To see the other types of publications on this topic, follow the link: Information technology Portfolio management.

Dissertations / Theses on the topic 'Information technology Portfolio management'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Information technology Portfolio management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Nelson, Marco. "Information technology portfolio management proof of concept modern portfolio theory with KVA and ROI analysis." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5148.

Full text
Abstract:
Approved for public release; distribution is unlimited
The basic research question guiding this thesis is: "How can Modern Portfolio Theory (MPT) be defensibly applied to DoD Information Technology (IT) portfolio optimization problems?" The research will demonstrate how to derive the appropriate raw performance, volatility data, required to remain consistent with MPT assumptions and methodology. This thesis accomplishes this research objective by establishing a notional IT beta to apply a MPT approach for asset allocation within the Department of Defense (DoD). Data from three previous RFID implementation case studies were used, where the Knowledge Value Added (KVA) methodology was applied to estimate the return on investment (ROI) produced by IT. The KVA methodology is essential for the application of this thesis because it provides the framework for the allocation of surrogate revenue and cost streams into core processes where RFID technology was implemented. The ROI estimates of volatility act as a surrogate for equity price volatility, allowing application of the Modern Portfolio Theory (MPT) approach in the nonprofit sector.
APA, Harvard, Vancouver, ISO, and other styles
2

Zhou, Bin S. M. Massachusetts Institute of Technology. "Enterprise information technology project portfolio selection through system dynamics simulations." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/43107.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, System Design and Management Program, 2007.
Includes bibliographical references (p. 166-169).
As companies are increasingly relying on information technologies (IT) to help maintain their existing and develop new competitive advantages, investing effectively in IT is becoming more and more important. One of the biggest challenges facing an enterprise IT organization is how to select a project portfolio that is best aligned with the business strategies and to deliver highest value using limited IT resources. In this research paper, I examined in detail a recently proposed IT governance framework, designed a System Dynamics model based on this framework, and developed a simulation application to investigate constructs, relationships and scenarios suggested by the framework. My research identified and examined several levers through which IT managers can achieve better alignment with business goals and more efficient use of IT resources. I examined alternative IT governance regimes (combinations of rules and policies for selecting among opportunities and retaining existing systems) in terms of their effects on efficiency, feature satisfaction, and cost of the resulting legacy asset base. By choosing the right combination of relatively straightforward selection and retention policies, IT managers can steer their legacy assets toward a desired efficiency or satisfaction goal in concert with company strategies.
by Bin Zhou.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
3

Cabral, Braulio J. "Exploring Factors Influencing Information Technology Portfolio Selection Process in Government-Funded Bioinformatics Projects." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2957.

Full text
Abstract:
In 2012, the National Cancer Institute's (NCI) Board of Scientific Advisors (BSA) conducted a review of the Center for Biomedical Informatics and Information Technology's (CBIIT) bioinformatics program. The BSA suggested that the lack of a formal project selection process made it difficult to determine the alignment of projects with the mission of the organization. The problem addressed by this study was that CBIIT did not have an in-depth understanding of the project selection process and the factors influencing the process. The purpose of this study was to understand the project selection process at CBIIT. The research methodology was an exploratory case study. The data collection process included a phenomenological interview of 25 managers from program management, engineering, scientific computing, informatics program, and health sciences. The data analysis consisted of coding for themes, sensitizing, and heuristic coding, supported by a theoretical framework that included the technology acceptance model, the program evaluation theory, and decision theory. The analysis revealed the need for formal project portfolio governance, the lack of a predefined project selection process, and that the decision-making process was circumstantial. The study also revealed six major themes that affected the decision-making process: the CBIIT mission, the organizational culture, leadership, governance, funding, and organizational change. Finally, the study fills the gap in the literature regarding the project selection process for government-funded initiatives in information technologies. This study may contribute to positive social change by improving the project selection process at CBIIT, allowing for the effective use of public funds for cancer informatics researchers.
APA, Harvard, Vancouver, ISO, and other styles
4

Davis, Jeffery P. "Information technology portfolio management & the real options method (ROM) : managing the risks of IT /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Dec%5FDavis%5FMBA.pdf.

Full text
Abstract:
Thesis (M.B.A.)--Naval Postgraduate School, December 2003.
[MBA professional report]. Thesis advisor(s): Philip Candreva, Kenneth Doerr, Glenn Cook. Includes bibliographical references (p. 67-69). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
5

Davis, Jeffery P. "Information technology portfolio management and the real options method (ROM) managing the risks of IT investments in the Department of the Navy (DON) /." Thesis, View thesis via the Naval Postgraduate School View thesis via DTIC, 2003. http://handle.dtic.mil/100.2/ADA420489.

Full text
Abstract:
Thesis (M.B.A.)--Naval Postgraduate School, 2003.
Title from title screen (viewed Apr. 5, 2004). "December 2003." "ADA420489"--URL. Includes bibliographical references (p. 67-69). Also issued in paper format.
APA, Harvard, Vancouver, ISO, and other styles
6

Landmesser, John Andrew. "Improving it portfolio management decision confidence using multi-criteria decision making and hypervariate display techniques." Thesis, Nova Southeastern University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3609737.

Full text
Abstract:

Information technology (IT) investment decision makers are required to process large volumes of complex data. An existing body of knowledge relevant to IT portfolio management (PfM), decision analysis, visual comprehension of large volumes of information, and IT investment decision making suggest Multi-Criteria Decision Making (MCDM) and hypervariate display techniques can reduce cognitive load and improve decision confidence in IT PfM decisions. This dissertation investigates improving the decision confidence by reducing cognitive burden of the decision maker through greater comprehension of relevant decision information. Decision makers from across the federal government were presented with actual federal IT portfolio project lifecycle costs and durations using hypervariate displays to better comprehend IT portfolio information more quickly and make more confident decisions. Other information economics attributes were randomized for IT portfolio projects to generate Balanced Scorecard (BSC) values to support MCDM decision aids focused on IT investment alignment with specific business objectives and constraints. Both quantitative and qualitative measures of participant comprehension, confidence, and efficiency were measured to assess hypervariate display treatment and then MCDM decision aid treatment effectiveness. Morae Recorder Autopilot guided participants through scenario tasks and collected study data without researcher intervention for analysis using Morae Manager. Results showed improved comprehension and decision confidence using hypervariate displays of federal IT portfolio information over the standard displays. Both quantitative and qualitative data showed significant differences in accomplishment of assigned IT portfolio management tasks and increased confidence in decisions. MCDM techniques, incorporating IT BSC, Monte Carlo simulation, and optimization algorithms to provide cost, value, and risk optimized portfolios improved decision making efficiency. Participants did not find improved quality and reduced uncertainty from optimized IT portfolio information. However, on average participants were satisfied and confident with the portfolio optimizations. Improved and efficient methods of delivering and visualizing IT portfolio information can reduce decision maker cognitive load, improve comprehension efficiency, and improve decision making confidence. Study results contribute to knowledge in the area of comprehension and decision making cognitive processes, and demonstrate important linkages between Human-Computer Interaction (HCI) and Decision Support Systems (DSS) to support IT PfM decision making.

APA, Harvard, Vancouver, ISO, and other styles
7

Betz, Linda. "An Analysis of the Relationship between Security Information Technology Enhancements and Computer Security Breaches and Incidents." NSUWorks, 2016. http://nsuworks.nova.edu/gscis_etd/960.

Full text
Abstract:
Financial services institutions maintain large amounts of data that include both intellectual property and personally identifiable information for employees and customers. Due to the potential damage to individuals, government regulators hold institutions accountable for ensuring that personal data are protected and require reporting of data security breaches. No company wants a data breach, but finding a security incident or breach early in the attack cycle may decrease the damage or data loss a company experiences. In multiple high profile data breaches reported in major news stories over the past few years, there is a pattern of the adversary being inside the company’s network for months, and often law enforcement is the first to inform the company of the breach. The problem that was investigated in this case study was whether new information technology (IT) utilized by Fortune 500 financial services companies led to the changes in data security incidents and breaches. The goal of this dissertation is to gain a deeper understanding on how IT can increase awareness of a security incident or breach, and can also decrease security incidents and breaches. This dissertation also explores how threat information sharing increases awareness and decreases information security incidents and breaches. The objective of the study was to understand how changes in IT can influence an increase or decrease in data security breaches. This investigation was a case study of nine Fortune 500 financial services companies to understand what types of IT increase or decrease detection of security incidents and breaches. An increase in detecting and stopping a security incident or breach may have positive effects on the security of an enterprise. The longer a hacker has access to IT systems, the more entrenched they become and the more time the hacker has to locate data with high value. Time is of the essence to detect a compromise and react. The results of the case study showed that Fortune 500 companies utilized new IT that allowed them to improve their visibility of security incidents and breaches from months and years to hours and days.
APA, Harvard, Vancouver, ISO, and other styles
8

Horáček, Jan. "Řízení vztahu se zákazníkem při outsourcingu IT." Master's thesis, Vysoká škola ekonomická v Praze, 2008. http://www.nusl.cz/ntk/nusl-10504.

Full text
Abstract:
Outsourcing of IT is likely to be a perspective model of IT service delivery. However, only a small number of companies have adopted it and according to surveys, their satisfaction is relatively low. On the contrary, customer relation management (CRM) is a marketing approach that still keeps its popularity. Is not therefore CRM a solution also for outsourcing of IT? How should it be applied in the field? This master's thesis is intended for providers of outsourcing of IT and it aims to find answers to the questions above. The first step towards the goal is to identify main characteristic features of outsourcing of IT, which consequently provide a guideline for a systematic approach to the solution. The thesis does not presume reader's familiarity with CRM, hence the second chapter offers a brief yet holistic view of the issue. A synthesis of the information from the first two parts leads to a conclusion that it is not possible to decide about suitability of CRM in outsourcing of IT on a general basis, but always in the particular situation. Therefore the work suggests a set of criteria for the choice. The consecutive chapters deal with the application of CRM. Firstly, an entire system of tools for evaluation of customers is proposed. It enables providers to determine the suitable level of individual approach to each customer with consideration of both business and technical factors. Consequently, a provider can start building a relationship with his customer taking advantage of number of recommendations and tools given by this paper. It includes measures not only for convincing customers but also for increasing their retention. The thesis discusses broad variety of aspects of marketing in outsourcing of IT. Its scope ranges from customer uncertainty mitigation and purchasing process of a corporate customer, over tips on how to manage customer satisfaction, to appropriate adjustments of a service level agreement (SLA). The paper also briefly analyses the specifics of CRM in outsourcing of IT in the public sector.
APA, Harvard, Vancouver, ISO, and other styles
9

Larieira, Cláudio Luís Carvalho. "Um estudo sobre os fatores organizacionais que influenciam a gestão de portfólio de projetos de TIC." reponame:Repositório Institucional do FGV, 2013. http://hdl.handle.net/10438/11391.

Full text
Abstract:
Submitted by claudio larieira (larieira@hotmail.com) on 2014-01-08T14:14:21Z No. of bitstreams: 1 Tese sobre Gestão de Portfolio de Projetos de TI - Claudio Larieira - texto final.pdf: 3209042 bytes, checksum: abe31ab5bddfaffb5d6db4ba9ee6688e (MD5)
Rejected by Vera Lúcia Mourão (vera.mourao@fgv.br), reason: Prezado aluno, antes de postar na biblioteca digital você deve providenciar a ficha catalográfica, verifique o e-mail enviado pela Suzinei, tem as instruções sobre como fazer. Outro ponto o titulo do seu trabalho está diferente do que consta em nossos arquivos, sistema e ata, caso a banca examinadora tenha sugerido alteração ou o seu orientador, para que possamos corrigir o seu orientador deverá encaminhar uma mensagem com o novo título, caso não tenha essa sugestão deverá constar conforme segue: "Um estudo sobre os fatores organizacionais que influenciam a gestão de portfólio de projetos de TIC". abs. Vera on 2014-01-08T15:24:35Z (GMT)
Submitted by claudio larieira (larieira@hotmail.com) on 2014-01-09T15:30:54Z No. of bitstreams: 1 Tese sobre Gestão de Portfolio de Projetos de TI - Claudio Larieira - texto final.pdf: 3210468 bytes, checksum: 7b4be2fc34ce1e992285271a1849d36b (MD5)
Approved for entry into archive by Vera Lúcia Mourão (vera.mourao@fgv.br) on 2014-01-09T15:41:51Z (GMT) No. of bitstreams: 1 Tese sobre Gestão de Portfolio de Projetos de TI - Claudio Larieira - texto final.pdf: 3210468 bytes, checksum: 7b4be2fc34ce1e992285271a1849d36b (MD5)
Made available in DSpace on 2014-01-09T16:19:34Z (GMT). No. of bitstreams: 1 Tese sobre Gestão de Portfolio de Projetos de TI - Claudio Larieira - texto final.pdf: 3210468 bytes, checksum: 7b4be2fc34ce1e992285271a1849d36b (MD5) Previous issue date: 13-12-11
Organizations may manage their operations more efficiently and leverage business strategies through Information and Communications Technologies (ICT), enabling them to add competitive advantages required for success and enterprise sustainability. Scholars and business leaders often dispute the value ICT brings to businesses because of high investment required for acquisition, implementation, and maintenance. Markowitz’s Portfolio Analysis dealt with financial investments. Other authors extended his proposition to project’s assessment, selection and prioritization, creating Project Portfolio Management. Subsequently, the concept was applied to ICT Project Portfolio Management was proposed. Various organizational factors can influence the execution of this process, beyond inherent technical and methodological issues. This thesis identified organizational factors that affect ICT Project Portfolio Management and analyzed their influence on the process. The research is of an applied nature, qualitative, exploratory and descriptive, and was executed in multiple case studies through analysis of three mid-sized commercial Brazilian banks. This thesis’ main contribution is reached through the creation of a conceptual structure that represents various organizational factors that influence ICT Project Portfolio Management. There are indications that organizational factors have great influence on this process, given the responses obtained in interviews with professionals of the banks analyzed.
A Tecnologia da Informação e Comunicação (TIC) permite que as empresas realizem suas operações de maneira mais eficiente, alavanquem suas estratégias de negócio e tragam assim as vantagens competitivas necessárias para o sucesso e perenidade do empreendimento. É constante nos meios acadêmicos e empresariais o questionamento sobre o valor que a TIC efetivamente traz ao negócio dados os altos investimentos necessários para sua aquisição, implementação e manutenção. A partir da proposição seminal de Markowitz sobre a Análise de Portfólio (que tratou especificamente dos investimentos financeiros), outros autores estenderam este conceito para realizar a avaliação, seleção e priorização de projetos, criando o que atualmente se denomina de Gestão de Portfólio de Projetos. A Gestão de Portfólio de Projetos, por sua vez, foi posteriormente estendida para os projetos de TIC e foi proposta então a abordagem de Gestão de Portfólio de Projetos de TIC. Além das questões meramente técnicas ou metodológicas, vários fatores organizacionais estão presentes na execução deste processo e podem influenciá-lo. Este trabalho identifica os fatores organizacionais que envolvem a Gestão de Portfólio de Projetos de TIC e analisa as influências que estes fatores trazem sobre o processo citado. A pesquisa é de natureza qualitativa, de caráter exploratório e descritivo e é operacionalizada através da realização de estudos de caso múltiplos em 3 (três) bancos médios comerciais brasileiros. A principal contribuição deste trabalho é a proposição de uma estrutura conceitual que representa os diversos fatores organizacionais que influenciam a Gestão de Portfólio de Projetos de TIC em uma organização. Há indícios de que os fatores organizacionais têm grande influência sobre este processo dadas as respostas obtidas nas entrevistas com os profissionais dos bancos analisados.
APA, Harvard, Vancouver, ISO, and other styles
10

Phillips, Brandis. "Information systems portfolio management the impact of portfolio management practices /." Diss., Connect to online resource - MSU authorized users, 2008.

Find full text
Abstract:
Thesis (Ph. D.)--Michigan State University. Dept. of Accounting and Information Systems, 2008.
Title from PDF t.p. (viewed on July 2, 2009) Includes bibliographical references (p. 98-102). Also issued in print.
APA, Harvard, Vancouver, ISO, and other styles
11

Zhang, Haifei. "University Technology Transfer and Research Portfolio Management." Thesis, Harvard University, 2013. http://dissertations.umi.com/gsas.harvard:11038.

Full text
Abstract:
University technology transfer is of critical importance to the U.S. innovation economy. Understanding the drivers of technology transfer efficiency will shed light on University research portfolio management. In this dissertation, survey data from The Association of University Technology Managers is analyzed in various aspects to offer a overall understanding of the technology transfer industry, which include University research fund composition, technology transfer office staffing, licenses executed to start-ups, small companies, and large companies, license income composition, legal fee expenditures, new patents applications, provisional patents, utility patents, and non USA patents, invention disclosures, U.S. patents issued, start-ups initiated, and annual averages of U.S. University technology transfer offices. Then, a two-stage technology transfer model based on Data Envelopment Analysis is proposed to address the limitation of the single-stage model. The two-stage model provides the capacity to evaluate the efficiencies of university research and technology transfer office separately and also as a whole, offering better insights for university technology transfer management. Year to year productivity changes are also measured using Malmquist Index. It is found the productivity growth has stemmed primarily from a growth in commercialization by all universities rather than a catching up by the inefficient universities. Finally, technology transfer efficiency and academic reputation is studied for the first time. Counter intuitively, they are not correlated. To further understand University research portfolio management, Modern Portfolio Theory is applied for the first time in this field. University disciplines are categorized into three major disciplines: engineering, physical and mathematical sciences, and biological and life sciences. The risk and return of technology transfer are defined and research portfolio risk-return curve are solved. Then correlation between portfolio balance and technology transfer efficiency are studied. It is found that a balanced portfolio is correlated to technology transfer efficiency, which means Universities can structure its research portfolio to increase technology transfer efficiency.
Engineering and Applied Sciences
APA, Harvard, Vancouver, ISO, and other styles
12

Alonzo, Corimanya Roy Alex, Ahumada Eduardo André Siguas, and Lazo Ursula Carola Solano. "Propuesta de implementación de un Modelo de Gestión de la Demanda Estratégica para una organización previsional en el Perú." Master's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2021. http://hdl.handle.net/10757/656042.

Full text
Abstract:
La gestión de demanda en las organizaciones es de vital importancia para una gestión adecuada de los recursos y generar beneficios. Entre los beneficios que genera este modelo, se pueden evidenciar el ahorro en costos que pudieron haber incurrido por no tener una gestión adecuada, en el alineamiento de los proyectos de TI a los objetivos estratégicos y la generación de valor para la organización. El presente trabajo de investigación propone implementar la metodología “Gestión de la Demanda Estratégica de la TI” (GEDESTI)” por Igor Aguilar, para la gestión de la demanda estratégica de organizaciones de previsionamiento. En el primer capítulo, se presenta el marco teórico donde se describen los sistemas de previsión actuales a nivel internacional y nacional, así como los marcos de referencia de los modelos de madurez de la gestión de demanda estratégica. En el segundo capítulo, se presenta la situación problemática de la organización. Se describe la organización previsional y se detallan los problemas encontrados que tienen un impacto económico y de imagen organizacional. En el tercer capítulo, se presenta la propuesta de solución. En este punto se detalla el nivel de madurez actual de la organización y el nivel de madurez al cual se pretende llegar. Se propone un modelo de procesos para la gestión de la demanda adecuado a la metodología, además de las herramientas, roles y responsabilidades, costo beneficio y viabilidad que forman parte de la propuesta presentada. En el cuarto capítulo, se presentan las conclusiones y recomendaciones que se deprenden del trabajo de investigación trabajados en la presente tesis.
The demand's management plays a vital role for proper resources direction and generating benefits. Among the benefits generated by this model, can be evidenced the cost savings that may have been incurred from not having adequate management, in the alignment of IT projects with strategic objectives and the value generation for the organization. The current research proposes the methodology implementation "IT Strategic Demand's Management" (GEDESTI) by Igor Aguilar, for strategic demand's management of pension system. The first chapter is presented theoretical framework where the current forecasting systems are described at the international and national level, as well as the reference frameworks for the maturity models of strategic demand management. The second chapter is presented the organization's problematic situation. It describes the pension system and details the problems encountered that have an economic and organizational image impact. The third chapter is presented the proposed solution. At this point, the current organization's maturity level and the maturity level at which it is intended to reach are detailed. A process model is proposed for appropriate demand management to the methodology, in addition to the tools, roles and responsibilities, cost benefit and viability that are part of the proposal presented. The fourth chapter are presented the conclusions and recommendations derived from the research work carried out in this thesis.
Trabajo de investigación
APA, Harvard, Vancouver, ISO, and other styles
13

Zheng, Guangzhi. "A Multidimensional and Visual Exploration Approach to Project Portfolio Management." Digital Archive @ GSU, 2009. http://digitalarchive.gsu.edu/cis_diss/34.

Full text
Abstract:
Managing projects in an organization, especially a project-oriented organization, is a challenging task. Project data has a large volume and is complex to manage. It is different from managing a single project, because one needs to integrate and synthesize information from multiple projects and multiple perspectives for high-level strategic business decisions, such as aligning projects with business objectives, balancing investment and expected return, and allocating resources. Current methods and tools either do not well integrate multiple aspects or are not intuitive and easy to use for managers and executives. In this dissertation project, a multidimensional and visual exploration approach was designed and evaluated to provide a unique and intuitive option to support decision making in project portfolio management. The research followed a general design science research methodology involving phases of awareness of problem, suggestion, development, evaluation and conclusion. The approach was implemented into a software system using a prototyping method and was evaluated through user interviews. The evaluation result demonstrates the utility and ease-of-use of the approach, and confirms design objectives. The research brings a new perspective and provides a new decision support tool for project portfolio management. It also contributes to the design knowledge of visual exploration systems for business portfolio management by theorizing the system.
APA, Harvard, Vancouver, ISO, and other styles
14

Rastogi, Rahul. "Information security service management : a service management approach to information security management." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1389.

Full text
Abstract:
In today’s world, information and the associated Information Technology are critical assets for many organizations. Any information security breach, or compromise of these assets, can lead to serious implications for organizations that are heavily dependent on these assets. For such organizations, information security becomes vital. Organizations deploy an information security infrastructure for protecting their information assets. This infrastructure consists of policies and controls. Organizations also create an information security management system for managing information security in the organization. While some of the policies and controls are of a purely technical nature, many depend upon the actions of end-users. However, end-users are known to exhibit both compliant and noncompliant behaviours in respect of these information security policies and controls in the organization. Non-compliant information security behaviours of end-users have the potential to lead to information security breaches. Non-compliance thus needs to be controlled. The discipline of information security and its management have evolved over the years. However, the discipline has retained the technology-driven nature of its origin. In this context, the discipline has failed to adequately appreciate the role played by the end-users and the complexities of their behaviour, as it relates to information security policies and controls. The pervasive information security management philosophy is that of treating end-users as the enemy. Compliance is sought to be achieved through awareness programs, rewards, punishments and evermore strict policies and controls. This has led to a bureaucratic information security management approach. The philosophy of treating end-users as the enemy has had an adverse impact on information security in the organization. It can be said that rather than curbing non-compliance by end-users, the present-day bureaucratic approach to information security management has contributed to non-compliance. This thesis calls this the end-user crisis. This research aims at resolving this crisis by identifying an improved approach to information security management in the organization. This research has applied the service management approach to information security management. The resultant Information Security Service Management (ISSM) views end-users as assets and resources, and not as enemies. The central idea of ISSM is that the end-user is to be treated as a customer, whose needs are to be satisfied. This research presents ISSM. This research also presents the various components of ISSM to aid in its implementation in an organization.
APA, Harvard, Vancouver, ISO, and other styles
15

De, Jongh Henk. "Information technology outsourcing." Thesis, Stellenbosch : Stellenbosch University, 2003. http://hdl.handle.net/10019.1/53467.

Full text
Abstract:
Thesis (MBA)--Stellenbosch University, 2003.
ENGLISH ABSTRACT: The study project examines the concept of information technology (IT) outsourcing to external service providers. It is a relatively new concept in the South African scenario and there are many risks associated with the process that can cause a company to loose large amounts of money if outsourcing is not done right. The study project will aim to examine the most important aspects regarding IT outsourcing in order to reduce the risks associated with the process. The definition of IT outsourcing is the practice of transferring an organisation's computer centre operations, telecommunications networks, or applications development to external vendors of these services. There are different variations of outsourcing applicable to IT, for example: contracting out, outsourcing, in sourcing and co-sourcing. Companies have different reasons for outsourcing and the risks associated with the process have to be taken into account when embarking on an outsourcing initiative. With IT outsourcing there are different services that can be outsourced, for example: mainframe services, desktop computer services, security services and different application services. The decision to outsource a specific area of IT is a strategic issue and the risks, costs, and selection of the service provider are all very important factors to take into account. One of the main factors that any company should take into account when embarking on a big initiative is of course costs. The aim is the reduction of costs of the specific outsourced area. Therefore the necessary measures need to be in place to measure costs before and after the outsourcing process. It could happen that the outsourcing process do not provide the reduced cost benefits envisaged initially. This could be due to hidden costs that were not taken into account when the outsourcing initiative was planned. Normally the outsourcing process is driven by a structured project and numerous important factors need to be taken into account when managing the whole process. The factors include: the vendor evaluation process, setup of the service level agreement, the request for proposal, relationship with the supplier, communication of the whole process inside the company, the contract between the two parties, and the transition period with the measuring of results thereafter. The current IT skills shortage in South Africa is causing companies to rethink their IT strategies and make use of external service providers to supply them with the necessary skills to get the job done. The research illustrates this fact that IT consulting has one of the highest adoption rates currently and with regard to the future. Full blown outsourcing is still a relatively new concept in South Africa and companies will only adopt the concept as soon as it has proved to be successful and cost effective. As mentioned it is important that a structured methodology should be used to drive an outsourcing process. It is important that the approach is structured around proven project management principles with the correct measures in place to support and sustain the whole process. Outsourcing of IT services is a strategic decision that a company must take and the risks associated with the process mean that it must be planned and executed very carefully. Outsourcing has various risks associated with it like the appointment of the wrong service provider. However, the outsourcing process can also have its merits and the most important of these are most probably lower costs, new IT skills, and better service. The shortage of IT skills in South Africa makes the idea of outsourcing more and more attractive because of the fact that companies can now "buy" the skills without having to commit to long term permanent employment contracts for permanent staff.
AFRIKAANSE OPSOMMING: Die navorsingsverslag handel oor die konsep van uitkontraktering van inligtingstegnologie(IT) dienste aan eksterne diensverskaffers. Aangesien dit 'n relatiewe nuwe tendens in Suid Afrika se IT bedryf is, en die risiko bestaan dat 'n maatskappy groot geldelike verliese kan ly indien dit nie reg aangepak word nie, word daar gepoog om na die belangrikste aspekte van uitkontraktering te kyk om die risikos daaraan verbonde so laag as moontlik te hou. Die definisie van IT uitkontraktering is die oordrag van 'n organisasie se rekenaar sentrum operasies, telekommunikasie netwerk, of toepassing ontwikkeling na 'n eksterne verskaffer van hierdie dienste. Daar is verskillende variasies van uitkontraktering van toepassing op IT soos byvoorbeeld: uitkontraktering, inkontraktering, en gesamentlike kontraktering. Maatskappye het verskillende redes om 'n diens uit te kontrakteer en die risikos verbonde aan die proses moet sorgvuldig in gedagte gehou word wanneer die uitkontrakteringsproses aangepak word. Met IT uitkontraktering is daar verskillende dienste wat uitgekontrakteer kan word soos byvoorbeeld: hoofraam dienste, persoonlike rekenaar dienste, sekuriteitsdienste en verskeie rekenaar applikasie dienste. Die besluit om 'n spesifieke area van IT uit te kontrakteer is 'n strategiese kwessie vir die maatskappy en die risikos, kostes en keuse van eksterne diensverskaffer is almal baie belangrike faktore wat in gedagte gehou moet word. Een van die vernaamste faktore wat enige maatskappy in ag behoort te neem wanneer 'n groot inisiatief aangepak word, is natuurlik kostes. Die doel van uitkontraktering is om die kostes van die spesifieke area te verlaag. Daarom moet die nodige maatreëls in plek wees om die kostes vooraf en na die uitkontrakteringsproses te meet. Die uitkontraktering inisiatief kan die maatskappy egter baie duur te staan kom en glad nie die koste voordele bied wat aanvanklik beplan is nie. Dit kan wees as gevolg van verskuilde kostes wat nie met die beplanning van die proses in ag geneem is nie. Gewoonlik word die uitkontrakteringsproses gedryf deur 'n gestruktureerde projek en verskeie belangrike faktore moet in ag geneem word vir die hele proses. Die faktore sluit in: die evaluasieproses om die regte diensverskaffer aan te stel, die opstel van die regte dokumentasie in terme van die diensvoorstel voorlegging, verhouding met die diensverskaffer, die opstel van die diensvlak ooreenkoms, kommunikasie oor die hele proses binne die maatskappy, die kontrak tussen die twee partye, oorgangstadium en die meting van voordele daarna. Die huidige tekort aan IT vaardighede in Suid Afrika veroorsaak dat maatskappye hul IT strategie moet herdink en die opsie van eksterna diensverskaffers wat die nodige vaardighede kan verskaf, oorweeg word. Die studie illustreer hierdie feit dat IT konsultasie een van die hoogste vlakke van ingebruikneming tans en vir die toekoms het. Volledige IT funksie uitkontraktering is nog 'n relatiewe nuwe konsep in Suid Afrika en maatskappye sal slegs die idee aanneem sodra uitkontraktering as suksesvol en koste effektief bewys is. Soos reeds genoem is dit belangrik dat 'n gestruktureerde metodologie gebruik word om 'n uitkontrakteringsinisiatief te dryf. Dit is belangrik dat die aanslag geskoei is rondom bewese projekbestuursbeginsels en dat die regte maatreëls getref is om die proses te ondersteun. Uitkontraktering van IT dienste is 'n strategiese besluit wat 'n maatskappy moet neem. Die risikos daaraan verbonde veroorsaak dat die beplanning en aanpak van die proses baie deeglik en noukeurig gedoen moet word. Uitkontraktering het verskeie risikos soos om die verkeerde eksterne diensverskaffer te kies, maar kan ook voordelig vir die maatskappy wees en die grootste voordele wat 'n maatskappy kan verwag is verlaagde kostes en nuwe IT vaardighede. Die probleem van 'n tekort aan goed opgeleide IT personeel in Suid Afrika maak die idee van uitkontraktering al meer aanlokliker omdat dit 'n goeie manier is om goeie vaardighede in te "koop".
APA, Harvard, Vancouver, ISO, and other styles
16

Dickinson, Michael W. (Michael William) 1964. "Technology portfolio management : optimizing interdependent projects over multiple time periods." Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/80491.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Sloan School of Management; and, (S.M.)--Massachusetts Institute of Technology, Dept. of Mechanical Engineering, 1999.
Includes bibliographical references (p. 49-50).
by Michael W. Dickinson.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
17

Duffy, Juliet (Juliet Maria). "Information management using Web 2.0 technology." Thesis, Massachusetts Institute of Technology, 2009. http://hdl.handle.net/1721.1/50100.

Full text
Abstract:
Thesis (M.B.A.)--Massachusetts Institute of Technology, Sloan School of Management; and, (S.M.)--Massachusetts Institute of Technology, Dept. of Chemical Engineering; in conjunction with the Leaders for Manufacturing Program at MIT, 2009.
Includes bibliographical references.
Web 2.0, the ultimate platform for tacit based knowledge work has finally arrived. User driven, collaborative platform based tools including wikis, web mash-ups, discussion boards, linkage based search engines, and tagging have the potential to vastly change how information is managed and how knowledge work is captured. This thesis investigates how the new paradigms and tools of Web 2.0 can be applied to the Pharmaceutical Industry and assist with information management at The Novartis Institute for BioMedical Research (NIBR). Applying Web 2.0 tools to NIBR's chemical compounds, targets, assays, people, and projects in a well thought out framework has the potential to yield tremendous productivity improvements in the drug discovery process. Effectively harnessing the collective intelligence of thousands of scientists within Novartis's worldwide research network will enable a paradigm shift. A large, extremely knowledgeable user community can more effectively annotate metadata, hyperlink to important content, establish tags, and collectively author content. Such activities will not only improve the search ability of information but also allow important scientific connections to emerge linking biology to chemistry and furthering Novartis's understanding of disease.
by Juliet Duffy.
S.M.
M.B.A.
APA, Harvard, Vancouver, ISO, and other styles
18

Sezgin, Emre. "Itmem - Information Technology Management Enhancement Model: Assessment Of Information Technology Use In Organizations." Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/12612353/index.pdf.

Full text
Abstract:
This study proposes a new model for the assessment of information technology (IT) use in public and private companies, which is called ITMEM- Information Technology Management Enhancement Model. This model aims to assist decision making processes in information technology management. For this purpose, a tool is developed to explore strengths and weaknesses of a company in IT use. The model was developed upon a three-folded structure including (1) academic studies in technology management, (2) best practices which are developed for control over operations and processes including COBIT, CMMI and ITIL, and (3) standards about IT management and IT security. The conceptual framework of ITMEM is based on technology management process assessment model of M.J. Gregory. Methodological triangulation approach is adopted for the model for retrieving valid and reliable results. Triangulation consists of (1) semi structured interview, (2) presented company documents and (3) questionnaire developed upon relevant academic researches, best practices and standards. ITMEM was practiced on ten domestic and experienced companies in software &
development and manufacturing industries which were appraised in or in progress of being appraised in CMMI. The study revealed the benefits and deficiencies of IT use in the company. It also provided information for decision makers about IT value within companies, and demonstrated the effects of best practices and standards over IT use.The reported findings should be valuable assets to researchers studying on IT management and IT use in organizations.
APA, Harvard, Vancouver, ISO, and other styles
19

McGee, Mary Jane. "Information Technology Management Strategies to Implement Knowledge Management Systems." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4156.

Full text
Abstract:
More than 38% of the U.S. public workforce will likely retire by 2030, which may result in a labor shortage. Business leaders may adopt strategies to mitigate knowledge loss within their organizations by capturing knowledge in a knowledge management system (KMS). The purpose of this single case study was to explore strategies that information technology (IT) managers use to develop and implement a KMS. The target population consisted of IT managers in a small-sized organization located in northwestern Florida who had implemented a KMS successfully. The conceptual framework for this study was organizational knowledge creation theory. The collection of public documents, execution of semistructured interviews with 5 qualified participants, literature on the topic, and member checking formed the determination of the findings of the study. Using triangulation and coding the data for emergent themes, 6 themes emerged from the data analysis: (a) training, (b) customer focus, (c) policy and governance, (d) leadership and management support, (e) communication and marketing, and (f) business process management. The application of the findings may contribute to social change by identifying strategies that leaders and IT managers from communities and government agencies use in implementing a KMS that may facilitate transparency and open flow of information to citizens, and allow access to timely, civic, and potentially life-enhancing information.
APA, Harvard, Vancouver, ISO, and other styles
20

Blatt, Sharon L. "An in-depth look at the information ratio." Link to electronic thesis, 2004. http://www.wpi.edu/Pubs/ETD/Available/etd-0824104-155216/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Aral, Sinan. "Essays on information, technology and information worker productivity." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/39003.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Sloan School of Management, 2007.
Includes bibliographical references.
I examine how information technology (IT) skills and use, communication network structures, and the distribution and flow of information in organizations impact individual information worker productivity. The work is divided into three essays based on the task level practices of information workers at a midsize executive recruiting firm: Essay 1: "Information, Technology and Information Worker Productivity: Task Level Evidence." I develop and econometrically test a multistage model of production and interaction activities at the firm, and analyze correlations among network structure, characteristics of information flow and real economic output. I find that (a) IT use is positively correlated with non-linear drivers of productivity; (b) the structure and size of workers' communication networks are highly correlated with performance; (c) an inverted-U shaped relationship exists between multitasking and productivity such that, beyond an optimum, more multitasking is associated with declining project completion rates and revenue generation; and (d) asynchronous information seeking such as email and database use promotes multitasking while synchronous information seeking over the phone shows a negative correlation. These data demonstrate a strong correspondence among technology use, social networks, and productivity for project-based information workers.
(cont.) Essay 2: "Network Structure and Information Advantage: Structural Determinants of Access to Novel Information and their Performance Implications." I examine relationships between social network structure, information structure, and individual performance. I build and validate a Vector Space Model of information diversity, develop hypotheses linking two key aspects of network structure - size and diversity - to the distribution of novel information among actors, and test the theory using data on email communication patterns, message content and performance. Results indicate that access to diverse, novel information is related to network structure in non-linear ways, and that network diversity contributes to performance even when controlling for the positive performance effects of access to novel information, suggesting additional benefits to network diversity beyond those conferred through information advantage.
(cont.) Essay 3: "Organizational Information Dynamics: Drivers of Information Diffusion in Organizations." I examine drivers of the diffusion of different types of information through organizations by observing several thousand diffusion processes of two types of information -'event news' and 'discussion topics' - from their original first use to their varied recipients over time. I then test the effects of network structure and functional and demographic characteristics of dyadic relationships on the likelihood of receiving each type of information and receiving it sooner. Discussion topics exhibit more shallow diffusion characterized by 'back-and-forth' conversation and are more likely to diffuse vertically up and down the organizational hierarchy, across relationships with a prior working history, and across stronger ties; while news, characterized by a spike in communication and rapid, pervasive diffusion through the organization, is more likely to diffuse laterally as well as vertically, and without regard to the strength or function of relationships. The findings highlight the importance of simultaneous considerations of structure and content in information diffusion studies.
by Sinan Aral.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
22

Kuan, Chan Hong. "Management of information technology for competitive advantage." Thesis, University of Macau, 1996. http://umaclib3.umac.mo/record=b1636729.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Cheng, Man-fai, and 鄭文輝. "Utitlization in information technology in housing management." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2007. http://hub.hku.hk/bib/B4500920X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Rich, Martin. "Information and communication technology in management learning." Thesis, City University London, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.410151.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Zhu, Ying 1975. "Information technology application in intermodal terminal management." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/84783.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Civil and Environmental Engineering; and, (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2002.
Page 125 blank.
Includes bibliographical references (p. 119-124).
by Ying Zhu.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
26

Hammar, Tora. "eMedication – improving medication management using information technology." Doctoral thesis, Linnéuniversitetet, Institutionen för medicin och optometri (MEO), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-37167.

Full text
Abstract:
Medication is an essential part of health care and enables the prevention andtreatment of many conditions. However, medication errors and drug-relatedproblems (DRP) are frequent and cause suffering for patients and substantial costsfor society. eMedication, defined as information technology (IT) in themedication management process, has the potential to increase quality, efficiencyand safety but can also cause new problems and risks.In this thesis, we have studied the employment of IT in different steps of themedication management process with a focus on the user's perspective. Sweden isone of the leading countries when it comes to ePrescribing, i.e. prescriptionstransferred and stored electronically. We found that ePrescribing is well acceptedand appreciated by pharmacists (Study I) and patients (Study II), but that therewas a need for improvement in several aspects. When the pharmacy market inSweden was re-regulated, four new dispensing systems were developed andimplemented. Soon after the implementation, we found weaknesses related toreliability, functionality, and usability, which could affect patient safety (StudyIII). In the last decade, several county councils in Sweden have implementedshared medication lists within the respective region. We found that physiciansperceived that a regionally shared medication list generally was more complete butoften not accurate (Study IV). Electronic expert support (EES) is a decisionsupport system which analyses patients´ electronically-stored prescriptions in orderto detect potential DRP, i.e. drug-drug interactions, therapy duplication, highdose, and inappropriate drugs for geriatric or pediatric patients. We found thatEES detected potential DRP in most patients with multi-dose drug dispensing inSweden (Study V), and that the majority of alerts were regarded as clinicallyrelevant (Study VI).For an improved eMedication, we need a holistic approach that combinestechnology, users, and organization in implementation and evaluation. The thesissuggests a need for improved sharing of information and support for decisionmaking, coordination, and education, as well as clarification of responsibilitiesamong involved actors in order to employ appropriate IT. We suggestcollaborative strategic work and that the relevant authorities establish guidelinesand requirements for IT in the medication management process.
Läkemedel förbättrar och förlänger livet för många och utgör en väsentlig del av dagens hälso- och sjukvård men om läkemedel tas i fel dos eller kombineras felaktigt med varandra kan behandlingen leda till en försämrad livskvalitet, sjukhusinläggningar och dödsfall. En del av dessa problem skulle kunna förebyggas med rätt information till rätt person vid rätt tidpunkt och i rätt form. Informationsteknik i läkemedelsprocessen har potentialen att öka kvalitet, effektivitet och säkerhet genom att göra information tillgänglig och användbar men kan också innebära problem och risker. Det är dock en stor utmaning att i läkemedelsprocessen föra in effektiva och användbara IT-system som stödjer och inte stör personalen inom sjukvård och på apotek, skyddar den känsliga informationen för obehöriga och dessutom fungerar tillsammans med andra system. Dagens IT-stöd i läkemedelsprocessen är otillräckliga. Till exempel saknar läkare, farmaceuter och patienter ofta tillgång på fullständig och korrekt information om en patients aktuella läkemedel; det händer att fel läkemedel blir utskrivet eller expedierat på apotek; och bristande eller långsamma system skapar frustration hos användarna. Dessutom är det flera delar av läkemedelsprocessen som fortfarande är pappersbaserade. Därför är det viktigt att utvärdera IT-system i läkemedelsprocessen. Vi har studerat IT i olika delar av läkemedelsprocessen, före eller efter införandet, framför allt utifrån användarnas perspektiv. Sverige har lång erfarenhet och tillhör de ledande länderna i världen när det gäller eRecept, det vill säga recept som skickas och lagras elektroniskt. I två studier fann vi att eRecept är väl accepterat och uppskattat av farmaceuter (Studie I) och patienter (Studie II), men att det finns behov av förbättringar. När apoteksmarknaden omreglerades 2009 infördes fyra nya receptexpeditionssystem på apoteken. Vi fann att det efter införandet uppstod problem med användbarhet, tillförlitlighet och funktionalitet som kan ha inneburit en risk för patientsäkerheten (Studie III). I Sverige har man inom flera sjukvårdsregioner infört gemensamma elektroniska läkemedelslistor. I en av studierna kunde vi visa att detta har inneburit en ökad tillgänglighet av information, men att en gemensam lista inte alltid blir mer korrekt och kan innebära en ökad risk att känslig information nås av obehöriga (Studie IV). I två av studierna undersöktes beslutsstödssystemet elektroniskt expertstöd (EES):s potential som stöd för läkare att upptäcka läkemedelsrelaterade problem till exempel om en patient har två olika läkemedel som inte passar ihop, eller ett läkemedel som kanske är olämpligt för en äldre person. Studierna visade att EES gav signaler för potentiella problem hos de flesta patienter med dosdispenserade läkemedel i Sverige (Studie V), och läkarna ansåg att majoriteten av signalerna är kliniskt relevanta och att några av signalerna kan leda till förändringar i läkemedelsbehandlingen (Studie VI). Sammantaget visar avhandlingen att IT-stöd har blivit en naturlig och nödvändig del i läkemedelsprocessen i Sverige men att flera problem är olösta. Vi fann svagheter med användbarhet, tillförlitlighet och funktionalitet i de använda IT-systemen. Patienterna är inte tillräckligt informerade och delaktiga i sin läkemedelsbehandling. Läkare och farmaceuter saknar fullständig och korrekt information om patienters läkemedel, och de har i dagsläget inte tillräckliga beslutsstöd för att förebygga läkemedelsrelaterade problem. Eftersom läkemedelsprocessen är komplex med många aspekter som påverkar utfall behöver vi ett helhetstänkande när vi planerar, utvecklar, implementerar och utvärderar IT-lösningar där vi väger in både tekniska, sociala och organisatoriska aspekter. Avhandlingens resultat visar på ett behov av ökad koordination och utbildning samt förtydligande av ansvaret för inblandade aktörer. Vi föreslår gemensamt strategiskt arbete och att inblandade myndigheter tar fram vägledning och krav för IT i läkemedelsprocessen.
APA, Harvard, Vancouver, ISO, and other styles
27

Isaksson, Ulrika, Karin Kvarnström, and Malin Nilsson. "Challenges with Incident Management : In Information Technology." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1634.

Full text
Abstract:
IT-security is a global problem and over the world Computer Emergency Response Teams (CERT) are created in order to solve the problem. The common understanding is that IT-security is important but no straight guideline how to deal with it. The Swedish IT-incident centre (SITIC) started 2003. It is a Swedish solution on an international problem. There are challenges to be met when handling an IT-incident centre – organisation form, activity and result. We believe a general solution in IT-incident management that will suit all parties in the society, is a hard task for SITIC as things stand today. What we can deduce from our investigation is that there is no greater need of SITIC among the global companies. We believe one reason for this is that they are going to create within their companies some sort of CERT function by themselves in the future. This in its turn, depend on that the companies do not have any trust to SITIC, they do not see the benefit with an activity as SITIC because they only see the reporting, they do not believe they are going to get something in return. Conclusion: Incident management is not only about reporting incidents, but a continuous life cycle with phases: detect, report, measure and follow-up.
IT-säkerhet är ett globalt problem och över världen skapas Computer Emergency Respons Teams (CERT) för att försöka att lösa olika problem. Den vanliga uppfattningen är att IT-säkerhet är viktigt men att inga direkta guidelines finns för hur man skall hantera det. SITIC som är det svenska IT-incident centret, startade 1 januari, 2003. Det är en svensk lösning på ett internationellt problem. För ett IT-incident center finns det utmaningar att hantera såsom organisations form, verksamhet och resultat. Vi tror att en generell lösning av hanteringen IT-incidenter som skulle passa alla parter i samhället blir svårt för SITIC att klara av som det ser ut idag. Vad vi kan härleda från vår utredning är att det inte finns något större behov av SITIC för de globala företagen. Vi tror att en av anledningarna är att företagen själva i framtiden tänker starta egna CERT-funktioner. Detta i sin tur kan bero på att företagen inte har något större förtroende för SITIC, de kan inte se någon fördel men verksamheten, de ser endast rapporteringsdelen. Företagen tror inte att de kommer att få något tillbaka när dom rapporterar sina incidenter till SITIC. Slutsats: Incident hantering handlar inte bara om att rapportera incidenter, utan det är en kontinuerlig livscykel innehållande faserna: upptäcka, rapportera, åtgärda och följa upp.
APA, Harvard, Vancouver, ISO, and other styles
28

Ho, Wai-cheong. "Business and information technology alignment /." Hong Kong : University of Hong Kong, 1998. http://sunzi.lib.hku.hk/hkuto/record.jsp?B2071807X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Carey, David R. "Information technology : attitudes and implementation." Thesis, Massachusetts Institute of Technology, 1988. http://hdl.handle.net/1721.1/14534.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Mylonopoulos, Nikolaos. "The governance of information technology service provision." Thesis, University of Warwick, 1999. http://wrap.warwick.ac.uk/34705/.

Full text
Abstract:
The governance of information technology (IT) service provision entails all those elements of the structure and process of contracting and organisation that are necessary in order to deliver effective and efficient IT services within today's organisations. This thesis develops a framework integrating those elements of governance with a view to explaining actual governance structures and to guiding relevant decisions in practice. Until the late 1980s, the principal concerns with respect to the organisation of IT activities revolved around the issues of centralisation versus decentralisation and end-user computing versus specialist control. Whilst contracts for various systems and services have always been a significant part of the IT department's activity, the issue of structuring such contracts took a prominent position on the management agenda in the beginning of 1990s with the proliferation of large contracts of the 'total outsourcing' kind. IT outsourcing rekindled interest in and reshaped the agenda of the organisation of IT provision. The debate on IT outsourcing provided the motivation and the starting point of this thesis. Thus, chapter 1 reviews this debate and, following on the opinion of others, recasts the question of 'whether to outsource or not' as 'how to set up the governance (i. e. the structure and process of contracting and organisation) of IT service provision'. In order to shed some light on the elements of governance, chapter 2 turns on a range of economic theories of the firm. These theories are critically reviewed and some preliminary suggestions as to how they might inform the governance of IT are put forth. The chapter concludes by setting the theoretical foundations for the rest of the thesis. The notion of a governance continuum between the ideal pure market and the ideal pure hierarchy is introduced. Actual governance structures, it is argued, can be placed on this continuum as individual instances. Before advancing onto more substantive work, chapter 3 pauses to reflect on the epistemological basis of this research project. The main principles of the epistemological position adopted here are taken from the philosophical arguments of transcendental realism. The implications of this epistemological position for the empirical methods and the theoretical claims made in this thesis are also examined. Chapter 4 documents an intensive case study at British Petroleum Plc. The purpose of this case study was to draw lessons from practice and to assess the relevance of the theories of chapter 2. This case study was an interactive learning process through which the researcher sought access to management practice in order to assess economic theories, while the managers at BP sought a broader understanding of IT outsourcing. The outcome of this interaction was the S-CAGE framework which coupled theoretical insights with practical relevance. The S-CAGE (Service Clustering And Governance Establishment) framework is described in detail in chapter 5. It is put forth as both an explanatory and a normative account of the governance of IT service provision. It is based on the notion of governance continuum, it introduces the idea of grouping services into clusters and it provides a classification of the elements of governance that should be customised to the characteristics of each cluster of services. Chapter 6 presents two further case studies aimed at evaluating the usefulness of SCAGE in understanding and explaining alternative outsourcing practices. ICI and Anglian Water have been visited for this purpose. On the basis of these cases, the concluding chapter summarises the strengths and limitations of the proposed framework. An attempt is also made to set forth some preliminary theoretical ideas extending the notions of clustering and governance continuum. The thesis concludes with a final short illustration of the use of the S-CAGE framework.
APA, Harvard, Vancouver, ISO, and other styles
31

Kalissery, Biju. "Managing agile information technology infrastructure." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/42363.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, System Design and Management Program, 2007.
Includes bibliographical references (leaves 43-44).
Information technology (IT) can be a key contributor for the successful implementation of business strategies. However, companies normally find it hard to synchronize their evolving business strategies with the capabilities in IT. This thesis analyzes the key contributors to the problems in synchronizing business strategy and Information Technology and suggests both management and technical frameworks for an agile IT infrastructure that can stay in sync with the evolving business strategy. Agility in IT infrastructure means the ability for the infrastructure to accommodate evolving needs and business strategies without significant re-architecture. There is no magic bullet that could induce agility into an IT infrastructure and its management. But, this thesis studies the best practices in management and technology which are being used by industry leaders successfully.
by Biju Kalissery.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
32

Speed-Crittle, Sharita Dianthe. "Healthcare Organization Change Management Strategies to Guide Information Technology With for Information Technology Change Initiatives." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6679.

Full text
Abstract:
As technology and organizations continue to increase in complexity, a willingness to implement change management strategies for Internet technology (IT) change initiatives is necessary in a healthcare setting. This multiple case study explored change management strategies that 3 hospital administrators at 3 different hospitals in the southeast region of the United States used to guide organizational IT change activities to avoid waste and increase profits. The conceptual framework for this study was Lewin's organizational change model and Kanter's theory of structural empowerment. Data were collected using semistructured interviews and a review of hospital documentation from the 3 hospitals. The data analysis process was completed by transcribing the interview recordings and coding the data using a codebook and data-management software. Themes that emerged from data analysis included strategies to increase digitization in all areas, improve communication with IT personnel, provide ongoing training, and encourage the gradual adoption of technology. The implications of this study for positive social change include the potential to provide hospital managers with successful strategies related to the use of IT in hospitals to facilitate improved patient care and community well-being.
APA, Harvard, Vancouver, ISO, and other styles
33

Lima, Luis A. C. "LEADERSHIP IN THE INFORMATION AGE: HOW CHIEF INFORMATION OFFICERS LEAD INFORMATION TECHNOLOGY WORKERS." Connect to this title online, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=bgsu1151093030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Ryan, Cynthia A. (Cynthia Anne) 1961. "Sustainable competitive advantage through information technology." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/9193.

Full text
Abstract:
Thesis (M.B.A.)--Massachusetts Institute of Technology, Sloan School of Management, 2000.
Also available online on DSpace at MIT.
Includes bibliographical references (leaf 48).
This paper discusses the difficulty of achieving sustainable competitive advantage through information technology. While information technology proliferates and innovations arise frequently, few companies have been able to use IT to remain leaders in their industries. Using a framework proposed by Michael Scott Morton, this paper examines how one firm, Capital One Financial, has created sustainable competitive advantage through a powerful combination of its information technology, strategic planning, and organizational design. The first section provides an introduction and information about the Scott Morton framework. Section two provides background information about the credit card industry and Capital One;s history. The third section analyzes why Capital One's advantage has been sustainable to date and includes discussion of strategic, economic, organizational and technical reasons. Section four analyzes the risks to Capital One's advantage in the future and includes discussion of technicalogical risks, organizational risks and customer risks. The final section includes a summary and some conclusions.
by Cynthia A. Ryan.
M.B.A.
APA, Harvard, Vancouver, ISO, and other styles
35

Bhansali, Sumit Milap. "Essays on impact of information technology." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/40861.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Sloan School of Management, 2007.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Includes bibliographical references.
The five essays in this dissertation look at how specific information technologies (such as Electronic Document Management (EDM), Semantic Web and RuleML) and IT in general can be used to automate and standardize data and processes, enable faster and more accurate information flow, and improve individual as well as firm performance. The first essay is an analytical review-type study in which we provide a comprehensive survey of research literature about different complementary organizational assets that when coupled with IT can lead to higher firm performance. In the second essay, we study the causal effects of digitizing work on information workers' time- use and performance at a large insurance firm. We make causal inferences and obtain unbiased estimates by exploiting a quasi-experiment: the phased introduction of Electronic Document Management (EDM) across multiple offices at different dates. In addition to large changes in time-use and performance, we find that digitization leads to a decline in the substitutable routine labor input and an increase in complementary non-routine cognitive labor input at the information worker level. We also uncover a new micro-level mechanism, "IT-enabled slack", that explains how exactly IT can lead to payoff in terms of information worker productivity. In the third essay, we examine the IT productivity relationship using a large primary source firm-level dataset about IT investments that spans the 2003-2005 period. Given results from previous studies, we present evidence of an inverted U-shaped returns curve, with returns now close to what they were in pre-Internet era. The fourth essay explores what high-performing firms specifically do to gain the greatest benefits from their IT investments.
(cont.) Through a set of matched interviews with multiple respondents at 138 firms, we find that data/process standardization and systems integration, level of application integration and several IT-specific cultural elements are positively correlated with IT impact on customer satisfaction. The fifth essay shows the first detailed realistic e-business application scenario that exploits capabilities of the SweetRules V2.1 toolset for e-contracting using the SweetDeal approach. SweetRules is a powerful integrated set of tools for semantic web rules and ontologies. SweetDeal is a rule-based approach to representation of business contracts.
by Sumit Milap Bhansali.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
36

Liao, Kenny Ghen-yue 1966, and Luis Alberto 1967 Reátegui. "Information technology outsourcing in emerging markets." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/26892.

Full text
Abstract:
Thesis (M.B.A.)--Massachusetts Institute of Technology, Sloan School of Management, 2002.
Includes bibliographical references (leaves 84-85).
Information Technology (IT) firms can better differentiate themselves and achieve improved profitability through IT outsourcing business. This can be explained by using Hax and 'Wilde's Delta Model. Several IT firms have successfully achieved these objectives in well-developed countries. However, this thesis argues that developing successful IT outsourcing business in emerging markets cannot be achieved simply by replicating previous experiences in well developed countries, as IT outsourcing is greatly influenced by the cultural factors and the macro environment of the local markets. This thesis discusses the factors through two perspectives. The first encompasses the factors influencing a firm's decision whether or not to outsource its IT functions. Those factors can be categorized into five different concerns: financial, resource, strategic, managerial, and cultural. The second perspective focuses on the eight critical factors for IT outsourcing projects to be successful, four inside and four outside the firm. For emerging markets, we use Michael Porter's Diamond Model to analyze how IT outsourcing business is influenced by the environment in which it is operating. To give an example of an emerging market, we have studied IT outsourcing business in China. We have conducted in-depth interviews locally with a variety of IT firms and corporate customers, and applied once more Michael Porter's Diamond Model to analyze our findings. This thesis identifies the market segments and reviews the critical success factors in each of them, and concludes with recommendations to IT firms on strategies for the IT outsourcing business development in China.
by Kenny Ghen-yue Liao and Luis Alberto Reátegui.
M.B.A.
APA, Harvard, Vancouver, ISO, and other styles
37

Green, Daniel M. "Net-centric information sharing supporting the 21st century maritime strategy." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Sept/08Sep%5FGreen.pdf.

Full text
Abstract:
Thesis (M.S. in Systems Engineering Management)--Naval Postgraduate School, September 2008.
Thesis Advisor(s): Osmundson, John S. "September 2008." Description based on title screen as viewed on November 3, 2008. Includes bibliographical references (p. 75-78). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
38

Lan, Yi-chen 1969, University of Western Sydney, of Science Technology and Environment College, and School of Computing and Information Technology. "Management of information technology issues in enterprise globalisation." THESIS_CSTE_CIT_Lan_Y.xml, 2003. http://handle.uws.edu.au:8081/1959.7/314.

Full text
Abstract:
Domestic companies are increasingly trying to expand to become globalised firms or multinational corporations (MNCs). Existing business strategies, visions and information systems need to be re-analysed and perhaps reconstructed to fulfil the business goals, operations and characteristics of the global organisation. Information technology is a critical element in enabling globalisation, and enterprises need to identify and consider information technology and system management issues. Depending on the structure of multinational organisations, different emphases need to be placed on issues such as business information systems management, information technology management, people management, end-user management, and culture. A global transition issue priority model is constructed to support the following hypothesis: the global transition issue priority varies depending on the type of organisational structure. With the assistance of this model, MNCs are able to pinpoint the emphasis of issues in preparing the globalisation process according to their organisational structures. Surevsy were onducted to investigate the priority of issues, and outcomes suggest that the emphasis of each issue class is dependent on the type of organisational structure. The main contribution of this research is to develop a global information systems management priority model that will assist MNCs in preparing the strategic plan in the global transition process, and develop a global transition framework for enterprises which will facilitate construction of their global information systems.
Doctor of Philosophy (PhD)
APA, Harvard, Vancouver, ISO, and other styles
39

Staples, Douglas Sandfield. "Management of remote workers, an information technology perspective." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/nq21317.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Lan, Yi-Chen. "Management of information technology issues in enterprise globalisation /." View thesis, 2003. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20031217.130842/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Allen, James D. "Information technology program management: is there a difference?" Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/42573.

Full text
Abstract:
Approved for public release; distribution is unlimited
The federal government spends billions of dollars on information technology (IT) projects each year. Despite spending billions on IT, the government has achieved little of the productivity improvements that private industry has realized from IT. Too often, federal IT projects run over budget, behind schedule, or fail to deliver promised functionality. The March 2009 Defense Science Board concluded that three root causes emerged from a review of major IT acquisition programs where cost, schedule, and performance were issues. First, senior leaders lacked experience and understanding. Second, the program executive officers and program managers had inadequate experience. Third, the acquisition process was bureaucratic and cumbersome, where many who were not accountable had to say yes before authority to proceed. To address these concerns, the U.S. Chief Information Officer, the Office of Personnel Management, and the Office of Management and Budget launched an initiative to strengthen program management by designing a formal IT Program Management career path. This research analyzes the need for IT Program Managers (PM) within the federal government by comparing the differences between IT PMs and non-IT PMs.
APA, Harvard, Vancouver, ISO, and other styles
42

Foote, Alan Richard. "Exploring Knowledge Management Models on Information Technology Projects." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2028.

Full text
Abstract:
One way an organization manages the knowledge of its people is in information technology (IT) projects. Organizations develop IT projects for many socially responsible reasons, including improved health care services and better community services. IT projects do not always achieve the goals of the organization when the knowledge of the stakeholders is not managed for these objectives. For this study the purpose was to address the use of knowledge management (KM) in project management (PM) to improve the success of IT projects in achieving the organizational goals. The research questions were based on KM including its tools and techniques to improve the success rate for IT projects. The conceptual framework included the project knowledge management (PKM) model, which helped identify the knowledge sharing in IT software projects for a local insurance company in Baltimore, Maryland. Interview data were collected from 26 IT project stakeholders about KM in PM. Analysis revealed 4 themes of managing knowledge in the requirement process, code development process, testing process, and the helpdesk process for the success of the IT project. Each of the 4 processes used different KM repositories and face-to-face tools. Improving the rate of successful IT projects benefits organizations and society with better products and services for lower costs. This study may affect social change by providing information for managers of other organizations about achieving success of their IT projects.
APA, Harvard, Vancouver, ISO, and other styles
43

Williams, Andrew Stephen. "Effective Stakeholder Management Strategies for Information Technology Projects." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4580.

Full text
Abstract:
Information Technology (IT) projects have become critical to business strategy. However, one major issue is that, historically, IT projects have high failure rates, with scholars asserting that ineffective stakeholder management strategies were a major factor for project failure. The purpose of this multiple case study was to explore strategies IT executives use for managing IT project stakeholders by exploring the experiences of 2 CIOs and 4 IT directors in two multinational companies, based in Switzerland. Stakeholder theory was the conceptual framework for this study. Data were collected through semistructured interviews and company documentation, and analyzed using Yin's 5-step data analysis process to identify and code themes. Five main themes emerged from the data analysis: organizational culture, organizational maturity, leadership, competencies, and post-implementation reviews. The results of this study revealed the importance for leaders to articulate business strategies enabling stakeholders to have a common perspective on project objectives, and to act as a foundation upon which IT executives can create effective stakeholder management strategies. Results indicated that the deployment of effective stakeholder management strategies was dependent on several factors, including organizational culture, leadership style, competencies, and organizational maturity. Findings may contribute to positive social change by encouraging effective stakeholder management to improve knowledge sharing, individual and team motivation, management across cultural boundaries, and stimulate a culture of social responsibility and sustainability.
APA, Harvard, Vancouver, ISO, and other styles
44

Tedder, Derek. "Effective management of an information technology professional's career." Thesis, Rhodes University, 2005. http://hdl.handle.net/10962/d1004543.

Full text
Abstract:
The human resource is constantly cited as an organisation's greatest asset. In a rapidly changing technological environment this is most applicable to the Information Technology (IT) function. Organisations are experiencing IT human resource problems such as low satisfaction, early plateauing, high turnover, burnout, limited advancement potential, nominal corporate commitment, supervisory aversion, poor organisational culture, and exceptional compensation. These problems are directly related to the IT professional's career. There is a lack of information and awareness surrounding IT careers to deal effectively with these problems. The research aims to create increased awareness of IT careers and the inherent problems through the development of a career management model. The research aims to identify the factors that influence IT careers, provide career management with a means to measure compatibility of the factors, and suggest solutions to incompatibility. The solving of this problem will be of mutual benefit to both organisations and individuals as they seek to better manage IT careers. After reviewing research literature relating to career anchors, IT job types, IT skills portfolios, and career dynamics a model for Effective IT Career Management (EITCM) has been constructed. The model represents the dynamic interactions between individual, organisational, and dependent factors. The model examines the compatibility of these interacting factors by measuring the levels of relevant career variables. The model suggests appropriate career management techniques to increase the compatibility of the interacting factors. An empirical study was designed and launched online to provide data that would confirm the seven Critical Success Factors (CSF) relating to the proposed model. The responses from the members of the Computer Society of South Africa (CSSA) allowed the seven hypotheses derived from the CSFs to be tested. The results of the empirical study were positive but required modification to five of the CSFs before they could be confirmed. The EITCM model was modified to reflect the improved CSFs. An awareness of career influencing factors combined with active career management is advantageous to both IT professionals and their organisations.
APA, Harvard, Vancouver, ISO, and other styles
45

Ho, Wai-cheong, and 何偉昌. "Business and information technology alignment." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1998. http://hub.hku.hk/bib/B31268833.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Cragg, Paul B. "Information technology and small firm performance." Thesis, Loughborough University, 1990. https://dspace.lboro.ac.uk/2134/6953.

Full text
Abstract:
This study utilised both mail questionnaire and case study approaches to investigate propositions related to information technology (IT) in small firms. The major proposition investigated IT Sophistication as one cause of small firm success. Data was collected from 289 engineering firms by mail questionnaire, including 120 with at least one computer. Multiple regression analysis gave no support to IT as a success factor. Similarly, non-parametric statistical tests suggested that firms with more sophisticated IT performed no better than firms with no or less sophisticated IT. Furthermore, among only the firms with computers, many negative rather than positive correlations were found between IT variables and financial performance. Therefore, rather than support the major proposition that IT was a success factor for small firms, the mail questionnaire provided evidence to the contrary. An indepth analysis of six firms provided evidence that developing IT had, in some firms, increased operating costs and consumed important managerial time. Furthermore, there was evidence to suggest that some factors tended to encourage both IT growth and poorer performance simultaneously, which would explain the negative correlations found between IT and financial performance. Two further propositions were investigated, both relating to IT success. Using path analysis, the following factors were found to influence IT success: external assistance in identifying IT requirements, owner involvement in IT planning and in control, planning IT development, and the use of IT for many applications. However, the measure of IT success was not found to be correlated with financial performance, and this must put in question how MIS researchers should measure "success".
APA, Harvard, Vancouver, ISO, and other styles
47

Pringle, Sammie VanOrden Marc A. "Applying modern portfolio theory and the capital asset pricing model to DoD's information technology investments." Monterey, Calif. : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/March/09Mar%5FPringle.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technololgy Management)--Naval Postgraduate School, March 2009.
Thesis Advisor(s): Housel, Thomas J. "March 2009." Description based on title screen as viewed on April 23, 2009. Author(s) subject terms: CAPM, Capital Asset Pricing Model, KVA, Knowledge Value Added, Real Options, ROI, Return on Investment, MPT, Modern Portfolio Theory. Includes bibliographical references (p. 37-39). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
48

Ha, T. H. "Information management, information technology and their implications in the Korean banking industry." Thesis, Swansea University, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.637192.

Full text
Abstract:
This research examines the practice of information resource management in the Korean (South Korean) banking industry. It analyses the perceptions of managers, employees and union representatives with regard to the manpower and work environment implications of information technology (IT), and to the impact of IT on decision-making and industrial relations. It gives particular attention to the importance of, and attention paid by, management to training/education for IT. The research method adopts a comparative analytical approach based on questionnaire survey responses from three work groups - managers, employees, and union representatives - drawn from a sample of five Korean banks. Concerning the impact of IT on the banking industry, the evidence indicates that all three groups agree that IT improves banking efficiency and reduces job repetitiveness. However, all respondents indicated dissatisfaction with IT-based work. The reasons are mainly lack of training/education and poor user manuals. The study shows that most respondents would like to get further training/education to more adequately fit them for their jobs. IT was perceived to improve working conditions while adversely affecting health & safety. IT was not thought to be a direct threat to job security, which could be explained by the facts that banks were still expanding their businesses and that the culture of lifetime employment is widely held. The results indicate that similarities and differences exist between the three responding groups. Where differences did emerge they were mainly between managers and the other two groups. Generally, broad unanimity was found with regard to the positive attitudes towards IT. Concerning training/education for IT, even though the staff members were deficient in technical skills before starting their IT jobs, respondents from banks which invested in continuing training/education showed more positive work attitudes and higher job satisfaction. The thesis concludes with a discussion of the managerial implications of the study and suggestions for future research.
APA, Harvard, Vancouver, ISO, and other styles
49

Shives, Timothy R., and Laban M. Pelz. "Analyzing the U.S. Marine Corps Enterprise Information Technology Framework for IT Acquisition and Portfolio Governance." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/17460.

Full text
Abstract:
Approved for public release; distribution is unlimited
This research examined the ongoing development of a Marine Corps-wide, enterprise architecture (EA) approach for assessing the IT planning and investment process, including IT-related programs of record. The EA-approach to an architecture known as the Marine Corps Information Enterprise Technology Strategy (MCIENT-S) is intended to transition Marine Corps into the 21st century by providing Marine Corps leadership with superior decision support. This study evaluated planning and implementation strategies against Return on Investment (ROI) and requirements-based Capabilities Based Assessment (CBA) processes in their contrasting measures of effectiveness. By analyzing the current and proposed additional IT investment performance metrics to enhance the enterprise architecture, the study learned of the need to conduct an organizational analysis of the Marine Corps IT development and portfolio management process. The study begins with a baseline understanding of the current financial environment of EA; from the initial and rapid growth in defense-specific IT acquisitions since 9/11 into the current fiscally constrained environment of FY2013. The rising trend of the last decade of defense (IT) investment yields its own unintended consequences. One noted conclusion is that some procurements have unfortunately occurred outside the intended parameters of the enterprise architecture framework and the DoD acquisition process and thereby created consequences in the IT governance. One recommendation for the Marine Corps leadership is to develop a systematic process to link the MCIENT-S and its two primary ROI processes, Capital Planning Investment Control (CPIC) and Information Technology Steering Group (ITSG), to the Marine Corps Combat Development Command (MCCDC) requirements based CBA process.
APA, Harvard, Vancouver, ISO, and other styles
50

VanOrden, Marc A. "Applying modern portfolio theory and the capital asset pricing model to DoD's information technology investments." Thesis, Monterey, California. Naval Postgraduate School, 2009. http://hdl.handle.net/10945/4795.

Full text
Abstract:
Approved for public release, distribution unlimited
Program Managers (PMs) throughout the Department of Defense (DoD) were directed by the DoD Chief Information Officer to manage information technology (IT) investments as portfolios (to include Mission Areas, Subportfolios, and Components) within the DoD Enterprise. Managing portfolios of capabilities aligns IT with the overall needs of the warfighter, as well as the intelligence and business activities which support the warfighter. This thesis provides the detailed steps that PMs and Program Executive Officers (PEOs) should follow to closely manage their IT portfolios using the concepts described within Harry Markowitz' Modern Portfolio Theory. The first section will provide a demonstration of allocating revenue generated by a fictitious large corporation to the various sub-corporate levels and then applying Knowledge Value Added (KVA) in order to calculate a Return on Investment (ROI). The foundation of KVA analysis is that each subprocess output must be represented in common units of change; a price per unit of output is generated to allocate both cost and revenue at the subprocess level. The final section will apply a similar KVA analysis to the Naval Cryptologic Carry On Program (CCOP) systems to provide a public sector example.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography