999 resultados para Decisões de investimentos em sistemas e tecnologia da informação


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The change in the economic world and the emergence of Internet as a tool for communication and integration among the markets have forced organizations to adopt a different structure, process-oriented with a focus on information management. Thus, information technology has gained prominence in the organizational context, increasing its complexity and range of services provided by this function. Moreover, outsourcing has become an important model for flexible corporate structure, helping organizations to achieve better results when carrying out their activities and processes and be more competitive. To make the IT outsourcing, it is necessary to follow certain steps that range from strategic assessment to the management of outsourced service. Such steps can influence the form of contracting services, varying the types of service providers and contractors. Thus, the study aimed to identify how this IT outsourcing process influences the use of models for contracting services. For this, a study was conducted in multiple cases study involving two companies in Rio Grande do Norte State, specifically the health sector. Data collection was carried out with the CIOs of the companies surveyed through semi-structured interviews. According to the results obtained, it was found that the outsourcing process more structured influences the use of a more advanced contracting model. However, there are features found in these steps carrying more clearly this influence, as the goals pursued by outsourcing, the criteria used in selecting the supplier, a contract negotiation, how to transition services and the use of methods management, but can vary depending on the level of maturity in the relationship of the companies examined. Moreover, it was found that the use of contracting model may also influence how it is developed the IT outsourcing process, requiring or not its more formalized and organization

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study aims to understand the general model of governance of information technology adopted by telecommunication companies operating in Rio Grande do Norte. The research methodology used involved a theoretical and empirical approach prepared, involving two case studies on companies in the telecommunications industry working in the state of Rio Grande do Norte. The study covered the area of IT organizations, through interviews with managers responsible for the area of Telecommunications / IT. To study in accordance with the approach and address the problem of research, this study was based on qualitative criteria, which enabled the understanding of how companies adopt the governance of information technology. In conclusion, it was found that the governance practices of information technology employees are incipient, but that meet the needs of business and that they intend to implement in specific areas and use other practices of IT governance

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Information is one of the most valuable organization s assets, mainly on a global and highly competitive world. On this scenery there are two antagonists forces: on one side, organizations struggle for keeping protected its information, specially those considered as strategic, on the other side, the invaders, leaded by innumerous reasons - such as hobby, challenge or one single protest with the intention of capturing and corrupting the information of other organizations. This thesis presents the descriptive results of one research that had as its main objective to identify which variables influence the Executives´ and CIOs´ perceptions toward Information Security. In addition, the research also identified the profile of Rio Grande do Norte s organizations and its Executives/CIOs concerning Information Security, computed the level of agreement of the respondents according to NBR ISO/IEC 17799 (Information technology Code of practice for information security management) on its dimension Access Control. The research was based on a model, which took into account the following variables: origin of the organization s capital, sector of production, number of PCs networked, number of employees with rights to network, number of attacks suffered by the organizations, respondent´s positions, education level, literacy on Information Technology and specific training on network. In the goal´s point of view, the research was classified as exploratory and descriptive, and, in relation of the approach, quantitative. One questionnaire was applied on 33 Executives and CIOs of the 50 Rio Grande do Norte s organizations that collected the highest taxes of ICMS - Imposto sobre Circulação de Mercadorias on 2000. After the data collecting, cluster analysis and chi-square statistical tools were used for data analysis. The research made clear that the Executives and CIOs of Rio Grande do Norte s organizations have low level of agreement concerning the rules of the NBR ISO/IEC 17799. It also made evident that the Executives and CIOs have its perception toward Information Security influenced by the number of PCs networked and by the number of attacks suffered by the organizations

Relevância:

100.00% 100.00%

Publicador:

Resumo:

La recherche presentée, realisée sur le domaine de la méthaphysique, s´agit de rassembler des pressupositions pour une fondamentation ontologique de la technologie de l´Information, basé sur la philophie de Martin Heidegger; foncièrement, sur l´analytique existentiel du Dasein dans l´ouvrage Être et Temps. À partir de la pensée sur ce qui est aujourd´hui , il s´agit d´investiguer sur quels fondaments la Nouvelle Tecnologie se fut érigée de façon a que nous sommes engajés au projet de numérisation des étants que en même temps que destine l´homme a l´oubli de l´Être, l´offre la possibilité de transformation. Le rapport entre la question de l´Être et la question de la technique est analysé comme des chemins croisés et dans ce carrefour il devient possible penser ce qui est technique, ce qui est information pour Heidegger et de quel façon les modes existentiels du Dasein sont prêtes pour caractériser l ´homme au sein de la tecnologie de l´information. Par cette appropriation, il reste penser comment c´est possible l´ouverture d´une perspective de reconduction de l´homme à la vérité de l´Être. Finalement, la structuration des fondements rends possible la réflexion discursive général: avec qui nous nous ocuppons, comme nous sommes, dans quelle direction nous nous acheminons, les thèmes générales, respectivement, des trois chapitres. Les points d´investigation du premier chapitre son: a) La caractérisation précise du Dasein, appuyé sur des considerations de Benedito Nunes, Hans-Georg Gadamer, Jacques Derrida et Rüdiger Safränski; b) Le concept de technique et son essence chez Heidegger; c) la distinction entre technique et technologie, appuyé sur le pensée de J. Ellul, Michel Séris, Otto Pöggeler, Michel Haar, Dominique Janicaud; c) Le concept de cibernetique chez Heidegger et chez Norbert Wiener; d) La caractérisation preliminaire d´information, l´analyse étimologique e philosophique, l´avis de Heidegger te les théories de Rafael Capurro; f) L´Analyse du phénomène de la numérisation des étants, des considérations de Virilio, et l´analyse d´un concept de virtuel avec Henri Bergson et Gilles Deleuze. Dans le deuxième chapitre, l´analyse des existentiels du Dasein vers le sommaire des fondements de base pour la caractérisation de la technologie de l´information comme un problème philosophique. Finalement, aprés avoir presenté les concepts introdutoires que délimitent le questionement, suivi par les indications et pressupositions ontologiques trouvés sur Être et Temps, le troisième chapitre disserte sur le péril, ce qui sauve et la sérénité, les trois mots-clés de la pensée heideggerienne sur la technique que permettent l´approche conclusif de la question