SEARCH RESULTS

YOU WERE LOOKING FOR :Case Studies Information Systems

Essays 721 - 750

eCommerce and Information Systems

cultivating relationships with top automotive retailers that want access to the browsing car buyer, and sharpening its outreach to...

Communications Technology and Information Systems

It has been noted that with industries and organizations developing less structured and simpler forms because of downsizing, busin...

Reynolds and Reynolds and the Effects of Information Systems Technology

In ten pages this paper examines how information systems technology development at Reynolds and Reynolds has made an extremely ben...

Information Technology and VMS Operating Systems

"is a 32-bit, multitasking, multiprocessing virtual memory operating system" (Article 73391, 2001). OpenVMS Alpha is the 64-bit v...

Airline Information System Development

data requirements for the second type of data are more complex, these are the departures information, which includes details of th...

Statement of the Problem of Managing Military Information Systems Technology

reliable and trustworthy information systems" (Wolthusen, 2004, p. 102). In fact, the development of military-based software and ...

WAL-MART, INFORMATION SYSTEMS AND RISK MANAGEMENT

Discusses vulnerabilities to Wal-Mart's supply chain management and IT systems and proposes solutions. There are 5 sources listed ...

AN OVERVIEW OF VMWARE'S INFORMATION SYSTEM

the adoption of VMwares virtualization technologies) (Morningstar Equity Analysts, 2012). VMwares products help improve server uti...

A Qualitative and Quantitative View of Information Systems

In a paper of four pages, the writer looks at information systems. Strategies for successful implementation are taken from both qu...

Ethics of Information Systems

In a paper of three pages, the writer looks at information systems. Ethical and unethical companies are explored. Paper uses three...

Homeland Security's use of Geographical Information Systems

Homeland Security uses many different forms of technology in their role of protecting the US. One type of technology which is use...

Identity Theft and Information Systems

II. What is Identity Theft? The American government defines it as follows: "Identity theft occurs when a criminal uses another...

Research Design and Methods Analysis

the traditional one-on-one model" (Herrara, Vang and Gale, 2002, p. 4). Prior to presenting their method analysis section, the res...

Two Contract Law Cases from Australia

to identify if and where the offer and acceptance may have taken place. Anton placed an advertisement, for the call from John to b...

Wal-Mart's Use of Information Technology

This 10 page paper discusses the way in which Wal-Mart uses information technology. The retailer has the world's largest IT system...

Xerox's Eureka

In ten pages Eureka's information systems at Xerox are examined in terms of how it increases social capital, productivity, and dec...

Reviewing the Political Party System in Canada

In eight pages this paper discusses the system operations, offers background information on the parties including policies and sup...

Diversity Management

In five pages this paper examines how to manage workplace diversity in a consideration of population statistics, executive informa...

Change and Geocast Network Systems

In five pages this paper discusses the problems confronting Geocast Network Systems when it introduced a new product and concept f...

A Case Study in Requirements of Functional Human/Computer Interactions

This paper examines functionality issues required by a video shop to set up a database information system to allow customers easie...

Security on the Web

people "with malicious intent" (Novogrodsky, 2006). If the information is innocuous, this may not be a problem, but it can be trou...

Software Design Systems Analysis and Ethics

of a good systemic approach): 1) state the ethical nature of the problem; 2) state the alternatives; 3) by the use of the laws of...

Tool of Earned Value Management

in time management, quality circles and resource based models. Another tool that has been used effectively has been the Earned Val...

Nanotechnology and Its' Use in the Human Body; It is Desirable or Ethical?

potentially large number of benefits there are also a wide range of ethical and acceptability issues that need to be considered a...

Healthcare Integrated Systems

In twelve pages this paper examines resource information management integration considerations and includes systems definitions, t...

New York City and Asian American High School Students

Asians account for only 13 percent of the high school student population but they account for a disproportionately large percentag...

Values Creation and Jarir Bookstore

assumptions are that the company wants to increase its use of resources to save on costs and also to increase sales. It is also as...

Small Business and Systems Problem Resolution

information technology to create strategic business advantages. It would use an outside IT company to come in and evaluate their ...

IS and Risk Assessment

hackers can readily infiltrate any given companys entire computer system with the intent to destroy data is more than enough reaso...

Exporting Computers to Kenya

both computer systems and the Internet on the rise. Though South Africa is considered the "leader" in such a field, Kenya is defin...