You are previewing International Journal of Strategic Information Technology and Applications (IJSITA) Volume 5, Issue 2.
O'Reilly logo
International Journal of Strategic Information Technology and Applications (IJSITA) Volume 5, Issue 2

Book Description

The International Journal of Strategic Information Technology and Applications (IJSITA) provides state-of-the-art research on the optimization of performance in corporations, groups, associations, communities of practice, community organizations, governments, non-profits, nations, and societies that implement information systems. This journal covers analysis and avoidance of risk, detection and prevention of problems, acquisition and management of knowledge, preparation and response to emergencies, enhancement of decision making, facilitation of collaborative efforts, and incremental organizational wisdom.

This issue contains the following articles:

  • Structural Epochs in Software
  • Telecommunications Entrepreneurial Orientation (TELEO): An Empirical Study Measuring the Significance of Entrepreneurial Orientation on Business Performance of Small-to-Medium Enterprises (SME) in the Telecommunications Industry
  • An Integrated RFOS Model for Risk Assessment on Real Time Operating System
  • Maturity and Process Capability Models and Their Use in Measuring Resilience in Critical Infrastructure Protection Sectors
  • A BPR Approach for e-Governance in Public Transportation

Table of Contents

  1. Cover
  2. Masthead
  3. Call For Articles
  4. Structural Epochs in Software
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. RESEARCH METHODOLOGY
    4. 3. RESULTS
    5. 4. CONCLUSION
    6. REFERENCES
  5. Telecommunications Entrepreneurial Orientation (TELEO):
    1. ABSTRACT
    2. INTRODUCTION TO THE STUDY
    3. HISTORY OF ENTREPRENEURIAL RESEARCH
    4. STATEMENT OF THE PROBLEM
    5. PURPOSE STATEMENT
    6. RESEARCH QUESTIONS
    7. HYPOTHESES
    8. RESEARCH METHOD
    9. POPULATION AND SAMPLE
    10. INSTRUMENTATION
    11. VARIABLES
    12. MISSING DATA
    13. ETHICAL ISSUES
    14. THE RISK
    15. THE BENEFITS
    16. SIGNIFICANCE OF THE STUDY
    17. ASSUMPTIONS AND LIMITATIONS
    18. DELIMITATIONS AND SCOPE
    19. DATA ANALYSIS
    20. RESULTS OF HYPOTHESES TESTING
    21. CONCLUSION
    22. RECOMMENDATIONS FOR FUTURE STUDY
    23. REFERENCES
  6. An Integrated RFOS Model for Risk Assessment on Real Time Operating System
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. RISK ASSESSMENT
    4. 3. BASIC DATA COLLECTION ON RTOS (TECHNICAL SURVEY)
    5. 4. PROBLEM STATEMENTS
    6. 5. PROPOSAL ON REAL TIME OS LEVEL FOR RFOS MODEL
    7. 6. RESULT OF RFOS MODEL
    8. 7. IMPACT ANALYSIS
    9. 8. FURTHER ADVANCEMENT OF THIS WORK
    10. 9. CONCLUSION
    11. REFERENCES
  7. Maturity and Process Capability Models and Their Use in Measuring Resilience in Critical Infrastructure Protection Sectors
    1. ABSTRACT
    2. INTRODUCTION
    3. MATURITY AND PROCESS CAPABILITY MODELS
    4. CIP TOOLS AND FRAMEWORKS AS ENABLERS OF PROCESS CAPABILITY AND RESILIENCE
    5. PROCESS CAPABILITY MODELS FOR THE ELECTRICITY GENERATING SECTOR
    6. RECOMMENDATIONS FOR FUTURE RESEARCH
    7. CONCLUSION
    8. REFERENCES
  8. A BPR Approach for e-Governance in Public Transportation
    1. ABSTRACT
    2. INTRODUCTION
    3. NEED OF BPR IN PUBLIC TRANSPORTATION
    4. BUSINESS PROCESS REENGINEERING
    5. RECOMMENDATIONS FOR PUBLIC TRANSPORTATION
    6. ADVANTAGES OF BPR IN PUBLIC TRANSPORTATION
    7. CONCLUSION
    8. REFERENCES
  9. Call For Articles