Business-Function Productivity and Information Systems

1988 ◽  
Vol 6 (1) ◽  
pp. 49-61
Author(s):  
Hirohide Hinomoto
2018 ◽  
Vol 9 (3) ◽  
pp. 127-144
Author(s):  
Frederick Pobee ◽  
Daniel Opoku

Information systems (IS) have become an integral part of many organizations as they depend on it to execute their critical business function. The purpose of this research was to explore the enablers and inhibitors of information systems disaster recovery planning in organizations in the Ghanaian banking sector. In order to achieve this purpose, the protection motivation theory and the theory of planned behavior was used as the theoretical lens for this study. Eight hypotheses were developed to test the research conceptualization. Data analysis was performed using SPSS version 20.0. Using a survey of 207 managers in the Ghanaian banking sector, this article shows the factors such as perceived vulnerability, perceived severity, response efficacy, self-efficacy, attitude, subjective norms and perceived behavioral control positively influences motivation and intention to develop an information systems disaster recovery plan in Ghanaian banking industries.


JURNAL PETIK ◽  
2020 ◽  
Vol 6 (1) ◽  
pp. 51-63
Author(s):  
Purnomo Sidiq ◽  
Yopy Nugraha ◽  
Irdham Denny ◽  
Demmy Dharma Bhakti

Abstrac - PT. XYZ is a company engaged in the manufacture of sweet soy sauce, with a segment of middle class consumers, focusing on the market share of the housewives, restaurants and traders of the wheel circumference. SI/TI in the PT .XYZ at this time not integrated in the utilization of information technology by better, of course, the very necessary development of information systems with the approach of the Architecture of the Enterprise (EA) with enterprise system manufacturing for business architecture, information architecture, application architecture and technology architecture, with method Architecture Enterprise Planning (EAP) approach framework Zachman.With planning Architecture Enterprise Planning (EAP) described in the modeling business according to the organization identified 25 business function 7 business processes, schemes of information technology are connected, the architecture of the data on the candidate data entities 41 entities, the data base tersentralisasikan accessed by all organizational units in PT. XYZ, the architecture of the application identification on candidate 41 applications, technology architecture 30 network infrastructure technology supporting business, with the aim that the process of business connected overall so that stacholder easy to plan the development of a system. Keywords - Information Systems Architecture, EAP, Information Systems, Manufacturing  Abstrak - PT. XYZ merupakan perusahaan yang bergerak dalam pembuatan kecap manis, dengan segmen konsumen menengah kebawah, berfokus pada pangsa pasar para ibu rumah tangga, rumah makan dan pedagang roda keliling. SI/TI di PT .XYZ pada saat ini belum terintergrasi pada pemanfaatan teknologi informasi dengan baik, tentunya sangat diperlukan pengembangan sistem informasi dengan pendekatan Architecture Enterprise (EA) dengan sistem enterprise manufaktur secara arsitektur bisnis, arsitektur informasi, arsitektur aplikasi dan arsitektur teknologi, dengan metode Architecture Enterprise Planning (EAP) pada pendekatan framework Zachman.Dengan perencanaan Architecture Enterprise Planning (EAP) dijabarkan dalam suatu pemodelan bisnis yang sesuai organisasi mengidentifikasi 25 fungsi bisnis dan 7 proses bisnis, skema teknologi informasi yang terkoneksi, arsitektur data pada kandidat entitas data 41 entitas, basis data yang tersentralisasikan diakses oleh semua unit organisasi di PT. XYZ, arsitektur aplikasi melakukan identifikasi pada kandidat 41 aplikasi, arsitektur teknologi 30 infrastruktur jaringan teknologi pendukung bisnis, dengan tujuan agar proses binis terkoneksi secara keseluruhan sehingga stacholder mudah merencanakan pengembangan sebuah sistem.   Kata Kunci – Sistem Informasi Arsitektur, EAP, Sistem Informasi Manufaktur


1984 ◽  
Vol 1 (1) ◽  
pp. 175-185
Author(s):  
Michael E. D. Koenig

2020 ◽  
Vol 64 (1) ◽  
pp. 6-16 ◽  
Author(s):  
Sarah M. Meeßen ◽  
Meinald T. Thielsch ◽  
Guido Hertel

Abstract. Digitalization, enhanced storage capacities, and the Internet of Things increase the volume of data in modern organizations. To process and make use of these data and to avoid information overload, management information systems (MIS) are introduced that collect, process, and analyze relevant data. However, a precondition for the application of MIS is that users trust them. Extending accounts of trust in automation and trust in technology, we introduce a new model of trust in MIS that addresses the conceptual ambiguities of existing conceptualizations of trust and integrates initial empirical work in this field. In doing so, we differentiate between perceived trustworthiness of an MIS, experienced trust in an MIS, intentions to use an MIS, and actual use of an MIS. Moreover, we consider users’ perceived risks and contextual factors (e. g., autonomy at work) as moderators. The introduced model offers guidelines for future research and initial suggestions to foster trust-based MIS use.


1993 ◽  
Vol 38 (10) ◽  
pp. 1094-1095
Author(s):  
Scott P. Robertson
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document