A General, But Readily Adaptable Model of Information System Risk

The invention relates to an output amplifier for a transmitting tube, having an operating frequency located in the FM- and the VHF- frequency bands. In order to match the output impedance of the preamplifier to the input impedance of the output amplifier the output amplifier includes a broad-band impedance transformer. Mechanical and electrical flexibility is obtained by using an impedance transformer formed from series/parallel arrangements of coaxial cables. The impedance transformer needs little room and nevertheless provides a broadband impedance match.

[1]  R. Kelly Rainer,et al.  The Keys to Executive Information Systems Success , 1995, J. Manag. Inf. Syst..

[2]  Suzanne Rivard,et al.  An Integrative Contingency Model of Software Project Risk Management , 2001, J. Manag. Inf. Syst..

[3]  Robert N. Charette,et al.  Software Engineering Risk Analysis and Management , 1989 .

[4]  Abraham Seidmann,et al.  Software Development Outsourcing Contract: Structure and Business Value , 1993, J. Manag. Inf. Syst..

[5]  Michel Benaroch,et al.  Managing Information Technology Investment Risk: A Real Options Perspective , 2002, J. Manag. Inf. Syst..

[6]  Capers Jones,et al.  Assessment and control of software risks , 1994, Yourdon Press Computing Series.

[7]  D. M. Rasmuson,et al.  Uncertainties in Nuclear Probabilistic Risk Analyses , 1984 .

[8]  Sarma R. Nidumolu The Effect of Coordination and Uncertainty on Software Project Performance: Residual Performance Risk as an Intervening Variable , 1995, Inf. Syst. Res..

[9]  M. Lynne Markus,et al.  PRECONDITIONS FOR BPR SUCCESS And How to Prevent Failures , 1994 .

[10]  Tom Brier,et al.  Communications of the Association for Information Systems , 1999 .

[11]  Eric K. Clemons,et al.  Evaluation of strategic investments in information technology , 1991, CACM.

[12]  Barry W. Boehm,et al.  A spiral model of software development and enhancement , 1986, Computer.

[13]  Kalle Lyytinen,et al.  Identifying Software Project Risks: An International Delphi Study , 2001, J. Manag. Inf. Syst..

[14]  Eric K. Clemons,et al.  Identifying Sources of Reengineering Failures: A Study of the Behavioral Factors Contributing to Reengineering Risks , 1995, J. Manag. Inf. Syst..

[15]  Robert D. Austin,et al.  The Effects of Time Pressure on Quality in Software Development: An Agency Model , 2001, Inf. Syst. Res..

[16]  Sarma R. Nidumolu A Comparison of the Structural Contingency and Risk-Based Perspectives on Coordination in Software Development Projects , 1996, J. Manag. Inf. Syst..

[17]  Steven L. Alter,et al.  Information Systems Risks and Risk Factors: Are They Mostly About Information Systems? , 2004, Commun. Assoc. Inf. Syst..

[18]  E. Clemons Using Scenario Analysis to Manage the Strategic Risks of Reengineering , 1995 .

[19]  Neil F. Doherty,et al.  An investigation of the factors affecting the successful treatment of organisational issues in systems development projects , 2001, Eur. J. Inf. Syst..

[20]  David Hall,et al.  Risk Management Working Group , 2002 .

[21]  Barry W. Boehm,et al.  Theory-W Software Project Management: Principles and Examples , 1989, IEEE Trans. Software Eng..

[22]  Ho Geun Lee,et al.  Market Process Reengineering through Electronic Market Systems: Opportunities and Challenges , 1996, J. Manag. Inf. Syst..

[23]  Steven A. Yourstone,et al.  Managing System Errors and Failures in Health Care Organizations: Suggestions for Practice and Research , 2002, Health care management review.

[24]  Kuldeep Kumar,et al.  From static supply chains to dynamic supply webs: principles for radical redesign in the age of information , 1999, ICIS.

[25]  A. Adam Whatever happened to information systems ethics? Caught between the devil and the deep blue sea , 2004 .

[26]  F. W. McFarlan,et al.  Portfolio approach to information systems , 1989 .

[27]  Tony Moynihan,et al.  Coping with client-based 'people-problems': the theories-of-action of experienced IS/software project managers , 2002, Inf. Manag..

[28]  Gary Klein,et al.  Information system success as impacted by risks and development strategies , 2001, IEEE Trans. Engineering Management.

[29]  Detmar W. Straub,et al.  Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..

[30]  Jan Stage,et al.  Controlling Prototype Development Through Risk Analysis , 1996, MIS Q..

[31]  Barney Roberts,et al.  Risk Management Working Group , 2002 .

[32]  Kuldeep Kumar,et al.  Sustainable Collaboration: Managing Conflict and Cooperation in Interorganizational Systems , 1996, MIS Q..

[33]  Suzanne Rivard,et al.  Toward an Assessment of Software Development Risk , 1993, J. Manag. Inf. Syst..

[34]  Jane Fedorowicz,et al.  Assessing Risks in Two Projects: A Strategic Opportunity and a Necessary Evil , 1999, Commun. Assoc. Inf. Syst..

[35]  Robert B. Adams,et al.  EIS: It Can Work in the Public Sector , 1990, MIS Q..

[36]  Elizabeth C. Hirschman,et al.  Judgment under Uncertainty: Heuristics and Biases , 1974, Science.

[37]  Bernard C. Y. Tan,et al.  A Cross-Cultural Study on Escalation of Commitment Behavior in Software Projects , 2000, MIS Q..

[38]  Shouhong Wang,et al.  The Implementation of Business Process Reengineering , 1995, J. Manag. Inf. Syst..

[39]  Kalle Lyytinen,et al.  A framework for identifying software project risks , 1998, CACM.

[40]  Steven L. Alter,et al.  The Work System Method for Understanding Information Systems and Information Systems Research , 2002, Commun. Assoc. Inf. Syst..

[41]  Jyrki Kontio,et al.  Experiences in improving risk management processes using the concepts of the Riskit method , 1998, SIGSOFT '98/FSE-6.

[42]  K ClemonsEric Evaluation of strategic investments in information technology , 1991 .

[43]  Manash R. Ray,et al.  Assessing information technology investments with an integrative process framework , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[44]  Kalle Lyytinen,et al.  A Framework for software risk management , 1996, Scand. J. Inf. Syst..

[45]  Michael R. Vitale,et al.  The Growing Risks of Information Systems Success , 1986, MIS Q..

[46]  James J. Jiang,et al.  A Measure of Software Development Risk , 2002 .

[47]  Houston H. Carr,et al.  Risk Analysis for Information Technology , 1991, J. Manag. Inf. Syst..

[48]  Kalle Lyytinen,et al.  Attention Shaping and Software Risk - A Categorical Analysis of Four Classical Risk Management Approaches , 1998, Inf. Syst. Res..

[49]  D. Sandy Staples,et al.  New Developments in Practice I: Risk Management in Information Systems: Problems and Potential , 2001, Commun. Assoc. Inf. Syst..

[50]  Houston H. Carr,et al.  Threats to Information Systems: Today's Reality, Yesterday's Understanding , 1992, MIS Q..

[51]  Steven L. Alter 18 Reasons Why IT-Reliant Work Systems Should Replace "The IT Artifact" as the Core Subject Matter of the IS Field , 2003, Commun. Assoc. Inf. Syst..

[52]  David McComb,et al.  System project failure : the heuristics of risk , 1991 .

[53]  Judy E. Scott,et al.  Managing risks in enterprise systems implementations , 2002, CACM.