• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content

Loading…

Flash Player 9 (or above) is needed to view presentations.
We have detected that you do not have it on your computer. To install it, go here.

Like this presentation? Why not share!

Referensi 5 Topik It

on

  • 2,116 views

 

Statistics

Views

Total Views
2,116
Views on SlideShare
2,107
Embed Views
9

Actions

Likes
0
Downloads
12
Comments
0

2 Embeds 9

http://alex-pandia.blogspot.com 5
http://www.slideshare.net 4

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Referensi 5 Topik It Referensi 5 Topik It Presentation Transcript

    • Enterprise Information System Harjanto Prabowo Chief Information Officer ( CIO ) Bina Nusantara
    • Referensi
      • 1. Ayres, Ian, Steven D. Levitt. 1998. Measuring positive externalities from unobservable victim precaution:
      • 2. An empirical analysis of lojack. The Quarterly Journal of Economics 113(1) 43–77.
      • 3.Baliga, Sandeep, Eric Maskin. 2003. Chapter 7 mechanism design for the environment. Karl-Goran Maler,
      • Jeffrey R. Vincent, eds., Environmental Degradation and Institutional Responses, vol. Volume 1. Elsevier,
      • 305–324.
      • 4. Bier, V., A. Nagaraj, V. Abhichandani. 2004. Protection of simple series and parallel systems with components
      • of different values. Reliability Engineering and Systems Safety 10(27).
      • 5. Campbell, K., L. Zhou. 2003. The economic cost of publicly announced information security breaches:
      • Empirical evidence from the stock market. Journal of Computer Security 11 431–448.
      • Kumar, Telang and Mukhopadhyay: Optimally securing interconnected information systems and assets
      • 6. Fudenberg, D., J. Tirole. 1991. Game Theory. MIT Press.
      • Gordon, Lawrence A., Martin P. Loeb. 2002. The economics of information security investment. ACM
      • Transactions on Information Systems Security 5(4) 438–457. doi:http://doi.acm.org/10.1145/581271.
      • 581274.
      • 7. Gordon, Lawrence A., Martin P. Loeb, William Lucyshyn. 2005. 2005 csi/fbi computer crime and security
      • survey.
      • 8. Kataria, Gaurav, Pei yu Chen, Ramayya Krishnan. 2005. Software diversity for information security. Proceedings of the 2005 Workshop on the Economics of Information Security.
      • 9. Kunreuther, Howard, Geoffrey Heal. 2003. Interdependent security. Journal of Risk and Uncertainty 26(2)
      • 231–49.
      • 10. Mendelson, Haim. 1985. Pricing computer services: queueing effects. Commun. ACM 28(3) 312–321. doi:
      • http://doi.acm.org/10.1145/3166.3171.
      • 11. O’Donnell, Adam J., Harish Sethu. 2004. On achieving software diversity for improved network security
      • using distributed coloring algorithms. Proceedings of the 11th ACM conference on Computer and
      • communications security 121–131doi:http://doi.acm.org/10.1145/1030083.1030101.
      • 12. Png, Ivan P.L., Candy Q. Tang, Qiu-Hong Wang. 2006. Information security: User precautions and hacker
    • 13. Radner, Roy. 1986. The internal economy of large firms. The Economic Journal 96 1–22. URL http: //links.jstor.org/sici?sici=0013-0133%281986%2996%3C1%3ATIEOLF%3E2.0.CO%3B2-D. 14. Smith, Rodney B. W., Yacov Tsur. 1997. Asymmetric information and the pricing of natural resources: The case of unmetered water. Land Economics 73(3) 392–403. 15. Whang, S. 1990. Alternative mechanisms of allocating computer resources under queueing delays. Information Systems Research 1(1) 71–88. 16. Andrew Jaquith, Security Metrics: Replacing Fear, Uncertainty, and Doubt, Addison Wesley, 2006 17. Gerald L. Kovacich, Edward Halibozek, Security Metrics Management: How to Measure the Costs and Benefits of Security, Butterworth-Heinemann, 2005 18. Marianne Swanson P & others, Security Metrics Guide for Information Technology Systems, NIST Special Publication 800-55, 2003 ( http://csrc.nist.gov/publications/nistpubs/800-55/sp800-55.pdf ) 19. Ron Ross, & others, Recommended Security Controls for Federal Information Systems, NIST Special Publication 800-53, 2005 ( http://csrc.nist.gov/publications/nistpubs/800-53/SP800-53.pdf ) 20. Systems Security Engineering-Capability Maturity Model Group, SSE-CMM – Model Description Document version 3.0, International Systems Security Engineering Association, 2003 ( http://www.sse-cmm.org/docs/ssecmmv3final.pdf ). 21. VV Patriciu, I. Priescu, S. Nicolăescu, Security Monitoring - An Advanced Tactic for Network Security Management, Communications 2006 Conference, Bucharest, Romania, 2006 22. VV Patriciu, I. Priescu, S. Nicolăescu, Operational Security Metrics for Large Networks, International Conference on Computers, Communications & Control (ICCC 2006) - Oradea, Romania, 2006 23. ISO/IEC. Information Technology – Security Techniques, Code of practice for information security management (final draft), ISO, 2005. 24. British Standard Institute, Information Security Management. Code of Practice for Information Security Management (BS 7799-1), British Standard Institute, 1999. 25. Basel Committee on Banking Supervision, Working Paper on the Regulatory Treatment of Operational Risk Bank for International Settlements, Basel Committee, 2001 (http://www.bis.org/publ/bcbs_wp8.pdf). 26. CERT, CERT/CC Statistics 1988-2005, CERT, 2005 (http://www.cert.org/stats/) 27. US President’s Information Technology Advisory Committee – “Cyber Security: A Crisis of Prioritization”, Report to the President, National Coordination Office for Information Technology Research and Development
    • MATERI PRESENTASI
    • Referensi
      • Acemoglu, D. 2002. Technical change, inequality and the labor market. Journal of Economic
      • Literature 40(1), 7-72.
      • Antonucci, T. and Pianta, M. 2002. The employment effects of product and process innovations
      • in Europe. International Review of Applied Economics 16(3), 295-308.
      • Autor, D.H., Katz, L.F., and Krueger, A.B. 1998. Computing inequality: Have computers
      • changed the labour market? Quarterly Journal of Economics 133(4), 1169-1210.
      • Bailey, E.E. and Lawrence, R.Z. 2001. Do we have a new economy? NBER Working
      • Paper W8243, Cambridge, Massachusetts.
      • Beath, J., Katsoulacos, Y. and Ulph, D. 1987. Sequential product innovation and industry
      • evolution. Economic Journal (Supplement) 97, 32-43.
      • Beath, J., Katsoulacos, Y. and Ulph, D. 1995. Game-theoretic approaches to the
      • modeling of technological change, in: Stoneman, P. (Ed.), Handbook of the Economics of
      • Innovation and Technological Change . Blackwell, Oxford and Cambridge, pp. 132-181.
      • Becker, G. 1975. Human Capital . NBER, New York.
      • Berman, E., Bound, J., and Griliches, Z. 1994. Changes in the demand for skilled labour
      • within U.S. manufacturing: Evidence from the annual survey of manufacturers. Quarterly
      • Journal of Economics 109(2), 367-398.
      • Bertschek, I. and Kaiser, U. 2004. Productivity effects of organizational change:
      • Microeconometric evidence. Management Science 50(3), 394-404.
      • Breshnahan, T.F. and Trajtenberg, M. 1995. General purpose technologies: ‘Engines of
      • growth’? Journal of Econometrics 65, 83-108.
      • Brynjolfsson, E. and Hitt, L., 1996. Paradox lost? Firm-level evidence on the returns to
      • information systems spending. Management Science 42(4), 541-558.
    • Brynjolfsson, E. and Hitt, L.M. 2000. Beyond computation: Information technology, organizational transformation and business performance. Journal of Economic Perspectives 14(4), 23-48. Brynjolfsson, E. and Hitt, L.M. 2002. Information technology, workplace organization and the demand for skilled labor: Firm-level evidence. Quarterly Journal of Economics 117, 339-376. Brynjolfsson, E. and Hitt, L.M. 2003. Computing productivity: Firm level evidence. Review of Economics and Statistics LXXXV(4), 793-808. Chan, Y., 2000. IT value: The great divide between qualitative and quantitative and individual and organizational measures. Journal of Management Information Systems 16(4), 225-261. Dasgupta, P. and Stiglitz, J. 1980. Industrial structure and the nature of innovative activity. Economic Journal 90, 266-293. David, P.A. 1990. The dynamo and the computer: A historical perspective on the modern productivity paradox. American Economic Review Papers and Proceedings 1(2), 355- 361. ICT Impacts Denis, C., McMorrow, K. and Röger, W. 2004. An analysis of EU and US productivity developments . European Commission Economic Papers 208, Brussels. Devaraj, S. and Kohli, R. 2000. Information technology payoff in the healthcare industry: A longitudinal study. Journal of Management Information Systems 16(4), 41-67. Devaraj, S. and Kohli, R. 2003. Performance impacts of information technology: Is actual usage the missing link? Management Science 49(3), 273-289. Edquist, C., Hommen, L. and McKelvey, M. 2001. Innovation and Employment . Edward Elgar, Cheltenham and Northampton.
    • Evangelista, R. and Savona, M. 2002. The impact of innovation on employment and skill in services – evidence from Italy. International Review of Applied Economics 16(3), 309- 318. 22. Evangelista, R. and Savona, M. 2003. Innovation, employment and skills in services – firm and sectoral evidence. Structural Change and Economic Dynamics 14(4), 449-474. Fudenberg, D. and Tirole, J. 1985. Pre-emption and rent equalization in the adoption of new technology. Review of Economic Studies 52, 383-401. Geroski, P. 1995. Markets of technology: Knowledge, innovation and appropriability, in: Stoneman, P. (Ed.), Handbook of the Economics of Innovation and Technological Change . Oxford and Cambridge, pp. 90-131. Götz, G. 1999. Monopolistic competition and the diffusion of new technology. Rand Journal of Economics 30(4), 679-693. 25. Gordon, R.J. 2000. Does the ‘new economy’ measure up with the great inventions of the past? Journal of Economic Perspectives 14(4), 49-77. 26. Gordon, R.J. 2002. Comments to ‘Productivity growth and the new economy’ by Nordhaus (2002). Brookings Papers on Economic Activity 2002:2, 245-253. 27. Greenwood, J. and Jovanovic, B. 1998. Accounting for growth. NBER Working Paper 6647, Cambridge, Massachusetts. 28. Hannan, T.H. and McDowell, J.M. 1984. The determinants of technology adoption: The case of the banking firm. Rand Journal of Economics 15, 328-335. 29. Hannan, T.H. and McDowell, J.M. 1990. The impact of technology adoption on market structure. Review of Economics and Statistics 72, 164-168. 30. Harris, S.E. and Katz, J.L. 1991. Organizational performance and information technology investment intensity in the insurance industry. Organization Science 2(3), 263-295. 31. Helpman, E. 1998. General Purpose Technologies and Economic Growth . MIT Press, Massachusetts. 32. Jorgenson, D.W. 2001. Information technology and the U.S. economy. American Economic Review 91(1), 1-32. 33. Jorgenson, D.W. and Stiroh, K.J. 2000. U.S. economic growth and the industry level. American Economic Review 90(2), 161-167. 34. Hempell, T. 2002. Does experience matter? Productivity effects of ICT in the German service sector. ZEW Discussion Paper 02-43, Mannheim. 35. Ittner, C.D., Larcker, D.F. and Rajan, M.V. 1997. The choice of performance measures in annual bonus contracts. Accounting Review 72(2), 231-255.
    •  
    • Referensi
      • AbouRizk, S.M. and Dozzi, S.P. (1993) Application of computer simulation in resolving construction disputes,
      • Journal of Construction Engineering and Management , 119(2), 355-373.
      • Cheung, S.O., Ng, S.T. and Sin, W.S. (2001). A fuzzy sets model for construction dispute evaluation,
      • Construction Innovation , 1, 117-127.
      • Eggleston, B. (1993) The ICE Conditions of Contract: Sixth Edition – A User’s Guide , Blackwell Science,
      • Oxford.
      • Hanna, A.S., Russell, J.S., Taha, M.A. and Park, S.C. (1997). Application of neural networks to ownercontractor
      • prequalification, in Kartam, N., Flood, I. and Garett, J.H. (Eds), Artificial Neural Networks for
      • Civil Engineers: Fundamentals and Applications , ASCE, New York, USA, 124-136.
      • Hatush, Z. and Skitmore, M. (1998). Contractor selection using multi criteria utility theory: an additive mode,
      • Building and Environment , 33(2/3), 105-115.
      • Holt, G.D. (1998). Which contractor selection methodology, International Journal of Project Management ,
      • 16(3), 153-164.
      • Kumaraswamy, M.M. (1997). Conflicts, claims and disputes in construction, Engineering, Construction and
      • Architectural Management , 4(2), 95-111.
      • Kumaraswamy, M.M. and Dissanayaka, S.M. (2001). Developing a decision support system for building project
      • procurement, Building and Environment , 36(3), 337-349.
      • Kumaraswamy, M.M. and Yogeswaran, K. (2003) Substantiation and Assessment of Claims for Extensions of
      • Time, International Journal of Project Management , 21, 27-38.
      • ITcon Vol. 11 (2006), Kumaraswamy et al, pg. 209
      • Kumaraswamy, M.M., Yeung, N. Sze, E. Law, S. and Rahman, M. (2003). Knowledge-Building for successful
      • Partnering, Proceedings of the Joint International Symposium of CIB Working Commissions , 22-24, Oct.
      • 2003, Singapore, 1, 468- 480.
    • Kumaraswamy, M.M., Palaneeswaran, E. and Ng, S.T. (2004a). Towards ICT-enhanced management support systems for optimising infrastructure procurement, International Journal of IT in Architecture, Engineering, and Construction, 2(3), 191-203. Kumaraswamy, M.M., van Egmond, E.L.C., Rahman, M.M. and Ugwu, J. (2004b). Technology Exchange through Relationally Integrated Joint Venture Teams, CIB W92 International Symposium on Procurement Systems – Project Procurement for Infrastructure Construction, 7-10 January, 2004, Chennai, India, 326- 334. Kumaraswamy, M.M., Ng, T.S.T., Luu, D.T., Anumba, C., and Palaneeswaran, E. (2004c). Proactive Procurement and Improved Project Delivery, Proceedings of the CIBW92 Symposium, Chennai, India, Edited by: Kalidindi, S.N. and Varghese, K., Narosa Publishing House, New Delhi, India, 179-187. Kumaraswamy, M.M., Anvuur, A. and Rahman, M.M. (2005) ‘Balancing Contractual and Relational Approaches for PPP success and sustainability’, Conference on Public Private Partnerships – Opportunities and Challenges , Feb. 22, 2005, Hong Kong, CICID, The University of Hong Kong and HKIE Civil Divisions, 105-114. Kumaraswamy, M.M., Ling, F.Y.Y., Rahman, M.M. and Phng, S.T. (2005) Constructing Relationally Integrated Teams, Journal of Construction Engineering and Management , 131(10), 1076-1086. Lam, K.C., Ng, S.T., Hu, T., Skitmore, M. and Cheung, S.O. (2000). Decision support system for contractor prequalification – artificial neural network model, Engineering, Construction and Architectural Management , 7(3), 251-266. Love, P.E.D. Irani. Z., Li, H. Tse, R.Y.C and Cheng, E.W.L. (2000). An Empirical Analysis of IT/IS Evaluation in Construction. International Journal of Construction Information Technology , 8(2), 21-38. McCaffer, R. and Hassan, T.M. (2002). Changes in large scale infrastructure arising from ICT developments, Journal of Building and Construction Management , 7(1), 1-8. Ng, S.T., Luu, D.T., Chen, S.E., Lam, K.C. (2002). Fuzzy membership functions on procurement selection criteria, Construction Management and Economics , 20(3), 285-296. Ng, T.S.T. Palaneeswaran, E., and Kumaraswamy, M.M. (2002). A dynamic e-reporting system for contractor’s performance appraisal, Journal of Advances in Engineering Science , 33, 339-349. Ng, T.S.T., Palaneeswaran, E., and Kumaraswamy, M.M. (2003). A web-based centralized multi-client cooperative contractor registration system, Journal of Computing in Civil Engineering , 17(1), 28-37. Palaneeswaran, E., and Kumaraswamy, M.M. (1999) “Contractor Prequalification Expert System for Design- Build projects.” Proceedings of the 5th International Conference on the Applications of Artificial Intelligence to Civil and Structural Engineering , University of Oxford, UK in September 1999, ISBN 0-
      • Ng, T.S.T., Palaneeswaran, E., and Kumaraswamy, M.M. (2003). A web-based centralized multi-client
      • cooperative contractor registration system, Journal of Computing in Civil Engineering , 17(1), 28-37.
      • Palaneeswaran, E., and Kumaraswamy, M.M. (1999) “Contractor Prequalification Expert System for Design-
      • Build projects.” Proceedings of the 5th International Conference on the Applications of Artificial
      • Intelligence to Civil and Structural Engineering , University of Oxford, UK in September 1999, ISBN 0-
      • 948749-63-6 entitled Novel Design and Information Technology Applications for Civil and Structural
      • Engineering, edited by Kumar, B. and Topping, B.H.V., Civil-Comp Press, Edinburgh, UK, 103-112.
      • Palaneeswaran, E., and Kumaraswamy, M.M. (2000). Contractor Selection for Design-Build Projects, Journal of
      • Construction Engineering and Managemen t, 126(5), 331-339.
      • Palaneeswaran, E., Kumaraswamy, M.M., and Ng, T.S.T. (2003). Targeting optimum value in public sector
      • projects through “best value” – focused contractor selection, Engineering, Construction and Architectural
      • Management , 10(6), 418-431.
      • Palaneeswaran, E., Kumaraswamy, M.M., and Zhang, X.Q. (2004). Focusing on best value from a source
      • selection perspective, Australian Journal of Construction Economics & Building , 4(1), 21-33.
      • Palaneeswaran, E., Kumaraswamy, M.M., Rahman, M.M., Ng, T.S.T. (2005) Towards taxonomy based
      • classification of construction procurement systems, Proceedings of the CIB W92/T23/W107 International
      • ITcon Vol. 11 (2006), Kumaraswamy et al, pg. 210
      • Symposium on Procurement Systems – The Impact of Cultural Differences and Systems on construction
      • Performance , 8-10 February, 2005, Las Vegas, Nevada, USA, 2, 665-682.
      • Palaneeswaran, E., and Kumaraswamy, M.M. (2005). Web based client advisory decision support system for
      • Design-Builder prequalification, Journal of Computing in Civil Engineering , 19(1), 69-82.
      • Rahman, M.M. and Kumaraswamy, M.M. (2002a). Joint risk management through transactionally efficient
      • relational contracting, Construction Management and Economics , 20(1), 45-54.
      • Rahman, M.M. and Kumaraswamy, M.M. (2002b). Risk Management Trends in the Construction Industry:
      • Moving Towards Joint Risk Management, Engineering, Construction and Architectural MANAGEMENT ,
      • 9(2), 131-151.
      • Rahman, M.M. and Kumaraswamy, M.M. (2004a). Contracting Relationship Trends and Transitions. Journal of
      • Management in Engineering , 20(4), 147-161.
      • Rahman, M.M. and Kumaraswamy, M.M. (2004b). Potential for Implementing Relational Contracting and Joint
      • Risk Management. Journal of Management in Engineering , 20(4), 178-189.
      • Rahman, M.M. and Kumaraswamy, M.M. (2005). Assembling Integrated Project Teams for Joint Risk
      • Management. Construction Management and economics , (in press).
      • Rahman, M.M., Kumaraswamy, M.M., Karim, K., Ang, G. and Dulaimi, M. (2005). Cross-country perspectives
      • on Integrating Construction Project Teams, Canadian Society of Civil Engineers, 6th Construction
      • Specialty Conference , Toronto, June 2005, (in press).
      • Russell, J.S. (1992). Decision models for analysis and evaluation of construction contractors, Construction
      • Management and Economics , 10, 185-202.
      • Sze, E., Kumaraswamy, M.M., Wong, T., Yeung, N. and Rahman, M. (2003). Weak Links in Partnering Supply
      • Chains? - Consultants’ and Subcontractors’ Views on Project Partnering, 2nd International Conference
      • on Construction in the 21st Centur y, Hong Kong, Dec. 2003, 108-113.
      • Sze, E., Kumaraswamy, M., Fung, A., Palaneeswaran, E. and Wong, S. (2004). Partnering with the tenants –
      • Hong Kong experience, 20th ARCOM Conference , September, Edinburgh, UK, 1, 309-320.
      • Sze, E., Kumaraswamy, M., Ling, F.Y.Y., Dulaimi, M., Bajracharya, A. and Luk, C., (2005). Barriers to
      • Construction Industry Innovations – a Hong Kong perspective, 3rd International Conference on
      • Innovations in Architecture, Engineering and Construction (AEC) ; June 2005, Rotterdam, The
      • Netherlands, (in press).
      • Taha, M.A., Abou-Zeid, A., Hanna, A.S. and Russell, J.S. (1998). Merging genetic algorithms with neural
      • networks: Owner-contractor prequalification example, in Flood, I. and Kartam, N. (Eds), Artificial Neural
      • Networks for Civil Engineers: Advanced features and Applications , ASCE, New York, USA, 247-259.
      • Ugwu O. O, Kumaraswamy M. M, Ng T. S, Lee P K. K. (2003). Agent–based Collaborative Working in
      • Construction: Understanding and Modelling Design Knowledge, Construction Management Practice and
      • Activities for Process Automation, HKIE Transactions , Hong Kong Institution of Engineers, 10 (4), 81-
      • 87.
      • Yogeswaran, K., Kumaraswamy, M.M, and Miller, D.R.A. (1998). Claims for extension of time in civil
      • engineering projects. Construction Management and Economics , 16, 238-244.
      • Zhang, X.Q., Kumaraswamy, M.M., Wei, Z., and Palaneeswaran, E. (2002). Consessionaire selection of BOT
      • tunnel projects in Hong Kong, Journal of Construction Engineering and Management , 128(2), 155-163.
    •  
    • Referensi
      • APQC (1997) Using Information Technology to Support Knowledge Management ,
      • Consortium Benchmarking Study: Final Report. 1997
      • Ascari, A.; Rock, M. and Dutta, S. (1995) “Reengineering and Organisational
      • Change: Lessons from a Comparative Analysis of Company Experiences”
      • European Management Journal, Vol 13, 1, 1-30
      • Davenport, T. H. and Prusak, L. (1998) “ Working Knowledge ”, Harvard Business
      • School Press
      • Davenport, T. H., D. de Long and M. Beers (1997) Building Successful Knowledge
      • Management Projects, Center for Business Innovation , Working Paper
      • Davenport, T. H., S. Jarvenpaa and M. Beers (1998) Improving Knowledge Work
      • Processes, Sloan Management Review, Vol. 37, Summer, No 4, pp. 53-65.
      • Lank, E. (1997) “Valuing ICL Knowledge: A Case Study”, Knowledge Management ,
      • Aug/Sep 1997, 1, 1, 16-19
      • Nonaka, I. (1991) The Knowledge-Creating Company, Harvard Business Review ,
      • 1991, Nov.-Dec., pp. 96-104.
      • Nonaka, I. and Takeuchi, H. (1995) The Knowledge-Creating Company: How
      • Japanese Companies Create the Dynamics of Innovation , Oxford Univ Press.
      • Reimus, B. (1996) “ Knowledge Sharing Within Management Consulting Firms ,
      • Report on How U.S.-Based Management Consultancies Deploy Technology,
      • Use Groupware and Facilitate Collaboration” Executive Summary, Kennedy
      • Publications, Fitzwilliam, New Hampshire,
      • http://www.kennedypub.com/gware.html
      • Sveiby, K. E. (1992) “The Knowhow Company: Strategy Formulation in Knowledge-
      • Intensive Industries”, International Review of Strategic Management , Wiley,
      • 167-186
      • Sveiby, K. E. (1997) The New Organizational Wealth: Managing and Measuring
      • Knowledge-Based Assets , Berrett-Koehler Publ., San Francisco
      • Cambridge, MA: Harvard Business School Press, 2000.
      • J. Ivari, “A Paradigmatic Analysis of Contemporary School of IS Development”, European Journal of Information Systems , Vol. 1, No. 4, 1991, pp. 249-272.
      • C. Christensen, The Innovator’s Dilemma: When New Technologies Cause Great Firms to Fail , Boston, MA: Harvard Business School Press, 1997.
      • C. Christensen and M. Raynor, The Innovator’s Solution: Creating and Sustaining Successful Growth , Boston, MA: Harvard Business School Press, 2003.
      • G. Hamel, Leading the Revolution: How to Thrive in Turbulent Times by Making Innovation a Way of Life , New York, NY: Penguin Putnam Inc., 2000.
      • R.S. Wurman, InformationAnxiety2 , Indianapolis, IN: QUE, 2001.
      • R.M. Kanter, eVolve!: Succeeding in the Digital Culture of Tomorrow , Boston, MA: Harvard Business School Press, 2000.
      • H. Saint-Onge and D. Wallace, Leveraging Communities of Practice for Strategic Advantage , Burlington, MA: Butterworth-Heinemann, 2003.
      • J. Lave and E. Wenger, Situated Learning: Legitimate Peripheral Participation , Cambridge, UK: Cambridge University Press, 1991.
      • S. Denning, The Springboard: How Storytelling Ignites Action in Knowledge-Era Organizations , Boston, MA: Butterworth-Heinemann, 2001.
      • K. Beck, Extreme Programming Explained: Embrace Change , Boston, MA: Addison-Wesley, 2000.
      • A. Cooper, Inmates Running the Asylum: Why High-Tech Products Drive Us Crazy and How to Restore the Sanity , Indianapolis, IN: SAMS Publishing, 1999.
      • P. Senge, C. Roberts, R. Ross, B. Smith, G. Roth, and A. Kleiner, The Dance of Change: The Challenges to Sustaining Momentum in Learning Organizations , New York, NY: Currency Doubleday, 1999.
      • A. Hunt and D. Thomas, The Pragmatic Programmer , Boston, MA: Addison-Wesley, 2000.
      • J. Kotter, Leading Change , Boston, MA: Harvard Business School Press, 1996.
      • M. Fullan, Leading in a Culture of Change , San Francisco, CA: Jossey-Bass, 2001.
    • Understanding Information & Communication Technology Harjanto Prabowo Chief Information Officer ( CIO ) Bina Nusantara
    • Referensi
      • 1. Adcock, Ken, Helms, Marilyn M., and Jih, Wen-Jang Kenny. (1993, Spring).
      • 2. Information technology: Can it provide a sustainable competitive advantage? Information
      • Strategy: The Executive’s Journal, 10-15.
      • 3. American Express and Microsoft form alliance to provide Internet/intranet travel
      • services. (1996, July 29). PR Newswire.
      • 4. American Express expands RoundTrip Services with array of new products and
      • services. (1997, July 15). Business Wire.
      • 5. Andersen Consulting and American Hotel & Motel Association. (1989). Looking
      • forward: A management perspective of technology in the lodging industry.
      • 6. Anderson, Erin. (1984). The sales person as outside agent or employee: A
      • transaction cost analysis (Report No. 84-107). Cambridge, MA: Marketing Sciences
      • Institute.
      • 7. Antonucci, Yvonne Lederer and Tucker, James J., III. (1998, Spring). Responding
      • to earnings-related pressure to reduce IT operating and capital expenditures. Information
      • Strategy: The Executive’s Journal, 6-14.
      • 8. Apostolopoulos, T. K. and Pramataris, K. C. (1997). Information technology
      • investment evaluation: Investments in telecommunication infrastructure. International
      • Journal of Information Management, 17 (4), 287-296.
      • 9. Applegate, Lynda M., McFarlan, F. Warren, and McKenney, James L. (1996).
      • Corporate information systems management: The issues facing senior executives (4th ed.).
      • Chicago: Irwin.
      • 10. Argyris, Chris. (1991, May-June). Teaching smart people how to learn. Harvard
      • Business Review, 99-109.
      • 11. Argyris, Chris. (1993, Winter). Education for leading-learning. Organizational
      • Dynamics, 21 (3), 5-17.
      • 12. Argyris, Chris. (1994, July-August). Good communication that blocks learning.
      • Harvard Business Review, 77-85.
      • 13. Argyris, Chris and Schön, Donald A. (1978). Organizational learning: A theory of
      • action perspective. Reading, MA: Addison-Wesley.
      • 429
      • 14. Babbie, Earl. (1995). The practice of social research (7th ed.). Belmont, CA:
      • Wadsworth Publishing Company.
      • 15. Bacharach, Samuel B. (1989). Organizational theories: Some criteria for evaluation.
      • Academy of Management Review, 14 (4), 496-515.
      • 16. Bacon, C. James. (1992, September). The use of decision criteria in selecting
      • information system. MIS Quarterly, 16 (3), 335-354.
      • 17. Bagozzi, Richard. P. (1980). Causal models in marketing. New York:
      • John Wiley & Sons.
      • 18. Bakos, J. Yannis. (1987). Dependent variables for the study of firm and industrylevel
      • impacts of information technology. Proceedings of the Eighth International Conference
      • on Information Systems, Pittsburgh, PA, 10-23.
      • 19. Bakos, J. Yannis and Treacy, Michael E. (1986, June). Information technology and
      • corporate strategy: A research perspective. MIS Quarterly, 10 (2), 107-119.
      • 20. Banker, Rajiv D., Kauffman, Robert J., and Morey, Richard C. (1990, Fall).
      • 21. Measuring gains in operational efficiency from information technology: A study of the
      • Positran deployment at Hardee’s Inc. Journal of Management Information Systems, 7 (2),
      • 29-54.
      • 22. Barrett, Amy. (1997, February 24). At AOL, more holes by the minute. Business
      • Week, 37.
      • 23. Barrington, Melvin N. and Olsen, Michael D. (1987). Concept of service in the
      • hospitality industry. International Journal of Hospitality Management, 6 (3), 131-138.
      • Baumann, M. A. (1997, September 1). Click and drag. Hotel & Motel Management,
      • 28-30.
      • 24. Becker, Cherylynn F. (1992). A middle range approach to theory development for
      • service organization. Unpublished doctoral dissertation, Virginia Polytechnic Institute and
      • State University.
      • 25. Becker, Cherylynn and Olsen, Michael D. (1995). Exploring the relationship
      • between heterogeneity and generic management trends in hospitality organizations.
      • International Journal of Hospitality Management, 14 (1), 39-52.
      • 26. Benbasat, Izak, Goldstein, David K., and Mead, Melissa. (1987, September). The
      • case research strategy in studies of information systems. MIS Quarterly, 11 (3), 369-386.
      • 27. Benbasat, Izak and Zmud, Robert W. (1999, March). Empirical research in
      • information systems: The practice of relevance. MIS Quarterly, 23 (1), 3-16.
      • 430
      • 28. Benjamin, Robert I., Rockart, John F., Scott Morton, Michael S., and Wyman, John.
      • (1984, Spring). Information Technology: A strategic opportunity. Sloan Management
      • Review, 3-10.
      • 29. Bensaou, M. and Earl, Michael. (1998, September-October). The right mind-set for
      • managing information technology. Harvard Business Review, 119-128.
      • 30. Berry, John. (1997, March). Death of a middle man. Internet World, 39-41.
      • Berry, Leonard. L. (1980, May-June). Service marketing is different. Business, 30,
      • 24-29.
      • 31. Bessen, Jim. (1993, September-October). Riding the marketing information wave.
      • Harvard Business Review, 150-160.
      • 32. Bharadwaj, Anandhi and Konsynski, Benn R. (1997, September 22). Capturing the
      • intangibles. InformationWeek, 71-73, 75.
      • 33. Bhote, Keki R. (1995, Summer). “It’s customer loyalty, stupid”: Nurturing and
      • measuring what really matters. National Productivity Review, 14 (3), 39-59.
      • 34. Bitner, Mary Jo, Booms, Bernard H., and Tetreault, Mary Stanfield. (1990, January).
      • The service encounter: Diagnosing favorable and unfavorable incidents. Journal of
      • Marketing, 54 (1), 71-84.
      • 35. Blau, P. M. and Scott, W. R. (1962). Formal organizations. San Francisco:
      • Chandler.
      • 36. Bonn, Mark A., Furr, H. Leslie, and Susskind, Alex M. (1999, May). Predicting a
      • behavioral profile for pleasure travelers on the basis of Internet use segmentation. Journal of
      • Travel Research, 37 (4), 333-340.
      • 37. Bourgeois, L. J., III. (1980). Strategy and environment: A conceptual integration.
      • Academy of Management Review, 5 (1), 25-39.
      • 38. Bourgeois, L. J., III. and Eisenhardt, Kathleen M. (1988, July). Strategic decision
      • processes in high velocity environments: Four cases in the microcomputer industry.
      • Management Science, 34 (7), 816-835.
      • 39. Bowen, David E. and Cummings, Thomas G. (1990). Suppose we took services
      • seriously. In David E. Bowen, Richard B. Chase, Thomas G. Cummings, and Associates
      • (Eds.). Service management effectiveness: Balancing strategy, organization and human
      • resources, operations, and marketing (pp. 1-14). San Francisco: Jossey-Bass Publishers.
      • 431
      • 40. Bowen, John. (1990, Winter). Development of a taxonomy of services to gain
      • strategic marketing insights. Journal of the Academy of Marketing Science, 18 (1), 43-49.
      • 41. Boynton, Andrew C. and Zmud, Robert W. (1984, Summer). An assessment of
      • critical success factors. Sloan Management Review, 17-27.
      • 42. Boynton, Andrew C., Zmud, Robert W., and Jacobs, Gerry C. (1994, September).
      • The influence of IT management practice on IT use in large organizations.
      • MIS Quarterly, 18 (3), 299-318.
      • 43. Brady, Tim, Cameron, Ross, Targett, David, and Beaumont, Chris. (1992). Strategic
      • IT issues: The views of some major IT investors. Journal of Strategic Information
      • Systems, 1 (4), 183-189.
      • 44. Brealey, Richard A. and Myers, Stewart C. (1991). Principles of corporate finance
      • (4th ed.). New York: McGraw-Hill, Inc.
      • 45. Bresnahan, Jennifer. (1998, July 15). What good is technology? CIO Enterprise
      • [On-line]. Available: http://www.cio.com/archive/enterprise/071598_value_content.html.
      • 46. Brinberg, David and McGrath, Joseph E. (1985). Validity and the research process.
      • Newbury Park, CA: Sage Publications, Inc.
      • 47. Bruns, Richard. (1997, June). Are we there yet? Lodging [On-line]. Available:
      • http://www.lodgingmagazine.com/june97/coverstory.htm.
      • 48. Brynjolfsson, Erik and Hitt, Lorin. (1996, September 9). The customer counts.
      • Informat ionWeek, 48, 50, 52, 54.
      • 49. Burrus, Daniel (with Gittines, Roger). (1993). Technotrends: How to use
      • technology and go beyond your competition. New York: HarperBusiness.
      • 50. Cahill, John. (1997, February 24). The Internet tidal wave. Address presented at
      • EURHOTEC, The Pan European Hotel Technology Exhibition and Conference, Amsterdam.
      • 51. Caldwell, Bruce. (1998a, March 23). Executive briefing: Senior managers get ITenlightened.
      • InformationWeek, 2ER-3ER.
      • 52. Caldwell, Bruce. (1998b, May 18). Travel network hit by one-two punch.
      • InformationWeek, 40.
      • 53. Campbell, Donald T. (1955, January). The informant in quantitative research.
      • The American Journal of Sociology, 60 (4), 339-342.
      • 54. Campbell, Donald T. (1975). Degrees of freedom and case study. Comparative
      • Political Studies, 8, 178-193.
      • 432
      • 55. Carlzon, Jan. (1987). Moments of truth: New strategies for today’s customer-driven
      • economy. New York: HarperCollins Publishers.
      • 56. Carney, Thomas F. (1972). Content analysis: A technique for systematic inference
      • from communications. Winnipeg: University of Manitoba Press.
      • 57. Cash, James I., Jr. and Konsynski, Benn R. (1985, March-April). IS redraws
      • competitive boundaries. Harvard Business Review, 134-142.
      • 58. Castleberry, Jay A., Hempell, Christian, and Kaufman, Gretchen. (1998, Summer).
      • The battle for electronic shelf space on the global distribution network. Hotel Online
      • [On-line]. Available: http://www.hotel-online.com/Neo/Trends/Andersen/1998_GDNShelf
      • Space.html.
      • 59. Chakravarthy, Balaji S. (1986). Measuring strategic performance. Strategic
      • Management Journal, 7, 437-458.
      • 60. Champy, James, Buday, Robert, and Nohria, Nitin (1996, June 10). Creating the
      • Terimakasih
      • Alex Breznev Pandia
      • Pasca Manajemen UNIKOM
      • NIM : 6110109001