Literatura científica selecionada sobre o tema "Information technology"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Information technology".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Information technology"
Kumar, Dr M. Ashok, e R. Sathya Devi. "Information Technology in Banking". Paripex - Indian Journal Of Research 3, n.º 3 (15 de janeiro de 2012): 112–14. http://dx.doi.org/10.15373/22501991/mar2014/39.
Texto completo da fonteJahnavi, Mylavarapu Monika. "Information Technology and Indian Agriculture". International Journal of Trend in Scientific Research and Development Special Issue, Special Issue-ICDEBI2018 (3 de outubro de 2018): 255–57. http://dx.doi.org/10.31142/ijtsrd18717.
Texto completo da fonteDr.S.Rajamohan, Dr S. Rajamohan, e K. Subha K.Subha. "Information Technology in Financial Inclusion". Paripex - Indian Journal Of Research 3, n.º 7 (1 de janeiro de 2012): 1–2. http://dx.doi.org/10.15373/22501991/july2014/37.
Texto completo da fonteBenamati, John “Skip”, Albert L. Lederer e Meenu Singh. "Changing information technology and information technology management". Information & Management 31, n.º 5 (janeiro de 1997): 275–88. http://dx.doi.org/10.1016/s0378-7206(96)01091-9.
Texto completo da fonteReddy, Dr B. Venkatesula. "Role of Information Technology in Society". Indian Journal of Applied Research 4, n.º 1 (1 de outubro de 2011): 278–79. http://dx.doi.org/10.15373/2249555x/jan2014/80.
Texto completo da fonteSorokatyi, R., A. Dykha, O. Pasichnyk e T. Skrypnyk. "Computer information technology modeling tribological systems". Problems of tribology 25, n.º 2 (5 de junho de 2020): 59–66. http://dx.doi.org/10.31891/2079-1372-2020-96-2-59-66.
Texto completo da fonteBrailer, David J. "Information Technology". Disease Management & Health Outcomes 1, n.º 5 (maio de 1997): 227–32. http://dx.doi.org/10.2165/00115677-199701050-00001.
Texto completo da fonteSahu, G. P., e Prabhudatt Dwivedi. "Information Technology". Journal of Cases on Information Technology 10, n.º 3 (julho de 2008): 48–57. http://dx.doi.org/10.4018/jcit.2008070105.
Texto completo da fonteTelem, Moshe. "Information Technology". Journal of Research on Computing in Education 26, n.º 1 (setembro de 1993): 123–42. http://dx.doi.org/10.1080/08886504.1993.10782082.
Texto completo da fonteSIMPSON, ROY L. "Information Technology". Nursing Management (Springhouse) 29, n.º 8 (agosto de 1998): 20???22. http://dx.doi.org/10.1097/00006247-199808000-00007.
Texto completo da fonteTeses / dissertações sobre o assunto "Information technology"
Burch-Bynum, Melvin D. "DoD information technology acquisition: delivering information technology capabilities expeditiously". Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/37591.
Texto completo da fonteMaintaining an information advantage for the Department of Defense (DoD) and its military departments is critical to national defense objectives and the acquisition of new information technology (IT) is key. The DoD seeks to quickly acquire IT systems that meet requirements and are within budget; however, this goal has been very difficult to achieve given the cumbersome and deliberate process through which IT systems have been acquired. Essentially, the DoDs acquisition process cannot keep pace with the rapid development of IT systems that occurs in the commercial sector. For years, the DoD has relied on a common approach in acquiring different systems and services. This approach has been laced with inefficiencies and inadequacies that have resulted in prolonged schedules as well as increased cost. Currently, the DoD is implementing a new IT acquisition process; however, this new process does not resolve all the issues that have plagued IT acquisition. This study will identify the causes or impeding factors that have prevented the DoD from acquiring new IT systems in a timely manner and will recommend alternative solutions to solving the problems. Ultimately, this thesis contributes to the DoDs efforts to resolve the issues that continue to undermine timely IT acquisition.
De, Jongh Henk. "Information technology outsourcing". Thesis, Stellenbosch : Stellenbosch University, 2003. http://hdl.handle.net/10019.1/53467.
Texto completo da fonteENGLISH ABSTRACT: The study project examines the concept of information technology (IT) outsourcing to external service providers. It is a relatively new concept in the South African scenario and there are many risks associated with the process that can cause a company to loose large amounts of money if outsourcing is not done right. The study project will aim to examine the most important aspects regarding IT outsourcing in order to reduce the risks associated with the process. The definition of IT outsourcing is the practice of transferring an organisation's computer centre operations, telecommunications networks, or applications development to external vendors of these services. There are different variations of outsourcing applicable to IT, for example: contracting out, outsourcing, in sourcing and co-sourcing. Companies have different reasons for outsourcing and the risks associated with the process have to be taken into account when embarking on an outsourcing initiative. With IT outsourcing there are different services that can be outsourced, for example: mainframe services, desktop computer services, security services and different application services. The decision to outsource a specific area of IT is a strategic issue and the risks, costs, and selection of the service provider are all very important factors to take into account. One of the main factors that any company should take into account when embarking on a big initiative is of course costs. The aim is the reduction of costs of the specific outsourced area. Therefore the necessary measures need to be in place to measure costs before and after the outsourcing process. It could happen that the outsourcing process do not provide the reduced cost benefits envisaged initially. This could be due to hidden costs that were not taken into account when the outsourcing initiative was planned. Normally the outsourcing process is driven by a structured project and numerous important factors need to be taken into account when managing the whole process. The factors include: the vendor evaluation process, setup of the service level agreement, the request for proposal, relationship with the supplier, communication of the whole process inside the company, the contract between the two parties, and the transition period with the measuring of results thereafter. The current IT skills shortage in South Africa is causing companies to rethink their IT strategies and make use of external service providers to supply them with the necessary skills to get the job done. The research illustrates this fact that IT consulting has one of the highest adoption rates currently and with regard to the future. Full blown outsourcing is still a relatively new concept in South Africa and companies will only adopt the concept as soon as it has proved to be successful and cost effective. As mentioned it is important that a structured methodology should be used to drive an outsourcing process. It is important that the approach is structured around proven project management principles with the correct measures in place to support and sustain the whole process. Outsourcing of IT services is a strategic decision that a company must take and the risks associated with the process mean that it must be planned and executed very carefully. Outsourcing has various risks associated with it like the appointment of the wrong service provider. However, the outsourcing process can also have its merits and the most important of these are most probably lower costs, new IT skills, and better service. The shortage of IT skills in South Africa makes the idea of outsourcing more and more attractive because of the fact that companies can now "buy" the skills without having to commit to long term permanent employment contracts for permanent staff.
AFRIKAANSE OPSOMMING: Die navorsingsverslag handel oor die konsep van uitkontraktering van inligtingstegnologie(IT) dienste aan eksterne diensverskaffers. Aangesien dit 'n relatiewe nuwe tendens in Suid Afrika se IT bedryf is, en die risiko bestaan dat 'n maatskappy groot geldelike verliese kan ly indien dit nie reg aangepak word nie, word daar gepoog om na die belangrikste aspekte van uitkontraktering te kyk om die risikos daaraan verbonde so laag as moontlik te hou. Die definisie van IT uitkontraktering is die oordrag van 'n organisasie se rekenaar sentrum operasies, telekommunikasie netwerk, of toepassing ontwikkeling na 'n eksterne verskaffer van hierdie dienste. Daar is verskillende variasies van uitkontraktering van toepassing op IT soos byvoorbeeld: uitkontraktering, inkontraktering, en gesamentlike kontraktering. Maatskappye het verskillende redes om 'n diens uit te kontrakteer en die risikos verbonde aan die proses moet sorgvuldig in gedagte gehou word wanneer die uitkontrakteringsproses aangepak word. Met IT uitkontraktering is daar verskillende dienste wat uitgekontrakteer kan word soos byvoorbeeld: hoofraam dienste, persoonlike rekenaar dienste, sekuriteitsdienste en verskeie rekenaar applikasie dienste. Die besluit om 'n spesifieke area van IT uit te kontrakteer is 'n strategiese kwessie vir die maatskappy en die risikos, kostes en keuse van eksterne diensverskaffer is almal baie belangrike faktore wat in gedagte gehou moet word. Een van die vernaamste faktore wat enige maatskappy in ag behoort te neem wanneer 'n groot inisiatief aangepak word, is natuurlik kostes. Die doel van uitkontraktering is om die kostes van die spesifieke area te verlaag. Daarom moet die nodige maatreëls in plek wees om die kostes vooraf en na die uitkontrakteringsproses te meet. Die uitkontraktering inisiatief kan die maatskappy egter baie duur te staan kom en glad nie die koste voordele bied wat aanvanklik beplan is nie. Dit kan wees as gevolg van verskuilde kostes wat nie met die beplanning van die proses in ag geneem is nie. Gewoonlik word die uitkontrakteringsproses gedryf deur 'n gestruktureerde projek en verskeie belangrike faktore moet in ag geneem word vir die hele proses. Die faktore sluit in: die evaluasieproses om die regte diensverskaffer aan te stel, die opstel van die regte dokumentasie in terme van die diensvoorstel voorlegging, verhouding met die diensverskaffer, die opstel van die diensvlak ooreenkoms, kommunikasie oor die hele proses binne die maatskappy, die kontrak tussen die twee partye, oorgangstadium en die meting van voordele daarna. Die huidige tekort aan IT vaardighede in Suid Afrika veroorsaak dat maatskappye hul IT strategie moet herdink en die opsie van eksterna diensverskaffers wat die nodige vaardighede kan verskaf, oorweeg word. Die studie illustreer hierdie feit dat IT konsultasie een van die hoogste vlakke van ingebruikneming tans en vir die toekoms het. Volledige IT funksie uitkontraktering is nog 'n relatiewe nuwe konsep in Suid Afrika en maatskappye sal slegs die idee aanneem sodra uitkontraktering as suksesvol en koste effektief bewys is. Soos reeds genoem is dit belangrik dat 'n gestruktureerde metodologie gebruik word om 'n uitkontrakteringsinisiatief te dryf. Dit is belangrik dat die aanslag geskoei is rondom bewese projekbestuursbeginsels en dat die regte maatreëls getref is om die proses te ondersteun. Uitkontraktering van IT dienste is 'n strategiese besluit wat 'n maatskappy moet neem. Die risikos daaraan verbonde veroorsaak dat die beplanning en aanpak van die proses baie deeglik en noukeurig gedoen moet word. Uitkontraktering het verskeie risikos soos om die verkeerde eksterne diensverskaffer te kies, maar kan ook voordelig vir die maatskappy wees en die grootste voordele wat 'n maatskappy kan verwag is verlaagde kostes en nuwe IT vaardighede. Die probleem van 'n tekort aan goed opgeleide IT personeel in Suid Afrika maak die idee van uitkontraktering al meer aanlokliker omdat dit 'n goeie manier is om goeie vaardighede in te "koop".
Морозова, Ірина Анатоліївна, Ирина Анатольевна Морозова, Iryna Anatoliivna Morozova e M. I. Bilan. "Information communications technology". Thesis, Вид-во СумДУ, 2011. http://essuir.sumdu.edu.ua/handle/123456789/22209.
Texto completo da fonteSananda, Vikash. "Information Technology Offshoring". Kent State University / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=kent1209416975.
Texto completo da fonteSacchetti, Nicola. "Green information technology". Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2011. http://amslaurea.unibo.it/1861/.
Texto completo da fonteLindsay, Jon Randall. "Information friction : information technology and military performance". Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/65320.
Texto completo da fonteCataloged from PDF version of thesis.
Includes bibliographical references (p. 519-544).
Militaries have long been eager to adopt the latest technology (IT) in a quest to improve knowledge of and control over the battlefield. At the same time, uncertainty and confusion have remained prominent in actual experience of war. IT usage sometimes improves knowledge, but it sometimes contributes to tactical blunders and misplaced hubris. As militaries invest intensively in IT, they also tend to develop larger headquarters staffs, depend more heavily on planning and intelligence, and employ a larger percentage of personnel in knowledge work rather than physical combat. Both optimists and pessimists about the so-called "revolution in military affairs" have tended to overlook the ways in which IT is profoundly and ambiguously embedded in everyday organizational life. Technocrats embrace IT to "lift the fog of war," but IT often becomes a source of breakdowns, misperception, and politicization. To describe the conditions under which IT usage improves or degrades organizational performance, this dissertation develops the notion of information friction, an aggregate measure of the intensity of organizational struggle to coordinate IT with the operational environment. It articulates hypotheses about how the structure of the external battlefield, internal bureaucratic politics, and patterns of human-computer interaction can either exacerbate or relieve friction, which thus degrades or improves performance. Technological determinism alone cannot account for the increasing complexity and variable performances of information phenomena. Information friction theory is empirically grounded in a participant-observation study of U.S. special operations in Iraq from 2007 to 2008. To test the external validity of insights gained through fieldwork in Iraq, an historical study of the 1940 Battle of Britain examines IT usage in a totally different structural, organizational, and technological context.
(cont.) These paired cases show that high information friction, and thus degraded performance, can arise with sophisticated IT, while lower friction and impressive performance can occur with far less sophisticated networks. The social context, not just the quality of technology, makes all the difference. Many shorter examples from recent military history are included to illustrate concepts. This project should be of broad interest to students of organizational knowledge, IT, and military effectiveness.
by Jon Randall Lindsay.
Ph.D.
Kfutwa, Fukah. "Motivational Factors for Growth in Small and Medium Sized Enterprises (SMEs) : Information Technology Perspective". Thesis, Jönköping University, JIBS, Business Informatics, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-844.
Texto completo da fonteSmall and Medium Size Enterprises (SMEs) constitute the backbone of many economies in the world today. This is because they are creating new jobs and contributing positively to their respective economies in which Sweden is not an exception and par-ticularly the municipality of Jonkoping. SMEs invest in IT to gain access to integration of transactions oriented data and business processes.
This thesis, motivational factors for growth in SMEs – (IT perspective) give an overview of how SMEs grow as a result of the introduction and implementation of IT. Information Technology (IT) is seen to be a motivational factor for the growth of SMEs. This is because it acts like an enabler to their businesses and the current business environment.
To answer the research question, I conducted an empirical study of some companies in Jonkoping that are using IT as a motivational factor for growth. Interviews were con-ducted through the use of a structured questionnaire and to a lesser extent, unstructured questionnaire.
Results from studies portrayed that, these companies introduced and implemented IT as a motivational factor for similar reasons though with different objectives.
Marwat, Muhammad. "Information Technology and Youths". UOIT, 2009. http://hdl.handle.net/10155/53.
Texto completo da fonteCrawford, William Charles Richards. "Mapping healthcare information technology". Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/58179.
Texto completo da fonteCataloged from PDF version of thesis.
Includes bibliographical references (p. 56-58).
In this thesis I have developed a map of Healthcare Information Technology applications used in the United States for care delivery, healthcare enterprise management, clinical support, research and patient engagement. No attempt has previously been made to develop such a taxonomy for use by healthcare policy makers and on-the-spot decision makers. Using my own fifteen years of experience in HIT, along with an extensive set of literature reviews, interviews and on-site research I assembled lists of applications and organized them into categories based on primary workflows. Seven categories of HIT systems emerged, which are Practice Tools, Advisory Tools, Financial Tools, Remote Healthcare Tools, Clinical Research Tools, Health 2.0 Tools and Enterprise Clinical Analytics, each of which have different operational characteristics and user communities. The results of this pilot study demonstrate that a map is possible. The draft map presented here will allow researchers and investors to focus on developing the next generation of HIT tools, including software platforms that orchestrate a variety of healthcare transactions, and will support policy makers as they consider the impact of Federal funding for HIT deployment and adoption. Further studies will refine the map, adding an additional level of detail below the seven categories established here, thus supporting tactical decision making at the hospital and medical practice level.
by William Charles Richards Crawford.
S.M.
S, Kralina G., e Tupota E. V. "The information retrieval technology". Thesis, Київ, Національний авіаційний університет, 2009. http://er.nau.edu.ua/handle/NAU/18794.
Texto completo da fonteLivros sobre o assunto "Information technology"
Fox, Richard. Information Technology. Second edition. | Boca Raton : CRC Press, 2020.: Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781003050971.
Texto completo da fonteText, REtrieval Conference (13th 2004 Gaithersburg Md ). Information technology. Washington: U.S. G.P.O., 2005.
Encontre o texto completo da fontePassey, Don, e Brian Samways, eds. Information Technology. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35081-3.
Texto completo da fonteReis, Ricardo, ed. Information Technology. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/b98987.
Texto completo da fonteHarper, Harriet. Information Technology. London: Macmillan Education UK, 1988. http://dx.doi.org/10.1007/978-1-349-11675-1.
Texto completo da fonteHarper, Harriet. Information Technology. London: Macmillan Education UK, 1988. http://dx.doi.org/10.1007/978-1-349-10097-2.
Texto completo da fonteSecurity, Illinois Department of Employment. Information technology. Springfield, Ill.]: Illinois Dept. of Employment Security, 2007.
Encontre o texto completo da fonteBrowning, John. Information technology. [London]: [Economist Newspapers], 1990.
Encontre o texto completo da fonteStoyles, Pennie. Information technology. North Mankato, Minn: Smart Apple Media, 2003.
Encontre o texto completo da fonteFrost, Roger. Information technology. Glasgow: Nelson Blackie, 1993.
Encontre o texto completo da fonteCapítulos de livros sobre o assunto "Information technology"
Vance, David E. "Information Technology". In Corporate Restructuring, 185–95. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01786-5_12.
Texto completo da fonteBenton, David. "Information technology". In Developing Your Career in Nursing, 148–64. Boston, MA: Springer US, 1990. http://dx.doi.org/10.1007/978-1-4899-7274-3_11.
Texto completo da fonteSilberston, Aubrey, e Christopher P. Raymond. "Information Technology". In The Changing Industrial Map of Europe, 19–42. London: Palgrave Macmillan UK, 1996. http://dx.doi.org/10.1007/978-1-349-24357-0_2.
Texto completo da fonteBeynon-Davies, Paul. "Information Technology". In Information Systems Development, 36–45. London: Macmillan Education UK, 1998. http://dx.doi.org/10.1007/978-1-349-14931-5_5.
Texto completo da fonteWeik, Martin H. "information technology". In Computer Science and Communications Dictionary, 779. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_8972.
Texto completo da fonteFranklin, J. Rod. "Information Technology". In Operations, Logistics and Supply Chain Management, 165–90. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-92447-2_8.
Texto completo da fonteMartich, G. D., D. C. Van Pelt e D. Lovasik. "Information Technology". In Update in Intensive Care and Emergency Medicine, 133–51. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/3-540-29730-8_10.
Texto completo da fonteSinding-Larsen, Henrik. "Information Technology". In The Springer Series on Artificial Intelligence and Society, 119–30. London: Springer London, 1991. http://dx.doi.org/10.1007/978-1-4471-1731-5_14.
Texto completo da fonteSpaniel, Drew. "Information Technology". In Securing the Nation's Critical Infrastructures, 209–28. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003243021-14.
Texto completo da fonteMcDonald, Brian. "Information Technology". In The World Trading System, 159–60. London: Palgrave Macmillan UK, 1998. http://dx.doi.org/10.1057/9780230379701_18.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Information technology"
"Information Technology". In Proceedings of the International Conference Mixed Design of Integrated Circuits and System, 2006. MIXDES 2006. IEEE, 2006. http://dx.doi.org/10.1109/mixdes.2006.1706690.
Texto completo da fonte"Information technology". In 2014 7th International Symposium on Telecommunications (IST). IEEE, 2014. http://dx.doi.org/10.1109/istel.2014.7000713.
Texto completo da fonteFrampton, Keith, James A. Thom, Jennie Carroll e Bruce Crossman. "Information technology architects". In the 2006 ACM SIGMIS CPR conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1125170.1125225.
Texto completo da fonteFrampton, Keith. "Information technology architects". In the 2006 ACM SIGMIS CPR conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1125170.1125251.
Texto completo da fonteZerkina, Natalya. "INFORMATIONAL ETHICS TEACHING FOR FUTURE INFORMATION TECHNOLOGY SPECIALIST". In 2nd International Multidisciplinary Scientific Conference on Social Sciences and Arts SGEM2015. Stef92 Technology, 2015. http://dx.doi.org/10.5593/sgemsocial2015/b12/s3.067.
Texto completo da fonteTITU, Aurel Mihail, e Alexandru STANCIU. "Merging Operations Technology with Information Technology". In 2020 12th International Conference on Electronics, Computers and Artificial Intelligence (ECAI). IEEE, 2020. http://dx.doi.org/10.1109/ecai50035.2020.9223235.
Texto completo da fonteSavini, Antonio. "Museums of Information Technology and Information Technology in Museums: A Survey". In 2023 8th IEEE History of Electrotechnology Conference (HISTELCON). IEEE, 2023. http://dx.doi.org/10.1109/histelcon56357.2023.10365996.
Texto completo da fonteAgbonifo, Oluwatoyin C., e Olumide S. Adewale. "Information revolution through Information and Communication Technology". In 2010 Second IEEE Region 8 Conference on the History of Telecommunications (HISTELCON). IEEE, 2010. http://dx.doi.org/10.1109/histelcon.2010.5735301.
Texto completo da fonte"Track 2: Information Systems & information technology". In 2015 12th International Symposium on Programming and Systems (ISPS). IEEE, 2015. http://dx.doi.org/10.1109/isps.2015.7244967.
Texto completo da fonteZhang, Hongbing. "Information Technology and Digitization of Information Media". In 2015 International Conference on Intelligent Systems Research and Mechatronics Engineering. Paris, France: Atlantis Press, 2015. http://dx.doi.org/10.2991/isrme-15.2015.275.
Texto completo da fonteRelatórios de organizações sobre o assunto "Information technology"
Lyon, Gordon E. Information technology :. Gaithersburg, MD: National Institute of Standards and Technology, 2002. http://dx.doi.org/10.6028/nist.sp.500-241.
Texto completo da fonteMcCabe, R. Michael, e Elaine M. Newton. Information technology :. Gaithersburg, MD: National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.500-271.
Texto completo da fonteWing, Brad. Information technology :. Gaithersburg, MD: National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.sp.500-290.
Texto completo da fonteBaird, Aaron, Corey Angst e Eivor Oborn. Health Information Technology. MIS Quarterly, junho de 2018. http://dx.doi.org/10.25300/misq/2019/curations/06212018.
Texto completo da fonteMoncarz, Howard T., Craig Schlenoff, Michael Gruninger, Michael Duffey e Amy Knutilla. Process information technology:. Gaithersburg, MD: National Institute of Standards and Technology, 1998. http://dx.doi.org/10.6028/nist.ir.6206.
Texto completo da fonteBartoszek, Thomas, Barry Gay, John Huddleston, James Mitchell, Alejandra Rodriguez, Vicky Sain, Christopher Scrabis e Kathryn Truex. Information Technology Management: Management of Information Technology Resources Within DoD. Fort Belvoir, VA: Defense Technical Information Center, janeiro de 2005. http://dx.doi.org/10.21236/ada432557.
Texto completo da fonteUpton, Jaki F., Ann M. Lesperance e Steven L. Stein. Information Technology and Community Restoration Studies/Task 1: Information Technology. Office of Scientific and Technical Information (OSTI), novembro de 2009. http://dx.doi.org/10.2172/971111.
Texto completo da fonteHostetler, David D., Jan E. Goolsbey, David A. Niesen e Anita C. Phillips. PNNL Information Technology Benchmarking. Office of Scientific and Technical Information (OSTI), agosto de 1999. http://dx.doi.org/10.2172/15001473.
Texto completo da fonteSECRETARY OF THE AIR FORCE WASHINGTON DC. Enterprise Information Technology Architectures. Fort Belvoir, VA: Defense Technical Information Center, maio de 2000. http://dx.doi.org/10.21236/ada404981.
Texto completo da fonteAnken, Craig S. Intelligent C2 Information Technology. Fort Belvoir, VA: Defense Technical Information Center, janeiro de 1999. http://dx.doi.org/10.21236/ada458077.
Texto completo da fonte