نتایج جستجو برای: it structure
تعداد نتایج: 3988278 فیلتر نتایج به سال:
This study investigated the effect of different scientific inquiry activities on visitors' understanding of the science underlying an interactive exhibit. The exhibit, "colored shadows," creates a pattern of colored shadows on a white wall, due to a person's body blocking the light from colored lamps. The subjects were 392 museum visitors, aged 7 to adult. They were individually guided through ...
In response to multiple LGBTQ youth suicides in 2010, Dan Savage and Terry Miller sought to provide messages of hope to at-risk LGBTQ youth through the YouTube-based “It Gets Better Project” (IGBP). With empirical data gathered through online chatbased in-depth interviews, this study offers insight into multi-dimensional motivations for participation in an online community. Pointedly, data show...
As project managers (PMs) play an important role in project success, assigning PMs with appropriate skills and personalities to projects is a crucial task. Nevertheless, empirical research on skill requirements for information technology (IT) PMs is limited and little information systems literature focuses on the role of internally recruited IT PMs. This paper presents a case study of a trouble...
ERRATA delete optimal Section accommodate R(t,k) vi ci nity change b-a to a-b Bayes risk It easily follows (by induction) from (9) and (21) ...
Spreadsheets are important business tools. Increasingly they are being used for simulation e.g. to perform risk analysis. Such tasks have far greater computational demands than traditional spreadsheet bookkeeping applications. In this paper we show how spreadsheets can support supercomputing. This is achieved without requiring the spreadsheet user to have specialist tools or knowledge. The key ...
سازمان ها با نیاز رو به افزایش برای انطباق و انعطاف پذیری، همچنین برای کارایی و مقرون بصرفه بودن روبرو هستند. فناوری اطلاعات پیچیده تر و اغلب محدود به توانایی یک سازمان برای تغییر شده است. حاکمیت فناوری اطلاعات روشی است که برای کمک به سازمان ها در تضمین ارزش از فناوری اطلاعات و مدیریت تغییرات در نظر گرفته شده است. از میان چارچوب های موجود val it چارچوبی حاکمیتی برای کمک به سازمان ها جهت بهینه...
Risk analysis is considered as a fundamental aspect relevant for ensuring the level of critical infrastructure protection, where the critical infrastructure is seen as system, asset or its part which is important for maintaining the vital societal functions. Article actually discusses and analyzes the potential application of selected tools of information support for the implementation and with...
In this paper, a system for capturing and maintaining design rationale is described. The significant contribution of this work is to address the problem of ensuring that the model is followed by the user and to extend the model to include risk analysis. This is accomplished using a software tool (PPIS) that allows the structure of the argumentation process to be made explicit and visible in the...
Shadow Information Technology (IT) occurs when users develop systems outside of the central information technology department. It provides both benefits and risks. Users procuring shadow IT often do not consider integration with existing enterprise architecture, privacy and security protection, maintenance cost, and legal ramifications. Problems with shadow IT must often be resolved by central ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید