首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
It is fast becoming evident that there are major competitive and economic advantages in implementing electronic communications capabilities, both within companies and between companies and their business partners and customers. Corporate electronic mail is one of the most far reaching strategic investments a company can make, yet it can prove to be disappointing, and even disasterous. Based on the experience of companies which have installed such systems, this paper explores key factors that are essential to the successful implementation of corporate electronic mail.  相似文献   

2.
Problems related to the creation of energy-conservation systems used in control of dynamic objects are considered, in particular, the formalization of the optimal control problem, the set of the object’s operating states, analysis and synthesis of the optimal control, techniques of increasing the efficiency of energy-conservation control systems, and the introduction and maintenance of energy-conservation control systems in the course of operation.  相似文献   

3.
Zink KJ 《Ergonomics》2005,48(5):534-546
Occupational health and safety is one of the most important topics of ergonomics. In many countries the practical issues are addressed in worker protection laws or rules and most companies have some sort of occupational health and safety system. As with many other ergonomics approaches, such activities are often necessary because of legal requirements. Such efforts are often viewed by management as primarily cost intensive. To change this image, it would be helpful to have a more positive, management-oriented approach. Corporate health management as a module of an integrated management system can fulfil this goal.  相似文献   

4.
《Ergonomics》2012,55(5):534-546
Occupational health and safety is one of the most important topics of ergonomics. In many countries the practical issues are addressed in worker protection laws or rules and most companies have some sort of occupational health and safety system. As with many other ergonomics approaches, such activities are often necessary because of legal requirements. Such efforts are often viewed by management as primarily cost intensive. To change this image, it would be helpful to have a more positive, management-oriented approach. Corporate health management as a module of an integrated management system can fulfil this goal.  相似文献   

5.
Although existing models of e-learning effectiveness in information systems (IS) have increased our understanding of how technology can support and enhance learning, most of our models do not take into account the importance of social presence. Thus, this study extends previous research by developing a model of e-learning effectiveness which adds social presence to other oft studied variables including application-specific computer self-efficacy (AS-CSE), perceived usefulness, course interaction, and e-learning effectiveness. Using data from 345 individuals, this model was validated through a field study in an introductory IS survey course. Results indicate that AS-CSE and perceived usefulness were related to course performance, course satisfaction, and course instrumentality. In addition, course interaction was related to course performance and satisfaction. Finally, social presence was related to course satisfaction and course instrumentality. Implications for research and practice are discussed.  相似文献   

6.
7.
《Data Processing》1984,26(10):17-19
There are six stages to the design and implementation of a network. The need for a network is usually prompted by a business demand or opportunity. The network manager must start by dimensioning the network before commencing design. Equipment selection, which may include the scrapping of already installed equipment, is followed by the actual implementation. The operation of the network should take account of requirements such as security and integrity. Finally, the manager must remember that performance monitoring and review is also of great importance. Datec has built up this philosophy on the basis of its own experience if building a network.  相似文献   

8.
Contemporary societies develop scepticism about the social responsibility of businesses. There are expectations that firms/corporations/industries/companies make more than just economic contributions. In the area of information technology, more and more companies recognize their responsibility to promote information security management, above and beyond the level required by law, in order to achieve/build a secure information society for daily business operations. While concepts of Corporate Social Responsibility (CSR) have been applied to a plethora of sectors/industries, information security from the aspect of CSR is still behind in both theory and practice. The purpose of this paper is to apply the concept of CSR to the practice of information security management. The paper reviews and analyzes the theoretical background (definitions) of CSR from both practice and the literature and tries to explain what socially responsible management of information security actually is.  相似文献   

9.
随着木马的猖獗,网站挂马现象日益严重。该文从实例出发,分别从服务器安全、网站文件夹安全、数据库安全和程序安全四个方面讲解了加强网站安全的基本步骤。  相似文献   

10.
11.
This work presents a hierarchical tree layout algorithm based on iterative rearrangement of subtrees. Using a greedy heuristic, all subtrees of a common parent are rearranged into a forest such that gaps between them are minimized. This heuristic is used to build a rearranged tree from bottom-up, starting with forests of the single leafs, and ending with the complete tree. Different cost measures for arrangement operations are discussed, which are based on the shape of a subtree. This shape can be characterized by the subtree’s leftmost and rightmost vertices, which determine how gapless this subtree can be combined with another one. The layout algorithm is used to display an organisational hierarchy. Such a hierarchical layout aids leadership when organisational structures are complex. In particular, it can be used to monitor the performance of organisational units undergoing change, e.g. restructuring. This improves the effectiveness of leadership instruments.  相似文献   

12.
13.

Editorial

Preface to the focus theme section: collaborative value creation in e-business management  相似文献   

14.
The paper describes an agent-based architecture developed as a part of the KSNet-approach to the knowledge logistics. This approach is targeted to timely provide an appropriate personalized knowledge for an intelligent support of decision-makers. In the KSNet-approach the problem of knowledge logistics is considered as a configuration of a network of end-users/customers, loosely coupled knowledge sources/resources, and set of tools and methods for information processing. Such network located in the information environment has been referred to as knowledge source network or “KSNet”. The paper presents this approach from the perspective of application of the mass customization idea to corporate knowledge management as a major information kernel technology of intelligent enterprises. As an example of intelligent enterprise the paper considers virtual supply network. Main ideas of the KSNet-approach are presented and the structure of the developed agents’ society is described in more detail. Main results are illustrated via a configuration case study and discussed in conclusions.  相似文献   

15.
16.
领先的网络安全解决方案提供商WatchGuardTechnologies(纳斯达克代号:WGRD)于2005年12月7日宣布,随着间谍软件和垃圾邮件对网络安全的威胁不断升级,为应对这一趋势,其统一威胁管理(U T M)设备已经集成了强大的垃圾邮件过滤和多层反间谍软件保护功能,扩展了安全功能的内容,以提供超越典型统一威胁管理(UTM)设备的更有效的安全保护。此举进一步巩固了WatchGuard在统一威胁管理(UTM)领域的领导者地位。市场调研机构ForresterResearch的研究显示,17%接受调查企业的网络已经受到间谍软件的感染。未来1年内,受感染网络的比例预计将增至25%…  相似文献   

17.
18.
19.
20.
Although effective project management is critical to the success of information technology (IT) projects, little empirical research has investigated skill requirements for IT project managers (PMs). This study addressed this gap by asking 19 practicing IT PMs to describe the skills that successful IT PMs exhibit. A semi-structured interview method known as the repertory grid (RepGrid) technique was used to elicit these skills. Nine skill categories emerged: client management, communication, general management, leadership, personal integrity, planning and control, problem solving, systems development and team development. Our study complements existing research by providing a richer understanding of several skills that were narrowly defined (client management, planning and control, and problem solving) and by introducing two new skill categories that had not been previously discussed (personal integrity and team development). Analysis of the individual RepGrids revealed four distinct ways in which study participants combined skill categories to form archetypes of effective IT PMs. We describe these four IT PM archetypes – General Manager, Problem Solver, Client Representative and Balanced Manager – and discuss how this knowledge can be useful for practitioners, researchers and educators. The paper concludes with suggestions for future research.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号