713 research outputs found

    The Evolution of Information Technology Management

    Get PDF
    Information technology (IT) management methods are changing with time. The main methodological shifts can be observed in management authority and responsibility distribution within a company. Four characteristic stages are spontaneous responsibility delegation stage, monopoly over information stage, business within business stage, and the stage of information economy. However, some serious dilemmas regarding the future of IT management remain

    The Evolution of Information Technology

    Full text link
    http://deepblue.lib.umich.edu/bitstream/2027.42/88236/1/2003_Computers_4.0_2.pd

    The Evolution of Information Technology

    Full text link
    http://deepblue.lib.umich.edu/bitstream/2027.42/88235/1/2000_Computers_2.pd

    The Evolution of Information Technology

    Full text link
    http://deepblue.lib.umich.edu/bitstream/2027.42/88237/1/2005_Computers_4.0.pd

    DATA WAREHOUSE AND BUSINESS INTELLIGENCE STRATEGIES AND TRENDS

    Get PDF
    In recent decades following the evolution of information technology, decision support systems have played an important role by presenting the necessary information resulted from the operational systems processes. By continuing improvement of the methods as well as the contribution of technological advance the applicability of decision support systems is now generalized and has reached the status of complex systems of business intelligence. Business Intelligence is about creating intelligence about a business based on a cyclic flow which consists of capturing, analyzing, planning and implementation resulting in streamlining the organization.Decisions, DSS, Data Driven, Business Intelligence, Data Warehouse

    Aspects of a Watermark Solution

    Get PDF
    Although watermarking is a relatively new technology, there are many ways of applying it on an electronic data set with the purpose of ensuring copyright integrity and authenticity of the electronic data. But, bearing in mind the evolution of information technology and of communication, a watermark may be the target of several attacks which aim at its robustness, its form and even at its removal. In order to reduce these threats, this paper proposes a solution - digital watermarking completed by a hash function which has an important role in the authenticity of the content of a message and in the security of the transmission of this message through computer networks which are the main support of collaborative systems.Digital Watermarking, Hash Functions, Digital Information Security, Collaborative Systems

    Accounting Information Systems: Ethics, Fraudulent Behavior, and Preventative Measures

    Get PDF
    Most business organizations have implemented Accounting Information Systems to improve efficiency and to help optimize use of company resources. The evolution of Information Technology within financial and accounting processes has brought new ethical issues, forms of fraudulent behavior, and mechanisms to prevent compromising confidential, sensitive, and personal information. This investigation focuses on the evolution of Accounting Information Systems and their controls for limiting fraud and misconduct in financial and accounting processes
    • …
    corecore