NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
Adkins, Meredith C.; Lucas, Kathleen C. – Electronic Library, 1986
This checklist provides guidance on how to measure adequacy of control and security of computer systems, identifies areas of risk, raises management and user awareness of their stewardship responsibilities, and reviews issues relative to system documentation, maintenance, integrity, and reliability. (MBR)
Descriptors: Check Lists, Computer Software, Cost Effectiveness, Integrity
Peer reviewed Peer reviewed
Burton, Paul – Electronic Library, 1987
Discusses the need for careful systems analysis and design in the implementation of microcomputer based information systems. Checklists of system requirements and a bibliography of relevant journals, printed, and online sources are provided. (CLB)
Descriptors: Evaluation Criteria, Information Centers, Information Services, Information Systems
Peer reviewed Peer reviewed
Kirkham, Sandi – Electronic Library, 1994
Argues that false assumptions about user needs implicit in methodologies for building information systems have resulted in inadequate and inflexible systems. Checkland's Soft Systems Methodology is examined as a useful alternative. Its fundamental features are described, and examples of models demonstrate how the methodology can facilitate…
Descriptors: Communication Audits, Context Effect, Cultural Context, Informal Organization