Year of publication
Type of media
Source
Type of material
Language
-
Information strategy : the executive's journal
TIBKAT | 1.1984/85 - 20.2003/04,4; damit Ersch. eingest. -
Legacy Value Engineering: The Fountain of Youth to Maximize the Value of Existing Technology Investments - How can IT departments meet business needs while staying within a level or even declining budget? One answer is to stop thinking of our legacy information systems as the poor stepchild. Instead, we need to treat the tremendous intellectual and financial investment in these systems with respect and make sure we extract the value they embody.
Online Contents | 2003| -
What Does an Information Security Breach Really Cost? Evidence and Implications - Event studies yield an accurate gauge of losses resulting from IT security incidents. Given the tight corporate budgets, IT managers, risk managers, and finance policy makers require reliable quantitative estimates to make tough decisions regarding enterprise IT security.
Online Contents | 2003| -
Keeping SCOR on Your Supply Chain: Basic Operations Reference Model Updates with the Times - Today's manufacturers and service providers tend to be partners in one or more supply chains. Continued evolution of IT has enhanced discrete supply-chain activities. Yet in the blur of competitive business, managers need ongoing supply-chain assessment for potential performance improvement. This article explains how the computerized Supply-Chain Operations Reference (SCOR) Model keeps current with industry's dynamic changes.
Online Contents | 2003| -
Winning Their Hearts, Their Minds, and Their Databases - This article takes a look at what works and what does not work when it comes to combining two large entities. We examine two different mergers, both of which had to overcome significant cultural barriers in order to amicably unite.
Online Contents | 2003| -
The Rise and Fall of Rank and Yank - What does the evaluation trend involving forced-ranking say about a company's attitude towards its workers? What does it say about an organization that relegates bottom-dwelling employees to the same fate as the last generation of PCs? This article considers these and other issues related to "rank and yank," then presents the more comprehensive 360(degree) review as a solution.
Online Contents | 2003| -
Assembling Knowledge Management Teams - Knowledge management (KM) teams are vital to the success of any project. But organizing and managing a KM team is no easy task. Who do you need on your KM team? Who do you place in charge and when should consultants be included? Once assembled, what "magic" do you employ to get everyone to work smoothly together? And should the team have finite duration or transition into an ongoing KM operation? This article examines these issues, calling upon the experiences of companies, both large and small, that have erected a KM team, as well as consultants who helped them achieve true business value from their knowledge initiatives.
Online Contents | 2003| -
Notes - Expecting the Unexpected: Business Integrity ... Where Is IT in All That Is Going On?
Online Contents | 2003| -
Teleconferencing Cuts Costs - The future for teleconferencing is bright. Given the current economic and social climate, it is time to better utilize these technologies within your organization. They have proven to save time and money. This article addresses what they are and how to apply them.
Online Contents | 2003| -
The Real-Time Enterprise, The Real-Time Supply Chain - Managing companies with a mix of real-time and historical information is the best of both worlds. Existing system investments can be leveraged, ultimately allowing applications to provide the ROI they promised. Find out how to accomplish this through an evolutionary, process of integration and accommodation.
Online Contents | 2003|