Une méthode de gestion de l'attention aux signaux faibles
Keywords:
Business Intelligence, Individual cognitive process, Sensemaking, Weak signals analysis, Cognitive approachAbstract
This article proposes, in a cognitive approach of information systems, a method for the exploitation of anticipatory information like weak signals. The observations from several practitioners make it possible to come to a favourable conclusion as to the acceptability and practicability of the method. Furthermore, progress could be made in the face of some managers difficulties.Downloads
How to Cite
CARON-FASAN, M.-L. (2001). Une méthode de gestion de l’attention aux signaux faibles. Systèmes d’Information Et Management (French Journal of Management Information Systems), 6(4), 73–90. Retrieved from https://revuesim.org/index.php/sim/article/view/111
Issue
Section
Empirical Research Article
License
The author bears the responsibility for checking whether material submitted is subject to copyright or ownership rights (e.g. figures, tables, photographs, illustrations, trade literature and data). The author will need to obtain permission to reproduce any such items, and include these permissions with their final submission.
It is our policy to ask all contributors to transfer for free the copyright in their contribution to the journal owner. There are two broad reasons for this:
- ownership of copyright by the journal owner facilitates international protection against infringement of copyright, libel or plagiarism;
- it also ensures that requests by third parties to reprint or reproduce a contribution, or part of it, in either print or electronic form, are handled efficiently in accordance with our general policy which encourages dissemination of knowledge within the framework of copyright.
In conformity with the French law, the author keeps the 'moral rights' related to the article:
- The 'authorship right': It is the author's right to have his name associated with each publication and exploitation of the article.
- The 'integrity right': It can be claimed by the author if he finds that during an exploitation, his work has been distorted (cutting, reassembly...).

