Flylib.com
Responsible Management of Information Systems
Responsible Management of Information Systems
ISBN: 1591401720
EAN: 2147483647
Year: 2004
Pages: 52
Authors:
Bernd Stahl
BUY ON AMAZON
Table of Contents
BackCover
Responsible Management of Information Systems
Preface
Chapter 1: Information Systems and Business Information Technology
INFORMATION TECHNOLOGY
BUSINESS INFORMATION TECHNOLOGY
Chapter 2: Ethics and Morality
THE GERMAN TRADITION
THE FRENCH TRADITION
PROBLEMS OF THE DISTINCTION BETWEEN ETHICS AND MORALITY
Chapter 3: Why Responsibility and Information Systems?
THE RISE OF RESPONSIBILITY
SOCIETY, RISK, AND RESPONSIBILITY
RESPONSIBILITY AS THE ANSWER TO OUR PROBLEMS
THE SIMILARITY OF INFORMATION SYSTEMS AND RESPONSIBILITY
Chapter 4: The Theory of Responsibility and Information Systems
PROBLEMS OF RESPONSIBILITY AND INFORMATION SYSTEMS
Chapter 5: Reflective Responsibility
REFLECTIVE APPLICATION OF THE SHARED FEATURES OF RESPONSIBILITY
CONSEQUENCES OF REFLECTIVE RESPONSIBILITY
Chapter 6: Reflective Responsibility and the Management of Information Systems
AN EXAMPLE: THE PROBLEM OF PRIVACY AND EMPLOYEE SURVEILLANCE
DIMENSIONS OF REFLECTIVE RESPONSIBILITY AND IT
REALISATION OF RESPONSIBILITY IN INFORMATION SYSTEMS
THE ADVANTAGES OF REFLECTIVE RESPONSIBILITY IN INFORMATION SYSTEMS
A CHECKLIST FOR MANAGERIAL RESPONSIBILITY IN INFORMATION SYSTEMS
Chapter 7: Conclusion
References
Endnotes
Glossary
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_K
Index_L
Index_M
Index_O
Index_P
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Responsible Management of Information Systems
ISBN: 1591401720
EAN: 2147483647
Year: 2004
Pages: 52
Authors:
Bernd Stahl
BUY ON AMAZON
Beginning Cryptography with Java
Symmetric Key Cryptography
Message Digests, MACs, and HMACs
Distinguished Names and Certificates
Key and Certificate Management Using Keystores
Appendix A Solutions to Exercises
Java How to Program (6th Edition) (How to Program (Deitel))
Essentials of Counter-Controlled Repetition
(Optional) Software Engineering Case Study: Identifying Class Operations
Summary
Client/Server Tic-Tac-Toe Using a Multithreaded Server
Class StringBuffer
Introduction to 80x86 Assembly Language and Computer Architecture
Basic Instructions
String Operations
Appendix B Useful MS-DOS Commands
Appendix C MASM 6.11 Reserved Words
Appendix E 80x86 Instructions (by Opcode)
An Introduction to Design Patterns in C++ with Qt 4
Subobjects
Models and Views
Review Questions
Inheritance in Detail
Qt References
GO! with Microsoft Office 2003 Brief (2nd Edition)
Project 1A. Exploring Outlook 2003
Problem Solving
Mastery Assessments
Objective 6. Specify Text Criteria in a Query
Problem Solving
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Authentication, Authorization, and Accounting (AAA)
Defining an Authentication Server
Summary
Deployment Scenarios
Address Translation
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies