Flylib.com
Responsible Management of Information Systems
Responsible Management of Information Systems
ISBN: 1591401720
EAN: 2147483647
Year: 2004
Pages: 52
Authors:
Bernd Stahl
BUY ON AMAZON
Table of Contents
BackCover
Responsible Management of Information Systems
Preface
Chapter 1: Information Systems and Business Information Technology
INFORMATION TECHNOLOGY
BUSINESS INFORMATION TECHNOLOGY
Chapter 2: Ethics and Morality
THE GERMAN TRADITION
THE FRENCH TRADITION
PROBLEMS OF THE DISTINCTION BETWEEN ETHICS AND MORALITY
Chapter 3: Why Responsibility and Information Systems?
THE RISE OF RESPONSIBILITY
SOCIETY, RISK, AND RESPONSIBILITY
RESPONSIBILITY AS THE ANSWER TO OUR PROBLEMS
THE SIMILARITY OF INFORMATION SYSTEMS AND RESPONSIBILITY
Chapter 4: The Theory of Responsibility and Information Systems
PROBLEMS OF RESPONSIBILITY AND INFORMATION SYSTEMS
Chapter 5: Reflective Responsibility
REFLECTIVE APPLICATION OF THE SHARED FEATURES OF RESPONSIBILITY
CONSEQUENCES OF REFLECTIVE RESPONSIBILITY
Chapter 6: Reflective Responsibility and the Management of Information Systems
AN EXAMPLE: THE PROBLEM OF PRIVACY AND EMPLOYEE SURVEILLANCE
DIMENSIONS OF REFLECTIVE RESPONSIBILITY AND IT
REALISATION OF RESPONSIBILITY IN INFORMATION SYSTEMS
THE ADVANTAGES OF REFLECTIVE RESPONSIBILITY IN INFORMATION SYSTEMS
A CHECKLIST FOR MANAGERIAL RESPONSIBILITY IN INFORMATION SYSTEMS
Chapter 7: Conclusion
References
Endnotes
Glossary
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_K
Index_L
Index_M
Index_O
Index_P
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Responsible Management of Information Systems
ISBN: 1591401720
EAN: 2147483647
Year: 2004
Pages: 52
Authors:
Bernd Stahl
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 1.1 Install OpenSSH to Replace the Remote Access Protocols with Encrypted Versions
Step 3.2 Use PuTTY / plink as a Command Line Replacement for telnet / rlogin
Step 4.2 Passphrase Considerations
Step 4.4 How to Generate a Key Using PuTTY
Step 6.1 Port Forwarding
A Practitioners Guide to Software Test Design
The Testing Process
Section I - Black Box Testing Techniques
Decision Table Testing
Section III - Testing Paradigms
Defect Taxonomies
Visual C# 2005 How to Program (2nd Edition)
Base Classes and Derived Classes
Drawing Polygons and Polylines
Trees
C.3. The Locals and Watch Windows
J.10. Class BalanceInquiry
C & Data Structures (Charles River Media Computer Engineering)
Introduction to the C Language
Storage of Variables
Union
Stacks and Queues
Miscellaneous Problems
Cisco IOS Cookbook (Cookbooks (OReilly))
Restricting Command Access
Setting Up Frame Relay with Point-to-Point Subinterfaces
NTP Authentication
Using a Remote Log Server
Manually Configuring IPv6 Addresses on an Interface
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The AJAX Revolution
The Pulsing Heart of ASP.NET AJAX
Partial Page Rendering
The AJAX Control Toolkit
Building AJAX Applications with ASP.NET
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies