نتایج جستجو برای: it structure

تعداد نتایج: 3988278  

Journal: :Business & Information Systems Engineering 2014
Daniel Beverungen

Business process management is often considered as a top-downmanagement activity. This view is inconsistent with the observation that information infrastructures are at drift, outside top-downmanagement control. To reconcile both views, a meta-framework is presented that frames the interplay of the design and emergence of business processes. Business processes are identified as a particular for...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه گیلان - دانشکده فنی 1393

asymmetric membranes are widely used in many industrial membrane separation processes. the major advantage of membrane filtration over the conventional process is its ability to remove a wider spectrum of particles without using any chemicals. hollow fiber configuration offer many advantages over flat-sheet or tubular membranes. the spinning process of hollow fiber may look simple, yet it is te...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بیرجند - دانشکده ادبیات و علوم انسانی 1392

in new management approaches, in the organizations with inflexible structure, existing of red tapes and interruptions caused by limitations and also non-compliance with environmental changes, create demotivation among staff. with regard to the influence of job motivational potential and its relationship to the type of organizational structure( enabling and dissuasive), the goal of this research...

Journal: :international journal of information, security and systems management 2012
afshin mirmasoudi yaghob farjami alireza pourebrahimi

undoubtedly, information technology (it) has undergone extensive developments in various social and economic spheres; its effect on human society is in such a way that the world today is referred as information society. besides, information technology, attributed as the main agent of global change, is to achieve meta- organization purposes. it also pertains to appropriate information formulated...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و علوم انسانی 1391

peace and national security protection and ironic solving of international conflicts become the preliminary foundation of the united nations charter and had been considered as the main responsibilities of the security council, after world war ii and the establishment of united nations organization. therefore, the security council enables to analyze every kind of conflicts and challenges which ...

2010
Nicolas Racz Edgar R. Weippl Andreas Seufert

The growing importance of enterprise risk management and the resulting integration efforts put the need for separate IT risk management frameworks in question. In this research we analyse common and distinct elements of the COSO enterprise risk management and ISACA Risk IT frameworks. The analysis affirms the hypothesis that separate IT risk management frameworks are redundant.

Journal: :iranian journal of management studies 2014
seyed mohammadbagerher jafari

the increasing dependency of many businesses with information technology (it)and the high percentage of the it investment in all invested capital in businessenvironment ask for more attention to this important driver of business. thelimitation of capital budget forces the managers to look for more wise investment init. there are many cost-cutting techniques in the literature and each of them ha...

2005
Per Røe Jon Ølnes André Larsen Ilangko Balasingham Karl Øyri

This document describes given an analysis of the computer security aspects of the demonstrator developed in work package 12 of the Wireless Health and Care (WsHC) project. A risk analysis is performed and requirements for the system are established. The implementation of security measurements implemented in the demonstrator is discussed. Finally the risk analysis is revised according to the pro...

Journal: :Journal of Physics: Conference Series 2009

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شاهد - دانشکده فنی و مهندسی 1387

abstract biometric access control is an automatic system that intelligently provides the access of special actions to predefined individuals. it may use one or more unique features of humans, like fingerprint, iris, gesture, 2d and 3d face images. 2d face image is one of the important features with useful and reliable information for recognition of individuals and systems based on this ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید