Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-10 of 10
Keywords: Project management
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Earned value management in a data warehouse project
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2006) 14 (1): 37–50.
Published: 01 January 2006
...J. Art Gowan; Richard G. Mathieu; Mark B. Hey Purpose Sets out to examine earned value management (EVM), a project management technique that relates resource planning to schedules, technical costs and schedule requirements. Design/methodology/approach Provides an example of how EVM can...
Journal Articles
Dynamic risk management system for the modeling, optimal adaptation and implementation of an ERP system
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2005) 13 (3): 212–234.
Published: 01 July 2005
.... With the use of these platforms, the application becomes dynamic and accessible via a network. The system consists of three sub‐systems: the risk management system, the data management system and the database system. As mentioned before, the application will support three groups of users: project manager...
Journal Articles
A conceptual model for enterprise resource planning (ERP)
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2005) 13 (2): 144–155.
Published: 01 April 2005
...Carl Marnewick; Lessing Labuschagne Purpose This article seeks to provide a conceptual model that explains the complexity of an enterprise resource planning (ERP) system to general and project managers in a non‐technical manner that is easily understood. Design/methodology/approach The 4Ps...
Journal Articles
Information technology project failures: Applying the bandit problem to evaluate managerial decision making
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2005) 13 (2): 135–143.
Published: 01 April 2005
... are in accordance with the predictions of bandit process studies. Findings Bandits are a class of decision‐making problems that involve choosing one action from a set. In terms of project management, the firm selects from several alternative IT projects, each with its own distribution of risks and rewards...
Journal Articles
Goal directed project management methodology for the support of ERP implementation and optimal adaptation procedure
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2005) 13 (1): 55–71.
Published: 01 February 2005
... This paper presents a fundamental methodology based on goal directed project management (GDPM) principles which supports the complicated process of implementation and optimal adaptation (IOA) of an ERP system. Findings By implementing this methodology it was found that it is able to control and reduce...
Journal Articles
What went wrong? Unsuccessful information technology projects
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1999) 7 (1): 23–30.
Published: 01 March 1999
...Brenda Whittaker Information technology (IT) project management is a crucial issue for organizations today. A 1995 study in the USA found that 31 per cent of software projects will be canceled before completion, and more than half the projects will cost an average of 189 per cent of the original...
Journal Articles
KPMG survey: the IT outsourcing decision
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1997) 5 (4): 126–132.
Published: 01 October 1997
... Outsourcing Project management Skills Information technology has been touted endlessly as the great saviour of productivity and the huge investments in it (it now constitutes roughly 40 per cent of all capital investment in the developed world) have been expected to show a significant...
Journal Articles
Managing for demonstrably effective IT projects
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1997) 5 (4): 133–137.
Published: 01 October 1997
... and after a project. Business strategy Information technology strategy Project management Systems development The total context in which IT delivers business value can be viewed in three levels: top level related to the alignment of business IT strategy; next level concerns...
Journal Articles
The death of ROI: re‐thinking IT value measurement
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1997) 5 (3): 90–92.
Published: 01 August 1997
..., routers and hubs current. © MCB UP Limited 1997 Appropriate technology Information resources Information technology strategy Project management Return on investment Value In today’s don’t‐blame‐me, blame‐my‐metrics world of non‐accountability, one receives little argument when...
Journal Articles
Practical management of programme risk: the case of the National Strategy for Police Information Systems for England and Wales
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1996) 4 (5): 24–33.
Published: 01 December 1996
... and that the case may interest other programme and project managers. Policing in England and Wales is a highly complex activity. Its core businesses, crime prevention and detection, public order, community safety and partnership, traffic, and emergency response, involve a wide diversity of tasks...
