Will cross functional information systems work?
Article Abstract:
The successful application of cross functional systems which would allow information sharing between managers is dependent on people and technological issues. People issues include corporate culture, work units and individual decision makers. Cooperation is an essential factor in corporate cultures and work units to encourage information sharing between managers that will be facilitated by cross functional systems. An abundance of useless or incorrect information in cross functional systems must also be avoided, for efficient decision making. Technological issues on the other hand, include information system elements and level of success. Management must compare the advantages of using information system elements such as inputs, processors and outputs with the costs involved. The level of access to be granted for each user must also be determined to guard against the misuse of information.
Publication Name: Management Accounting (USA)
Subject: Business, general
ISSN: 0025-1690
Year: 1993
User Contributions:
Comment about this article or add new information about this topic:
Information please: what are some of the applications of bar code technology?
Article Abstract:
Automatic identification systems (AIS), also known as bar coders, identify products using machine-readable binary codes. Bar coding is commonly associated with supermarket and other retail operations, but any industry in which information or products are counted, packaged, or tracked can benefit. Accounting applications of bar code technology include: inventory control, asset management, record keeping, and attendance data collection. Bar code technology allows for error-free data entry. AIS can improve customer service by making product distribution more efficient.
Publication Name: Management Accounting (USA)
Subject: Business, general
ISSN: 0025-1690
Year: 1987
User Contributions:
Comment about this article or add new information about this topic:
Establishing information security
Article Abstract:
Lincoln National Corporation has developed an extensive system for maintaining information integrity and security. The process consists of: assigning divisional security managers; publishing security policy statements; classifying various systems; developing emergency contingency plans; and developing safeguards against internal and external computer 'hackers.' Employee involvement has also been found to be critical for Lincoln National's security system success.
Publication Name: Management Accounting (USA)
Subject: Business, general
ISSN: 0025-1690
Year: 1989
User Contributions:
Comment about this article or add new information about this topic:
- Abstracts: Allocation of investment in work and family roles: alternative theories and implications for research. Dollars, Sense, and Sunk Cost: A Life Cycle Model of Research Allocation Decisions
- Abstracts: Designs for environmental scanning systems: tests of a contingency theory. A maximum decisional efficiency estimation principle
- Abstracts: Initial attribution and information-seeking by superiors and subordinates in production variance investigations
- Abstracts: Commission recommends more military base closures: thirty large facilities targeted. Military lifts martial law
- Abstracts: Managing employee separations with the reward system. Employee empowerment at risk: effects of recent NLRB rulings