Académique Documents
Professionnel Documents
Culture Documents
0 Is
1oO
by
N. C. Churchill, C. H. Kriebel
and A. C. Stedry
October., 1965
Introduction
technology have made the research problems more apparent. This is not
fore, must include not only the means for gathering, storing, and
retrieving data, but also the means for converting these "inputs" into
-V.
-3-
the presence of the computer has made possible the notion that a system
irt systems design arise in areas, such as data coding, file organization
the like.
wanted the same information they had been previously receiving but
decision making;
in the future.
Operating Systems
and computer user groups. While these systems can provide comparative
the need for analysis of the provided systems and snythesis by potential
systems to date have provided limited insight into necessary criteria for
-7-
and
process data as rapidly as they are generated (for all practical purposes)
could be used to alter the plan, both the wisdom and pracLicability
the length of the information lag. With no effective time lag, the
- - -- 5 - -- --
-9-
are, however, two forces which are beginning to bring about fundamental
exercised.
larger and larger aspects of management operations has altered the way
LI For example, see Leavitt and Whistler [18], who predict a complete
change in shape from the traditional organization pyramid.
-Il-
authority.
and the way in which they are exercised, can produce marked changes
conducted in greater depth than the two original studies. The purpose
WARM'
-13-
have appeared for the design and operation of such systems, e.g.,
the development of most of these systems has been the system programming
for system design and the programming support necessary to cope with
system."
attention to:
tion compilers";
these systems.
making rules are developed and programmed within the system which
and Theil [19], has ignored within the formal analysis explicit consideration
this study include Kriebel [13] and [17], and Van de Panne [20]. Ongoing
Summary
rather, it present:s a set of areas for research in which the authors and
-16-
of how to use it, there seems little value in conducting research within
information systems would seem to come, rather, frmn laying the ground-
work for use of the computers yet to come, so that management will be
available.
References
). REPORT TITLE
None Logistics
Office and Mathematical
of Naval Research Statistics Branca
None
Washington, D. C. 20360
I)1 ANSTRACT
SecuarityClassificatijon______________
14 LINK A UPIN a LINK C
KIEVWORDS -o~ T Ot
-o -O
research program
mana~gement Infortantion systems
electronic computers
de~cislon-rtaking and control
evaluatior criteria
INSTRUCTIONS
1. OPIGINATING ACTVITY: Enter the name and address imposed by security classification, using standard statements
of th, contractor. subc-intractor. granter. Department of De- such as,
fec~Ae activity at other organization (corporat. author) issuing (1) "Qualified req~uester% may obtain copies of this
Iereport, report from DDC."
2s. REPORT SFCUr.ITY CLASSIFICATION: Enter the over- (2) "Foreign announcement and dissemination of this
alt security classification of tihe report. Indicate whetherreotb DIsntuhrid"
' iNeotricted Data" is Included. 1Ltothing is to be in accord- ertbDCisntatozd.
onewith appropriate security regulations. (3) "U. S. Government agencies may obtain copies of
2b. ROU: Atomticdowgraingis
pecfie inDoDDi-this report directly from DDC. Other qualified DOC
rective 5200. 10 and Armed Forces Industrial Manual. Enter sr hl eus hog
the group number. Also, whuen applicab~le. show that optional .
markings have been used for Group 3 and] Group 4 as author- (4) "U. S. military agencies may obtain copies of this
izedLreport directly from DDC. Other qualified users
3. REPORT TITLE: Fnter the complete report title in all shall request through
capital letter's. Titles in all cases should be unclassified.
If a meaningful title cannot be selectedl without classifica-
tion. shop, title cla5'tification In all capitals in parenthesis (5) "All distribution of this report Is controlled. Qual-
immediatety fo~llowing' -he title. Ified DDC users shall rcquest through
4. DESCRIPTIVE NOTES. If appoprilte. enter the type of
report. e.y.. interimr. progrer., summary. annual, or final. If the report has been furniqlhedto intie Office of Technical
Give the inclusive dates when a otp'*cific reporting period to Services. Department of Commerce, for mote to the public. indi-
'ýovered. cate this fact and enter the price. If known.
S. AUTIIOR(S): Enter thei nam4.(s) of author(s) as shown on 11 SUPPLEJ6ENTARY NOTES: Use for additionsl explana-
or in the report. Entes Iost name. first name, middle Initial, tory notes.
If mtilitary. -show ranlk en-I brant-h of service. The name of
the principal author Is an absolute miunimum requirement. 12. SPONSORING MILITARY ACTIVITY: Enter the name of
the departmental project office or laboratory sponsoring (par
6, REPORT DATL_ Enter the ilatc of the report as day. Inad for) the research and development. Include address.
month. year. or mont.'h year. if mwrc than one date appears
on the report, use daite of public at ion. 13. A13STRACT: Enter an abstrtact riving a brief and factual
summary of the document indicative of ltie report. even though
7&. TOTAL NtIMflEi OF PAGES: The total page count It may also appear elsewhere in the body of the technical re-
should follow normnrl pagination procedturets. Le., enter the port. If additional sapce is required4, a continuation sheet shall
number of p~ivee rntiring
o; information. be attached.
7b. NUMI6iFR 0F REFERUENCES, Enter the total number of ltina highly desirable that the abstract of classified reports
references citedr in the teport. be unclsassified. Each parapraph of the abstract shall end with
GAL CONTRACT f)iR GRANT NIIMnEU; If appropriate, enter an indication of the military security classification of the in-
the applicable nrarrber of the contract or grant under which formation in the paragraph, represented as ('TS). (S). ( C). ar (U)
the report was written There Is no limitation on the length of the abstract. How.
Sb. Be. & 8d. P'ROJE.CT NUMB3ER: Enter the appropriate ever, the suggested length is from ISO t0 225 words.
military department identification, Such as Project number.
subrproject number, system numbers, task number. etc. 14. KEY WORDS: Key words are-technically meaningful terms
or short phrases that characterize a report and may be used as
9a. ORIGINATOR'S REPORT NUMflER(S): Enter the coffi. Index entries fot cataloging the report. Key word% must be
ciat report number by which the document will be Identified selected so that no security classification is required. Identil.
and controlled by the orriintting activity. This number must fiers. such as equipment model designation, trade name, military
be unique to this r.-port. project code name, geographic location. may be used asa key
9b. OTHIER REPORT NUMflFR(S)* If the report hast beern words but will be followed by an indication of technical con.
assigned any other report numbers (either by the ordignaeor text. Thie assignment of links, roles. and weights Is optional.
a.b the sponsor), al so enter tIs number(s).
10. AVAILAIIILITY/LIMITATION NOTICES:~ Enter any lm-
itations or.further dissemination of the report, other than thosel
Unclassified
Scturlly Cla'ssificationt
-- -001W - -w--.-. -~