Search
for Topics
All Reviews
Browse All Reviews
>
Information Systems (H)
>
Models And Principles (H.1)
>
Systems And Information Theory (H.1.1)
> Value of Information (H.1.1...)
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
1-10 of 18 Reviews about "
Value of Information (H.1.1...)
":
Date Reviewed
An exploration of the categories associated with ICT project sustainability in rural areas of developing countries: a case study of the Dwesa project
Pade C., Mallinson B., Sewry D. IT research in developing countries (Proceedings of the 2006 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, Somerset West, South Africa, Oct 9-11, 2006) 100-106, 2006. Type: Proceedings
The sustainability of information and communications technology (ICT) projects has garnered increasing interest in recent years. The authors of this paper identify and categorize the issues involved in sustainability through a study of...
Apr 10 2007
Comparing multicast and newscast communication in evolving agent societies
Eiben A., Schut M., Toma T. Genetic and evolutionary computation (Proceedings of the 2005 Conference on Genetic and Evolutionary Computation, Washington DC, USA, Jun 25-29, 2005) 75-81, 2005. Type: Proceedings
Imagine that your personal (in this case, reproductive) success and your life depend on effective communication (in this case, to find sufficient food), and that you can choose between two methods to achieve this success: communicating...
Jan 5 2006
Information technology and world politics
Mazarr M. (ed), Palgrave Global Publishing, New York, NY, 2002. 272 pp. Type: Book (9781403960573)
The title of this book is provocative, and so is the premise examined in it: that modern information technology (IT), and the evolving global information infrastructure based on the Internet, are destabilizing, and also democratizing, ...
Jun 29 2004
Knowledge management metrics via a balanced scorecard methodology
Fairchild A. (Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS’02)-Volume 8,Jan 7-10, 2002) 2432002. Type: Proceedings
How effective is your knowledge management (KM) program? Are all the information technology (IT) investments for technologies, such as GroupWare, customer relationship management (CRM), or decision support systems (DSS) tools worth the...
Sep 10 2003
The economics of information security investment
Gordon L., Loeb M. ACM Transactions on Information and System Security 5(4): 438-457, 2002. Type: Article, Reviews: (3 of 3)
A practical approach is presented in this paper for determining the investment requirements necessary for information protection. The model used is explained in detail throughout the 18 pages of the paper. Gordon and Loeb’s d...
Sep 5 2003
Query strategies for priced information: an experiment with the shortest-paths algorithms
Charikar M., Fagin R., Guruswami V., Kleinberg J., Raghavan P., Sahai A. Journal of Computer and System Sciences 64(4): 785-819, 2002. Type: Article
In this paper, lowest cost algorithms are described for finding the value of a Boolean function by sequentially assigning values to variables, in the case when each input variable has an associated price. A corresponding situation is w...
Jul 24 2003
The economics of information security investment
Gordon L., Loeb M. ACM Transactions on Information and System Security 5(4): 438-457, 2002. Type: Article, Reviews: (2 of 3)
Gordon and Loeb’s paper is well timed. As businesses suffer from the economic uncertainties of the 21st century, management is looking for ways to contain costs while continuing to meet fiduciary responsibilities. This requi...
Mar 4 2003
The economics of information security investment
Gordon L., Loeb M. ACM Transactions on Information and System Security 5(4): 438-457, 2002. Type: Article, Reviews: (1 of 3)
Gordon and Loeb report on a model that they have developed to evaluate how much information security is needed to protect data assets, and to determine the optimal investment, given the value of the assets and their vulnerability. The...
Jan 3 2003
Meta-information, and time: factors in human decision making
Higgins M. Journal of the American Society for Information Science 50(2): 132-139, 1999. Type: Article
Meta-information (information about information) is one of theunderappreciated aspects of the equation determining the impact ofinformation on decisions. Source credibility, that is, the weight givento a sender of information, is one t...
Oct 1 1999
Information rules
Shapiro C., Varian H. (ed), Harvard Business School Press, Boston, MA, 1998. Type: Book (9780875848631)
Computer science curricula typically approach software from an engineering rather than a business perspective, thereby leaving computer science graduates poorly equipped to compete with MBAs in product strategization. Books like this s...
May 1 1999
Display
5
10
15
25
50
100
per page
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy