To see the other types of publications on this topic, follow the link: Information technology – Ethiopia – Management.

Dissertations / Theses on the topic 'Information technology – Ethiopia – Management'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Information technology – Ethiopia – Management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Adem, Lishan. "The impact of information technology in sub Saharan Africa with a particular reference to Ethiopia : a constructionist approach." Thesis, University of Sheffield, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.284979.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rastogi, Rahul. "Information security service management : a service management approach to information security management." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1389.

Full text
Abstract:
In today’s world, information and the associated Information Technology are critical assets for many organizations. Any information security breach, or compromise of these assets, can lead to serious implications for organizations that are heavily dependent on these assets. For such organizations, information security becomes vital. Organizations deploy an information security infrastructure for protecting their information assets. This infrastructure consists of policies and controls. Organizations also create an information security management system for managing information security in the organization. While some of the policies and controls are of a purely technical nature, many depend upon the actions of end-users. However, end-users are known to exhibit both compliant and noncompliant behaviours in respect of these information security policies and controls in the organization. Non-compliant information security behaviours of end-users have the potential to lead to information security breaches. Non-compliance thus needs to be controlled. The discipline of information security and its management have evolved over the years. However, the discipline has retained the technology-driven nature of its origin. In this context, the discipline has failed to adequately appreciate the role played by the end-users and the complexities of their behaviour, as it relates to information security policies and controls. The pervasive information security management philosophy is that of treating end-users as the enemy. Compliance is sought to be achieved through awareness programs, rewards, punishments and evermore strict policies and controls. This has led to a bureaucratic information security management approach. The philosophy of treating end-users as the enemy has had an adverse impact on information security in the organization. It can be said that rather than curbing non-compliance by end-users, the present-day bureaucratic approach to information security management has contributed to non-compliance. This thesis calls this the end-user crisis. This research aims at resolving this crisis by identifying an improved approach to information security management in the organization. This research has applied the service management approach to information security management. The resultant Information Security Service Management (ISSM) views end-users as assets and resources, and not as enemies. The central idea of ISSM is that the end-user is to be treated as a customer, whose needs are to be satisfied. This research presents ISSM. This research also presents the various components of ISSM to aid in its implementation in an organization.
APA, Harvard, Vancouver, ISO, and other styles
3

De, Jongh Henk. "Information technology outsourcing." Thesis, Stellenbosch : Stellenbosch University, 2003. http://hdl.handle.net/10019.1/53467.

Full text
Abstract:
Thesis (MBA)--Stellenbosch University, 2003.
ENGLISH ABSTRACT: The study project examines the concept of information technology (IT) outsourcing to external service providers. It is a relatively new concept in the South African scenario and there are many risks associated with the process that can cause a company to loose large amounts of money if outsourcing is not done right. The study project will aim to examine the most important aspects regarding IT outsourcing in order to reduce the risks associated with the process. The definition of IT outsourcing is the practice of transferring an organisation's computer centre operations, telecommunications networks, or applications development to external vendors of these services. There are different variations of outsourcing applicable to IT, for example: contracting out, outsourcing, in sourcing and co-sourcing. Companies have different reasons for outsourcing and the risks associated with the process have to be taken into account when embarking on an outsourcing initiative. With IT outsourcing there are different services that can be outsourced, for example: mainframe services, desktop computer services, security services and different application services. The decision to outsource a specific area of IT is a strategic issue and the risks, costs, and selection of the service provider are all very important factors to take into account. One of the main factors that any company should take into account when embarking on a big initiative is of course costs. The aim is the reduction of costs of the specific outsourced area. Therefore the necessary measures need to be in place to measure costs before and after the outsourcing process. It could happen that the outsourcing process do not provide the reduced cost benefits envisaged initially. This could be due to hidden costs that were not taken into account when the outsourcing initiative was planned. Normally the outsourcing process is driven by a structured project and numerous important factors need to be taken into account when managing the whole process. The factors include: the vendor evaluation process, setup of the service level agreement, the request for proposal, relationship with the supplier, communication of the whole process inside the company, the contract between the two parties, and the transition period with the measuring of results thereafter. The current IT skills shortage in South Africa is causing companies to rethink their IT strategies and make use of external service providers to supply them with the necessary skills to get the job done. The research illustrates this fact that IT consulting has one of the highest adoption rates currently and with regard to the future. Full blown outsourcing is still a relatively new concept in South Africa and companies will only adopt the concept as soon as it has proved to be successful and cost effective. As mentioned it is important that a structured methodology should be used to drive an outsourcing process. It is important that the approach is structured around proven project management principles with the correct measures in place to support and sustain the whole process. Outsourcing of IT services is a strategic decision that a company must take and the risks associated with the process mean that it must be planned and executed very carefully. Outsourcing has various risks associated with it like the appointment of the wrong service provider. However, the outsourcing process can also have its merits and the most important of these are most probably lower costs, new IT skills, and better service. The shortage of IT skills in South Africa makes the idea of outsourcing more and more attractive because of the fact that companies can now "buy" the skills without having to commit to long term permanent employment contracts for permanent staff.
AFRIKAANSE OPSOMMING: Die navorsingsverslag handel oor die konsep van uitkontraktering van inligtingstegnologie(IT) dienste aan eksterne diensverskaffers. Aangesien dit 'n relatiewe nuwe tendens in Suid Afrika se IT bedryf is, en die risiko bestaan dat 'n maatskappy groot geldelike verliese kan ly indien dit nie reg aangepak word nie, word daar gepoog om na die belangrikste aspekte van uitkontraktering te kyk om die risikos daaraan verbonde so laag as moontlik te hou. Die definisie van IT uitkontraktering is die oordrag van 'n organisasie se rekenaar sentrum operasies, telekommunikasie netwerk, of toepassing ontwikkeling na 'n eksterne verskaffer van hierdie dienste. Daar is verskillende variasies van uitkontraktering van toepassing op IT soos byvoorbeeld: uitkontraktering, inkontraktering, en gesamentlike kontraktering. Maatskappye het verskillende redes om 'n diens uit te kontrakteer en die risikos verbonde aan die proses moet sorgvuldig in gedagte gehou word wanneer die uitkontrakteringsproses aangepak word. Met IT uitkontraktering is daar verskillende dienste wat uitgekontrakteer kan word soos byvoorbeeld: hoofraam dienste, persoonlike rekenaar dienste, sekuriteitsdienste en verskeie rekenaar applikasie dienste. Die besluit om 'n spesifieke area van IT uit te kontrakteer is 'n strategiese kwessie vir die maatskappy en die risikos, kostes en keuse van eksterne diensverskaffer is almal baie belangrike faktore wat in gedagte gehou moet word. Een van die vernaamste faktore wat enige maatskappy in ag behoort te neem wanneer 'n groot inisiatief aangepak word, is natuurlik kostes. Die doel van uitkontraktering is om die kostes van die spesifieke area te verlaag. Daarom moet die nodige maatreëls in plek wees om die kostes vooraf en na die uitkontrakteringsproses te meet. Die uitkontraktering inisiatief kan die maatskappy egter baie duur te staan kom en glad nie die koste voordele bied wat aanvanklik beplan is nie. Dit kan wees as gevolg van verskuilde kostes wat nie met die beplanning van die proses in ag geneem is nie. Gewoonlik word die uitkontrakteringsproses gedryf deur 'n gestruktureerde projek en verskeie belangrike faktore moet in ag geneem word vir die hele proses. Die faktore sluit in: die evaluasieproses om die regte diensverskaffer aan te stel, die opstel van die regte dokumentasie in terme van die diensvoorstel voorlegging, verhouding met die diensverskaffer, die opstel van die diensvlak ooreenkoms, kommunikasie oor die hele proses binne die maatskappy, die kontrak tussen die twee partye, oorgangstadium en die meting van voordele daarna. Die huidige tekort aan IT vaardighede in Suid Afrika veroorsaak dat maatskappye hul IT strategie moet herdink en die opsie van eksterna diensverskaffers wat die nodige vaardighede kan verskaf, oorweeg word. Die studie illustreer hierdie feit dat IT konsultasie een van die hoogste vlakke van ingebruikneming tans en vir die toekoms het. Volledige IT funksie uitkontraktering is nog 'n relatiewe nuwe konsep in Suid Afrika en maatskappye sal slegs die idee aanneem sodra uitkontraktering as suksesvol en koste effektief bewys is. Soos reeds genoem is dit belangrik dat 'n gestruktureerde metodologie gebruik word om 'n uitkontrakteringsinisiatief te dryf. Dit is belangrik dat die aanslag geskoei is rondom bewese projekbestuursbeginsels en dat die regte maatreëls getref is om die proses te ondersteun. Uitkontraktering van IT dienste is 'n strategiese besluit wat 'n maatskappy moet neem. Die risikos daaraan verbonde veroorsaak dat die beplanning en aanpak van die proses baie deeglik en noukeurig gedoen moet word. Uitkontraktering het verskeie risikos soos om die verkeerde eksterne diensverskaffer te kies, maar kan ook voordelig vir die maatskappy wees en die grootste voordele wat 'n maatskappy kan verwag is verlaagde kostes en nuwe IT vaardighede. Die probleem van 'n tekort aan goed opgeleide IT personeel in Suid Afrika maak die idee van uitkontraktering al meer aanlokliker omdat dit 'n goeie manier is om goeie vaardighede in te "koop".
APA, Harvard, Vancouver, ISO, and other styles
4

Duffy, Juliet (Juliet Maria). "Information management using Web 2.0 technology." Thesis, Massachusetts Institute of Technology, 2009. http://hdl.handle.net/1721.1/50100.

Full text
Abstract:
Thesis (M.B.A.)--Massachusetts Institute of Technology, Sloan School of Management; and, (S.M.)--Massachusetts Institute of Technology, Dept. of Chemical Engineering; in conjunction with the Leaders for Manufacturing Program at MIT, 2009.
Includes bibliographical references.
Web 2.0, the ultimate platform for tacit based knowledge work has finally arrived. User driven, collaborative platform based tools including wikis, web mash-ups, discussion boards, linkage based search engines, and tagging have the potential to vastly change how information is managed and how knowledge work is captured. This thesis investigates how the new paradigms and tools of Web 2.0 can be applied to the Pharmaceutical Industry and assist with information management at The Novartis Institute for BioMedical Research (NIBR). Applying Web 2.0 tools to NIBR's chemical compounds, targets, assays, people, and projects in a well thought out framework has the potential to yield tremendous productivity improvements in the drug discovery process. Effectively harnessing the collective intelligence of thousands of scientists within Novartis's worldwide research network will enable a paradigm shift. A large, extremely knowledgeable user community can more effectively annotate metadata, hyperlink to important content, establish tags, and collectively author content. Such activities will not only improve the search ability of information but also allow important scientific connections to emerge linking biology to chemistry and furthering Novartis's understanding of disease.
by Juliet Duffy.
S.M.
M.B.A.
APA, Harvard, Vancouver, ISO, and other styles
5

Tessema, Ermyas Arega. "The relation between ICT and poverty reduction : the Central Statistical Agency of Ethiopia." Thesis, Stellenbosch : University of Stellenbosch, 2010. http://hdl.handle.net/10019.1/5275.

Full text
Abstract:
Thesis (MPhil (Information Science))--University of Stellenbosch, 2010.
ENGLISH ABSTRACT: National Statistical offices (NSOs) are the sources of wide ranges of socio-economic, demographic and agricultural data and information that are used to monitor and evaluate development programs and formulate policies. The data generated by NSOs is used as basis for making decisions and also used to assess the extent and causes of poverty. Various stakeholders such as researchers, the World Bank, the International Monetary Fund, the UN, and various NGOs prepare and release research materials and annual reports using data and information obtained from NSOs and line ministries. For example, Deneulin and Shahani state that one of the intentions of the annual Human Development Report (HDR) prepared by the UNDP is “to assess the quality of life of a population and be an advocacy tool for its improvement with a political purpose of raising awareness and generating debate on public issues and concerns which would otherwise not be on the political agenda”1. Based on the different approaches to poverty, different sets of data and information are produced and used for poverty measurement. Mostly, poverty is measured using data obtained from nationally representative household surveys which focus on income and expenditure, ownership, access to and use of some basic services. Another approach uses data on mental satisfaction; still others assume poverty to be multi-dimensional and argue that income alone is not enough. They view poverty as deprivation of basic capabilities due to high rates of mortality, illiteracy, malnourishment, unemployment, ill health, lack of education and social exclusion, etc2. The quality of data and information (such as integrity, methodological soundness, accuracy and reliability, serviceability and accessibility) generated by data-producingagencies therefore needs to be preserved and improved in order to obtain meaningful results from the measurement of poverty in any of the approaches and to satisfy the growing data quality demands of stakeholders. Loshin states that “strategic decisions based on untrustworthy information are likely to result in poor decisions”3. This study focuses on the role played by national statistical offices in poverty reduction in general. It examines the various activities, players, interactions, and ICTs used at the various stages of the statistical process in the Ethiopian Central Statistical Agency (CSA) to generate poverty-related data and information and how the quality of this data can be preserved and improved. The purpose of this research is therefore to identify poverty related data quality problems with respect to the IMF’s DQAF and assess where in the statistical process specific types of ICTs can improve data quality. For this reason interpretive case study method with the researcher as participant observer was adopted to study how poverty related data and information is produced. It was found out that some of the data quality problems can be addressed using appropriate ICTs with the availability of reliable power infrastructures.
AFRIKAANSE OPSOMMING: Nasionale Statistiekkantore (NSOs) is die bron van ‘n wye reeks sosio-ekonomiese, demografiese en landboukundige data en inligting wat gebruik word om ontwikkelingsprogramme te monitor en te evalueer. Die data wat deur NSOs geskep word, word aangewend as grondslag vir besluitneming. Die data word ook gebruik om die omvang en oorsake van armoede te bepaal. Verskeie betrokkenes soos navorsers, die Wêreldbank (WB), Internasionale Monetêre Fonds (IMF) en die VN en NSOs skep en versprei verskillende navorsingsuitsette en jaarverslae wat gebruik maak van die data en inligting wat verkry word van NSOs en ministeries. So konstateer Deneulin en Shahani dat een van die doelstellings van die Verslag op Menslike Ontwikkeling (HDR), soos opgestel deur die VNDP, is om “die lewensgehalte van ‘n bevolking te skat en om as werktuig en voorspraak vir die verbetering daarvan op te tree, met die politiese doelwit om bewustheid te verhoog en debatvoering oor openbare sake en kwessies, wat andersins nie op die agenda sou verskyn nie, aan te voor”.4. Na gelang van die verskillende benaderings tot armoede word verskillende stelle data en inligting geproduseer en gebruik vir die meting van armoede. Armoede word gewoonlik gemeet deur data te gebruik wat bekom word van landswye opnames van huishoudings en ingestel is op inkomste en besteding, besitreg, toegang tot en die gebruik van ‘n paar basiese dienste. ‘n Ander benadering gebruik data oor geestelike bevrediging; ander weer aanvaar dat armoede multidimensioneel is en voer aan dat inkomste alleen nie genoeg is nie. Hulle beskou armoede as die ontbering van basiese vermoëns weens ‘n hoë sterftesyfer, ongeletterdheid, ondervoeding, siekte, gebrekkige onderwys, sosiale uitsluiting en dies meer5. Die gehalte van data en inligting (soos integriteit, metodologiese deeglikheid, akkuraatheid en betroubaarheid, bruikbaarheid en toeganklikheid) wat deur agentskappe opgelewer word moet dus bewaar en verbeter word ten einde ‘n beduidende resultaat te bekom uit die meting van armoede deur enige van die benaderings en ook om belanghebbendes se groeiende aandrang op datagehalte te bevredig. Loshin beweer dat “strategiese besluite gebaseer op onbetroubare inligting waarskynlik swak besluitneming tot gevolg sal hê”.6. Hierdie ondersoek konsentreer op die rol wat gespeel word deur nasionale statistiekkantore in die algemene bekamping van armoede. Dit ondersoek die verskillende aktiwiteite, rolspelers, interaksies en ICTs wat op verskeie stadiums van die statistiese proses deur die Etiopiese Sentrale Statistiekagentskap (CSA) gebruik word om data en inligting oor armoede te skep en hoe die betroubaarheid van data behou en verbeter kan word. Die doel van hierdie navorsing is dus om kwaliteitsprobleme wat verband hou met armoededata ten opsigte van die IMF se DQAF te identifiseer en om te besluit waar in die statistiese proses bepaalde soort ICT’s die gehalte van data kan identifiseer. Om hierdie rede is die interpretiewe gevallestudiemetode aanvaar om te bepaal hoe armoede-verwante data en inligting geskep word. Die slotsom was dat sommige van die probleme in datagehalte aangespreek kan word deur die gebruik van gepaste ICT’s met die beskikbaarheid van betroubare mag-infrakstrukture.
APA, Harvard, Vancouver, ISO, and other styles
6

Sezgin, Emre. "Itmem - Information Technology Management Enhancement Model: Assessment Of Information Technology Use In Organizations." Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/12612353/index.pdf.

Full text
Abstract:
This study proposes a new model for the assessment of information technology (IT) use in public and private companies, which is called ITMEM- Information Technology Management Enhancement Model. This model aims to assist decision making processes in information technology management. For this purpose, a tool is developed to explore strengths and weaknesses of a company in IT use. The model was developed upon a three-folded structure including (1) academic studies in technology management, (2) best practices which are developed for control over operations and processes including COBIT, CMMI and ITIL, and (3) standards about IT management and IT security. The conceptual framework of ITMEM is based on technology management process assessment model of M.J. Gregory. Methodological triangulation approach is adopted for the model for retrieving valid and reliable results. Triangulation consists of (1) semi structured interview, (2) presented company documents and (3) questionnaire developed upon relevant academic researches, best practices and standards. ITMEM was practiced on ten domestic and experienced companies in software &
development and manufacturing industries which were appraised in or in progress of being appraised in CMMI. The study revealed the benefits and deficiencies of IT use in the company. It also provided information for decision makers about IT value within companies, and demonstrated the effects of best practices and standards over IT use.The reported findings should be valuable assets to researchers studying on IT management and IT use in organizations.
APA, Harvard, Vancouver, ISO, and other styles
7

McGee, Mary Jane. "Information Technology Management Strategies to Implement Knowledge Management Systems." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4156.

Full text
Abstract:
More than 38% of the U.S. public workforce will likely retire by 2030, which may result in a labor shortage. Business leaders may adopt strategies to mitigate knowledge loss within their organizations by capturing knowledge in a knowledge management system (KMS). The purpose of this single case study was to explore strategies that information technology (IT) managers use to develop and implement a KMS. The target population consisted of IT managers in a small-sized organization located in northwestern Florida who had implemented a KMS successfully. The conceptual framework for this study was organizational knowledge creation theory. The collection of public documents, execution of semistructured interviews with 5 qualified participants, literature on the topic, and member checking formed the determination of the findings of the study. Using triangulation and coding the data for emergent themes, 6 themes emerged from the data analysis: (a) training, (b) customer focus, (c) policy and governance, (d) leadership and management support, (e) communication and marketing, and (f) business process management. The application of the findings may contribute to social change by identifying strategies that leaders and IT managers from communities and government agencies use in implementing a KMS that may facilitate transparency and open flow of information to citizens, and allow access to timely, civic, and potentially life-enhancing information.
APA, Harvard, Vancouver, ISO, and other styles
8

Aral, Sinan. "Essays on information, technology and information worker productivity." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/39003.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Sloan School of Management, 2007.
Includes bibliographical references.
I examine how information technology (IT) skills and use, communication network structures, and the distribution and flow of information in organizations impact individual information worker productivity. The work is divided into three essays based on the task level practices of information workers at a midsize executive recruiting firm: Essay 1: "Information, Technology and Information Worker Productivity: Task Level Evidence." I develop and econometrically test a multistage model of production and interaction activities at the firm, and analyze correlations among network structure, characteristics of information flow and real economic output. I find that (a) IT use is positively correlated with non-linear drivers of productivity; (b) the structure and size of workers' communication networks are highly correlated with performance; (c) an inverted-U shaped relationship exists between multitasking and productivity such that, beyond an optimum, more multitasking is associated with declining project completion rates and revenue generation; and (d) asynchronous information seeking such as email and database use promotes multitasking while synchronous information seeking over the phone shows a negative correlation. These data demonstrate a strong correspondence among technology use, social networks, and productivity for project-based information workers.
(cont.) Essay 2: "Network Structure and Information Advantage: Structural Determinants of Access to Novel Information and their Performance Implications." I examine relationships between social network structure, information structure, and individual performance. I build and validate a Vector Space Model of information diversity, develop hypotheses linking two key aspects of network structure - size and diversity - to the distribution of novel information among actors, and test the theory using data on email communication patterns, message content and performance. Results indicate that access to diverse, novel information is related to network structure in non-linear ways, and that network diversity contributes to performance even when controlling for the positive performance effects of access to novel information, suggesting additional benefits to network diversity beyond those conferred through information advantage.
(cont.) Essay 3: "Organizational Information Dynamics: Drivers of Information Diffusion in Organizations." I examine drivers of the diffusion of different types of information through organizations by observing several thousand diffusion processes of two types of information -'event news' and 'discussion topics' - from their original first use to their varied recipients over time. I then test the effects of network structure and functional and demographic characteristics of dyadic relationships on the likelihood of receiving each type of information and receiving it sooner. Discussion topics exhibit more shallow diffusion characterized by 'back-and-forth' conversation and are more likely to diffuse vertically up and down the organizational hierarchy, across relationships with a prior working history, and across stronger ties; while news, characterized by a spike in communication and rapid, pervasive diffusion through the organization, is more likely to diffuse laterally as well as vertically, and without regard to the strength or function of relationships. The findings highlight the importance of simultaneous considerations of structure and content in information diffusion studies.
by Sinan Aral.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
9

Kuan, Chan Hong. "Management of information technology for competitive advantage." Thesis, University of Macau, 1996. http://umaclib3.umac.mo/record=b1636729.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cheng, Man-fai, and 鄭文輝. "Utitlization in information technology in housing management." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2007. http://hub.hku.hk/bib/B4500920X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Rich, Martin. "Information and communication technology in management learning." Thesis, City University London, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.410151.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Zhu, Ying 1975. "Information technology application in intermodal terminal management." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/84783.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Civil and Environmental Engineering; and, (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2002.
Page 125 blank.
Includes bibliographical references (p. 119-124).
by Ying Zhu.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
13

Hammar, Tora. "eMedication – improving medication management using information technology." Doctoral thesis, Linnéuniversitetet, Institutionen för medicin och optometri (MEO), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-37167.

Full text
Abstract:
Medication is an essential part of health care and enables the prevention andtreatment of many conditions. However, medication errors and drug-relatedproblems (DRP) are frequent and cause suffering for patients and substantial costsfor society. eMedication, defined as information technology (IT) in themedication management process, has the potential to increase quality, efficiencyand safety but can also cause new problems and risks.In this thesis, we have studied the employment of IT in different steps of themedication management process with a focus on the user's perspective. Sweden isone of the leading countries when it comes to ePrescribing, i.e. prescriptionstransferred and stored electronically. We found that ePrescribing is well acceptedand appreciated by pharmacists (Study I) and patients (Study II), but that therewas a need for improvement in several aspects. When the pharmacy market inSweden was re-regulated, four new dispensing systems were developed andimplemented. Soon after the implementation, we found weaknesses related toreliability, functionality, and usability, which could affect patient safety (StudyIII). In the last decade, several county councils in Sweden have implementedshared medication lists within the respective region. We found that physiciansperceived that a regionally shared medication list generally was more complete butoften not accurate (Study IV). Electronic expert support (EES) is a decisionsupport system which analyses patients´ electronically-stored prescriptions in orderto detect potential DRP, i.e. drug-drug interactions, therapy duplication, highdose, and inappropriate drugs for geriatric or pediatric patients. We found thatEES detected potential DRP in most patients with multi-dose drug dispensing inSweden (Study V), and that the majority of alerts were regarded as clinicallyrelevant (Study VI).For an improved eMedication, we need a holistic approach that combinestechnology, users, and organization in implementation and evaluation. The thesissuggests a need for improved sharing of information and support for decisionmaking, coordination, and education, as well as clarification of responsibilitiesamong involved actors in order to employ appropriate IT. We suggestcollaborative strategic work and that the relevant authorities establish guidelinesand requirements for IT in the medication management process.
Läkemedel förbättrar och förlänger livet för många och utgör en väsentlig del av dagens hälso- och sjukvård men om läkemedel tas i fel dos eller kombineras felaktigt med varandra kan behandlingen leda till en försämrad livskvalitet, sjukhusinläggningar och dödsfall. En del av dessa problem skulle kunna förebyggas med rätt information till rätt person vid rätt tidpunkt och i rätt form. Informationsteknik i läkemedelsprocessen har potentialen att öka kvalitet, effektivitet och säkerhet genom att göra information tillgänglig och användbar men kan också innebära problem och risker. Det är dock en stor utmaning att i läkemedelsprocessen föra in effektiva och användbara IT-system som stödjer och inte stör personalen inom sjukvård och på apotek, skyddar den känsliga informationen för obehöriga och dessutom fungerar tillsammans med andra system. Dagens IT-stöd i läkemedelsprocessen är otillräckliga. Till exempel saknar läkare, farmaceuter och patienter ofta tillgång på fullständig och korrekt information om en patients aktuella läkemedel; det händer att fel läkemedel blir utskrivet eller expedierat på apotek; och bristande eller långsamma system skapar frustration hos användarna. Dessutom är det flera delar av läkemedelsprocessen som fortfarande är pappersbaserade. Därför är det viktigt att utvärdera IT-system i läkemedelsprocessen. Vi har studerat IT i olika delar av läkemedelsprocessen, före eller efter införandet, framför allt utifrån användarnas perspektiv. Sverige har lång erfarenhet och tillhör de ledande länderna i världen när det gäller eRecept, det vill säga recept som skickas och lagras elektroniskt. I två studier fann vi att eRecept är väl accepterat och uppskattat av farmaceuter (Studie I) och patienter (Studie II), men att det finns behov av förbättringar. När apoteksmarknaden omreglerades 2009 infördes fyra nya receptexpeditionssystem på apoteken. Vi fann att det efter införandet uppstod problem med användbarhet, tillförlitlighet och funktionalitet som kan ha inneburit en risk för patientsäkerheten (Studie III). I Sverige har man inom flera sjukvårdsregioner infört gemensamma elektroniska läkemedelslistor. I en av studierna kunde vi visa att detta har inneburit en ökad tillgänglighet av information, men att en gemensam lista inte alltid blir mer korrekt och kan innebära en ökad risk att känslig information nås av obehöriga (Studie IV). I två av studierna undersöktes beslutsstödssystemet elektroniskt expertstöd (EES):s potential som stöd för läkare att upptäcka läkemedelsrelaterade problem till exempel om en patient har två olika läkemedel som inte passar ihop, eller ett läkemedel som kanske är olämpligt för en äldre person. Studierna visade att EES gav signaler för potentiella problem hos de flesta patienter med dosdispenserade läkemedel i Sverige (Studie V), och läkarna ansåg att majoriteten av signalerna är kliniskt relevanta och att några av signalerna kan leda till förändringar i läkemedelsbehandlingen (Studie VI). Sammantaget visar avhandlingen att IT-stöd har blivit en naturlig och nödvändig del i läkemedelsprocessen i Sverige men att flera problem är olösta. Vi fann svagheter med användbarhet, tillförlitlighet och funktionalitet i de använda IT-systemen. Patienterna är inte tillräckligt informerade och delaktiga i sin läkemedelsbehandling. Läkare och farmaceuter saknar fullständig och korrekt information om patienters läkemedel, och de har i dagsläget inte tillräckliga beslutsstöd för att förebygga läkemedelsrelaterade problem. Eftersom läkemedelsprocessen är komplex med många aspekter som påverkar utfall behöver vi ett helhetstänkande när vi planerar, utvecklar, implementerar och utvärderar IT-lösningar där vi väger in både tekniska, sociala och organisatoriska aspekter. Avhandlingens resultat visar på ett behov av ökad koordination och utbildning samt förtydligande av ansvaret för inblandade aktörer. Vi föreslår gemensamt strategiskt arbete och att inblandade myndigheter tar fram vägledning och krav för IT i läkemedelsprocessen.
APA, Harvard, Vancouver, ISO, and other styles
14

Isaksson, Ulrika, Karin Kvarnström, and Malin Nilsson. "Challenges with Incident Management : In Information Technology." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1634.

Full text
Abstract:
IT-security is a global problem and over the world Computer Emergency Response Teams (CERT) are created in order to solve the problem. The common understanding is that IT-security is important but no straight guideline how to deal with it. The Swedish IT-incident centre (SITIC) started 2003. It is a Swedish solution on an international problem. There are challenges to be met when handling an IT-incident centre – organisation form, activity and result. We believe a general solution in IT-incident management that will suit all parties in the society, is a hard task for SITIC as things stand today. What we can deduce from our investigation is that there is no greater need of SITIC among the global companies. We believe one reason for this is that they are going to create within their companies some sort of CERT function by themselves in the future. This in its turn, depend on that the companies do not have any trust to SITIC, they do not see the benefit with an activity as SITIC because they only see the reporting, they do not believe they are going to get something in return. Conclusion: Incident management is not only about reporting incidents, but a continuous life cycle with phases: detect, report, measure and follow-up.
IT-säkerhet är ett globalt problem och över världen skapas Computer Emergency Respons Teams (CERT) för att försöka att lösa olika problem. Den vanliga uppfattningen är att IT-säkerhet är viktigt men att inga direkta guidelines finns för hur man skall hantera det. SITIC som är det svenska IT-incident centret, startade 1 januari, 2003. Det är en svensk lösning på ett internationellt problem. För ett IT-incident center finns det utmaningar att hantera såsom organisations form, verksamhet och resultat. Vi tror att en generell lösning av hanteringen IT-incidenter som skulle passa alla parter i samhället blir svårt för SITIC att klara av som det ser ut idag. Vad vi kan härleda från vår utredning är att det inte finns något större behov av SITIC för de globala företagen. Vi tror att en av anledningarna är att företagen själva i framtiden tänker starta egna CERT-funktioner. Detta i sin tur kan bero på att företagen inte har något större förtroende för SITIC, de kan inte se någon fördel men verksamheten, de ser endast rapporteringsdelen. Företagen tror inte att de kommer att få något tillbaka när dom rapporterar sina incidenter till SITIC. Slutsats: Incident hantering handlar inte bara om att rapportera incidenter, utan det är en kontinuerlig livscykel innehållande faserna: upptäcka, rapportera, åtgärda och följa upp.
APA, Harvard, Vancouver, ISO, and other styles
15

Ho, Wai-cheong. "Business and information technology alignment /." Hong Kong : University of Hong Kong, 1998. http://sunzi.lib.hku.hk/hkuto/record.jsp?B2071807X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Carey, David R. "Information technology : attitudes and implementation." Thesis, Massachusetts Institute of Technology, 1988. http://hdl.handle.net/1721.1/14534.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Mylonopoulos, Nikolaos. "The governance of information technology service provision." Thesis, University of Warwick, 1999. http://wrap.warwick.ac.uk/34705/.

Full text
Abstract:
The governance of information technology (IT) service provision entails all those elements of the structure and process of contracting and organisation that are necessary in order to deliver effective and efficient IT services within today's organisations. This thesis develops a framework integrating those elements of governance with a view to explaining actual governance structures and to guiding relevant decisions in practice. Until the late 1980s, the principal concerns with respect to the organisation of IT activities revolved around the issues of centralisation versus decentralisation and end-user computing versus specialist control. Whilst contracts for various systems and services have always been a significant part of the IT department's activity, the issue of structuring such contracts took a prominent position on the management agenda in the beginning of 1990s with the proliferation of large contracts of the 'total outsourcing' kind. IT outsourcing rekindled interest in and reshaped the agenda of the organisation of IT provision. The debate on IT outsourcing provided the motivation and the starting point of this thesis. Thus, chapter 1 reviews this debate and, following on the opinion of others, recasts the question of 'whether to outsource or not' as 'how to set up the governance (i. e. the structure and process of contracting and organisation) of IT service provision'. In order to shed some light on the elements of governance, chapter 2 turns on a range of economic theories of the firm. These theories are critically reviewed and some preliminary suggestions as to how they might inform the governance of IT are put forth. The chapter concludes by setting the theoretical foundations for the rest of the thesis. The notion of a governance continuum between the ideal pure market and the ideal pure hierarchy is introduced. Actual governance structures, it is argued, can be placed on this continuum as individual instances. Before advancing onto more substantive work, chapter 3 pauses to reflect on the epistemological basis of this research project. The main principles of the epistemological position adopted here are taken from the philosophical arguments of transcendental realism. The implications of this epistemological position for the empirical methods and the theoretical claims made in this thesis are also examined. Chapter 4 documents an intensive case study at British Petroleum Plc. The purpose of this case study was to draw lessons from practice and to assess the relevance of the theories of chapter 2. This case study was an interactive learning process through which the researcher sought access to management practice in order to assess economic theories, while the managers at BP sought a broader understanding of IT outsourcing. The outcome of this interaction was the S-CAGE framework which coupled theoretical insights with practical relevance. The S-CAGE (Service Clustering And Governance Establishment) framework is described in detail in chapter 5. It is put forth as both an explanatory and a normative account of the governance of IT service provision. It is based on the notion of governance continuum, it introduces the idea of grouping services into clusters and it provides a classification of the elements of governance that should be customised to the characteristics of each cluster of services. Chapter 6 presents two further case studies aimed at evaluating the usefulness of SCAGE in understanding and explaining alternative outsourcing practices. ICI and Anglian Water have been visited for this purpose. On the basis of these cases, the concluding chapter summarises the strengths and limitations of the proposed framework. An attempt is also made to set forth some preliminary theoretical ideas extending the notions of clustering and governance continuum. The thesis concludes with a final short illustration of the use of the S-CAGE framework.
APA, Harvard, Vancouver, ISO, and other styles
18

Kalissery, Biju. "Managing agile information technology infrastructure." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/42363.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, System Design and Management Program, 2007.
Includes bibliographical references (leaves 43-44).
Information technology (IT) can be a key contributor for the successful implementation of business strategies. However, companies normally find it hard to synchronize their evolving business strategies with the capabilities in IT. This thesis analyzes the key contributors to the problems in synchronizing business strategy and Information Technology and suggests both management and technical frameworks for an agile IT infrastructure that can stay in sync with the evolving business strategy. Agility in IT infrastructure means the ability for the infrastructure to accommodate evolving needs and business strategies without significant re-architecture. There is no magic bullet that could induce agility into an IT infrastructure and its management. But, this thesis studies the best practices in management and technology which are being used by industry leaders successfully.
by Biju Kalissery.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
19

Speed-Crittle, Sharita Dianthe. "Healthcare Organization Change Management Strategies to Guide Information Technology With for Information Technology Change Initiatives." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6679.

Full text
Abstract:
As technology and organizations continue to increase in complexity, a willingness to implement change management strategies for Internet technology (IT) change initiatives is necessary in a healthcare setting. This multiple case study explored change management strategies that 3 hospital administrators at 3 different hospitals in the southeast region of the United States used to guide organizational IT change activities to avoid waste and increase profits. The conceptual framework for this study was Lewin's organizational change model and Kanter's theory of structural empowerment. Data were collected using semistructured interviews and a review of hospital documentation from the 3 hospitals. The data analysis process was completed by transcribing the interview recordings and coding the data using a codebook and data-management software. Themes that emerged from data analysis included strategies to increase digitization in all areas, improve communication with IT personnel, provide ongoing training, and encourage the gradual adoption of technology. The implications of this study for positive social change include the potential to provide hospital managers with successful strategies related to the use of IT in hospitals to facilitate improved patient care and community well-being.
APA, Harvard, Vancouver, ISO, and other styles
20

Lima, Luis A. C. "LEADERSHIP IN THE INFORMATION AGE: HOW CHIEF INFORMATION OFFICERS LEAD INFORMATION TECHNOLOGY WORKERS." Connect to this title online, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=bgsu1151093030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Ryan, Cynthia A. (Cynthia Anne) 1961. "Sustainable competitive advantage through information technology." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/9193.

Full text
Abstract:
Thesis (M.B.A.)--Massachusetts Institute of Technology, Sloan School of Management, 2000.
Also available online on DSpace at MIT.
Includes bibliographical references (leaf 48).
This paper discusses the difficulty of achieving sustainable competitive advantage through information technology. While information technology proliferates and innovations arise frequently, few companies have been able to use IT to remain leaders in their industries. Using a framework proposed by Michael Scott Morton, this paper examines how one firm, Capital One Financial, has created sustainable competitive advantage through a powerful combination of its information technology, strategic planning, and organizational design. The first section provides an introduction and information about the Scott Morton framework. Section two provides background information about the credit card industry and Capital One;s history. The third section analyzes why Capital One's advantage has been sustainable to date and includes discussion of strategic, economic, organizational and technical reasons. Section four analyzes the risks to Capital One's advantage in the future and includes discussion of technicalogical risks, organizational risks and customer risks. The final section includes a summary and some conclusions.
by Cynthia A. Ryan.
M.B.A.
APA, Harvard, Vancouver, ISO, and other styles
22

Bhansali, Sumit Milap. "Essays on impact of information technology." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/40861.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Sloan School of Management, 2007.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Includes bibliographical references.
The five essays in this dissertation look at how specific information technologies (such as Electronic Document Management (EDM), Semantic Web and RuleML) and IT in general can be used to automate and standardize data and processes, enable faster and more accurate information flow, and improve individual as well as firm performance. The first essay is an analytical review-type study in which we provide a comprehensive survey of research literature about different complementary organizational assets that when coupled with IT can lead to higher firm performance. In the second essay, we study the causal effects of digitizing work on information workers' time- use and performance at a large insurance firm. We make causal inferences and obtain unbiased estimates by exploiting a quasi-experiment: the phased introduction of Electronic Document Management (EDM) across multiple offices at different dates. In addition to large changes in time-use and performance, we find that digitization leads to a decline in the substitutable routine labor input and an increase in complementary non-routine cognitive labor input at the information worker level. We also uncover a new micro-level mechanism, "IT-enabled slack", that explains how exactly IT can lead to payoff in terms of information worker productivity. In the third essay, we examine the IT productivity relationship using a large primary source firm-level dataset about IT investments that spans the 2003-2005 period. Given results from previous studies, we present evidence of an inverted U-shaped returns curve, with returns now close to what they were in pre-Internet era. The fourth essay explores what high-performing firms specifically do to gain the greatest benefits from their IT investments.
(cont.) Through a set of matched interviews with multiple respondents at 138 firms, we find that data/process standardization and systems integration, level of application integration and several IT-specific cultural elements are positively correlated with IT impact on customer satisfaction. The fifth essay shows the first detailed realistic e-business application scenario that exploits capabilities of the SweetRules V2.1 toolset for e-contracting using the SweetDeal approach. SweetRules is a powerful integrated set of tools for semantic web rules and ontologies. SweetDeal is a rule-based approach to representation of business contracts.
by Sumit Milap Bhansali.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
23

Liao, Kenny Ghen-yue 1966, and Luis Alberto 1967 Reátegui. "Information technology outsourcing in emerging markets." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/26892.

Full text
Abstract:
Thesis (M.B.A.)--Massachusetts Institute of Technology, Sloan School of Management, 2002.
Includes bibliographical references (leaves 84-85).
Information Technology (IT) firms can better differentiate themselves and achieve improved profitability through IT outsourcing business. This can be explained by using Hax and 'Wilde's Delta Model. Several IT firms have successfully achieved these objectives in well-developed countries. However, this thesis argues that developing successful IT outsourcing business in emerging markets cannot be achieved simply by replicating previous experiences in well developed countries, as IT outsourcing is greatly influenced by the cultural factors and the macro environment of the local markets. This thesis discusses the factors through two perspectives. The first encompasses the factors influencing a firm's decision whether or not to outsource its IT functions. Those factors can be categorized into five different concerns: financial, resource, strategic, managerial, and cultural. The second perspective focuses on the eight critical factors for IT outsourcing projects to be successful, four inside and four outside the firm. For emerging markets, we use Michael Porter's Diamond Model to analyze how IT outsourcing business is influenced by the environment in which it is operating. To give an example of an emerging market, we have studied IT outsourcing business in China. We have conducted in-depth interviews locally with a variety of IT firms and corporate customers, and applied once more Michael Porter's Diamond Model to analyze our findings. This thesis identifies the market segments and reviews the critical success factors in each of them, and concludes with recommendations to IT firms on strategies for the IT outsourcing business development in China.
by Kenny Ghen-yue Liao and Luis Alberto Reátegui.
M.B.A.
APA, Harvard, Vancouver, ISO, and other styles
24

Lan, Yi-chen 1969, University of Western Sydney, of Science Technology and Environment College, and School of Computing and Information Technology. "Management of information technology issues in enterprise globalisation." THESIS_CSTE_CIT_Lan_Y.xml, 2003. http://handle.uws.edu.au:8081/1959.7/314.

Full text
Abstract:
Domestic companies are increasingly trying to expand to become globalised firms or multinational corporations (MNCs). Existing business strategies, visions and information systems need to be re-analysed and perhaps reconstructed to fulfil the business goals, operations and characteristics of the global organisation. Information technology is a critical element in enabling globalisation, and enterprises need to identify and consider information technology and system management issues. Depending on the structure of multinational organisations, different emphases need to be placed on issues such as business information systems management, information technology management, people management, end-user management, and culture. A global transition issue priority model is constructed to support the following hypothesis: the global transition issue priority varies depending on the type of organisational structure. With the assistance of this model, MNCs are able to pinpoint the emphasis of issues in preparing the globalisation process according to their organisational structures. Surevsy were onducted to investigate the priority of issues, and outcomes suggest that the emphasis of each issue class is dependent on the type of organisational structure. The main contribution of this research is to develop a global information systems management priority model that will assist MNCs in preparing the strategic plan in the global transition process, and develop a global transition framework for enterprises which will facilitate construction of their global information systems.
Doctor of Philosophy (PhD)
APA, Harvard, Vancouver, ISO, and other styles
25

Staples, Douglas Sandfield. "Management of remote workers, an information technology perspective." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/nq21317.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Lan, Yi-Chen. "Management of information technology issues in enterprise globalisation /." View thesis, 2003. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20031217.130842/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Allen, James D. "Information technology program management: is there a difference?" Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/42573.

Full text
Abstract:
Approved for public release; distribution is unlimited
The federal government spends billions of dollars on information technology (IT) projects each year. Despite spending billions on IT, the government has achieved little of the productivity improvements that private industry has realized from IT. Too often, federal IT projects run over budget, behind schedule, or fail to deliver promised functionality. The March 2009 Defense Science Board concluded that three root causes emerged from a review of major IT acquisition programs where cost, schedule, and performance were issues. First, senior leaders lacked experience and understanding. Second, the program executive officers and program managers had inadequate experience. Third, the acquisition process was bureaucratic and cumbersome, where many who were not accountable had to say yes before authority to proceed. To address these concerns, the U.S. Chief Information Officer, the Office of Personnel Management, and the Office of Management and Budget launched an initiative to strengthen program management by designing a formal IT Program Management career path. This research analyzes the need for IT Program Managers (PM) within the federal government by comparing the differences between IT PMs and non-IT PMs.
APA, Harvard, Vancouver, ISO, and other styles
28

Foote, Alan Richard. "Exploring Knowledge Management Models on Information Technology Projects." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2028.

Full text
Abstract:
One way an organization manages the knowledge of its people is in information technology (IT) projects. Organizations develop IT projects for many socially responsible reasons, including improved health care services and better community services. IT projects do not always achieve the goals of the organization when the knowledge of the stakeholders is not managed for these objectives. For this study the purpose was to address the use of knowledge management (KM) in project management (PM) to improve the success of IT projects in achieving the organizational goals. The research questions were based on KM including its tools and techniques to improve the success rate for IT projects. The conceptual framework included the project knowledge management (PKM) model, which helped identify the knowledge sharing in IT software projects for a local insurance company in Baltimore, Maryland. Interview data were collected from 26 IT project stakeholders about KM in PM. Analysis revealed 4 themes of managing knowledge in the requirement process, code development process, testing process, and the helpdesk process for the success of the IT project. Each of the 4 processes used different KM repositories and face-to-face tools. Improving the rate of successful IT projects benefits organizations and society with better products and services for lower costs. This study may affect social change by providing information for managers of other organizations about achieving success of their IT projects.
APA, Harvard, Vancouver, ISO, and other styles
29

Williams, Andrew Stephen. "Effective Stakeholder Management Strategies for Information Technology Projects." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4580.

Full text
Abstract:
Information Technology (IT) projects have become critical to business strategy. However, one major issue is that, historically, IT projects have high failure rates, with scholars asserting that ineffective stakeholder management strategies were a major factor for project failure. The purpose of this multiple case study was to explore strategies IT executives use for managing IT project stakeholders by exploring the experiences of 2 CIOs and 4 IT directors in two multinational companies, based in Switzerland. Stakeholder theory was the conceptual framework for this study. Data were collected through semistructured interviews and company documentation, and analyzed using Yin's 5-step data analysis process to identify and code themes. Five main themes emerged from the data analysis: organizational culture, organizational maturity, leadership, competencies, and post-implementation reviews. The results of this study revealed the importance for leaders to articulate business strategies enabling stakeholders to have a common perspective on project objectives, and to act as a foundation upon which IT executives can create effective stakeholder management strategies. Results indicated that the deployment of effective stakeholder management strategies was dependent on several factors, including organizational culture, leadership style, competencies, and organizational maturity. Findings may contribute to positive social change by encouraging effective stakeholder management to improve knowledge sharing, individual and team motivation, management across cultural boundaries, and stimulate a culture of social responsibility and sustainability.
APA, Harvard, Vancouver, ISO, and other styles
30

Tedder, Derek. "Effective management of an information technology professional's career." Thesis, Rhodes University, 2005. http://hdl.handle.net/10962/d1004543.

Full text
Abstract:
The human resource is constantly cited as an organisation's greatest asset. In a rapidly changing technological environment this is most applicable to the Information Technology (IT) function. Organisations are experiencing IT human resource problems such as low satisfaction, early plateauing, high turnover, burnout, limited advancement potential, nominal corporate commitment, supervisory aversion, poor organisational culture, and exceptional compensation. These problems are directly related to the IT professional's career. There is a lack of information and awareness surrounding IT careers to deal effectively with these problems. The research aims to create increased awareness of IT careers and the inherent problems through the development of a career management model. The research aims to identify the factors that influence IT careers, provide career management with a means to measure compatibility of the factors, and suggest solutions to incompatibility. The solving of this problem will be of mutual benefit to both organisations and individuals as they seek to better manage IT careers. After reviewing research literature relating to career anchors, IT job types, IT skills portfolios, and career dynamics a model for Effective IT Career Management (EITCM) has been constructed. The model represents the dynamic interactions between individual, organisational, and dependent factors. The model examines the compatibility of these interacting factors by measuring the levels of relevant career variables. The model suggests appropriate career management techniques to increase the compatibility of the interacting factors. An empirical study was designed and launched online to provide data that would confirm the seven Critical Success Factors (CSF) relating to the proposed model. The responses from the members of the Computer Society of South Africa (CSSA) allowed the seven hypotheses derived from the CSFs to be tested. The results of the empirical study were positive but required modification to five of the CSFs before they could be confirmed. The EITCM model was modified to reflect the improved CSFs. An awareness of career influencing factors combined with active career management is advantageous to both IT professionals and their organisations.
APA, Harvard, Vancouver, ISO, and other styles
31

Kanagwa, James R. "Establishing Mobile Financial Services in Ethiopia." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2319.

Full text
Abstract:
Mobile phone service is increasing among low income populations; however, with over 1 billion mobile service users worldwide, many people still lack banking services. Banks do not reach out to the poor because of the high operational costs involved. Scholars and industry practitioners have indicated that mobile phones could be an alternative channel for delivering financial services to the less advantaged and unbanked, without requiring a traditional bank with a branch network. The purpose of this bounded case study was to explore the strategies bank managers used to implement the new mobile banking service to the Ethiopian community. The new product development theory served as the conceptual framework for this study. Twenty experienced bank managers were interviewed from the leading private bank in Ethiopia. Data were segmented and categorized. After member checking and triangulation, data were sorted into 4 themes: development, testing, commercialization of new products or services, and an organizational commitment to adopt new technologies and innovative processes. The findings may contribute to the body of knowledge regarding strategies bank managers can use for implementing and introducing new products in order to contribute to the prosperity of individuals, businesses, and communities.
APA, Harvard, Vancouver, ISO, and other styles
32

Ho, Wai-cheong, and 何偉昌. "Business and information technology alignment." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1998. http://hub.hku.hk/bib/B31268833.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Cragg, Paul B. "Information technology and small firm performance." Thesis, Loughborough University, 1990. https://dspace.lboro.ac.uk/2134/6953.

Full text
Abstract:
This study utilised both mail questionnaire and case study approaches to investigate propositions related to information technology (IT) in small firms. The major proposition investigated IT Sophistication as one cause of small firm success. Data was collected from 289 engineering firms by mail questionnaire, including 120 with at least one computer. Multiple regression analysis gave no support to IT as a success factor. Similarly, non-parametric statistical tests suggested that firms with more sophisticated IT performed no better than firms with no or less sophisticated IT. Furthermore, among only the firms with computers, many negative rather than positive correlations were found between IT variables and financial performance. Therefore, rather than support the major proposition that IT was a success factor for small firms, the mail questionnaire provided evidence to the contrary. An indepth analysis of six firms provided evidence that developing IT had, in some firms, increased operating costs and consumed important managerial time. Furthermore, there was evidence to suggest that some factors tended to encourage both IT growth and poorer performance simultaneously, which would explain the negative correlations found between IT and financial performance. Two further propositions were investigated, both relating to IT success. Using path analysis, the following factors were found to influence IT success: external assistance in identifying IT requirements, owner involvement in IT planning and in control, planning IT development, and the use of IT for many applications. However, the measure of IT success was not found to be correlated with financial performance, and this must put in question how MIS researchers should measure "success".
APA, Harvard, Vancouver, ISO, and other styles
34

Ha, T. H. "Information management, information technology and their implications in the Korean banking industry." Thesis, Swansea University, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.637192.

Full text
Abstract:
This research examines the practice of information resource management in the Korean (South Korean) banking industry. It analyses the perceptions of managers, employees and union representatives with regard to the manpower and work environment implications of information technology (IT), and to the impact of IT on decision-making and industrial relations. It gives particular attention to the importance of, and attention paid by, management to training/education for IT. The research method adopts a comparative analytical approach based on questionnaire survey responses from three work groups - managers, employees, and union representatives - drawn from a sample of five Korean banks. Concerning the impact of IT on the banking industry, the evidence indicates that all three groups agree that IT improves banking efficiency and reduces job repetitiveness. However, all respondents indicated dissatisfaction with IT-based work. The reasons are mainly lack of training/education and poor user manuals. The study shows that most respondents would like to get further training/education to more adequately fit them for their jobs. IT was perceived to improve working conditions while adversely affecting health & safety. IT was not thought to be a direct threat to job security, which could be explained by the facts that banks were still expanding their businesses and that the culture of lifetime employment is widely held. The results indicate that similarities and differences exist between the three responding groups. Where differences did emerge they were mainly between managers and the other two groups. Generally, broad unanimity was found with regard to the positive attitudes towards IT. Concerning training/education for IT, even though the staff members were deficient in technical skills before starting their IT jobs, respondents from banks which invested in continuing training/education showed more positive work attitudes and higher job satisfaction. The thesis concludes with a discussion of the managerial implications of the study and suggestions for future research.
APA, Harvard, Vancouver, ISO, and other styles
35

Hitt, Lorin M. (Lorin Moultrie). "Economic analysis of information technology and organization." Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/10711.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Saunders, Adam. "Essays on information technology and intangible capital." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/68967.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Sloan School of Management, 2011.
Cataloged from PDF version of thesis. Vita.
Includes bibliographical references.
This thesis consists of three essays related to information technology and intangible capital. The first essay, "Valuing IT-Related Intangible Capital," examines the value of intangible assets in the firm. Using a panel of 130 firms from 2003-2006, we find that intangible assets are correlated with significantly higher market values beyond their cost-based measures. Moreover, we estimate that there is a 30-55% premium in market value for the firms with the highest organizational IT capabilities as compared to those with the lowest organizational IT capabilities. The second essay, "Has Information Technology Leveled the Competitive Playing Field?" analyzes the relationship between IT and ordinary (non-IT) capital and the competitive dynamics within U.S. industries. Using a panel of industry data from 1998-2005, when an industry becomes more IT intensive, there is more entry and expansion of firms (including entry of new small firms and expansion of large firms from the same and other industries). Yet there is also more turnover of small firms in the industry as well as concentration of the industry into large firms. In contrast, as an industry becomes more ordinary capital-intensive, there is less entry of small firms and fewer establishment openings by large firms; a lower rate of turnover by small firms; and fragmentation of the industry into small firms. In the third essay, "The Value and Durability of Patents in High-Tech Firms" (co-authored with Erik Brynjolfsson and Lorin Hitt), we use data on publicly traded high-tech companies from 1984-2002 to examine the relationship between the firms' market value and their patent-based intangible assets. We find that high-tech firms with patents that are cited by a wide variety of other patents in different patent classes are worth significantly more than firms with patents that are cited by a narrow range of patents. Patent generality is especially valuable in periods of change, when firms are no longer at the leading edge of innovation in a particular year. In these periods, we find that the value of diverse patents across technology categories is positive but not significant and that generality is comparatively more valuable than diversity.
by Adam Saunders.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
37

Dhillon, Gurpreet. "Interpreting the management of information systems security." Thesis, London School of Economics and Political Science (University of London), 1995. http://etheses.lse.ac.uk/275/.

Full text
Abstract:
The management of adverse events within organisations has become a pressing issue as the perceptions of risk continue to heighten. However the basic need for developing secure information systems has remained unfulfilled. This is because the focus has been on the means of delivery of information, i.e. the technology, rather than on the various contextual factors related to information processing. The overall aim of this research is to increase understanding of the issues and concerns in the management of information systems security. The study is conducted by reviewing the analysis, design and management of computer based information in two large organisations - A British national Health Service Hospital Trust and a Borough Council. The research methodology adopts an interpretive mode of inquiry. The management of information systems security is evaluated in terms of the business environment, organisational culture, expectations and obligations of different roles, meanings of different actions and the related patterns of behaviour. Findings from the two case studies show that an inappropriate analysis, design and management of computer based information systems affects the integrity and wholeness of an organisation. As a result, the probability of occurrence of adverse events increases. In such an environment there is a strong likelihood that security measures may either be ignored or are inappropriate to the real needs of an organisation. Therefore what is needed is coherence between the computer based information systems and the business environment in which they are embedded. In conclusion, this study shows that to resolve the problem of managing information systems security, we need to understand the deep seated pragmatic aspects of an organisation. Solutions to the problem of security can be provided by interpreting the behavioural patterns of the people involved.
APA, Harvard, Vancouver, ISO, and other styles
38

Shah, Akhtar H. "Examining the perceived value of integration of earned value management with risk management-based performance measurement baseline." Thesis, Capella University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3612243.

Full text
Abstract:

Many projects fail despite the use of evidence-based project management practices such as Performance Measurement Baseline (PMB), Earned Value Management (EVM) and Risk Management (RM). Although previous researchers have found that integrated project management techniques could be more valuable than the same techniques used by themselves, these findings do not address the benefits of integrated EVM with PMB created from RM-based Work Breakdown Structures (WBS) that could positively influence project results. The success of a project is partly dependent on accurately forecasting the performance of future states of current projects. The focus of this quantitative descriptive study is to improve current project management knowledge by identifying whether the integration of EVM with PMB created from RM-based WBS adds project value in accurately predicting the future performance of current projects. This study was conducted by surveying project leaders who have had some experience in EVM with project management. The results of this research significantly support the belief that integration of EVM with PMB created from RM-based WBS adds value to a project.

APA, Harvard, Vancouver, ISO, and other styles
39

Burkhead, Randy L. "A phenomenological study of information security incidents experienced by information security professionals providing corporate information security incident management." Thesis, Capella University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3682325.

Full text
Abstract:

The security of digital information is paramount to the success of private organizations. Violating that security is a multi-billion-dollar criminal business and exploiting these vulnerabilities creates a single point of failure for operations. Thus, understanding the detection, identification, and response to information security incidents is critical to protecting all levels of infrastructure. The lived experiences of current professionals indicate 10 unique themes in regards to how information security incidents are addressed in private organizations. These unique themes led the researcher to offer several conclusions related to the importance of planning, communication, offensive capabilities, and integration with third-party organizations. Information security incident management is accomplished as an escalation process with multiple decision points leading to a restoration of services or security. The source of the incident is not often sought beyond the first external IP address but their purpose and intent are essential to information security incident management. The key lessons learned from professionals include the importance of having a plan, training the plan, and incorporating the human elements of security into information security incident response. Penetration testing as well a knowledge about threat and attack patterns are important to information security incident management for detection, containment, and remediation. External organizations play a major role in the management of information security incidents as fear, incompetence, and jurisdictional issues keep the private sector from working with government, military, and law enforcement organizations. These themes have wide reaching implications for practical application and future research projects.

APA, Harvard, Vancouver, ISO, and other styles
40

Burlingame, Stanley G. "The impact of information technology on organizations : implications for organizational integration and the management of information technology." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1998. http://handle.dtic.mil/100.2/ADA345908.

Full text
Abstract:
Thesis (M.S. in Information Technology Management) Naval Postgraduate School, March 1998.
Thesis Advisor(s): Frank Barrett, Erik Jansen. "March 1998." Includes bibliographical references (p. 87-88). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
41

YANG, YANQING. "Information Technology in Supply Chain Management at apparel industry." Thesis, Uppsala universitet, Institutionen för informatik och media, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-202781.

Full text
Abstract:
With the rapid development of the global economy, the Chinese market is the largest consumption market in the world. Chinese domestic enterprises as well as global apparel enterprises target at the Chinese market. Enterprises informatization becomes a competition weapon to earn Chinese market shares. Supply chain management (SCM) could play an important role in the supply chain competition at the apparel industry. IT is like a nerve system for supply chain management (SCM). SCM clearly depends upon integrated information systems (IS) for sharing data on the various activities along the supply chain. This thesis focuses on analyzing the application of information technology in the supply chain management in the apparel industry. In total, four cases are studied with an emphasis on their application of IT in SCM. The Gunasekaran model is used to evaluate each case regarding application of IT in SCM. Through the analysis of information technology in supply chain management, we illustrate the development of informatization in the apparel industry, and derive recommendations for small and medium-sized enterprises (SMEs) in the Chinese market regarding appropriation of IT in SCM.

excellent presentation and informative thesis

APA, Harvard, Vancouver, ISO, and other styles
42

Flodström, Raquel. "A Framework for the Strategic Management of Information Technology." Licentiate thesis, Linköping University, Linköping University, Department of Management and Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-7595.

Full text
Abstract:

Strategy and IT research has been extensively discussed during the past 40 years. Two scientific disciplines Management Science (MS) and Management Information Science (MIS) investigate the importance of IT as a competitive factor. However, although much research is available in both disciplines, it is still difficult to explain how to manage IT to enable competitive advantages. One reason is that MS research focuses on strategies and competitive environments but avoids the analysis of IT. Another reason is that MIS research focuses on IT as a competitive factor but avoids the analysis of the competitive environment. Consequently, there is a gap of knowledge in the understanding of the strategic management of information technology (SMIT).

The strategic analysis of IT as a competitive factor is important for achieving the competitive advantages of IT. This thesis explores factors related to strategy and IT that should be considered for the strategic analysis of IT as a competitive factor, and proposes a framework for SMIT. The research is conducted by means of a qualitative analysis of theoretical data from the disciplines of MS and MIS. Data is explored to find factors related to SMIT.

The results of the analysis show that the strategic management of information technology is a continuous process of evaluation, change, and alignment between factors such as competitive environment, competitive strategies (business and IT strategies), competitive outcome, and competitive factors (IT). Therefore, the understanding of the relationships between these factors is essential in order to achieve the competitive advantages of using IT.

This thesis contributes to strategic management research by clarifying the relationships between strategic management, competitive environment, and IT as competitive factor into a holistic framework for strategic analysis. The framework proposed is valuable not only for business managers and for IT managers, but also for academics. The framework is designed to understand the relationship between competitive elements during the process of strategic analysis prior to the formulation of competitive strategies. Moreover, it can also be used as a communication tool between managers, in order to achieve alignment among company strategies. To academics, this thesis presents the state-of-the-art related to strategic management research; it can also be a valuable reference for strategic managers, as well as researchers interested in the strategic management of IT.


Report code: LiU-Tek-Lic.2006:53.
APA, Harvard, Vancouver, ISO, and other styles
43

Stewart, Rodney Anthony, and r. stewart@griffith edu au. "Lifecycle Management of Information Technology (IT) Projects in Construction." Griffith University. School of Engineering, 2003. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20030423.122317.

Full text
Abstract:
The last twenty years has seen a tremendous change in the way companies do business. Much of this change can be attributed to the so-called information revolution. The integrated interaction between Information Technology (IT) and business processes has changed from its initial function of automating clerical tasks (e.g. payroll, inventory) to providing pertinent information for operational, managerial and executive groups within the organisation. In more recent times, IT has enabled some organisations, including those in the construction industry, to transform or re-engineer their business processes in the face of the rapidly changing business environment. As international competition continues to intensify, significant numbers of construction organisations are investing large amounts of resources into IT as they seek to gain competitive advantage. IT is increasingly being implemented for strategic reasons, so as to enable improved efficiency, better control and enhanced productivity of internal processes. The failure of realising expected IT-induced benefits has led to a growing number of senior executives to question the value of IT investments. Thus, questions like the following are typical: Are we getting our money's worth from our IT investment? ; Are we spending too much or too little on IT? ; What IT projects make the best use of our resources? ; How can we improve the return on our IT investments? This Ph.D. research study was inspired by the perceived lack of a structured framework for the selection, implementation and performance evaluation of IT projects in construction. The development of such a generic framework that could capture the IT project lifecycle management process, and the associated guidelines and procedures for its effective implementation, is a young field of research, still struggling to define its place within the large family of academic disciplines. Being a young branch of science, it might be argued that IT in construction lacks a solid methodological foundation. An IT project lifecycle management process is an integrated approach that provides for the continuous identification, selection, implementation, monitoring and performance evaluation of IT projects. This structured process should provide a systematic method for construction organisations to minimise risks while maximising returns on IT investments. To effectively employ IT in construction, the IT project lifecycle management process should have elements of three essential phases: (1) IT project(s) selection; (2) strategic IT implementation and monitoring; and (3) IT performance evaluation. However, each phase should not be viewed as a separate step. Rather, each is conducted as part of a continuous, interdependent management effort. Information gained from one phase is used to support activities in each of the other two phases. With this in mind, this research study aimed to develop an appropriate framework and associated tools for each phase of the IT project lifecycle. The developed three frameworks are detailed individually in the following paragraphs. The developed IT project(s) selection framework utilised information economics theory to encompass the full spectrum of direct and indirect costs, tangible and intangible expected benefits and the intangible risks associated with IT project proposals, considered for funding by the organisation. To incorporate the uncertainty that normally surrounds quantifying costs, benefits and risks, the framework employed a simple but powerful fuzzy logic technique to integrate all the monetary and non-monetary factors into a form that enabled the ranking of proposals. A case study was undertaken with a large international project management and development organisation to demonstrate the framework's applicability. The case study illustrated the effectiveness of the proposed approach for ranking IT project proposals. Once a portfolio of IT projects is selected for funding by the organisation, it needs to be strategically implemented and monitored over its lifecycle. A strategic IT implementation and monitoring framework was developed to enhance the effectiveness and efficiency of this phase. The framework is premised on a hybrid analysis utilising the Analytical Hierarchy Process (AHP) and SWOT analysis. A case study was undertaken to demonstrate the applicability of the proposed framework in the strategic implementation and monitoring of a Project Management Information System (PMIS) by a large Australian construction-contracting organisation. The framework application proved to be successful in helping the organisation to develop appropriate strategies for the effective and efficient implementation of the PMIS. An IT performance evaluation framework and method was then developed for the final phase of the lifecycle. This framework was the primary focus of this Ph.D. research study and was structured using the Balanced Scorecard (BSC) principles adapted to the specific requirements of the construction industry. The framework was structured using a hierarchy of IT performance perspectives, indicators and measures. Five definable perspectives were conceptually developed through analysis and synthesis of the 'IT business value' evaluation literature. These are: operational, benefits, technology/system, strategic competitiveness and user orientation. Indicators and measures were extracted from the mainstream IT literature and construction management literature, as well as the emerging literature on information economics. The preliminary list of indicators was initially screened through consultation with construction professionals and conceptual cause-and-effect mapping. The screened list of project-tier indicators was further refined through questionnaire dissemination. The questionnaire was sent to 322 construction project participants from large construction-contracting and project management organisations located within Australia. The five framework perspectives were statistically validated through the principal component factor analysis with varimax rotation. Each perspective and indicator's relative weight was numerically established using the questionnaire survey results as input to the recently developed Performance Measurement Process Framework (PMPF). The reason that the performance measures were not justified through a quantitative analysis was due to their dynamic nature. Most performance measures change, and will continue to change, with new technology. The developed perspectives, indicators and measures were all compiled into a generic 'Construct IT' BSC that can serve as a template for application at other decision-making tiers of a construction organisation. The problem of combining performance measures, with varying metrics, into commensurable units (utiles) was achieved by applying utility theory. Finally, the developed 'Construct IT' BSC was utilised for a project-tier survey to test the interrelationship between framework indicators and perspectives. Using information collected from 82 project professionals, from large construction-contracting and project management organisations, correlation and independent sample t-tests (one-tailed) provided support for the 'Construct IT' BSC. Specifically, findings suggest that the 'Construct IT' BSC can be used as a tool for monitoring the IT-induced value creation process. In addition, it appears that the proposed 'Construct IT' BSC framework and associated performance evaluation method is both flexible in design and can be modified to suit the needs of individual organisations. These characteristics make the framework continuously relevant to the dynamic nature of IT projects. In summary, the proposed IT project lifecycle management process, and its associated frameworks, provides a holistic view of IT implementation in construction and offers significant contributions to current body of knowledge on IT in construction.
APA, Harvard, Vancouver, ISO, and other styles
44

Guiney, Andrew, and aguiney@smsmt com. "Information Technology Project Management Team Building for Project Success." RMIT University. Graduate School of Business, 2009. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20100122.121228.

Full text
Abstract:
More than ninety per cent of projects are run by project teams and the stronger the team the more likely the project will succeed. Team building activities are performed to both increase team performance and to enhance the likelihood of project success. For the purpose of this study, information technology (IT) business projects were chosen as IT is a major driving force in business today and there is widespread dissatisfaction with the performance of IT business projects. In analysing the causes of dissatisfaction, increasingly researchers are recognising that technology is a secondary issue behind the human side of project team management. Business projects were chosen because increasingly IT is being used in the business environment to solve problems in the post-industrial era characterised by the service industry, while the manufacturing industry, from which much of the project literature has emerged, reduces. The importance of the project team in developing IT business projects is well recognised and managers are concerned about their ability to transform an ad-hoc collection of people assigned to a particular project into a coherent, integrated project team. In most cases the activities recommended to build a successful IT business project team have been theoretically based, rather than empirically founded. The goal of this research was to investigate the team building activities used on successful projects. To achieve this goal, the research defines the key measures of project success and establishes their relative importance; determines the most important team building activities for project success with experienced project managers; enhances the understanding of implementation of team building activities on successful projects; and provides suggestions on how to increase the likelihood of project success through focusing on team building activities. The research used the analytic hierarchy process (AHP) to develop a hierarchical model linking project success measures with team building activities. Confirmation of the AHP results and additional understanding of team building activities implementation was achieved by interviewing experienced project managers. The research found that customer satisfaction, although seldom used, was significantly more important as a project success measure than the three measures most often used - time, budget and scope. As identified by project managers, the most important team building activities for achieving customer satisfaction are team leadership; ensuring senior management support; staffing the team properly; planning the project with the team and empowering team members; building commitment among team members; developing strong communication channels and developing appropriate organisational interfaces. The research found successful projects focused on relationships in addition to the task focus of many project methodologies. The research findings on team building activities will enable project leaders on IT business projects to develop empowered project teams with stronger affiliations and support throughout the organisation. By empowering project teams to create effective internal and external relationships there will be fewer project failures, increased customer satisfaction and improved achievement of project success.
APA, Harvard, Vancouver, ISO, and other styles
45

Flodström, Raquel. "A framework for the strategic management of information technology /." Linköping : Department of Computer and Information Science, Linköpings universitet, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-7595.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

McConnell, Patrick J. "Information technology for market risk management in international banks." Thesis, Henley Business School, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.320861.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

劉淑賢 and Shuk-yin Josephine Lau. "Management of public housing estates: competitiveness and information technology." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B31968909.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Waring, Alan Edward. "Management of change and information technology : three case studies." Thesis, University of Westminster, 1993. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.385553.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Lau, Shuk-yin Josephine. "Management of public housing estates : competitiveness and information technology /." Hong Kong : University of Hong Kong, 2002. http://sunzi.lib.hku.hk/hkuto/record.jsp?

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Ueno, Yoshinobu 1965. "Information technology as competitive advantage in supply chain management." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/9981.

Full text
Abstract:
Thesis (S.M.M.O.T.)--Massachusetts Institute of Technology, Sloan School of Management, Management of Technology Program, 1998.
Includes bibliographical references (leaves 73-77).
by Yoshinobu Ueno.
S.M.M.O.T.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography