PART 3 INFORMATION SYSTEMS STRATEGIC MANAGEMENT: LESSONS FOR THE FUTURE


Soil Horizons ◽  
1986 ◽  
Vol 27 (3) ◽  
pp. 36
Author(s):  
John Doe


2012 ◽  
Vol 27 (2) ◽  
pp. 96-99 ◽  
Author(s):  
Salvatore T. March ◽  
Fred Niederman

We must look ahead at today's radical changes in technology, not just as forecasters but as actors charged with designing and bringing about a sustainable and acceptable world. New knowledge gives us power for change: for good or ill, for knowledge is neutral. The problems we face go well beyond technology: problems of living in harmony with nature, and most important, living in harmony with each other. Information technology, so closely tied to the properties of the human mind, can give us, if we ask the right questions, the special insights we need to advance these goals. Herbert A. Simon (2000)



2017 ◽  
Vol 25 (2) ◽  
pp. 372-388 ◽  
Author(s):  
Morten Hertzum ◽  
Maria Ie Manikas ◽  
Arnvør á Torkilsheyggi


Author(s):  
Olha Husak

The article aims at defining the competence-based approach to training the future professionals in communication security and development of the advanced fields of their high-qualitative training. The main results of the study are represented in the list of specialists’ professional competencies in the field of communication security, which includes: capability to identify communication threats; peculiarities of civilized, manipulative and barbaric influences at the state, corporate and personal levels; categories of manipulators, types of manipulative traps, existing manipulative techniques; capability for using effective means to neutralize or counteract to manipulative influences; skills required for organization, planning and implementation of one’s actions in terms of information attacks; acquisition of communicative, organizational and technical methods of information protection in the existing information systems and networks.



2018 ◽  
Vol 6 (2) ◽  
pp. 112-128
Author(s):  
Elloit Cardozo

Foucault, in his seminal work Discipline and Punish: The Birth of the Prison (1975) discusses Bentham’s architectural design of the Panopticon as a means to exercise power and enforce discipline. He extends this metaphor to speak of Panopticism as a social phenomenon used to discipline work forces through covert strategies. Shoshana Zuboff, in In the Age of the Smart Machine: The Future of Work and Power (1988) contextualizes Foucault’s discussion in an age where the work culture uses Information Systems extensively for surveillance. She calls such a structure an “Information Panopticon”.  This paper aims to bring out the various nuances of the Information Panopticon in Cameron and Colin Cairnes’ film Scare Campaign (2016) and how it facilitates the exercise of power. The paper firstly looks at Zuboff’s Information Panopticon in light of Foucault’s discussion before evaluating the Information Panopticon created in the film and its hierarchal structure. Next it endeavours to demonstrate how the Information Panopticon in the film is not solely reliant on literal visibility. It wraps up with a discussion on the relation between spatiality, visibility and power in the film’s Information Panopticon.



2020 ◽  
Vol 3 (1) ◽  
Author(s):  
Kastriot Dermaku ◽  
◽  
Liridon Hoti Ilir Gashi ◽  
Selami Klaiqi ◽  
◽  
...  

Nowadays, we know how important it is for a country to have a good telecom infrastructure, including Kosovo. The purpose of this paper is to plan the telecommunications infrastructure based on the geographic information provided by GIS. By using these systems, we can draw analyses and conclusions on the possibility of planning the extension of this infrastructure in the future, consequently conveying ideas to different sectors of development or for using telecommunications infrastructure. The data by which the scenarios of this study have been drafted, are real and generated in Prishtina. They are employed to illustrate the use and techniques of GIS.



Author(s):  
G. Golovko ◽  
M. Borozdin ◽  
Y. Tokar

This article highlights the need and importance of using an information system in the modern restaurant business. The nature of information systems and the tasks they can perform are presented. The direction of introduction of information and communication technologies and automation in management activity of restaurants is considered. The dependence of the efficiency of the food establishment on the correctly automated work process is determined. It has been proven that the use of information systems is a necessary condition for modern restaurants and contributes to the adoption of strategic management decisions to increase competitiveness and create an appropriate and efficient infrastructure.



This chapter begins by explaining the purpose of strategic information systems planning, which is followed by describing three commonly adopted methodologies. They are known as “business systems planning,” “strategic systems planning,” and “information engineering.” In addition, the six broad process dimensions that characterize the activity of strategic information systems planning are discussed. In order to provide an understanding of what is meant by alignment, the basic concepts are presented and some established principles discussed. In essence, the primary and secondary functions in alignment for a business are explained, including the purpose it serves, how optimum alignment occurs, and when. Some proposed models for strategic alignment are reviewed to provide an understanding of the different types of strategic activities that are involved, and their flow and relationships with each other for interaction. By demonstrating how each model works based on a given set of conditions, the key to achieving strategic alignment for a business is established. The strengths and limitations of each of the models are stated. In particular, the model proposed by Henderson and Venkatraman (1990), the Strategic Alignment Model (SAM), is described in detail to explain how it works. It is explained in the context of four fundamental domains of strategic choice, with each having its own underlying dimensions. In essence, SAM has been developed for conceptualizing and directing the emerging area of strategic management of IT in terms of two fundamental characteristics of strategic management. They are strategic fit (the interrelationships between external and internal components) and functional integration (integration between business and functional domains). These fundamental characteristics are defined with respect to four different perspectives of alignment. Further, three dominant domain types are introduced together with appropriate illustrations of their application. Finally, case studies are presented to show how companies with a technology vision can achieve enormous business success through applying strategic IT alignment and indeed become global players. The chapter concludes with a summary of the main points covered on the concepts of strategic alignment of IT and business.



Sign in / Sign up

Export Citation Format

Share Document