ACHIEVING STRATEGIC IT ALIGNMENT |
|
Strategic Capabilities |
|
Assessing IT/Business Alignment, J. Luftman |
|
IT Capabilities, Business Processes, and Impact on the Bottom Line, W,R. King |
|
Facilitating Transformations in IT: Lessons Learned Along the Journey, S. Norman and R.A. Zawacki |
|
Strategic Information Technology Planning and the Line Manager's Role, R. Heckman |
|
Running Information Services as a Business, R.M. Kesner |
|
Managing the IT Procurement Process, R. Heckman |
|
Performance Metrics for IT Human Resource Alignment, C.V. Brown |
|
Is It Time for an IT Ethics Program? F.H. Grupe, T. Garcia-Jay, and W. Kuechler |
|
IT Leadership Roles |
|
The CIO in the Era of Dislocation, J.E. Showalter |
|
Leadership Development: The Role of the CIO, B.S. Bolton |
|
Designing a Process-Based IT Organization, C.V. Brown and J.W. Ross |
|
Sourcing Alternatives |
|
Preparing for the Outsourcing Challenge, N.D. Meyer |
|
Managing Information Systems Outsourcing, S.Y. Scott |
|
Offshore Development: Building Relationships across International Boundaries, H. Davey and B. Allgood |
|
Application Service Providers, M. Raisinghani and M. Kwiatkowski |
|
DESIGNING AND OPERATING AN ENTERPRISE INFRASTRUCTURE |
|
Managing a Distributed Computing Environment |
|
The New Enabling Role of The IT Infrastructure, J.W. Ross and J.F. Rockart |
|
U.S. Telecommunications Today, N. Economides |
|
Information Everywhere , P. Tarasewich and M. Warkentin |
|
Developing and Maintaining the Networking Infrastructure |
|
Designing and Provisioning an Enterprise Network, H. Gelman |
|
The Promise of Mobile Internet: Personalized Services, H. Topi |
|
Virtual Private Networks with Quality of Service, T. Clark |
|
Storage Area Networks Meet Enterprise Data Networks, L.M. Lindgren |
|
Data Warehousing |
|
Data Warehousing Concepts and Strategies, B. Bordoloi, S.M. Neikes, S. Sircar, and S.E. Yager |
|
Data Marts: Plan Big, Build Small, J. van den Hoven |
|
Data Mining: Exploring the Corporate Asset, J. Weir |
|
Data Conversion Fundamentals, M. Zimmer |
|
Quality Assurance and Control |
|
Service Level Management Links IT to the Business, J. Butler |
|
Information Systems Audits: What's in It for Executives, V. Raval and U. G. Gupta |
|
Security and Risk Management |
|
Cost-Effective IS Security Via Dynamic Prevention and Protection, C. Klaus |
|
Reengineering the Business Continuity Planning Process, C.B. Jackson |
|
Wireless Security: Here We Go Again, A. Louw and W.A. Yarberry, Jr. |
|
Understanding Intrusion Detection Systems, P. Mell |
|
PROVIDING APPLICATION SOLUTIONS |
|
New Tools and Applications |
|
Web Services: Extending Your Web, R. VanTol |
|
J2EE vs. .NET: An Application Development Perspective, V. Ramesh and A. Sengupta |
|
XML: Information Exchange, J. van den Hoven |
|
Software Agent Orientation: A New Paradigm, R. Vinaja and S. Sircar |
|
Systems Development Approaches |
|
The Methodology Evolution: From None, to One-Size-Fits-All, to Eclectic, R.L. Glass |
|
Usability: Happier Users Mean Greater Profits, L. Hohmann |
|
UML: The Good, the Bad and the Ugly, J. Erickson and K. Siau |
|
Use Case Modeling, D.R. Chand |
|
Extreme Programming and Agile Software Development Methodologies, L. Lindstrom and R. Jeffries |
|
Component-Based IS Architecture, L. Waguespack and W.T. Schiano |
|
Project Management |
|
The Seven Deadly Sins of Cost Estimating, J.I. Feldman |
|
Does Your Project Risk Management System Do the Job? R.B. Lanza |
|
Managing Development in the Era of Complex Systems, H.W. Ryan |
|
Reducing IT Project Complexity, J.P. Murray |
|
Software Quality Assurance |
|
Software Quality Assurance Activities, P. Perryman Kuver |
|
Six Myths About Managing Software Development, L. G. Hayes |
|
Ethical Responsibility for Software Development , J.C. Sipior and Burke T. Ward |
|
LEVERAGING E-BUSINESS OPPORTUNITIES |
|
E-Business Strategy and Applications |
|
Building an E-Business Strategy, G. Hackbarth and W. J. Kettinger |
|
Surveying the E-Landscape: New Rules of Survival, R. Krovi |
|
E-Procurement: Business and Technical Issues, T. M. Rajkumar |
|
Evaluating the Options for Business-to-Business E-Commerce, C. Ranganathan |
|
The Role of Corporate Intranets, D. Jovin |
|
Integrating Web-Based Data into a Data Warehouse, Z. Huang, L.-d. Chen, and M.N. Frolick |
|
At Your Service: .NET Redefines the Way Systems Interact, D. |
|
Security and Privacy Issues |
|
Dealing with Data Privacy Protection, F.H. Grupe, W. Kuechler, and S. Sweeney |
|
A Strategic Response to the Broad Spectrum of Internet Abuse, J.C. Sipior and B.T. Ward |
|
World Wide Web Application Security, S. Scanlon |
|
FACILITATING KNOWLEDGE WORK |
|
Providing Support and Controls |
|
Improving User Satisfaction with End-User Support, N.C. Shaw, F. Niederman, and J.-E. Lee-Partridge |
|
Internet Acceptable Usage Policies, J.E. Gaskin |
|
Managing Risks in User Computing, S.D. Allen-Senft and F. Gallegos |
|
Reviewing User-Developed Applications, S.M. Williford |
|
Security Actions during Reduction in Workforce Efforts, T.J. Bray |
|
Supporting Remote Workers |
|
Supporting Telework: Obstacles and Solutions, H. Topi |
|
Virtual Teams: The Cross-Cultural Dimension, A. Massey |
|
When Meeting Face-to-Face is Not the Best Option, N. Settle-Murphy |
|
Knowledge Management |
|
Sustainable Knowledge: Success in a Information Economy, S. Robbins |
|
Knowledge Management--Coming Up the Learning Curve, R. Hoving |
|
Building Knowledge Management Systems, B.J. Bowman |
|
Preparing for Knowledge Management: Process Mapping, R.M. Kesner |
|