Modeling and Analysis of Information Technology Change and Access Controls in the Business Context
暂无分享,去创建一个
[1] J.D. Sterman,et al. Nobody Ever Gets Credit for Fixing Problems That Never Happened: Creating and Sustaining Process Improvement , 2001, IEEE Engineering Management Review.
[2] R. H. Connery,et al. Processes of organization and management , 1948 .
[3] A. Stern. Reinvesting the IT Dollar: From IT Firefighting to Quality Strategic Services , 2001 .
[4] D. Meadows. Dynamics of Growth in a Finite World , 1974 .
[5] E. F. Wolstenholme,et al. Towards the definition and use of a core set of archetypal structures in system dynamics , 2003 .
[6] Steffen Bayer,et al. Business dynamics: Systems thinking and modeling for a complex world , 2004 .
[7] Rajiv Kohli,et al. The IT Payoff: Measuring the Business Value of Information Technology Investments , 2002 .
[8] Jim Smith,et al. Special Issue: Franz Edelman Award for Achievement in Operations Research and the Management Sciences: A Multimethod Approach for Creating New Business Models: The General Motors OnStar Project , 2002, Interfaces.
[9] Raymond R. Panko. Computer Security Incident Response Teams (CSIRTs) , 2004 .
[10] Y. Olesha. Dynamics of Growth in a Finite World , 1974 .
[11] Michael Brenner,et al. A Criteria Catalog Based Methodology for Analyzing Service Management Processes , 2002, DSOM.