首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 125 毫秒
1.
金亨根  洪承麟 《物流技术》2011,(11):207-210
分析了物流信息系统对供应链合作绩效的影响,发现物流信息系统对供应链内部合作和供应链间合作的服务以及费用绩效都有较大影响,指出供应链合作是提升供应链绩效水平的充要条件。  相似文献   

2.
面向装备制造业供应链管理信息系统结构分析   总被引:1,自引:0,他引:1  
罗明  马卫 《物流技术》2008,27(2):108-110
指出了构建装备制造业供应链管理信息系统的必要性。基于WEB和工作流管理系统,提出了一种装备制造业供应链管理信息系统的体系结构和功能结构。  相似文献   

3.
分析了物流信息系统对供应链合作绩效的影响,发现物流信息系统对供应链内部合作和供应链间合作的服务以及费用绩效都有较大影响.指出供应链合作是提升供应链绩效水平的充要条件.  相似文献   

4.
复杂网络理论在供应链管理中的应用   总被引:2,自引:0,他引:2  
胡一竑  朱冰心 《物流科技》2007,30(9):100-103
复杂网络理论是国际学术界的新兴研究热点,它突出强调了系统的拓扑特征,其中许多性质如小世界性质、无标度性质等都得到了广泛的研究,吸引了国际上众多不同领域的研究学者投身其中。本文用复杂网络理论研究供应链管理,为供应链管理提出了新的研究思路。本文首先回顾复杂网络的基本理论和应用现状,然后分别介绍该理论在交通运输网络和供应链和物流网络中的应用,指出了目前研究中的关键问题,最后对将来的发展方向作出展望。  相似文献   

5.
夏文汇  张陆 《物流技术》2007,26(8):199-202,229
论述了信息系统是促成有效供应链管理的素,确保企业供应链信息系统运行机制的主要目标,实现其有效运行的原则及特征,提出供应链信息系统运行的结构与功能.以我国大型企业中国嘉陵工业集团股份有限公司供应链管理流程的信息系统变革为例,论述了基于供应链信息系统结构与功能分析和设计的理论与实践问题.  相似文献   

6.
周斌 《物流科技》2014,(7):38-39
应用物联网技术打造供应链透明化信息系统,实现供应链全过程的信息透明化。首先分析了当前供应链流程中信息不对称存在的问题,通过流程再造或重组,改进供应链流程。在此基础上,构建供应链透明化实现模型与信息系统平台。最后,阐述了该信息系统在某科技企业实践中的具体应用。  相似文献   

7.
纪雪洪  孙道银 《物流技术》2012,(11):109-112
采用案例研究方法,基于戴尔公司案例,探讨了在敏捷供应链战略下,如何应用跨组织信息系统,以支持供应链战略的实现.归纳了戴尔公司的跨组织信息系统架构与信息流动模式,同时讨论了信息系统的E-Hub结构以及EAI技术的应用等及其对敏捷供应链战略的支持作用。  相似文献   

8.
秦秋莉 《物流技术》2006,(6):54-55,86
分析了基于Web的虚拟企业敏捷供应链的特点、功能及信息共享管理的内容,并分析了基于Web的虚拟企业敏捷供应链架构和软硬件结构,指出敏捷供应链管理区别于其他信息系统的核心问题是如何随着合作联盟的组成和解散,快速完成系统的重构以及如何有效地利用、优化各种企业间的异构资源。支持其协同工作。  相似文献   

9.
采用案例研究方法,基于戴尔公司案例,探讨了在敏捷供应链战略下,如何应用跨组织信息系统,以支持供应链战略的实现归纳了戴尔公司的跨组织信息系统架构与信息流动模式,同时讨论了信息系统的E-Hub结构以及EAI技术的应用等及其对敏捷供应链战略的支持作用.  相似文献   

10.
王辉  施先亮  任敏娟 《物流科技》2006,29(10):116-118
供应链成员中的信息共享对于供应链管理来说是最基本的要求,然而没有适当的信息系统和支持技术,供应链管理的尝试是很难取得成功的.本文通过展现信息流运作模式的演变,分析了集成式信息系统的可行性,并给出了集成式信息系统的技术构架.  相似文献   

11.
信息系统审计是控制组织中信息系统风险、保证组织业务正常运行、实现业务目标和提高组织竞争力的重要途径。联合国儿童基金会的信息系统审计,调查总结了当前联合国儿童基金会信息系统的现状及实施信息系统审计的过程、内容和技术方法,体现了境外信息系统审计重视程序规范、重视绩效和审计沟通的特点。  相似文献   

12.
针对信息系统(IS)如何创造持续竞争优势问题,本文提出了IS能力和IS与业务匹配的动态演化框架。以Z公司近二十年IS的发展为纵向案例研究对象,系统地研究IS创造持续竞争优势的过程与特征,解释了IS创造持续竞争优势的关键因素在于能力与业务匹配的动态演化,并归纳了基于能力与业务匹配动态演化的IS创造持续竞争优势的理论模型,以及IS创造持续竞争优势的能力与业务匹配动态演化三层次过程模型。本文探讨的Z公司IS创造持续竞争优势的理论与过程模型对中国企业借助信息系统提升企业竞争力、构筑持续竞争优势提供了重要的参考价值和指导意义。  相似文献   

13.
BPR中信息系统开发战略及过程框架   总被引:2,自引:0,他引:2  
陶峻 《价值工程》2004,23(8):123-126
自从企业流程再造的思想引入中国以来,在企业中得到了广泛的应用。作为BPR的使能器之一,信息系统受到了企业的重视,企业也逐渐意识到在流程再造过程中建立信息系统的作用。然而传统的信息系统开发方法无法适应流程再造所倡导的过程管理观点。本文从企业流程再造与信息系统之间的关系入手,利用规范研究方法构建了BPR中信息系统开发战略框架模型,提出了BPR中信息系统开发过程框架。  相似文献   

14.
The Project Management Institute (PMI) plays an important role in the training, career development, and recognition of information systems (IS) project managers. Indeed, not only do IS professionals account for a large proportion of the PMI constituency, but PMI is also influential in the training of IS project managers. This study explores further the contribution of PMI to IS project management by means of its main publication outlet, the Project Management Journal (PMJ). To do so, the contents of the 39 IS project management articles published in PMJ during 1988–2005 were analyzed. The article focuses on the following dimensions: the relative importance of IS project management articles published by PMJ; the profile of the authors of IS project management articles in PMJ; the main issues, in terms of IS project management, covered by PMJ; and the major gaps, in terms of IS project management, in the coverage of this domain by PMJ.  相似文献   

15.
Organizations incur substantial costs in managing organizational changes associated with the implementation of information systems (IS). However, the relationship between organizational changes and IS implementation costs is not well understood. Extending current research on IS-enabled organizational change, we draw on configuration theory to develop propositions identifying drivers of IS implementation costs. To test the propositions, we analyze the changes and implementation costs involved in three IS implementation initiatives. The analysis confirms that interdependencies between changes are key drivers of IS implementation costs. Implications for theory and practice are discussed.  相似文献   

16.
袁颖  宋克振 《价值工程》2006,25(9):80-83
国内外大量信息系统建设失败案例逐渐引起人们重视,学者开始研究信息系统建设项目中存在诸多风险因素,并提出了一些风险分析方法。但由于信息系统建设项目风险信息具有难以量化和不完整性等特点,这些方法并不适用。基于信息系统建设项目风险信息的特点,引入了模糊集理论,提出信息系统建设项目风险的模糊分析方法,并以实例分析加以证明该方法的有效性。  相似文献   

17.
Considering that current structures are the result of choices made in specific contexts in the past, we adopt a historical perspective in order to understand how some information systems (IS) project management practices evolved and became norms. Using historical methods, we analyze sources of data spanning 52 years of IS project management (1945–2007) – interviews with IS project managers and academics, IS project management textbooks, curricula, and the scientific and professional literature – to: (1) determine whether some IS project management practices may now be considered institutionalized, and (2) understand their institutionalization processes over time. Based on this analysis, three groups of IS project management practices may now be considered institutionalized: formal control, external integration, and project risk management.  相似文献   

18.
The hypothetico-deductive (H-D) method is reported to be common in information systems (IS). In IS, the H-D method is often presented as a Popperian, Hempelian, or natural science method. However, there are many fundamental differences between what Popper or Hempel actually say and what the alleged H-D method per Hempel or per Popper means in IS. To avoid possible misunderstanding and conceptual confusion about the basic philosophical concepts, we explain some of these differences, which are not mentioned in IS literature describing the H-D model. Due to these distinctive differences, the alleged H-D method per Hempel or per Popper in IS cannot be regarded as the H-D model per Hempel or per Popper. Further, the H-D model is sometimes confused with another model in IS, the deductive-nomological (D-N) model of explanations. Confusing the H-D and D-N methods can also produce stagnation in the fundamental methodological thinking in IS. As one example, the H-D model (per Hempel or per Popper) does not require hypotheses to be based on existing theories or literature. As a result, misunderstanding the H-D model in IS may seriously limit new hypothesis or theory development, as the H-D model in the philosophy of science allows guessing and imagination as the source for hypotheses and theories. We argue that although IS research (1) generally does not follow the H-D method (per Hempel or per Popper), and (2) should not follow the H-D method, (3) we can still learn from the H-D method and criticisms of it. To learn from the H-D method, we outline method of hypothesis (MoH) approaches for further discussion. These MoH approaches are not hypothetico-deductive, but hypothetico-inductive-qualitative or hypothetico-inductive-statistical. The former MoH endeavors to be suitable for qualitative research, while the latter is aimed for statistical research in IS.  相似文献   

19.
In response to claims emanating from recent assessments of the status of gender and IS research about insufficient theorizing of gender, a critical literature analysis of research papers on the topic of gender and IS that appeared in information systems journals between 1992 and 2012 was undertaken. While some research about gender and IS explicitly employs or develops gender theory, other research that claims to be about gender does not explicitly employ any gender theory to interpret research findings, relying, instead, on implicit gender essentialism as a theory-in-use. Research papers about gender and IS that do not explicitly employ gender theory typically use another IS or management theory as the sensitizing device to interpret the data. Still other research papers are gender atheoretical insofar as neither explicit nor implicit gender theorizing is evident in the papers. In gender and IS research, as in all research, gender theory can be used as a lens to guide the collection, analysis and interpretation of data — whether conducted with a positivist, interpretive or critical epistemology. Alternatively, gender theory can be used to interpret findings when gender is a factor that (expectedly or unexpectedly) results from a larger analysis. Finally, gender theory can result, inductively, from the data by means of grounded theory methods. In any case, the use of theory is to be directed toward understanding the phenomenon of gender in the context of IS (analyzing, explaining), establishing causality (predicting) or guiding action (design and action). This analysis of the role of theory in gender and IS research offers recommendations about the conduct of gender and IS research going forward.  相似文献   

20.
Over the past few decades, the potential of information systems (IS) to support organizational activities and help them gain competitive advantage has been widely recognized. At the level of strategy, there is a genre of organizational activities dedicated to realizing this potential. Methods known broadly as strategic information planning have been constructed to support such activities in organizations but these methods have not lived up their promises. Meanwhile, the use of evolutionary approaches in the application of IS in organizations have also received some attention. This paper describes and analyzes a case study of the evolution of the IS strategy within LeaseHold NV, a Dutch global leasing company. The study reveals that no IS planning was used. Instead, concepts of organizational evolution are found to be useful in analyzing the development of the IS strategy at LeaseHold.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号