Listing 1 - 10 of 174 | << page >> |
Sort by
|
Choose an application
The overall mission of this book is to provide a comprehensive understanding and coverage of the various theories and models used in IS research. Specifically, it aims to focus on the following key objectives: To describe the various theories and models applicable to studying IS/IT management issues. To outline and describe, for each of the various theories and models, independent and dependent constructs, reference discipline/originating area, originating author(s), seminal articles, level of analysis (i.e. firm, individual, industry) and links with other theories. To provide a critical review/meta-analysis of IS/IT management articles that have used a particular theory/model. To discuss how a theory can be used to better understand how information systems can be effectively deployed in today's digital world. This book contributes to our understanding of a number of theories and models. The theoretical contribution of this book is that it analyzes and synthesizes the relevant literature in order to enhance knowledge of IS theories and models from various perspectives. To cater to the information needs of a diverse spectrum of readers, this book is structured into two volumes, with each volume further broken down into two sections. The first section of Volume 1 presents detailed descriptions of a set of theories centered around the IS lifecycle, including the Success Model, Technology Acceptance Model, User Resistance Theories, and four others. The second section of Volume 1 contains strategic and economic theories, including a Resource-Based View, Theory of Slack Resources, Portfolio Theory, Discrepancy Theory Models, and eleven others. The first section of Volume 2 concerns socio-psychological theories. These include Personal Construct Theory, Psychological Ownership, Transactive Memory, Language-Action Approach, and nine others. The second section of Volume 2 deals with methodological theories, including Critical Realism, Grounded Theory, Narrative Inquiry, Work System Method, and four others. Together, these theories provide a rich tapestry of knowledge around the use of theory in IS research. Since most of these theories are from contributing disciplines, they provide a window into the world of external thought leadership.
Choose an application
The overall mission of this book is to provide a comprehensive understanding and coverage of the various theories and models used in IS research. Specifically, it aims to focus on the following key objectives: To describe the various theories and models applicable to studying IS/IT management issues. To outline and describe, for each of the various theories and models, independent and dependent constructs, reference discipline/originating area, originating author(s), seminal articles, level of analysis (i.e. firm, individual, industry) and links with other theories. To provide a critical review/meta-analysis of IS/IT management articles that have used a particular theory/model. To discuss how a theory can be used to better understand how information systems can be effectively deployed in today's digital world. This book contributes to our understanding of a number of theories and models. The theoretical contribution of this book is that it analyzes and synthesizes the relevant literature in order to enhance knowledge of IS theories and models from various perspectives. To cater to the information needs of a diverse spectrum of readers, this book is structured into two volumes, with each volume further broken down into two sections. The first section of Volume 1 presents detailed descriptions of a set of theories centered around the IS lifecycle, including the Success Model, Technology Acceptance Model, User Resistance Theories, and four others. The second section of Volume 1 contains strategic and economic theories, including a Resource-Based View, Theory of Slack Resources, Portfolio Theory, Discrepancy Theory Models, and eleven others. The first section of Volume 2 concerns socio-psychological theories. These include Personal Construct Theory, Psychological Ownership, Transactive Memory, Language-Action Approach, and nine others. The second section of Volume 2 deals with methodological theories, including Critical Realism, Grounded Theory, Narrative Inquiry, Work System Method, and four others. Together, these theories provide a rich tapestry of knowledge around the use of theory in IS research. Since most of these theories are from contributing disciplines, they provide a window into the world of external thought leadership.
Choose an application
The International Conference on Information Engineering and Applications (IEA) 2011 will be held on October 21-24, 2011, in Chongqing, China. It is organized by Chongqing Normal University, Chongqing University, Shanghai Jiao Tong University, Nanyang Technological University, the University of Michigan, Chongqing University of Arts and Sciences, and sponsored by the National Natural Science Foundation of China. The objective of IEA 2011 is to facilitate an exchange of information on best practices for the latest research advances in the area of information engineering and intelligence applications, which mainly includes computer science and engineering, informatics, communications and control, electrical engineering, information computing, business intelligence and management. IEA 2011 will provide a forum for engineers and scientists in academia, industry, and government to address the most innovative research and development including technical challenges, social and economic issues, and to present and discuss their ideas, results, work in progress and experience in all aspects of advanced information and business intelligence. The conference scope will place emphases on original work on identifying new research and development challenges and developing new techniques and algorithms in information and business intelligence. Original research papers in information and business intelligence on new theories, methods, algorithms, experimental and applied researches are solicited. Authors will be invited to submit complete unpublished papers, which are not under review in any other conference or journal. All tracks are open to both research and industry contributions. The accepted papers will be collected into two volumes of proceedings.
Choose an application
Information Strategy Design and Practices illustrates approaches for designing and implementing information strategy. While it gives details of different theoretical concepts related to information strategy, it also provides live examples from different corporations as to how project goals can be achieved through effective information strategy. The book also illustrates people focused' frameworks that can be used for designing and implementing IS. It also demonstrates different approaches that would be of interest to practitioners. The book has power point presentations for instructors which can be obtained from Springer.com.
Choose an application
Choose an application
Choose an application
Choose an application
Choose an application
Business policy --- ICT (informatie- en communicatietechnieken) --- kennismanagement --- projectmanagement
Choose an application
WiFi --- Mobiele telefoon --- Straling --- Gezondheidsopvoeding --- Onderwijs --- School (instelling) --- ICT
Listing 1 - 10 of 174 | << page >> |
Sort by
|