-
作者:TYRAN, CK; DENNIS, AR; VOGEL, DR; NUNAMAKER, JF
作者单位:University System of Georgia; University of Georgia
摘要:Strategic management is often performed by groups of managers. By improving the communication process of such groups, strategic management might be enhanced. This paper investigates the application of electronic meeting systems (EMS) technology to support strategic management. Eight cases involving five organizations using an EMS facility are examined to: (1) determine how organizational groups use EMS for strategic management, (2) assess the overall effectiveness and efficiency of the EMS app...
-
作者:IVES, B
-
作者:GOODHUE, DL; KIRSCH, LJ; QUILLARD, JA; WYBO, MD
作者单位:Massachusetts Institute of Technology (MIT)
摘要:In spite of strong conceptual arguments for the value of strategic data planning as a means to increase data integration in large organizations, empirical research has found more evidence of problems than of success. In this paper, four detailed case studies of SDP efforts, along with summaries of five previously reported efforts, are analyzed. Fifteen specific propositions are offered, with two overall conclusions. The first conclusion is that SDP, though conceived of as a generally appropria...
-
作者:TRAUTH, EM; COLE, E
作者单位:University of Pennsylvania
摘要:The growth of end-user computing and the trend toward the use of packaged software have focused greater attention on issues related to user support. A varied user population is requiring more tailored support, yet vendor-supplied software with a generic interface is increasingly being used. Four case studies illustrate ways in which organizational forms of support can enhance or overcome the limitations of the software interface. A framework called the organizational interface incorporates the...
-
作者:LOCH, KD; CARR, HH; WARKENTIN, ME
作者单位:Auburn University System; Auburn University; Bryant University
摘要:Information systems security remains high on the list of key issues facing information systems executives. Traditional concerns range from forced entry into computer and storage rooms to destruction by fire, earthquake, flood, and hurricane. Recent attention focuses on protecting information systems and data from accidental or intentional unauthorized access, disclosure, modification, or destruction. The consequences of these events can range from degraded or disrupted service to customers to ...