共查询到20条相似文献,搜索用时 15 毫秒
1.
核电工程管理信息资源规划问题研究 总被引:5,自引:0,他引:5
根据广东核电一核、二核工程建设过程中信息系统不健全“信息孤岛”现象严重的问题,以信息资源规划理论为基础,对核电工程管理信息资源规划技术进行研究,提出业务梳理、用户视图规范化、数据流分析、系统功能建模、数据库设计标准化等过程和方法,旨在以信息资源规划为基础,建立统一的、标准的、完善的工程管理信息系统,确保广东核电三核、四核工程以及其他核电工程建设的质量控制、进度控制和投资控制。 相似文献
2.
Knowledge Management Research & Practice - Information and knowledge have been cited over the last two decades as competitive advantage tools. Recently, the use of them has been discussed to... 相似文献
3.
This paper reviews the application of computer-based information systems for manufacturing, which has found a lack of strategic orientation. Critical factors for a strategic-oriented information system, i.e. external information scanning, data refining and information reporting, are discussed. A strategic-oriented system model that incorporates information scanning-refining-reporting into manufacturing automation and control systems is proposed. A case study of a corporate strategic information processing system in a UK company is explored. Limitations of the study and suggestions for future research are made. 相似文献
4.
James V. Hansen Lynn J. McKell Lester E. Heitger 《Information processing & management》1977,13(4):215-225
Despite the rapid growth in the use of computers in organizations, few of the resulting systems have had a significant impact on the way in which management makes decisions. Frameworks are needed which aid in understanding the structure of management information systems, toward providing focus and improving the effectiveness of systems efforts.This paper surveys recent conceptual and empirical work related to development of decision-oriented frameworks for management information systems design, particularly as related to the improving the management of organizations. 相似文献
5.
Organizations adopt sophisticated management information systems, which provide top managers with an ample range of information to achieve multiple strategic performances. However, organizations differ in the extent to which they improve their performance. This paper analyzes the role of top management team in the relationship between management information systems and strategic performance. Using data collected from 92 top management teams, it analyses how different team compositions interact with a sophisticated management information system, and how this interaction affects strategic performances, which are focused on cost reduction and flexibility. The findings show how the effect of management information system on strategic performance (focused on flexibility) is moderated by top management team diversity. 相似文献
6.
结合当前医院信息化管理进程,对医院的业务系统进行深入分析研究,归纳医院住院管理系统的业务流程,提出医院住院系统的设计思想,从功能模块、关键技术等角度给出医院住院系统的具体实现。 相似文献
7.
The main objectives of this research were to compare and contrast the findings of the relationships among different stages of information systems (IS) strategic planning, system planning, plan implementation, and IS effectiveness across various organizations in Taiwan. The intent was to take a broad look at the key concerns of IS planning across cultures. The relationships among three phases of planning (strategic planning, systems planning, and plan implementation), and their relationships with user satisfaction were examined. Five hypotheses are used to examine the relationships. The correlation analysis results support the following hypotheses: (1) the extent of IS systems planning is positively associated with the extent of IS strategic planning; (2) the extent of plan implementation is positively associated with the extent of IS systems planning; and (3) the extent of IS strategic planning is positively associated with the extent of user satisfaction. IS systems planning has no effect on user satisfaction. IS plan implementation has no relationship with user satisfaction. 相似文献
8.
在中大型信息系统中都要进行用户管理以及用户权限管理,本文将给出设计通用用户安全管理设计思路,并给出设计成功的关键流程及应用实例。 相似文献
9.
Measuring effectiveness of information retrieval (IR) systems is essential for research and development and for monitoring search quality in dynamic environments. In this study, we employ new methods for automatic ranking of retrieval systems. In these methods, we merge the retrieval results of multiple systems using various data fusion algorithms, use the top-ranked documents in the merged result as the “(pseudo) relevant documents,” and employ these documents to evaluate and rank the systems. Experiments using Text REtrieval Conference (TREC) data provide statistically significant strong correlations with human-based assessments of the same systems. We hypothesize that the selection of systems that would return documents different from the majority could eliminate the ordinary systems from data fusion and provide better discrimination among the documents and systems. This could improve the effectiveness of automatic ranking. Based on this intuition, we introduce a new method for the selection of systems to be used for data fusion. For this purpose, we use the bias concept that measures the deviation of a system from the norm or majority and employ the systems with higher bias in the data fusion process. This approach provides even higher correlations with the human-based results. We demonstrate that our approach outperforms the previously proposed automatic ranking methods. 相似文献
10.
随着当前土地利用总体规划调整完善工作的完成,采用地理信息系统和国土资源空间数据一体化等现代技术对历史和当前产生的土地利用规划成果数据进行管理,对国土资源管理部门传统的规划业务工作模式进行改造已成为大势所趋。文章以国土资源管理部门的土地规划业务工作为研究对象,介绍了基于异构空间数据集成和国土资源空间数据一体化技术,整合GIS和MIS开发技术的土地规划协同管理信息系统开发的设计及功能结构、数据库等方面的系统设计。 相似文献
11.
《International Journal of Information Management》2017,37(5):417-430
Organizations face significant challenges in capturing value from their investments in strategic information systems such as enterprise systems (ES). Managers are a powerful source of influence shaping the post-adoption attitudes and behaviors of users and the success of ES. However, the extant IS literature has focused primarily on the role of top management and theoretical explanations of the role of supervisors in fostering continuing usage of ES are lacking. Drawing on transformational leadership theory and the IS continuance (ISC) model, this paper conceptualizes a theoretical model differentiating the influence mechanisms through which different types of leadership behaviors influence the success of ES. Data collected from 192 users of ES confirms our theorization. We find that transformational leadership behaviors of supervisors influence users’ evaluations of satisfaction and perceived usefulness, while their transactional leadership behaviors influence users’ ES continuance intention by moderating the effects of user satisfaction and perceived usefulness on ES continuance intention. This study advances research on the role of leadership behaviors of supervisors in capturing value from enterprise systems. The research also contributes to practice by suggesting effective strategies for promoting continued usage of mission critical systems such as enterprise systems and delivering value from firms’ IT investments. 相似文献
12.
Jaka Lindi?Author VitaePeter BalohAuthor Vitae Vincent M. RibièreAuthor Vitae 《International Journal of Information Management》2011,31(2):183-188
Organizations must innovate if they are to survive in today's fiercely competitive marketplace. In this paper, we explore how leading organizations are using emerging technologies to enable novel forms of ideation that can radically increase the sheer volume of ideas they explore. In addition, we outline how organizations use technologies to cost effectively manage this increased volume of ideas by optimizing generation, mobilization, advocacy and screening, experimentation, commercialization, and even the diffusion and implementation of ideas. Critical to this is the management of knowledge during the innovation process. 相似文献
13.
《International Journal of Information Management》2014,34(2):191-199
This paper presents a model to analyse the different outcomes generated by the application of Task-Technology Fit (TTF) theory to economic and financial information management in university departments. This model extends that proposed by Goodhue (1995), in two ways: (i) a key role is played by the manager in designing the technology and in performing the task in question. Both of these aspects can be modified, depending on the evaluation made of a series of characteristics (or dimensions) inherent to the model. (ii) The free dissemination of the source code of the application not only allows the transfer of knowledge, but also creates virtual communities which, through collaborative work and the exchange of experiences, can achieve a better fit of the technology to the task at hand. This model has been introduced in several departments at the University of Granada (Spain), and evaluated in terms of the results obtained at both individual and group levels. This evaluation was conducted by means of in-depth interviews with departmental managers. 相似文献
14.
Documents circulating in paper form are increasingly being substituted by its electronic equivalent in the modern office today so that any stored document can be retrieved whenever needed later on. The office worker is already burdened with information overload, so effective and efficient retrieval facilities become an important factor affecting worker productivity. This paper first reviews the features of current document management systems with varying facilities to manage, store and retrieve either reference to documents or whole documents. Information retrieval databases, groupware products and workflow management systems are presented as developments to handle different needs, together with the underlying concepts of knowledge management. The two problems of worker finiteness and worker ignorance remain outstanding, as they are only partially addressed by the above-mentioned systems. The solution lies in a shift away from pull technology where the user has to actively initiate the request for information towards push technology, where available information is automatically delivered without user intervention. Intelligent information retrieval agents are presented as a solution together with a marketing scenario of how they can be introduced. 相似文献
15.
Ricardo Colomo-Palacios Ángel García-Crespo Pedro Soto-Acosta Marcos Ruano-Mayoral Diego Jiménez-López 《International Journal of Information Management》2010
It is evident that companies and research centres can find a myriad of instruments to fund their R&D (Research & Development) activities. Due to the dynamics of the information management in these circumstances there is a need for intermediary businesses intervention. Consequently, intermediary companies are thus involved in a complex process that needs to be managed and controlled. Within this scenario an Information Technology (IT) platform, named RDi-Advise, was developed by EgeoIT using semantic technologies to support R&D process decisions. This case analysis describes the development and implementation of the platform including the lessons learned during the activity period. 相似文献
16.
In this case study, a collaborative risk method for information security management has been analyzed considering the common problems encountered during the implementation of ISO standards in eight Turkish public organizations. This proposed risk method has been applied within different public organizations and it has been demonstrated to be effective and problem-free. The fundamental issue is that there is no legislation that regulates the information security liabilities of the public organizations in Turkey. The findings and lessons learned presented in this case provide useful insights for practitioners when implementing information security management projects in other international public sector organizations. 相似文献
17.
《International Journal of Information Management》2014,34(6):733-740
Because of the evolution and widespread use of the Internet, organisations are becoming more susceptible to attacks on Information Technology Systems. These attacks result in data losses and alterations, and impact services and business operations. Therefore, to minimise these potential failures, this paper presents an approach to information security risk management, encompassing Failure Mode and Effects Analysis (FMEA) and fuzzy theory. This approach analyses five dimensions of information security: access to information and systems, communication security, infrastructure, security management and secure information systems development. To illustrate the proposed model, it was applied to a University Research Group project. The results show that the most important aspects of information security risk are communication security, followed by infrastructure. 相似文献
18.
Utpal Bose 《Ethics and Information Technology》2012,14(1):17-26
As business environments become more complex and reliant on information systems, the decisions made by managers affect a growing number of stakeholders. This paper proposes a framework based on the application of normative theories in business ethics to facilitate the evaluation of IS related ethical dilemmas and arrive at fair and consistent decisions. The framework is applied in the context of an information privacy dilemma to demonstrate the decision making process. The ethical dilemma is analyzed using each one of the three normative theories—the stockholder theory, stakeholder theory, and social contract theory. The challenges associated with the application of these theories are also discussed. 相似文献
19.
20.
Ebru Yeniman Yildirim Gizem Akalp 《International Journal of Information Management》2011,31(4):360-365
The aims of the study were to examine enterprise information security in small and medium-sized enterprises (SMEs) in Bursa, Turkey and to compare the results with similar data gathered from different countries. This study was conducted through questionnaires consisting of 49 questions grouped into 9 sections. The questionnaires were delivered to 97 SMEs in Bursa, Turkey. The companies have been operating for 15.93 ± 11.67 (2-54) years. The number of PCs in the companies and their years of use were in the ranges of 53.51 ± 64.88 (2-240) and 12.47 ± 6.32 (1-30) years, respectively. According to the findings of this study, it can be speculated that when Communications and Operations Management and security policy improve, other security parameters in the companies, such as Organizational, Personnel and Physical and Environmental Securities improve as well. In addition, the results have shown that Turkish companies do not attach as much importance to information technology security as their counterpart companies from different countries do. 相似文献