Managing Information Technology

(Frankie) #1

360 Part III • Acquiring Information Systems


Hoffer, Jeffrey A., and Detmar W. Straub, Jr. 1989. “The 9 to 5
underground: Are you policing computer crimes?” Sloan
Management Review30 (Summer): 35–43.
Hoffer, Jeffrey A., V. Ramesh, and Heikki Topi. 2011. Modern
database management, 10th ed. Upper Saddle River, NJ:
Pearson Prentice Hall.
Keen, Peter G. W. 1997. The Process Edge.Boston, MA: Harvard
University Press.
Kodaganallur, Viswanathan, and Sung Shim. 2006. “Analysis
patterns: A taxonomy and its implications.” Information
Systems Management23, 3 (Summer): 52–61.
Markus, M. Lynne, and Daniel Robey. 1988. “Information
technology and organizational change: Causal structure
in theory and research.” Management Science34 (May):
583–598.


McNurlin, Barbara C., and Ralph H. Sprague, Jr. 2004.
Information systems management in practice, 6th ed. Upper
Saddle River, NJ: Pearson Prentice Hall.
Page-Jones, Meilir. 1988. The practical guide to structured sys-
tems design, 2nd ed. Englewood Cliffs, NJ: Yourdon Press.
Senge, Peter M. 1990. The fifth discipline.New York: Doubleday.
Valacich, Joseph S., Joey F. George, and Jeffrey A. Hoffer. 2009.
Essentials of systems analysis & design, 4th ed. Upper Saddle
River, NJ: Pearson Prentice Hall.
Verity, John W., and Evan I. Schwartz. 1991. “Software made
simple.” BusinessWeek(September 30): 92–100.
Vessey, Iris, and Robert L. Glass. 1994. “Applications-based method-
ologies.” Information Systems Management11 (Fall): 53–57.
Yugay, Irina, and Victor Klimchenko. 2004. “SOX mandates focus on
data quality & integration.” DM Review14, 2 (February): 38–42.
Free download pdf