|
This book is the first publication that combines the principles of business process management with strategic IT planning; the result being a groundbreaking work on strategic IT and process planning. While Breakthrough Strategic IT and Process Planning focuses on the real world of organizations, extensive treatment is also devoted to the politics of strategic planning. As such, a project management approach that combines process improvement, IT, and change management is employed. Other important aspects of process planning are discussed in detail: the strategic allocation of resources, short and long term implementation of the strategic plan, marketing of the plan to gain support for implementation, and development of strategic IT and process plans for business units and departments.
An obvious statement — all organizations use information systems and technology to support their key business processes. Value of IT and systems is reflected in the performance of the business through the processes. The business has a mission or vision and strategic business plan. |
|
|
Textbook of Pediatric Emergency Procedures
Widely acclaimed for its outstanding step-by-step illustrations, comprehensive coverage, and reader-friendly format, Textbook of Pediatric Emergency Procedures is now in its thoroughly updated Second Edition. In 137 chapters, the book provides clear, complete instructions on every emergency medicine procedure performed on... | | Disinformation and Fake News
This book is a collection of chapters penned by practitioners from around the world on the impact that disinformation and fake news has had in both the online and social sphere.
While much has been said about individual disinformation campaigns in specific countries, this book offers a panoramic view of how these ... | | Complete Guide to CISM CertificationComplete Guide to CISMЮ Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices,... |
|