Identification and assessment of risks associated with ERP post‐implementation in China

GuoChao Peng1, MiguelBaptista Nunes1
1Department of Information Studies, University of Sheffield, Sheffield, UK

Tóm tắt

Từ khóa


Tài liệu tham khảo

Brehm, N. and Gómez, J.M. (2005), “Standardization approach for federated ERP systems based on web services”,Proceedings of the 1st International Workshop on Engineering Service Compositions, Amsterdam, 12 December, pp. 101‐9.

10.1108/17410390510609572

10.1145/1053291.1053322

10.1108/14637150110406768

10.1016/S0263-7863(02)00095-9

10.1023/A:1026591822284

10.1016/j.compind.2005.02.006

10.1080/09638180020024007

10.1016/S0378-7206(01)00083-0

10.1016/0268-4012(95)00005-R

10.1108/14637150510619858

10.1108/02635570410550250

10.1108/02635570410561672

10.1108/09576050010326574

10.1145/332051.332063

10.1080/00207540410001671679

10.1287/mnsc.21.8.908

10.1017/S0305741000043149

10.1108/09685220510589325

10.1016/j.compind.2005.02.005

10.1109/WSC.2002.1166474

10.1108/14684520510638052

Peng, G.C. and Nunes, J.M.B. (2007a), “Using PEST analysis as a tool for refining and focusing contexts for information systems research”,Proceedings of the 6th European Conference on Research Methodology for Business and Management Studies, Lisbon, pp. 229‐37.

Peng, G.C. and Nunes, J.M.B. (2007b), “A risk ontology for ERP post‐implementation”,Proceedings of the 2nd Annual South East European Doctoral Student Conference, Thessaloniki.

Peng, G.C. and Nunes, J.M.B. (2008), “Issues and difficulties in doing participative research in China: lessons learned from a survey in information systems research”,Proceedings of the 7th European Conference on Research Methodology for Business and Management Studies, London, pp. 245‐52.

10.2307/3149606

10.1016/S0148-2963(99)00071-5

10.1080/0963818031000087907

10.1023/A:1026504325010

Sherer, S.A. (2004), “Managing risk beyond the control of IS managers: the role of business management”,Proceedings of the 37th Hawaii International Conference on System Sciences, Big Island, HI, 5‐8 January.

Sherer, S.A. and Alter, S. (2004), “Information system risks and risk factors: are they mostly about information systems?”,Communications of the Association for Information Systems, Vol. 14, pp. 29‐64.

10.1145/504350.504356

10.1145/332051.332070

10.1504/IJSS.2005.005802

10.1016/S0377-2217(02)00547-7

10.1108/02635570110365970

Wilding, E. (2003), “Corporate cybercrime trends”,Computer Fraud & Security, Vol. 6, pp. 4‐6.

10.1108/02635570210414640

10.1016/S0268-4012(02)00032-4

10.1016/j.ijpe.2004.07.008

10.1006/jfin.1995.1001

10.1108/02635570510575225

10.1016/j.ijpe.2003.10.004

10.1016/j.ijpe.2004.09.004