Chapter 14 References
[Home][Course
Schedule][Evaluation
Areas][Lecture Slides][Additional
Coverage][Submission
Forms]
The sites listed below are the existing
references to date. Recently submitted references are located under the new
reference submissions. All Submissions are recorded here. If there
are Duplicate submissions (of sites), all sets of comments are recorded. If the
submitter wishes to give their name, it is noted.
Site:
http://www.globalknowledge.com/ |
- This website gives you information about business training along with IT training that allows you to learn the solutions and services needed to survive in this industy.
|
Site:
http://www.dol.gov/cio/ |
- According to this website the CIO is accountable for the following: IT investments and results; limit the amount of information required from the public; report progress in restricting paperwork to that required by law or other essential need; protect the availability of the business computer systems;the integrity of business operations and the confidentiality of sensitive information. Furthermore, the CIO is also responsible for
information quality guidelines oversight and maintenance to ensure and maximize the quality, objectivity, utility, and integrity of information, including statistical information, disseminated by the business. Finally, the CIO is responsible for a lot of things. I hope he/she gets paid very well. I would not be able to sleep at night with this much responsibility on my shoulders.
|
Site:
http://www.resourcemanagement.com/ |
- they focus on many thins from client specific special projects, including exclusive research assignments. Strategic outsource usage, management and planning.
Bankruptcy prevention and recovery consulting.
Development of quality and world class client-agency partnerships.Strategic recovery management consulting.Process improvement activities, including analysis of internal operations.Recovery risk management consulting.Reengineering consulting for recovery operations.
|
Site:
http://www.nd.gov/itd/planning/doc/itarch.pdf |
- It is necessary to view state government as a single enterprise made up of entities which share common goal for public service & the management of public resources rather than induvidual organizations. Security measures must be taken to prevent unauthorized modification or deletion of critical information.
|
Site:
http://www.outsourcing.com/ |
- This site is a free source for outsourcing information, consulting and networking opportunities. The site has links to articles, advise and training.
|
Site:
http://www.loyola.edu/sellinger/isom/ |
- Systems professionals have the analytical skills and business background to utilize information technology to help business gain and sustain competitive advantage. The new information economy has created the need for a new set of managerial skills.
|
Site:
http://www.forrester.com/rb/search/results.jsp?N=71706 |
- Application Development Management (ADM) has become an integral part of the business industry. Without ADM projects fail and so does the business, which are placing great value on business applications. Business are relying on IT support in all aspects in the business enviornment, and as business have become fully reliant on business applications ADM has become much more valuable.
|
Site:
http://jitm.ubalt.edu/XVIII-1/article4.pdf |
- The website presents and interesting research exploring and understanding the issue,using focus group methodology. The results from the research suggest that there are five critical success
factors that organizations must consider.
|
Site:
http://searchcio.techtarget.com/sDefinition/0,,sid182_gci213620,00.html |
- Chief Information Officer (CIO) is a job title commonly given to the person in an enterprise responsible for the information technology and computer systems that support enterprise goals http://www.scribd.com/doc/396854/Enterprise-and-Global-Management-of-Information-Technology
|
|