational efficiency in the River. In this regard, vessel calls to terminals, lightering and barge operations, tidal and navigational rules in the River, terminal and anchorage properties as well as vessel profiles are considered in the model. The simulati...
The economic relevance of IT risks is increasing due to various operational, technical as well as regulatory reasons. Increasing flexibility of business processes and increasing dependability on IT require continuous risk assessment, challenging current methods for risk management. Extending IT risk management by a business process-oriented view is a promising approach for taking the occurring ...
This paper is an analysis of how Norwegians use television and the Internet in their leisure time. It sets up a taxonomy using the degree of engagement in the mediated information on one axis and the degree of sociability on the other. Within this matrix one can examine the similarities and differences between the two media and also differences between the generations. The analysis is based on ...
Although managing information technology (IT) risks is widely regarded as a critical in organizations, stakeholders often question the value provided by IT risk management (ITRM) to an organization. Organizational research suggests the concept of ‘enabling formalization’ to design highly formalized organizational processes. Processes like IT-RM that are designed in an enabling way support organ...
IT security issues and outsourcing of business processes are common but largely disjoint themes in the literature; common consideration is rare even though information security risk becomes a shared risk both through IS-based processes at outsourcing partners and potentially tightly-integrated IS systems. This paper explores this lack of an integrated model combining IT risk management view wit...
Increasing numbers of security incidents such as malware or hacker attacks prompt companies to spend billions of dollars on protecting their information systems. In this context IT risk management (ITRM) has become an important organizational function to control internal and external risks associated with IT. Much effort has been put on mitigating IT risks by means of physical, procedural, and ...
The implementation team problem is one of the critical elements lead to ERP project failure. The purpose of this research is to explore the relationship between team risk factors and IT governance. The IT governance includes five important domains, that is, IT strategic alignment, IT value delivery, IT resource management, IT risk management, and IT performance management. Our research results ...
Take a strip of paper with ‘once upon a time there’ written on one side and ‘was a story that began’ on the other. Twisting the paper and joining the ends produces John Barth’s story Frame-Tale, which prefixes ‘once upon a time there was a story that began’ to itself. In this paper, I argue that the possibility of understanding Frame-Tale cannot be explained by tacit knowledge of a recursive th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید