• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 113
  • 17
  • 14
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 183
  • 183
  • 183
  • 71
  • 52
  • 47
  • 30
  • 23
  • 22
  • 22
  • 21
  • 21
  • 21
  • 18
  • 17
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Integration of map and B-SCP in order to manage evolution of strategic it requirements

Babar, Abdul Razzaq, Computer Science & Engineering, Faculty of Engineering, UNSW January 2007 (has links)
The scope of requirements engineering must include high-level business objectives and strategies to achieve traceability between IT and business needs in order to ensure alignment. B-SCP handles this issue effectively. However, we must also deal with the evolution of business strategy operationlised in business processes and supporting it. MAP, goal/strategy modelling technique handles such evolution effectively. Integration of MAP with B-SCP can help us to address deficiency of addressing requirements evolution in the B-SCP framework. This thesis presents the first steps in a research project that integrates the requirements engineering methodologies, B-SCP and MAP, in order to manage evolution of strategic IT. Semantic similarities between B-SCP and MAP motivate us to combine both techniques. The integration theory results in three alternative mechanisms through which we can connect MAP with B-SCP. The usefulness of the three mechanisms is tested on two exemplars -- small one and detailed one. These mechanisms have advantages and disadvantages depending upon the complexity of the business system. MAP has a Gap Analysis process inbuilt so this saves on the overhead of inventing a new approach. In addition, MAP also extends B-SCP's capability by the addition of non-deterministic process modelling which allows B-SCP framework to offer multiple views of requirements. During the integration process, we encountered a number of issues. One important was that B-SCP identifies goals as a snapshot in time which are aligned hierarchically from higher level model to lower level model, however MAP identifies processes that strive to achieve goals and do not provide alignment between different levels of MAPs. This was a challenging issue to deal with during the integration.
12

Strategic valuation of enterprise information technology architecture in healthcare organizations

Bradley, Randy V. Byrd, Terry Anthony. January 2006 (has links) (PDF)
Dissertation (Ph.D.)--Auburn University, 2006. / Abstract. Vita. Includes bibliographic references (p.140-150).
13

A conceptual framework for IT programme management governance: an integrated view

Nyandongo, Kwete Mwana 05 June 2012 (has links)
M.Tech. / Project and programme management have become important organisational developments in today’s business environment. The growth in projects across different sectors and industries, and their capability to enable organisations to cope with change in order to remain in business has emphasised the importance of project, programme and portfolio activities. Although project management has provided a means of achieving goals that could not be achieved in traditional ways, the single project model has failed to address issues that arise when multiple and related projects are undertaken within an organisation. Programme management has then provided a means through which organisations achieve almost everything they undertake. It has been perceived as the strategy implementation vehicle that links the overall strategy of the organisation with the portfolio of projects. While the use of programmes and programme management has grown in organisations, its capability to secure the investment of corporation has not been proven. Numerous failure stories with dramatic consequences for the corporation as a whole have been reported. With the pace of new regulations that require the appropriate and responsible management of company affairs, considering the huge investment that corporations place in programmes, it has become important to devise an efficient and effective mechanism of overseeing these investments. This research addresses the need to improve programme performance and ensure compliance with corporate policies. It focus on the governance side to determine how IT programmes can be governed while making sure that there is enough established control responsibility and accountability to ensure the achievement of the programme strategic objectives. This has been addressed by identifying corporate, information technology and project governance requirements that have implications for IT programme management. This had led to the consolidation of implications identified from the Sarbanes Oxley Act, Control Objective for Information and Related Technology and the Guide to Governance of Project Management in order to provide an integrated view of overseeing the management of programmes. The value of the research is that it has devised a conceptual framework for IT programme management governance that provides a means to ensure both programme performance and compliance to governance requirements that pertain to corporations. The value of the framework is that it contains governance requirements that ensure an efficient and effective decision-making and delivery management, focused on achieving programme goals in a consistent manner while addressing appropriate risks, issues and events that can impede the programme outcome.
14

A model for bridging the information security gap between IT governance and IT service management.

Da Cruz, Eduardo Miguel 29 May 2008 (has links)
Today, organisations rely on IT systems which are constantly expected to improve return on investment without an increase in costs. These expectations have resulted in greater importance of the use and management of IT resources. In light of this increased importance of IT management, organisations turned towards frameworks, such as COBIT and ITIL, to better manage their IT resources. Although both frameworks have gained remarkable popularity, there is a lack of detailed information regarding their interrelation within an organisation. This creates a problem where an organisation that has implemented ITIL is unable to determine the level of COBIT compliance. Without being able to determine the level of compliance, it is not possible to ensure that the business requirements for information are being met therefore preventing an organisation from ensuring that their business objectives are achieved. The goal of this dissertation is to establish, from a security perspective, a Model that links COBIT and ITIL together on a detailed level to show their interrelation within an organisation and to provide a means of determining COBIT compliance through the use of the ITIL framework. This will effectively bridge the gap between IT Governance and IT Service Management. Before being able to develop such a Model, it was necessary to first link the COBIT and ITIL frameworks to show that such a Model can be developed. It was possible to establish such a link between COBIT and ITIL as both frameworks are based on a similar process. This is followed by determining the overlap between the security components of COBIT and ITIL. The results indicate that ITIL is insufficient to address all the security aspects of COBIT and additional control measures were required. These control measures werefound in an external framework and integrated into ITIL to complete the overlap. The completed overlap allowed for full COBIT compliance through the use of the ITIL with the additional control measures. The complete overlap between COBIT and ITIL allowed for the development of a framework that showed the interrelation between the security aspects of COBIT and ITIL within an organisation. This framework was then used as a foundation to develop a process of determining COBIT compliance using ITIL. This process of determining COBIT compliance was validated through the development of a software prototype. The framework and the process of determining COBIT compliance constitute the required Model which can be used to solve the identified problem. This dissertation also provides a strong platform for further research involving the areas of IT Governance and IT Service Management. It provides research topics into linking other parts of COBIT and ITIL that are not security related. The process of determining COBIT compliance can also be extended to function with other operational frameworks. This dissertation has also discovered an interesting relationship that exists within the COBIT frameworks. / Prof. Labuschagne
15

The implications of project risk management maturity on information technology success

Omphile, Wazha 05 June 2012 (has links)
M.Tech. / The question whether risk management contributes to project success is considered relevant considering the long history and high rates of failure in Information Technology (IT) projects. Much work and research has been done to investigate the relationship between risk management and project success but very few studies provide empirical evidence to substantiate the claims made on the relationship between these two concepts. Poor risk management has been associated with project failure while the question whether good risk management results in project success still cannot be unequivocally answered. The goal of this study is therefore to investigate the implications of project risk management maturity on project success in the South African telecommunications industry. To achieve the goal of this research a literature review was carried out to unearth the research questions relevant to this study. A survey questionnaire was compiled and sent out to IT project managers in the telecommunications industry in Gauteng, South Africa. The questionnaire gathered quantitative data from a purposive sample large enough to produce the results needed for this research. The questionnaire evaluated the risk management maturity of organisations in the telecommunications industry. It also determined definitions of project success that are prevalent in the industry and ranked factors that influence project outcomes. Furthermore, the questionnaire set out to establish current IT project success and failure rates in the telecommunications industry. This data was then analysed and conclusions drawn about risk management maturity and project success. Recommendations to the telecommunications industry were made based on the findings of the data analysis. The purpose of a literature study in this research was to provide clarity and focus for the research problem. It also broadened the researcher’s knowledge about the specific research area, thus allowing the researcher to become acquainted with the available body of knowledge regarding why and how risk management is associated with project success or failure. The quantitative research approach was used as it is on the basis of quantitative data that a correlation between risk management maturity and project success can be determined. A survey questionnaire was used as it provided anonymity, confidentiality and ease of administration. The findings of the research indicate that risk management maturity in the telecommunications industry is low. Organisations that claim higher levels of risk management maturity also have higher rates of IT project success. However this correlation is not significant when the responses are considered out of the organisational context. This is an indication that the organisational environment plays a role in determining project outcomes. The delivery of business benefits and customer satisfaction are more important than the traditional view of measuring project success by time, budget and scope/quality. Furthermore, communication within the project team and between team members and the customer has been found to be necessary for the delivery of successful IT projects. The improvement of risk management practices increases the chances of project success. Organisational effort in improving risk management practices does yield positive project outcomes. This research highlights areas for further investigation in the study of the relationship between risk management and project success.
16

Towards understanding dissatisfaction with explanations of IT value

Le Roux, Dirk Cornelis 10 March 2006 (has links)
The research focused on dissatisfaction with explanations of Information Technology (IT) value. IT’s business potential and the high levels of IT investment have put IT under the management spotlight. Management typically asks: “What is the contribution of our IT investments to improving our corporate strategy and business leverage?” or “How can we monitor the progress and performance of investments, in order to identify improvement actions?” Managers are, however, dissatisfied with explanations of IT value, because attempts to demonstrate the link between IT investments and business performance have produced mixed results. The research objective required the development of a framework as a step towards understanding dissatisfaction with IT value. Three case studies were used that resulted in a concluding theory consisting of a framework, a set of hypotheses describing the relationships between the elements of the framework and a pattern of conditions under which there is dissatisfaction with explanations of IT value. The theory clarifies dissatisfaction with explanations of IT value: IT is on management’s agenda due to its track record; high spending on IT; the need to exploit IT and dissatisfaction with available explanations of IT value. An outcome of this is a concern about IT’s value. Management’s concern is conditioned by factors such as their levels of comfort with IT; the business/IT relationship and management’s mindset about IT as a business resource. The concern becomes a need to control IT which requires an effective IT evaluation process in turn. Steps to ensure an effective IT evaluation process need to address the availability of alternative IT evaluation methods; the mindset about IT evaluation; flaws in IT evaluation methods; problems with defining IT value as well as IT benefits and costs complications. As a result, explanations of IT value may not be satisfactory. IT will then remain on the management agenda and management will continue to be concerned about IT value. The theory indicates two broad strategies to overcome or avoid dissatisfaction with explanations of IT value. The first strategy is to fully understand the reasons for management’s concern about IT value as well as to recognize those conditions that could influence concerns about the value of IT. The second strategy is to ensure an effective IT evaluation process by specifically addressing those factors or conditions that could impact on the effectiveness of the IT evaluation process. / Thesis (DCom (Informatics))--University of Pretoria, 2007. / Informatics / unrestricted
17

Logistics management in the information technology industry

Visage, Martha Magdalena 13 October 2006 (has links)
No abstract provided. Chapter one (10 pages) will be helpful for an overview / Dissertation (MCom (Business Management))--University of Pretoria, 2007. / Business Management / unrestricted
18

Virtual teams: The relationship between organizational support systems and effectiveness

Townsley, Carole 05 1900 (has links)
This study investigates the effects of eight organizational support systems on virtual team effectiveness in five areas: communication, planning tasks and setting goals, solving problems and making decisions, resolving conflict, and responding to customer requirements. One hundred and eighty surveys were sent to information technology managers and collaborative team members, representing 43 companies. The results indicated that developing new roles for IT professionals and senior managers significantly increased virtual team effectiveness in several areas. The findings support the theory that organizations that utilize virtual teams must create high-level structures, policies, and systems to support the teams and the information tools they use.
19

Applying COBIT in an ERP environment, with specific reference to Qmuzik

Kieviet, Freda 12 1900 (has links)
Thesis (MAcc (Accountancy ))--University of Stellenbosch, 2006. / ERP applications have evolved into enterprise-wide applications, which are generally acknowledged today as a critical component in an organisation’s information strategy. When implementing an ERP application, the control and governance of all IT processes are critical to ensure that value is delivered, risks are managed and that the investment in IT (ERP) delivers a reasonable return. It should, therefore, be important to focus on mitigating IT process risks that have an impact on the ERP environment, so that the level of residual risk is acceptable and aligned with the business objectives. This assignment focuses on using the generally accepted IT framework, COBIT (Control Objectives for Information and related Technology), as governance and control model. The criticality of each COBIT control objective (IT process) is evaluated by applying the COBIT control objectives in an ERP environment. Specific reference is also made to Qmuzik as an ERP application. By applying COBIT in an ERP environment, the most critical IT processes applicable to ERP are identified, in order to ensure that the minimum process controls for these IT processes are designed and implemented.
20

The strategic importance of information systems to airline revenue management

王達才, Wong, Tat-choi. January 1995 (has links)
published_or_final_version / Business Administration / Master / Master of Business Administration

Page generated in 0.1447 seconds