Wednesday, December 12, 2007

Information Technology Essentials

IT Essentials Lecture Notes in pdf from Sloan School of Management
Lec # TOPICS
1 Introduction: Fundamentals of Computing I (PDF)
The Technology
2 Fundamentals of Computing II (PDF)
3 Networks I (PDF)
4 Networks II (PDF)
5 Programming Languages (PDF)
6 Relational Databases (PDF)
7 Introduction to Microsoft® Access (PDF)
8 Web Technologies Fundamentals (PDF - 2.7 MB)
9 Computer Security I: Encryption and Digital Signatures (PDF)
10 Computer Security II: Network Security
Applications of Technology
11 "Under the Hood" of a Commercial Website (PDF)
12 Managing Software Development (PDF)
13 Enterprise Systems (PDF 2.1 MB)
14 Systems that Span Multiple Enterprises (PDF)
15 Business Intelligence: Data Mining and Data Warehousing (PDF)
16 Emerging Technologies; Course Wrap-up (PDF)

Saturday, November 24, 2007

The best presentations on E-commerce and Information Systems

Today you can download the BEST PRESENTATIONS that I picked up on e-commerce and Information Systems topics.
A robust presentation (ppt) on E-commerce (in fact is a whole course more than 300 slides) GET IT
An academic presentation in ppt (65 slides) on Electronic and Mobile commerce,their business models and transaction types etc GET IT
A presentation in ppt (40 slides):Introduction to IS,functional areas,transactional processing systems and ERP (Supply Chain and others)GET IT
A Short presentation in pdf (30 pages) on Management Information Systems in an organization
GET IT

Monday, November 19, 2007

Encyclopedia of business and finance 2006





I've decided to put the Encyclopedia of Business and Finance instead of financial articles so everybody can pick up what she/he is looking for. This is actually a thick book of Two Volumes of a total of 800 pages ufff nevertheless just find only what you need:)
Download
P.S.in case the link does not work, tell me and I'll put mine.

Trust and privacy in E-commerce, most trusted web brands

Here the results of annual Most Trusted Companies of 2005 for Privacy Study. The purpose of the study is to have consumers assign a rating to companies according to how much they trust these organizations to protect the privacy of their personal information. >Download
GEOTRUST white paper gives recommendations on how on-line companies can create trusted brands so their site visitors feel confident enough to stay and pay.
Download
E-Policy Best Practices: A Business Guide to Compliant & Secure Internet, Instant Messaging (IM),Peer-to-Peer (P2P) and Email Communications : provide best-practices guidelines for developing and implementing effective workplace e-policies and in the process, create clean and compliant, safe and secure electronic communications that are less likely to trigger a workplace lawsuit, regulatory investigation, security breach, or other electronic disaster.
Download

Sunday, November 18, 2007

An Ontology for developing e-Business Models

An Ontology for developing e-Business Models
Abstract. In this paper we demonstrate why executives and academics should consider thinking about e-business models. We show that the business model concept is an interesting tool for understanding, designing, sharing, measuring, changing and even simulating businesses. Based on an extensive review of e-business and business model literature we develop an e-business model ontology or framework. This ontology defines the concepts in e-business models and the relationships between them and shall be the foundation for a variety of management tools that facilitate business decisions. Our e-business model ontology outlines what value a company offers to which customer segments. It describes the architecture of the firm and its network of partners for creating, marketing and delivering value and relationship capital, in order to generate profitable and sustainable revenue streams.
Keywords: e-business, e-business model, e-business model design, ontology
Download


get pdf

Presentation on Creativity idea...

How to link executive pay with performance

Famous Rappaport article from 1999 but still advised to students.
Key words: Shareholders value adding, compensation schemes,CEO, indexed options.
Rappaport.pdf
Hosted by eSnips

Today's articles on Mobile Commerce, its business models and so on

ABSTRACT
Considering the recent convergence of computing and telecommunications technologies with the tremendous success of the Internet, the World Wide Web, and Mobile Communications, the next step is expected to be the Mobile Web. The main promise of the Mobile Web is to satisfy user needs for anywhere, anytime access to information and services, including Location Based Services (LBS). This paper presents an innovative LBS service applicable to the Mobile Marketing industry sector. We describe the architecture of the information system supporting the proposed service and a software prototype we implemented using a simulation environment for providing location information. The technologies adopted for this design are based on open standards and have successfully met the requirements of scalability and autonomy. Then, we propose and describe a business model for this service. Emphasis is given on the participating entities, their roles and the interactions among them.

Keywords: Mobile Advertising, Location Based Services, Business Model, System Implementation
Download


Nokia's paper on core points about Mobile Commerce (commerce on mobile phone devices)
Key words: drivers of mobile commerce, mobile payments, transaction environment, platform services.
Download

Information technology outsourcing

The information technology outsourcing risk: a transaction cost and agency theory-based perspective
ABSTRACT: Many firms have adopted outsourcing in recent years as a means of governing their information technology (IT) operations. While outsourcing is associated with significant benefits, it can also be a risky endeavour. This paper proposes a scenario-based conceptualization of the IT outsourcing risk, wherein risk is defined as a quadruplet comprising a scenario, the likelihood of that scenario, its consequences and the risk mitigation mechanisms that can attenuate or help avoid the occurrence of a scenario. This definition draws on and extends a risk assessment framework that is widely used in engineering. The proposed conceptualization of risk is then applied to the specific context of IT outsourcing using previous research on IT outsourcing as well as transaction cost and agency theory as a point of departure.
Download


Surveying the risks and benefits of outsourcing
Key words: survey of senior IT managers on top risk concerns and benefits of IT outsoursing, offsoring, ratings
Download