409
Views
0
CrossRef citations to date
0
Altmetric
Technology, Innovation and Sustainable Development.Guest Editors:Vinod Kumar and Uma Kumar

Modelling change management and risk management in a financial organization due to information system adoption

, , , &

References

  • Alhawari, S., Karadsheh, L., Talet, A.N., & Mansour, E. (2012). Knowledge-based risk management framework for information technology project. International Journal of Information Management, 32, 50–65. doi: 10.1016/j.ijinfomgt.2011.07.002
  • Aven, T. (2016). Risk assessment and risk management: Review of recent advances on their foundation. European Journal of Operational Research, 253, 1–13.doi: 10.1016/j.ejor.2015.12.023
  • Eagle, L. (2007). Risk management in Banking. Retrieved from www.bankersonline.com
  • Eric, S.K., & Mylopoulos, J. (1994, December). From ER to “AR”—Modelling strategic actor relationships for business process reengineering. (pp. 548–565). Proceedings of international conference on conceptual modeling.
  • Gans, G., Jarke, M., Kethers, S., & Lakemeyer, G. (2003). Continuous requirements management for organisation networks: A (dis)trust-based approach. Requirements Engineering, 8, 4–22. doi: 10.1007/s00766-002-0163-8
  • Georgakopoulos, D., Hornick, M., & Seth, A. (1995). An overview of workflow management: From process modeling to workflow automation infrastructure. Distributed and Parallel Databases, 3, 119–153. doi: 10.1007/BF01277643
  • Hubbard, D. (2009). The failure of risk management: Why it's broken and how to fix it (p. 46). John Wiley & Sons.
  • Karim, A.J. (2011). The significance of management information systems for enhancing strategic and tactical planning. Jistem Journal of Information Systems and Technology Management, 8, 459–470. doi: 10.4301/S1807-17752011000200011
  • Kueng, P., & Kaulek, P. (1997). Process models: a help or a burden. (pp. 676–678). Proceedings of the American for Information Systems, AIS’, Indianpolis, August.
  • Kueng, P., Kawalek, P., & Schrefl, M. (1996). How to compose an object-oriented model?”, Method engineering: Principles of method construction and tool support (pp. 94–110). London: Chapman and Hall.
  • Martin, I., & Cheung, Y. (2002). Change management at mobile Australia. Business Process Management Journal, 8, 447–461. doi: 10.1108/14637150210449120
  • Misra, S.C., Kumar, V., & Kumar, U. (2006a). An actor dependency technique for analysing and modelling early-phase requirements of organizational change management due to information systems adoption. Journal of Modelling in Management, 1, 215–231. doi: 10.1108/17465660610715212
  • Misra, S.C., Kumar, V., & Kumar, U. (2006b). Modeling strategic actor relationships for risk management in organizations undergoing business process reengineering due to information systems adoption. Business Process Management Journal, 14, 65–84. doi: 10.1108/14637150810849418
  • Molani, A., Perini, A., Yu, E., & Bresciani, P. (2003). Analysing the requirements for knowledge management using intentional analysis. Paper presented at AAAI Spring Symposium on Agent-Mediated Knowledge Management (AMKM-03), Stanford University, March 24–26.
  • Mylopoulos, J., Chung, L., & Yu, E. (1999). From object-oriented to goal-oriented requirements analysis. Communications of the ACM, 42, 31–37. doi: 10.1145/291469.293165
  • Ould, M. (1995). Business processes: Modeling and analysis for reengineering and improvement. Chichester: Wiley.
  • Smith, D., & Fischbacher, M. (2009). The changing nature of risk and risk management: The challenge of borders, uncertainty and resilience. Risk Management, 11, 1–12. doi: 10.1057/rm.2009.1
  • Sumner, M. (2005). Enterprise resource planning (pp. 17–38). Upper Saddle River, NJ: Prentice Hall.
  • Sutcliffe, A.G., & Minocha, S. (1999). Linking business modelling to socio-technical system design. (pp. 73–87). Proceedings of CAiSE’99.
  • Yu, E. (2009). Social Modelling and i*. In A.T. Borgida, V. Chaudhri, P. Giorgini & E.S. Yu (Eds.), Conceptual modelling: Foundations and applications – Essays in Honor of John Mylopoulos (pp. 1-25). Lecture notes in computer science (Vol. 5600). Berlin: Springer.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.