746 resultados para information technology (IT) education
Resumo:
The enterprise management (EM) approach provides a holistic view of organizations and their related information systems. In order to align information technology (IT) innovation with global markets and volatile virtualization, traditional firms are seeking to reconstruct their enterprise structures alongside repositioning strategy and establish new information system (IS) architectures to transform from single autonomous entities into more open enterprises supported by new Enterprise Resource Planning (ERP) systems. This chapter shows how ERP engage-abilities cater to three distinctive EM patterns and resultant strategies. The purpose is to examine the presumptions and importance of combing ERP and inter-firm relations relying on the virtual value chain concept. From a review of the literature on ERP development and enterprise strategy, exploratory inductive research studies in Zoomlion and Lanye have been conducted. In addition, the authors propose a dynamic conceptual framework to demonstrate the adoption and governance of ERP in the three enterprise management forms and points to a new architectural type (ERPIII) for operating in the virtual enterprise paradigm. © 2012, IGI Global.
Resumo:
The editorial section of the special issue of Production Planning & Control discusses contemporary approaches and scope for further research into the management of supply chain integration. Supply chain integration (SCI) is one of the major challenges in enhancing supply chain performance. Building and sustaining competitive advantage requires strategic collaboration between supply chain partners and synchronized management of intra- and inter-organizational practices and processes. The special issue attempts to address some of the fundamental SCI questions, which include but are not limited to the fields of organizational collaboration, information technology (IT) use, and risk and vulnerability management. The editorial first reviews a few key articles on SCI to provide information about the existing state of knowledge on SCI along with scope for further research.
Resumo:
E-business is concerned with the use of the Internet to link companies with their suppliers, customers and other trading partners. As a business concept, it has evolved significantly since its introduction in the 1990’s in parallel with the rapid rate of development of information technology (IT) during this period. Supply chain management (SCM) is fundamentally concerned with integration of activities both with and between organisations. IT plays a crucial role in SCM as a key enabler of supply chain integration (SCI). This chapter sets out the role of e-business concepts in the context of the supply chain challenges faced by firms. It specifically explores the role of e-procurement as an example of how e-business concepts have been applied to one key SCM activity, namely purchasing and procurement. In this context, the chapter examines the nature and evolution of e-marketplaces and goes on to identify key adoption drivers and benefits based on recent research. This research identifies key adoption drivers and benefits but also recognises that there are many barriers that ongoing research needs to address if the potential of e-business is to be fulfilled.
Resumo:
There are around 285 million visually impaired people worldwide, and around 370,000 people are registered as blind or partially sighted in the UK. Ongoing advances in information technology (IT) are increasing the scope for IT-based mobile assistive technologies to facilitate the independence, safety, and improved quality of life of the visually impaired. Research is being directed at making mobile phones and other handheld devices accessible via our haptic (touch) and audio sensory channels. We review research and innovation within the field of mobile assistive technology for the visually impaired and, in so doing, highlight the need for successful collaboration between clinical expertise, computer science, and domain users to realize fully the potential benefits of such technologies. We initially reflect on research that has been conducted to make mobile phones more accessible to people with vision loss. We then discuss innovative assistive applications designed for the visually impaired that are either delivered via mainstream devices and can be used while in motion (e.g., mobile phones) or are embedded within an environment that may be in motion (e.g., public transport) or within which the user may be in motion (e.g., smart homes). © 2013 Elsevier Inc.
Resumo:
The enterprise management (EM) approach provides a holistic view of organizations and their related information systems. In order to align information technology (IT) innovation with global markets and volatile virtualization, traditional firms are seeking to reconstruct their enterprise structures alongside repositioning strategy and establish new information system (IS) architectures to transform from single autonomous entities into more open enterprises supported by new Enterprise Resource Planning (ERP) systems. This chapter shows how ERP engage-abilities cater to three distinctive EM patterns and resultant strategies. The purpose is to examine the presumptions and importance of combing ERP and inter-firm relations relying on the virtual value chain concept. From a review of the literature on ERP development and enterprise strategy, exploratory inductive research studies in Zoomlion and Lanye have been conducted. In addition, the authors propose a dynamic conceptual framework to demonstrate the adoption and governance of ERP in the three enterprise management forms and points to a new architectural type (ERPIII) for operating in the virtual enterprise paradigm.
Resumo:
Recent years have witnessed an expansion in service industries such as finance, travel and retail. Firms in the services have shifted their traditional occupation with products to consider how value can be created and appropriated in the service industry [1]. In particular, information technology (IT) and IT-enabled business services have become central to a firm's ability to deliver value to its customers, driving firms to seek ways to improve their services and maintain their competitive position. In this regard, the last ten years have witnessed significant growth in the outsourcing industry which shifted from focus on low cost simple tasks such as coding to end-to-end delivery of services that range from IT services and customer services to more complex business services such as Finance and Accounting, Human Resources, Procurement, and knowledge-intensive services such as customer analysis and research services [2]. © 2012 Springer-Verlag.
Resumo:
The global population of people aged 60 years and older is growing rapidly. In the UK, there are currently around 10 million people aged 65 and over, and the number is projected to rise by 50% in the next 20 years (RNIB, 2013). While ongoing advances in information technology (IT) are undoubtedly increasing the scope for IT to enhance and support older adults' daily living, the digital divide between older and younger adults - 43% of people below the age of 55 own and use a smartphone, compared to only 3% of people aged 65 and over (AgeUK, 2013) - raises concerns about the suitability of technological solutions for older adults, especially for older adults with impairments. Evidence suggests that sympathetic design of mobile technology does render it useful and acceptable to older adults: the key issue is, however, how best to achieve such sympathetic design when working with impaired older adults. We report here on a case study in order to outline the practicalities and highlight the benefits of participatory research for the design of sympathetic technology for (and importantly with) older adults with impairments.
Resumo:
The global population of people aged 60 years and older is growing rapidly. In the UK, there are currently around 10 million people aged 65 and over, and the number is projected to rise by 50% in the next 20 years (RNIB, 2013). While ongoing advances in information technology (IT) are undoubtedly increasing the scope for IT to enhance and support older adults’ daily living, the digital divide between older and younger adults – 43% of people below the age of 55 own and use a smartphone, compared to only 3% of people aged 65 and over (AgeUK, 2013) – raises concerns about the suitability of technological solutions for older adults, especially for older adults with impairments. Evidence suggests that sympathetic design of mobile technology does render it useful and acceptable to older adults: the key issue is, however, how best to achieve such sympathetic design when working with impaired older adults. We report here on a case study in order to outline the practicalities and highlight the benefits of participatory research for the design of sympathetic technology for (and importantly with) older adults with impairments.
Resumo:
The information constitutes one of the most valuable strategic assets for the organization. However, the organizational environment in which it is inserted is very complex and heterogeneous, making emerging issues relevant to the Governance of information technology (IT) and Information Security. Academic Studies and market surveys indicate that the origin of most accidents with the information assets is the behavior of people organization itself rather than external attacks. Taking as a basis the promotion of a culture of safety among users and ensuring the protection of information in their properties of confidentiality, integrity and availability, organizations must establish its Information Security Policy (PSI). This policy is to formalise the guidelines in relation to the security of corporate information resources, in order to avoid that the asset vulnerabilities are exploited by threats and can bring negative consequences to the business. But, for the PSI being effective, it is required that the user have readiness to accept and follow the procedures and safety standards. In the light of this context, the present study aims to investigate what are the motivators extrinsic and intrinsic that affect the willingness of the user to be in accordance with the organization's security policies. The theoretical framework addresses issues related to IT Governance, Information Security, Theory of deterrence, Motivation and Behavior Pro-social. It was created a theoretical model based on the studies of Herath and Rao (2009) and D'Arcy, Hovav and Galletta (2009) that are based on General Deterrence Theory and propose the following influencing factors in compliance with the Policy: Severity of Punishment, Certainty of Detection, Peer Behaviour, Normative Beliefs, Perceived Effectiveness and Moral Commitment. The research used a quantitative approach, descriptive. The data were collected through a questionnaire with 18 variables with a Likert scale of five points representing the influencing factors proposed by the theory. The sample was composed of 391 students entering the courses from the Center for Applied Social Sciences of the Universidade Federal do Rio Grande do Norte. For the data analysis, were adopted the techniques of Exploratory Factor Analysis, Analysis of Cluster hierarchical and nonhierarchical, Logistic Regression and Multiple Linear Regression. As main results, it is noteworthy that the factor severity of punishment is what contributes the most to the theoretical model and also influences the division of the sample between users more predisposed and less prone. As practical implication, the research model applied allows organizations to provide users less prone and, with them, to carry out actions of awareness and training directed and write Security Policies more effective.
Resumo:
Increasingly, the Information Technology (IT) has been used to sustain the business strategies, causing increased its relevance. Therefore IT governance is seen as one of the priorities of organizations at the time. The search for strategic alignment between business and IT is debated as a factor for business success, but even with that importance, usually the main business managers are reluctant to take responsibility for decisions involving IT, mainly due to the complexity of your infrastructure. Since cloud computing is being seen as an element capable of assisting in the implementation of organizational strategies, because their characteristics enable greater efficiency and agility in IT, and is considered as a new computing paradigm. The main objective of the analyze the relationship between IT governance arrangements and strategic alignment with the infrastructure as a service (IaaS) of public cloud computing. Therefore, an exploratory, descriptive and inferential was developed, with approach to the problem of quantitatively research, with descriptive survey method and cross section. An electronic questionnaire that was applied to the ISACA chapters Associates of São Paulo and the Distrito Federal, totaling 164 respondents was used. The instrument used based on the theories of Weill and Ross (2006) for array of IT governance arrangement; Henderson and Venkatraman (1993) and Luftman (2000), for maturity of the strategic alignment model; and NIST (2011 b), ITGI (2007) and CSA (2010) for infrastructure maturity as a service (IaaS) public in its essential characteristics. As regards the main results, this research proved that with public IaaS decision-making structures have changed, with a greater participation of senior executives in all five key IT decisions (IT governance arrangement array) including more technical decisions as architecture and IT infrastructure. With increased participation of senior executives the decrease was also observed in the share of IT specialists, characterizing the decision process with the duopoly archetype (shared decision). With regard to strategic alignment, it was observed that it changes with cloud computing, and organizations with public IaaS, a maturity of strategic alignment with statistically significant and greater difference when compared to organizations without IaaS. The maturity of public IaaS is at the intermediate level (level 3 - "defined process"), with the elasticity and measurement achieved level 4 - "managed and measurable" It was also possible to infer in organizations with public IaaS, there are positive correlations between the key decisions and the maturity of IaaS, especially at the beginning, architecture and infrastructure, and the archetypes involving senior executives and IT specialists. In the correlation between the maturity and mature strategic alignment of public IaaS therefore the higher the strategic alignment, the greater the maturity of the public IaaS and vice versa.
Resumo:
The Information Technology (IT) is increasing his applicability to business, both private and public companies. It is necessary the adequate use of the new technologies and get cooperation and technology acceptance of the system. People tend to resist to the changes, contributing so that the technology is rejected or even it is not recognized as promoting of the changes. This study is relevant and aim to evaluate the impacts of new technologies, considering their users as fundamental factors in the change process. The survey analyzed the advantages and the barriers of the system use in three federal special judicial of Rio Grande do Norte, with data collected in May of 2007, through the application of questionnaires to thirty eight users of the virtual system CRETA. The users' perception was evaluated, under the optics of five variables: efficiency, image, agility, ease of use and quality. Starting from the obtained results, it was evidenced that the implementation of the system felt accordingly the expected and it reached the objectives intended that were: the velocity and efficiency in the path of the lawsuits, larger productivity, resulting in a better quality of the final work introduced to the citizen and proportionate an improvement in the organizational image of the judiciary power
Resumo:
The information technology - IT- benefits have been more perceived during the last decades. Both IT and business managers are dealing with subjects like governance, IT-Business alignment, information security and others on their top priorities. Talking about governance, specifically, managers are facing it with a technical approach, that gives emphasis on protection against invasions, antivirus systems, access controls and others technical issues. The IT risk management, commonly, is faced under this approach, that means, has its importance reduced and delegated to IT Departments. On the last two decades, a new IT risk management perspective raised, bringing an holistic view of IT risk to the organization. According to this new perspective, the strategies formulation process should take into account the IT risks. With the growing of IT dependence on most of organizations, the necessity of a better comprehension about the subject becomes more clear. This work shows a study in three public organizations of the Pernambuco State that investigates how those organizations manage their IT risks. Structured interviews were made with IT managers, and later, analyzed and compared with conceptual categories found in the literature. The results shows that the IT risks culture and IT governance are weakly understood and implemented on those organizations, where there are not such an IT risk methodology formally defined, neither executed. In addition, most of practices suggested in the literature were found, even without an alignment with an IT risks management process
Resumo:
This study aims to understand the general model of governance of information technology adopted by telecommunication companies operating in Rio Grande do Norte. The research methodology used involved a theoretical and empirical approach prepared, involving two case studies on companies in the telecommunications industry working in the state of Rio Grande do Norte. The study covered the area of IT organizations, through interviews with managers responsible for the area of Telecommunications / IT. To study in accordance with the approach and address the problem of research, this study was based on qualitative criteria, which enabled the understanding of how companies adopt the governance of information technology. In conclusion, it was found that the governance practices of information technology employees are incipient, but that meet the needs of business and that they intend to implement in specific areas and use other practices of IT governance
Resumo:
O presente trabalho relata e analisa o processo de internacionalização tendo em atenção os antecedentes que conduziram ao sucesso das empresas analisadas. O método utilizado foi a pesquisa qualitativa, e envolveu sete entrevistas individuais realizadas numa pequena e média empresa (PME), a Valart (cinco entrevistas), e duas multinacionais, a Bosch e a Quimialmel (um quadro superior entrevistado em cada uma). Os resultados obtidos foram discutidos à luz da literatura, após a transcrição das entrevistas e codificação dos dados primários recolhidos. Pretendeu-se entender como é que as grandes multinacionais Bosch e Quimialmel alcançaram o seu sucesso a nível internacional, assim como analisar, também, como a Valart cresceu e expandiu-se ao longo do tempo. Foi então realizada uma revisão da literatura em que foram abordados temas como a internacionalização, a globalização, o marketing e a inovação, conceitos relevantes ao desenvolvimento deste estudo, revisão essa completada após o trabalho de campo, seguindo-se o grounded theory. No conteúdo do trabalho também são relatadas as atividades desenvolvidas durante o estágio na Valart, e é feita uma análise da empresa e do produto principal em questão (porta-contentores marítimos ou sideloaders). Assim, com a revisão da literatura e análise dos resultados obtidos foi possível retirar conclusões e tecer recomendações de ação / gestão na Valart, tais como investir em colaboradores especializados, abrir um departamento de marketing interligado com o comercial, e sempre apoiado em ferramentas informáticas que poderão fomentar a inovação. Os antecedentes que guiam as empresas analisadas a uma internacionalização de sucesso, internacionalização essa que tem sido gradual e por fases, nas empresas abordadas, incluem: rede de contactos internacional, competência da força de vendas, investigação e desenvolvimento (I&D) que leva a produtos diferenciados, parcerias com universidades, orientação para o cliente, existência de uma marca forte, estrutura de custos eficiente, e aproveitamento do capital humano interno. Por fim, é relevante referir que a crise interna em Portugal tem sido um fator incentivador da procura de diversificação de mercados a nível internacional. Como resultado deste estudo foi apresentado um artigo na conferência internacional ICERI 2014 (Au-Yong-Oliveira e Coelho, 2014).
Resumo:
This work aims to analyze risks related to information technology (IT) in procedures related to data migration. This is done considering ALEPH, Integrated Libray System (ILS) that migrated data to the Library Module present in the software called Sistema Integrado de Gestão de Atividades Acadêmicas (SIGAA) at the Zila Mamede Central Library at the Federal University of Rio Grande do Norte (UFRN) in Natal/Brazil. The methodological procedure used was of a qualitative exploratory research with the realization of case study at the referred library in order to better understand this phenomenon. Data collection was able once there was use of a semi-structured interview that was applied with (11) subjects that are employed at the library as well as in the Technology Superintendence at UFRN. In order to examine data Content analysis as well as thematic review process was performed. After data migration the results of the interview were then linked to both analysis units and their system register with category correspondence. The main risks detected were: data destruction; data loss; data bank communication failure; user response delay; data inconsistency and duplicity. These elements point out implication and generate disorders that affect external and internal system users and lead to stress, work duplicity and hassles. Thus, some measures were taken related to risk management such as adequate planning, central management support, and pilot test simulations. For the advantages it has reduced of: risk, occurrence of problems and possible unforeseen costs, and allows achieving organizational objectives, among other. It is inferred therefore that the risks present in data bank conversion in libraries exist and some are predictable, however, it is seen that librarians do not know or ignore and are not very worried in the identification risks in data bank conversion, their acknowledge would minimize or even extinguish them. Another important aspect to consider is the existence of few empirical research that deal specifically with this subject and thus presenting the new of new approaches in order to promote better understanding of the matter in the corporate environment of the information units