首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Abstract

Because of changes in the work environment, motivating MIS personnel has become more challenging to both MIS managers and CIOs. Although studies show that most of these employees (with the exception of maintenance personnel) enjoy their work, MIS managers still need to improve elements of their staffs' jobs (e.g., salary and opportunity for advancement) to maintain the quality of their staffs' work. To show how the task of motivating MIS personnel has changed, the author presents some results from his research on motivation factors of MIS professionals.  相似文献   

2.
3.
Today's chief information officers (CIOs) are faced with several difficult tasks — meeting the changing technological needs of the MIS department, developing an efficient staff, and establishing themselves as knowledgeable executives with an important role in MIS and corporate management. This article presents the results of a survey of current CIOs, who described how they are managing their staffs, themselves, and the changing work load of the MIS department.  相似文献   

4.
叙述了MIS在厦门市轮渡公司的人事和月票管理中的实践和应用。首先从系统的组成、基本原理、基本功能阐述了MIS在人事管理中的实践 ,并取得既方便又快捷、且准确的效果 ;然后通过对轮渡TM卡的构成、基本功能、应用效果进行了阐述 ,证明了TM卡最适用于轮渡作为月票使用。在当今社会 ,MIS已成为现代企业不可缺少的组成部分 ,是企业升级的重要标志。  相似文献   

5.
Motivating staff     
《Data Processing》1984,26(9):17-19
Man management is as important a skill as technical ability for a departmental manager. It is useful to know about the various theories of motivation which have been put forward this century to help run a productive, happy department. From ‘scientific management’, theorists have progressed to consider the needs of people as important factors in their motivation to work. This goes far beyond financial gain, encompassing the need for social acceptance and selfactualization.  相似文献   

6.
介绍了系统的开发过程,说明了PowerDesignex建立数据模型的流程,着重说明了如何利用PowerDesigner中的CDM/PDM建立概念模型和物理模型.以SQL Server为数据库管理系统,采用B/S模式架构,以ASP.NET 2.0为核心并依据Web标准,采用DIV+CSS技术,用C#语言实现了该系统.该系统能满足不同时域、地域下进修人员与系统管理员之间交互的需要,极大地提高对高校进修人员管理工作的效率和质量,使高校的信息化建设更加完善.  相似文献   

7.
You've heard from me in this space before, but this is my first column as IEEE Security & Privacy's editor in chief. I feel both honored and privileged to have the opportunity to assume this responsibility. George Cybenko, as both the driving force behind the magazine's creation and its EIC for the first four years, is a hard act to follow. But because he created such a strong base for the magazine, I'm hoping it won't be a difficult act to continue. You can expect the mix of articles, departments, and special issues on current topics to continue. You'll see some new names in the masthead as we replace those rotating off the editorial board; this is a normal process for all IEEE publications. We'll continue to strive for fresh and interesting material to keep you at the forefront of technology and issues in security and privacy.  相似文献   

8.
The increasing number of computer-literate users in an organization is making the MIS staffs need to foster better interpersonal communication with end-users more apparent. MIS must ensure that effective communication channels are established with all areas of the organization to supply the timely information needed to solve business problems.  相似文献   

9.
The increasing number of computer-literate users in an organization is making the MIS staffs need to foster better interpersonal communication with end-users more apparent. MIS must ensure that effective communication channels are established with all areas of the organization to supply the timely information needed to solve business problems.  相似文献   

10.
Pedagogical agents can provide important support for the user in human–computer interaction systems. This paper examines whether a supplementary, motivating agent in a print tutorial can enhance student motivation and learning in software training. The agent served the role of motivator, attending the students to issues of task relevance and self-efficacy. The agent was presented in the tutorial by means of images and written messages. An experiment compared the agent condition with a no-agent (control) condition. Participants were 49 students (mean age 11.3 years) from the upper grades of elementary school. Data on motivation and learning were gathered before, during and after training. The findings revealed that students in the agent condition did significantly better on skills measures during and after training (i.e., performance indicators, posttest, and retention test). In addition, marginally significant differences favoring these students were found for flow experience during training and for motivational gains on task relevance and self-efficacy after training. The design strategies of the motivating agent are considered relevant for the creation of Animated Pedagogical Agents.  相似文献   

11.
《办公自动化》2011,(17):33
<正>欧洲规模最大的消费类电子展会——2011年德国柏林国际消费电子展媒体发布会于8月31日举行,西门子、松下、索尼等行业巨头均提前公布了各自的新产品。日本商业巨头索尼公布了秋季新品目录,其中包括两款运用安卓系统的平板电脑,分别为S款和P款。其中S款是9.4英寸的常规平板电脑,而P款则是由两块触控屏组成折叠屏幕的双屏电脑,每块屏幕大小为5.5英寸,可以单独运行也可以一起运行,还可以像笔记  相似文献   

12.
It is a great honor and privilege for me to serve as the Editor-in-Chief of IEEE Computational Intelligence Magazine (CIM). I would like to take this opportunity to thank the Administrative Committee (ADCOM) and the Executive Committee (EXCOM) of IEEE Computational Intelligence Society (CIS), particularly David B. Fogel and Xin Yao, for supporting my appointment. My deep appreciation also goes to the founding Editor-in-Chief of CIM, Gary G. Yen, for his unconditional support during the period of transition. I look forward to his continued contributions to the magazine in his new capacity as the IEEE CIS President.  相似文献   

13.
管理信息系统的多课程融合教学探讨   总被引:3,自引:0,他引:3  
本文分析了高职高专学生学习管理信息系统面临的问题,提出多课程融合的教学方法,介绍该方法的实施方案,收到良好的教学效果。  相似文献   

14.
15.
运营管理面临下一代网络新挑战   总被引:1,自引:0,他引:1  
相对传统电信网络而言.下一代网络在实现技术和组网模式上具有许多新的特点。而在下一代网络从技术研究向实验试商用阶段过渡的过程中,这些新特点对传统运营商的网络运营管理也提出了新的要求,并且其重要性将在下一代网络大规模商用的过程中进一步显现出来。  相似文献   

16.
17.
The emergence of a larger spectrum of threats – terrorism, sabotage, local conflicts, political unrest, and natural disasters – combined with the growing globalisation of economic activities, makes networks highly vulnerable. Rethinking national vulnerabilities requires the creation and the improvement of long‐term public‐private partnerships. This article discusses the US Presidential initiative launched in 1996 –the first initiative world wide to put these issues on the top‐level agenda– as well as the national structure of developed partnerships. It might constitute a starting point for other countries to develop their own national strategy, adapting it of course to their own national particularities. Terrorist attacks in 2001 show, however, that such an initiative is nothing but a first step in a general process to build preparedness nation wide; America still remains highly vulnerable. I conclude with a few myths that must be confronted to deal more efficiently with these new large‐scale risks at an international level.  相似文献   

18.
Whitaker  K. 《Computer》1997,30(1):126-128
Addresses the needs of those who are responsible for managing or leading computing professionals. This article is about motivating and rewarding software developers. This is especially difficult in a competitive job market that emphasizes high salaries and multiple opportunities for each software developer. Two important issues you need to handle are: making certain that developers understand their roles; and keeping developers happy, using either rewards or incentives. Management usually reacts to a wave of departing developers rather than proactively doing the right things to make certain that developers don't even think about leaving. Do the right thing now. To motivate and keep developers: (1) define a product delivery process and clear roles; (2) reward-don't use incentives; (3) set goals and make career plans on a regular basis; and (4) compensate to keep people  相似文献   

19.
We argue that formal analysis tools for security protocols are not achieving their full potential, and give only limited aid to designers of more complex modern protocols, protocols in constrained environments, and security APIs. We believe that typical assumptions such as perfect encryption can and must be relaxed, while other threats, including the partial leakage of information, must be considered if formal tools are to continue to be useful and gain widespread, real world utilisation. Using simple example protocols, we illustrate a number of attacks that are vital to avoid in security API design, but that have yet to be modelled using a formal analysis tool. We seek to extract the basic ideas behind these attacks and package them into a wish list of functionality for future research and tool development.  相似文献   

20.
基于Intranet的MIS   总被引:9,自引:0,他引:9  
在分析了Intranet的优点及传统MIS的问题后,本文对基于Intranet的MIS进行了描述,并对基于Intranet的MIS的实施方法进行了讨论。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号