نتایج جستجو برای: تکنولوژی اطلاعات it

تعداد نتایج: 2950163  

2008
Bastian Schlaak Scott Dynes Lutz Kolbe Ragnar Schierholz

IT security issues and outsourcing of business processes are common but largely disjoint themes in the literature; common consideration is rare even though information security risk becomes a shared risk both through IS-based processes at outsourcing partners and potentially tightly-integrated IS systems. This paper explores this lack of an integrated model combining IT risk management view wit...

2005
Stefanie Jahner Helmut Krcmar

Increasing numbers of security incidents such as malware or hacker attacks prompt companies to spend billions of dollars on protecting their information systems. In this context IT risk management (ITRM) has become an important organizational function to control internal and external risks associated with IT. Much effort has been put on mitigating IT risks by means of physical, procedural, and ...

2011
Wen-Hsien Tsai

The implementation team problem is one of the critical elements lead to ERP project failure. The purpose of this research is to explore the relationship between team risk factors and IT governance. The IT governance includes five important domains, that is, IT strategic alignment, IT value delivery, IT resource management, IT risk management, and IT performance management. Our research results ...

2014

Take a strip of paper with ‘once upon a time there’ written on one side and ‘was a story that began’ on the other. Twisting the paper and joining the ends produces John Barth’s story Frame-Tale, which prefixes ‘once upon a time there was a story that began’ to itself. In this paper, I argue that the possibility of understanding Frame-Tale cannot be explained by tacit knowledge of a recursive th...

2006
Andriy Panchenko Lexi Pimenidis

There are a number of attacker models in the area of anonymous communication. Most of them are either very simplified or pretty abstract therefore difficult to generalize or even identify in real networks. While some papers distinct different attacker types, the usual approach is to present an anonymization technique and then to develop an attacker model for it in order to identify properties o...

Journal: :Rel. Eng. & Sys. Safety 2012
Thierry Alex Mara Stefano Tarantola

Computational models are intensively used in engineering for risk analysis or prediction of future outcomes. Uncertainty and sensitivity analyses are of great help in these purposes. Although several methods exist to perform variance-based sensitivity analysis of model output with independent inputs only a few are proposed in the literature in the case of dependent inputs. This is explained by ...

ژورنال: :فناوری آموزش 0
زهرا حسینی استادیار، دکترای تکنولوژی آموزشی، دانشکده روانشناسی وعلوم تربیتی. دانشکده روانشناسی و علوم تربیتی دانشگاه آزاد اسلامی واحد تهران جنوب

پژوهش حاضر با هدف تعیین اثر استفاده از الگوی سازنده گرایی بر دانش تلفیق تکنولوژی دانشجومعلمان انجام شد. دانش تکنولوژیکی پداگوژیکی محتوا (tpack) به عنوان یک چارچوب مطالعه و اندازه­گیری دانش تلفیق تکنولوژی انتخاب شد. نمونه پژوهشی شامل 22 معلم دانشجومعلم دوره کارشناسی تکنولوژی آموزشی دانشگاه آزاد اسلامی بودند که از میان 174 دانشجویی که در سال تحصیلی 1393-1394 در این رشته مشغول به تحصیل بودند به رو...

2016
Panagiotis Koutsouras Sarah Martindale Andy Crabtree

In recent years, we have experienced the proliferation of videogames that have, as their main mode of play, the creation of in-game content. Even though existing literature has looked into various characteristics of these games, one of their aspects that warrants further exploration is the monetisation practices that can emerge in their context. Through our ongoing ethnographic study, we became...

Journal: :J. of Management Information Systems 1991
R. Kelly Rainer Charles A. Snyder Houston H. Carr

As Information Technology (IT) has become increasingly important to the competitive position of firms, managers have grown more sensitive to their organization's overall IT risk management. Recent publicity concerning losses incurred by companies becauseofproblcms with their sophisticated information systems has focused attention on the importance of these systems to the organization. In an att...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید