Journal articles on the topic 'Information Systems Planning (ISP)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Information Systems Planning (ISP).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Lee, Gwo-Guang, and Tom Gough. "An Integrated Framework for Information Systems Planning and Its Initial Application." Journal of Information Technology 8, no. 4 (December 1993): 227–40. http://dx.doi.org/10.1177/026839629300800404.
Full textKamariotou, Maria, Fotis Kitsios, and Michael Madas. "E-Business Strategy for Logistics Companies: Achieving Success through Information Systems Planning." Logistics 5, no. 4 (October 11, 2021): 73. http://dx.doi.org/10.3390/logistics5040073.
Full textKamariotou, Maria, Fotis Kitsios, Chrysanthi Charatsari, Evagelos D. Lioutas, and Michael A. Talias. "Digital Strategy Decision Support Systems: Agrifood Supply Chain Management in SMEs." Sensors 22, no. 1 (December 30, 2021): 274. http://dx.doi.org/10.3390/s22010274.
Full textHong, Soon-Goo, Keng Siau, and Jong-Weon Kim. "The impact of ISP, BPR, and customization on ERP performance in manufacturing SMEs of Korea." Asia Pacific Journal of Innovation and Entrepreneurship 10, no. 1 (December 5, 2016): 39–54. http://dx.doi.org/10.1108/apjie-12-2016-008.
Full textJakimavičius, Marius, and Marija Burinskienė. "ROUTE PLANNING METHODOLOGY OF AN ADVANCED TRAVELLER INFORMATION SYSTEM IN VILNIUS CITY." TRANSPORT 25, no. 2 (June 30, 2010): 171–77. http://dx.doi.org/10.3846/transport.2010.21.
Full textMadhusudan, Therani. "An Intelligent Mediator-Based Framework for Enterprise Application Integration." Journal of Computing and Information Science in Engineering 4, no. 4 (December 1, 2004): 294–304. http://dx.doi.org/10.1115/1.1818686.
Full textQiao, Li Hong, and Jin Zhang. "Integrated Process Planning Based on 3D Product Models." Key Engineering Materials 407-408 (February 2009): 298–302. http://dx.doi.org/10.4028/www.scientific.net/kem.407-408.298.
Full textAppel, Marcus, Michael Walther, and Ulrich Konigorski. "Distributed trajectory planning for multi-agent discrete event systems." at - Automatisierungstechnik 67, no. 9 (September 25, 2019): 751–61. http://dx.doi.org/10.1515/auto-2018-0127.
Full textGoncharenko, S. N., and A. B. Avdeev. "Problem-oriented information analytical system development for management, planningand mining enterprise production activities optimization." Issues of radio electronics, no. 11 (November 20, 2019): 82–86. http://dx.doi.org/10.21778/2218-5453-2019-11-82-86.
Full textBeydina, T., and A. Kukharsky. "INFORMATION SECURITY POLICY: A CRITICAL STUDY OF THE CONTENT OF UNIVERSITY POLICY." Transbaikal State University Journal 27, no. 4 (2021): 55–72. http://dx.doi.org/10.21209/2227-9245-2021-27-4-55-72.
Full textFERREIRA, HUGO M., and DIOGO R. FERREIRA. "AN INTEGRATED LIFE CYCLE FOR WORKFLOW MANAGEMENT BASED ON LEARNING AND PLANNING." International Journal of Cooperative Information Systems 15, no. 04 (December 2006): 485–505. http://dx.doi.org/10.1142/s0218843006001463.
Full textMustafayeva, A. M., and G. S. Bakhshiyeva. "An innovative approach in the study of mechatronic devices." Informatics and Control Problems, no. 1(3) (May 25, 2022): 39–45. http://dx.doi.org/10.54381/icp.2022.1.06.
Full textShaikh, Masood A. "Nurses' Use of Global Information Systems for Provision of Outreach Reproductive Health Services to Internally Displaced Persons." Prehospital and Disaster Medicine 23, S1 (June 2008): s35—s38. http://dx.doi.org/10.1017/s1049023x00024079.
Full textMuskat, Judd. "The Evolution of Applied Geographic Information Systems for Oil Spill Response in California: Rapid Data Dissemination for Informed Decision Making." International Oil Spill Conference Proceedings 2014, no. 1 (May 1, 2014): 1583–95. http://dx.doi.org/10.7901/2169-3358-2014.1.1583.
Full textGitelman, Lazar D., Vladimir V. Dobrodey, and Mikhail V. Kozhevnikov. "Tools for Sustainable Development of Regional Energy Systems." Economy of Region 16 (December 2020): 1208–23. http://dx.doi.org/10.17059/ekon.reg.2020-4-14.
Full textGitelman, Lazar D., Vladimir V. Dobrodey, and Mikhail V. Kozhevnikov. "Tools for Sustainable Development of Regional Energy Systems." Economy of Region 16 (December 2020): 1208–23. http://dx.doi.org/10.17059/ekon.reg.2020-4-14.
Full textMinhas, Akshay, Mitasha Singh, Nerella Satya Narayana Prasad, and Ashok Bhardwaj. "Geospatial Epidemiology of chicken-pox disease in India between 2015-2021: A GIS based analysis." Indian Journal of Community Health 34, no. 1 (March 31, 2022): 78–81. http://dx.doi.org/10.47203/ijch.2022.v34i01.015.
Full textAmankwa, Eric, Marianne Loock, and Elmarie Kritzinger. "Establishing information security policy compliance culture in organizations." Information & Computer Security 26, no. 4 (October 8, 2018): 420–36. http://dx.doi.org/10.1108/ics-09-2017-0063.
Full textAmankwa, Eric, Marianne Loock, and Elmarie Kritzinger. "Information Security Policy Compliance Culture." International Journal of Technology and Human Interaction 17, no. 4 (October 2021): 75–91. http://dx.doi.org/10.4018/ijthi.2021100105.
Full textRostami, Elham, Fredrik Karlsson, and Ella Kolkowska. "The hunt for computerized support in information security policy management." Information & Computer Security 28, no. 2 (January 8, 2020): 215–59. http://dx.doi.org/10.1108/ics-07-2019-0079.
Full textTurel, Ofir, Qinghua He, and Yatong Wen. "Examining the Neural Basis of Information Security Policy Violations: A Noninvasive Brain Stimulation Approach." MIS Quarterly 45, no. 4 (October 14, 2021): 1715–44. http://dx.doi.org/10.25300/misq/2021/15717.
Full textTsohou, Aggeliki, and Philipp Holtkamp. "Are users competent to comply with information security policies? An analysis of professional competence models." Information Technology & People 31, no. 5 (October 1, 2018): 1047–68. http://dx.doi.org/10.1108/itp-02-2017-0052.
Full textSchilling, Jannik, and Jens Tränckner. "Generate_SWMM_inp: An Open-Source QGIS Plugin to Import and Export Model Input Files for SWMM." Water 14, no. 14 (July 20, 2022): 2262. http://dx.doi.org/10.3390/w14142262.
Full textKoohang, Alex, Jonathan Anderson, Jeretta Horn Nord, and Joanna Paliszkiewicz. "Building an awareness-centered information security policy compliance model." Industrial Management & Data Systems 120, no. 1 (December 4, 2019): 231–47. http://dx.doi.org/10.1108/imds-07-2019-0412.
Full textSong, Yu Chuan, Y. J. Wang, J. X. Yin, Fei Liu, and L. H. Jiang. "A Kind of Information System Planning Model: The Application in an Automobile Manufacturing Enterprise." Materials Science Forum 626-627 (August 2009): 645–50. http://dx.doi.org/10.4028/www.scientific.net/msf.626-627.645.
Full textObaid, Ahmed J., and Firas Thamer Al-Rawi. "3rd International Conference on Smart Cities and Sustainable Planning (SCSP 2022)." IOP Conference Series: Earth and Environmental Science 1129, no. 1 (January 1, 2023): 011001. http://dx.doi.org/10.1088/1755-1315/1129/1/011001.
Full textCostanzo, Don. "AUTOMATED ICS: A FRAMEWORK FOR SUCCESS." International Oil Spill Conference Proceedings 2001, no. 2 (March 1, 2001): 1033–34. http://dx.doi.org/10.7901/2169-3358-2001-2-1033.
Full textGuan, Bowen, and Carol Hsu. "The role of abusive supervision and organizational commitment on employees' information security policy noncompliance intention." Internet Research 30, no. 5 (May 2, 2020): 1383–405. http://dx.doi.org/10.1108/intr-06-2019-0260.
Full textCarmi, Golan, and Dan Bouhnik. "The Effect of Rational Based Beliefs and Awareness on Employee Compliance with Information Security Procedures: A Case Study of a Financial Corporation in Israel." Interdisciplinary Journal of Information, Knowledge, and Management 15 (2020): 109–25. http://dx.doi.org/10.28945/4596.
Full textAurigemma, Salvatore, and Thomas Mattson. "Deterrence and punishment experience impacts on ISP compliance attitudes." Information & Computer Security 25, no. 4 (October 9, 2017): 421–36. http://dx.doi.org/10.1108/ics-11-2016-0089.
Full textTopa, Ioanna, and Maria Karyda. "From theory to practice: guidelines for enhancing information security management." Information & Computer Security 27, no. 3 (July 8, 2019): 326–42. http://dx.doi.org/10.1108/ics-09-2018-0108.
Full textShih, Hung-Pin, Kee-hung Lai, Xitong Guo, and T. C. E. Cheng. "Believe It or Not." Journal of Global Information Management 29, no. 6 (November 2021): 1–18. http://dx.doi.org/10.4018/jgim.294329.
Full textKuo, Kuang-Ming, Paul C. Talley, and Dyi-Yih Michael Lin. "Hospital Staff’s Adherence to Information Security Policy: A Quest for the Antecedents of Deterrence Variables." INQUIRY: The Journal of Health Care Organization, Provision, and Financing 58 (January 2021): 004695802110295. http://dx.doi.org/10.1177/00469580211029599.
Full textGenuis, Shelagh K. "Kuhlthau’s Classic Research on the Information Search Process (ISP) Provides Evidence for Information Seeking as a Constructivist Process." Evidence Based Library and Information Practice 2, no. 4 (December 7, 2007): 80. http://dx.doi.org/10.18438/b88d0c.
Full textRafikov, Rafik, and Mikhail Kulikov. "PROCESS ENGINEERING OF LOCOMOTIVE REPAIR." Transport engineering 2022, no. 8 (August 7, 2022): 33–43. http://dx.doi.org/10.30987/2782-5957-2022-8-33-43.
Full textRafikov, Rafik, and Mikhail Kulikov. "PROCESS ENGINEERING OF LOCOMOTIVE REPAIR." Transport engineering 2022, no. 8 (August 7, 2022): 33–43. http://dx.doi.org/10.30987/2782-5957-2022-8-33-43.
Full textKucera, Kristen L., Dustin W. Currie, Erin B. Wasserman, Zachary Y. Kerr, Leah Cox Thomas, Stephen Paul, and R. Dawn Comstock. "Incidence of Sport-Related Internal Organ Injuries Due to Direct-Contact Mechanisms Among High School and Collegiate Athletes Across 3 National Surveillance Systems." Journal of Athletic Training 54, no. 2 (February 1, 2019): 152–64. http://dx.doi.org/10.4085/1062-6050-271-17.
Full textLi, Han, Xin (Robert) Luo, and Yan Chen. "Understanding Information Security Policy Violation from a Situational Action Perspective." Journal of the Association for Information Systems 22, no. 3 (2021): 739–72. http://dx.doi.org/10.17705/1jais.00678.
Full textNAZARI-SHIRKOUHI, S., A. ANSARINEJAD, SS MIRI-NARGESI, V. MAJAZI DALFARD, and K. REZAIE. "INFORMATION SYSTEMS OUTSOURCING DECISIONS UNDER FUZZY GROUP DECISION MAKING APPROACH." International Journal of Information Technology & Decision Making 10, no. 06 (November 2011): 989–1022. http://dx.doi.org/10.1142/s0219622011004683.
Full textPark, Keumsun, Minah Chae, and Jae Hyuk Cho. "Image Pre-Processing Method of Machine Learning for Edge Detection with Image Signal Processor Enhancement." Micromachines 12, no. 1 (January 11, 2021): 73. http://dx.doi.org/10.3390/mi12010073.
Full textPark, Keumsun, Minah Chae, and Jae Hyuk Cho. "Image Pre-Processing Method of Machine Learning for Edge Detection with Image Signal Processor Enhancement." Micromachines 12, no. 1 (January 11, 2021): 73. http://dx.doi.org/10.3390/mi12010073.
Full textSavarnejad, Atoosa. "ISP security consortium formed." Network Security 1997, no. 6 (June 1997): 4. http://dx.doi.org/10.1016/s1353-4858(97)89518-9.
Full textPambudi, Ryo, and Much Aziz Muslim. "Implementasi Policy Base Routing dan Failover Menggunakan Router Mikrotik untuk Membagi Jalur Akses Internet di FMIPA Unnes." Jurnal Teknologi dan Sistem Komputer 5, no. 2 (May 2, 2017): 57. http://dx.doi.org/10.14710/jtsiskom.5.2.2017.57-61.
Full textRowley, Jennifer. "Strategic information systems planning." Information Services & Use 15, no. 1 (January 1, 1995): 57–66. http://dx.doi.org/10.3233/isu-1995-15108.
Full textHackney, Ray, John Kawalek, and Gurpreet Dhillon. "Strategic Information Systems Planning." Journal of Organizational and End User Computing 11, no. 2 (April 1999): 3–12. http://dx.doi.org/10.4018/joeuc.1999040101.
Full textLederer, Albert L., and Veronica Gardiner. "STRATEGIC INFORMATION SYSTEMS PLANNING." Information Systems Management 9, no. 3 (January 1992): 13–20. http://dx.doi.org/10.1080/10580539208906877.
Full textPourreza, Saba, Misagh Faezipour, and Miad Faezipour. "Eye-SCOR: A Supply Chain Operations Reference-Based Framework for Smart Eye Status Monitoring Using System Dynamics Modeling." Sustainability 14, no. 14 (July 20, 2022): 8876. http://dx.doi.org/10.3390/su14148876.
Full textCaesar, M., and J. Rexford. "BPG routing policies in ISP networks." IEEE Network 19, no. 6 (November 2005): 5–11. http://dx.doi.org/10.1109/mnet.2005.1541715.
Full textChandran, Avinash, Sarah N. Morris, Erin B. Wasserman, Adrian J. Boltz, and Christy L. Collins. "Methods of the National Collegiate Athletic Association Injury Surveillance Program, 2014–2015 Through 2018–2019." Journal of Athletic Training 56, no. 7 (July 1, 2021): 616–21. http://dx.doi.org/10.4085/1062-6050-406-20.
Full textMasri, Akram, and James E. Moore II. "Integrated Planning Information Systems: Disaster Planning Analysis." Journal of Urban Planning and Development 121, no. 1 (March 1995): 19–39. http://dx.doi.org/10.1061/(asce)0733-9488(1995)121:1(19).
Full text