Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

2009

Business Intelligence

Technology

Articles 1 - 3 of 3

Full-Text Articles in Management Information Systems

Business Risks: When Is Fails To Detect Circumvention Activities, Stanley X. Lewis Jr., J. Scott Magruder, Eddy J. Burks, Carl Smolinski Jan 2009

Business Risks: When Is Fails To Detect Circumvention Activities, Stanley X. Lewis Jr., J. Scott Magruder, Eddy J. Burks, Carl Smolinski

Journal of International Technology and Information Management

A business must recognize and address various risk factors when establishing and maintaining its information system. The overall risk to management is that the control environment does not protect proprietary business data and the financial reporting system that produces financial statements and other information used by investors, creditors and regulatory agencies. These risks require that management implement efforts to ensure the integrity and effectiveness of control procedures over business activities while being aware of additional system issues such as failing to adequately consider other risks which are more business-oriented including the risk of failing to prevent or detect fraudulent or …


Rapid Development Of Multimedia Instructional Modules For Information Technology Education, Nanda Ganesan Jan 2009

Rapid Development Of Multimedia Instructional Modules For Information Technology Education, Nanda Ganesan

Journal of International Technology and Information Management

A multifaceted learning model was developed for implementing e-learning in a largely commuter campus. The primary objective of the model was to build a flexible learning environment that combined the learning effectiveness of in-class learning with the flexibility and accessibility of online learning. One of the components of the model was the multimedia instructional modules produced to teach various Information Technology courses. Several different types of modules were produced representing chalk-and-talk type of lectures, PowerPoint presentations and software tutorials. The chalk-and-talk type of lecture modules and the software tutorials that emulated the in-class learning experience contributed positively towards enhancing the …


Egypt's Information Society Strategy: A Critical Lexicography, Neil Mcbride, Bernd Carsten Stahl Jan 2009

Egypt's Information Society Strategy: A Critical Lexicography, Neil Mcbride, Bernd Carsten Stahl

Journal of International Technology and Information Management

The development of ICT policies within developing countries in the past ten years has opened up a new area for study. These documents chart the ambitions of the countries for the use of ICT to promote rapid development. As such they are intercultural documents, developing at the interface between the culture of the country and western economic culture. This paper develops a critical approach to understanding these documents and studying their message. The approach involves the preparation of a critical dictionary which identifies relevant terms within the ICT policy document and reflects on their multiple meanings. The approach was applied …