Business & Management

Business Information Systems

Per Page:
Sort:

Critical Success Factors Simplified: Implementing the Powerful Drivers of Dramatic Business Improvement

Marvin T. Howell
November 20, 2009

Critical-to-success factors (CSFs) have become essential elements to strategic planning and no business can achieve consistent success without effectively adopting them. To take full advantage of CSFs, however, an organization must first understand what they are and how they can be used to drive...

Building an Enterprise-Wide Business Continuity Program

Kelley Okolita
August 26, 2009

If you had to evacuate from your building right now and were told you couldn’t get back in for two weeks, would you know what to do to ensure your business continues to operate? Would your staff? Would every person who works for your organization? Increasing threats to business operations, both...

Measuring and Improving Performance: Information Technology Applications in Lean Systems

James William Martin
August 26, 2009

As a pioneer in Lean improvement methods, Jim Martin was among the first to suggest that truly successful Lean initiatives are those applied across every facet of an organization, not just on the shop floor. Building on this concept, Martin demonstrates that one of the most effective ways to...

Mobile Enterprise Transition and Management

Bhuvan Unhelkar
June 25, 2009

Coupled with the Internet, mobile technology is rapidly moving us from the information age into the age of boundless communication. However, the success of today’s cutting-edge mobile technologies will not be determined merely by their new features. Rather, the way in which you integrate these...

HOWTO Secure and Audit Oracle 10g and 11g

Ron Ben-Natan
March 10, 2009

Oracle is the number one database engine in use today. The fact that it is the choice of military organizations and agencies around the world is part of the company’s legacy and is evident in the product. Oracle has more security-related functions, products, and tools than almost any other database...

The Effective CIO: How to Achieve Outstanding Success through Strategic Alignment, Financial Management, and IT Governance

Eric J. Brown, William A. Yarberry, Jr.
December 23, 2008

In a business world of uncertain budgets, relentless technology changes, scarce management talent, and intense production demands, theory is good, but practice sells. The Effective CIO: How to Achieve Outstanding Success through Strategic Alignment, Financial Management, and IT Governance is...

How to Complete a Risk Assessment in 5 Days or Less

Thomas R. Peltier
November 18, 2008

Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environment. But just because a threat exists does not mean that your organization is at risk. This is what risk assessment is all about. How to Complete a...

IT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement

Dimitris N. Chorafas
October 29, 2008

Information technology auditing and Sarbanes-Oxley compliance have several overlapping characteristics. They both require ethical accounting practices, focused auditing activities, a functioning system of internal control, and a close watch by the board’s audit committee and CEO. Written as a...

Knowledge Retention: Strategies and Solutions

Jay Liebowitz
August 14, 2008

As baby boomers approach retirement age and the work patterns of younger workers constantly change, many organizations worldwide are experiencing a far-reaching knowledge bleed.  Therefore, it is imperative that organizations find ways to best leverage and retain that vital knowledge before workers...

Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet

Ken Dunham, Jim Melnick
August 06, 2008

Originally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft. Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet explores the rise...

Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition

Marlin B. Pohlman
April 09, 2008

In today’s competitive marketplace with its focus on profit, maintaining integrity can often be a challenge. Further complicating this challenge is the fact that those assigned to the task of assuring accountability within an organization often have little, if any, visibility into the inner...

The Business Value of IT: Managing Risks, Optimizing Performance and Measuring Results

Michael D. S. Harris, David Herron, Stasia Iwanicki
March 17, 2008

In order to maximize IT resources and justify IT expenditures, CIO’s and other IT managers must be able to identify meaningful metrics and explain them in a way that management can understand. The Business Value of IT: Managing Risks, Optimizing Performance, and Measuring Results...

Conferences

Year: