Extent:
Online-Ressource (XXVI, 420 p. 82 illus, online resource)
Series:
Type of publication: Book / Working Paper
Type of publication (narrower categories): Aufsatzsammlung
Language: English
Notes:
Description based upon print version of record
304645_1_En_BookFrontmatter_OnlinePDF; Foreword; Preface; Acknowledgments; Contents; Reviewers; Part IT Governance; 1 Governance of IT in Small and Medium Sized Enterprises; 1…Introduction; 2…Enterprise Governance of IT; 3…CobiT: A Management Framework for IT; 4…QuickStart: A Management Framework for IT in SME's; 5…A Pragmatic Set of Management Practices to Govern IT in SME's; 6…Implementing an IT Governance Framework for IT in SME's; 7…Sourcing Guidelines for SME's; 8…Research Guidance also Applicable to SME's; 8.1 Invest in Management Practices as they have a Better ROI that Investing in IT
8.2 Make Time for Informal Exchanges8.3 Focus on Getting Things Done on Time and on Budget; 8.4 Consider Management Practices that Work; 9…Conclusions; 2 Business Process Management in Small Business: A Case Study; 1…Introduction and Background; 1.1 Small Business and Productivity; 1.2 Research Approach; 2…The Case Organisation; 3…Development of Process Infrastructure; 3.1 Process Governance Framework; 3.2 Process Architecture; 3.3 Process Modelling; 3.4 Process and Procedures Library; 3.5 Resource Allocation; 4…Key Observations; 4.1 BPM Benefits; 4.2 Efficiency
4.3 Compatibility of BPM Tools and Standards4.4 Resources and Skills; 4.5 Culture; 5…Implications; 5.1 BPM Awareness Within Small Businesses; 5.2 BPM Approach in Small Businesses; 5.3 BPM Tools and Techniques for Small Businesses; 5.4 BPM Practitioners; 6…Conclusions; Acknowledgments; References; 3 Information Technology (IT) Security in Small and Medium Enterprises (SMEs); 1…Introduction; 1.1 Background; 1.2 Strategic Importance of SMEs; 1.3 Motivation for the Research; 2…A Socio-Technical Approach to Information Technology Security; 2.1 Human Factors; 2.2 Organizational Factors
2.3 Need for a Different Approach to IT Security3…IT Security Requirements and Metrics; 4…Research Methodology; 5…Results and Analysis; 6…IT Security Framework for SMEs; 7…Conclusion; References; Part IIAdoption and Use; 4 Enterprise Architecture for Small and Medium-Sized Enterprises: A Starting Point for Bringing EA to SMEs, Based on Adoption Models; 1…Introduction; 2…Small and Medium-Sized Enterprises; 2.1 What is a Small and Medium-Sized Enterprise?; 2.2 Relevant Literature of SME Characteristics Influencing IT Adoption; 2.3 Six Well-Documented Characteristics; 2.4 Six Criteria for SMEs
2.5 Problems Faced by SMEs3…Enterprise Architecture; 3.1 Enterprise Architecture Introduction; 3.2 Existing Techniques; 3.3 The Key Concepts of Enterprise Architecture Techniques; 3.4 Five Criteria for EA Techniques; 3.5 Benefits of Enterprise and Business Architecture; 4…Enterprise Architecture for SMEs; 4.1 Adoption Models; 4.1.1 Technology Acceptance Model; 4.1.2 Method Evaluation Model; 4.1.3 Methodological Pragmatism; 4.1.4 Combining Methodological Pragmatism and the Technology Acceptance Model; 4.1.5 Adoption Models of IT in SMEs; 4.2 Bringing EA to SMEs
4.2.1 Increase the Perceived Usefulness
ISBN: 978-3-642-38244-4 ; 978-3-642-38243-7
Other identifiers:
10.1007/978-3-642-38244-4 [DOI]
Classification: Betriebliche Information und Kommunikation
Source:
ECONIS - Online Catalogue of the ZBW
Persistent link: https://www.econbiz.de/10014017051