Business & Management

Business Information Systems

Per Page:
Sort:

Measuring and Improving Performance: Information Technology Applications in Lean Systems

James William Martin
August 26, 2009

As a pioneer in Lean improvement methods, Jim Martin was among the first to suggest that truly successful Lean initiatives are those applied across every facet of an organization, not just on the shop floor. Building on this concept, Martin demonstrates that one of the most effective ways to...

Mobile Enterprise Transition and Management

Bhuvan Unhelkar
June 25, 2009

Coupled with the Internet, mobile technology is rapidly moving us from the information age into the age of boundless communication. However, the success of today’s cutting-edge mobile technologies will not be determined merely by their new features. Rather, the way in which you integrate these...

HOWTO Secure and Audit Oracle 10g and 11g

Ron Ben-Natan
March 10, 2009

Oracle is the number one database engine in use today. The fact that it is the choice of military organizations and agencies around the world is part of the company’s legacy and is evident in the product. Oracle has more security-related functions, products, and tools than almost any other database...

The Effective CIO: How to Achieve Outstanding Success through Strategic Alignment, Financial Management, and IT Governance

Eric J. Brown, William A. Yarberry, Jr.
December 23, 2008

In a business world of uncertain budgets, relentless technology changes, scarce management talent, and intense production demands, theory is good, but practice sells. The Effective CIO: How to Achieve Outstanding Success through Strategic Alignment, Financial Management, and IT Governance is...

How to Complete a Risk Assessment in 5 Days or Less

Thomas R. Peltier
November 18, 2008

Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environment. But just because a threat exists does not mean that your organization is at risk. This is what risk assessment is all about. How to Complete a...

IT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement

Dimitris N. Chorafas
October 29, 2008

Information technology auditing and Sarbanes-Oxley compliance have several overlapping characteristics. They both require ethical accounting practices, focused auditing activities, a functioning system of internal control, and a close watch by the board’s audit committee and CEO. Written as a...

Knowledge Retention: Strategies and Solutions

Jay Liebowitz
August 14, 2008

As baby boomers approach retirement age and the work patterns of younger workers constantly change, many organizations worldwide are experiencing a far-reaching knowledge bleed.  Therefore, it is imperative that organizations find ways to best leverage and retain that vital knowledge before workers...

Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet

Ken Dunham, Jim Melnick
August 06, 2008

Originally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft. Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet explores the rise...

The 3-D Global Spatial Data Model: Foundation of the Spatial Data Infrastructure

Earl F. Burkholder
April 15, 2008

Traditional methods for handling spatial data are encumbered by the assumption of separate origins for horizontal and vertical measurements. Modern measurement systems operate in a 3-D spatial environment. The 3-D Global Spatial Data Model: Foundation of the Spatial Data Infrastructure offers a new...

Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition

Marlin B. Pohlman
April 09, 2008

In today’s competitive marketplace with its focus on profit, maintaining integrity can often be a challenge. Further complicating this challenge is the fact that those assigned to the task of assuring accountability within an organization often have little, if any, visibility into the inner...

The Business Value of IT: Managing Risks, Optimizing Performance and Measuring Results

Michael D. S. Harris, David Herron, Stasia Iwanicki
March 17, 2008

In order to maximize IT resources and justify IT expenditures, CIO’s and other IT managers must be able to identify meaningful metrics and explain them in a way that management can understand. The Business Value of IT: Managing Risks, Optimizing Performance, and Measuring Results...

Data Mining Methods and Applications

Kenneth D. Lawrence, Stephan Kudyba, Ronald K. Klimberg
December 22, 2007

With today’s information explosion, many organizations are now able to access a wealth of valuable data. Unfortunately, most of these organizations find they are ill-equipped to organize this information, let alone put it to work for them. Gain a Competitive Advantage Employ data mining in...

Conferences

Year: