Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Techniques and Tools for the Design and Implementation of Enterprise Information Systems

Buy
Inter-organizational information systems play a major role in improving communication and integration between partnering firms to achieve an integrated global supply chain. Current research in enterprise resource planning and electronic commerce is crucial to maintaining efficient supply chain management and organizational competitiveness.

Techniques and Tools for the Design & Implementation of Enterprise Information Systems enables libraries to provide an invaluable resource to academicians and practitioners in fields such as operations management, Web engineering, information technology, and management information systems, providing insight into the effective design and implementation of enterprise information systems to improve communication and integration between partnering firms to achieve an integrated global supply chain.

About the Author

Angappa Gunasekaran is a Professor of Management in the Charlton College of Business at the University of Massachusetts (North Dartmouth, USA). Previously, he has held academic positions in Canada, India, Finland, Australia and Great Britain. He has BE and ME from the University of Madras and a PhD from the Indian Institute of Technology. He teaches and conducts research in operations management and information systems. He serves on the Editorial Board of 20 journals and edits a journal. He has published about 160 articles in journals, 60 articles in conference proceedings and 2 edited books. In addition, he has organized several conferences in the emerging areas of operations management and information systems. He has extensive editorial experience that includes the guest editor of many high profile journals. He has received outstanding paper and excellence in teaching awards. His current areas of research include supply chain management, enterprise resource planning, e-commerce, and benchmarking.

(HTML tags aren't allowed.)

Materials for Engineering
Materials for Engineering
The criterion I have adopted for discussing a specific material in this book is its commercial availability, rather than its being confined to a research and development laboratory. In the ten years since the appearance of the first edition of the book, a number of such engineering materials have appeared on the market and a number of these will be...
Communication Networks And Computer Systems (Communications and Signal Processing)
Communication Networks And Computer Systems (Communications and Signal Processing)
Communication networks and computer systems research is entering a new phase in which many of the established models and techniques of the last twenty years are being challenged. The research community is continuing to free itself from past intellectual constraints so that it may fully exploit the convergence of computing and communications....
Electronic Value Exchange: Origins of the VISA Electronic Payment System (History of Computing)
Electronic Value Exchange: Origins of the VISA Electronic Payment System (History of Computing)

Most anywhere in the developed world, I can use a small rectangular piece of plastic, issued to me by a bank I have never visited, to obtain local currency or purchase goods and services directly from a merchant. The cashier and I may not even speak a common language, and the face of my card may look quite different from those carried...


Shanghai Street Style
Shanghai Street Style

Although fashion fixtures and A-list celebrities pack the front rows at the biggest, most glamorous shows at fashion week, the most creative attire is often found not on the catwalks or inside the auditoriums but on the streets. Nowhere is this more evident than in the cosmopolitan city of Shanghai, where a vintage Vivienne Westwood frock...

Insider Attack and Cyber Security: Beyond the Hacker (Advances in Information Security)
Insider Attack and Cyber Security: Beyond the Hacker (Advances in Information Security)
Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Information Security Departments of Columbia...
Iconoclast: A Neuroscientist Reveals How to Think Differently
Iconoclast: A Neuroscientist Reveals How to Think Differently

No organization can survive without iconoclasts -- innovators who single-handedly upturn conventional wisdom and manage to achieve what so many others deem impossible.

Though indispensable, true iconoclasts are few and far between. In Iconoclast, neuroscientist Gregory Berns explains why. He explores the constraints
...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy