SEARCH RESULTS

YOU WERE LOOKING FOR :Communications Technology and Information Systems

Essays 931 - 960

HPV Policy in a Nationwide Chain of Health Clinics

sexually active. There have been numerous attempts around the nation to make HPV vaccination mandatory. Unfortunately, many of t...

Exporting Computers to Kenya

both computer systems and the Internet on the rise. Though South Africa is considered the "leader" in such a field, Kenya is defin...

Marketing a Plagiarism Detection 'Honor System' Device

complete their assignments, and the convenience of form and searching provide greater opportunity for plagiarizing than ever exist...

A Case Study of an Accounting System

to the have some control over these costs to manage his facility, but he is not being allowed this. If we look at the way head off...

Banking and MIS' Role

companies current performance and to use that information to makes changes and adaptation. One can see how this would be useful i...

Chemical Engineering and Process Control

Process control extends to all arms of the chemical engineering process. Consider, for example, the difficulties in production th...

No Child Left Behind and SIF

has numerous data reporting mandates and it also require that data be accessible. Todays Student Information Systems (SIS) must be...

Case Analysis of Montgomery Mutual Insurance Company

operation, Montgomery Mutual Insurance Company was demonstrating earned premiums in the amount of $480,000. Originally only emplo...

Probation's Failures and Successes

In five pages this paper examines the U.S. corrections system in a consideration of its history, failures, and successes with stat...

An Analysis of Rose's Book, Lives on the Boundary

This paper focuses on the information found in Mike Rose's work, Lives on the Boundary to discuss the current American educational...

Georgia Education Demographic Analysis

In this paper consisting of six pages Georgia demographic data based on 1990 census information is applied to the educational syst...

Expansion Considerations for Fragle Van Lines

FVL decides to go with intermodal shipping, for example, they will have to lease or buy shipping containers that are suitable for ...

The World and the United States in 2013 by Daniel Bell

In eight pages information systems and their many changes in the year 2013 are examined within the context of Bell's text. There ...

HRM and IS

In thirteen pages this paper discusses the value of information systems in human resources management. Twenty sources are cited i...

Information Systems and Ben and Jerry's Ice Cream Inc.

In a paper that consists of five pages an overview of Ben and Jerry's is presented with information systems examined by way of a S...

Corporate IS Outsourcing

of a firms own employees, risk becomes greater when information leaves the company. Further, contracts are made with employees so ...

Marketing Research and MIS

In four pages this paper examines Management Information Systems as they relate to market research in a consideration of startup, ...

AI Robotics and Software Development

growing area that requires extensive information systems (IS) in order to be successful. This fact is quite evident when the softw...

SMEs and AIS' Impact

it seems that the climate for small businesses is better than ever. With the advent of the Internet, small and medium sized compan...

Motivation and Workforce Diversity Management

If there is no fit among activities, there is no distinctive strategy and little sustainability. Management reverts to the simple...

Mexico's System of Banking

only domestic, todays banks are, for the most part, owned and operated by foreign concerns, which control assets through subsidiar...

Financially Analyzing AMS

Advanced Marketing Services, Inc. completed its initial public offering of common stock during July 1987 (AMS, 2002). These days, ...

Overview of Information Economics

rapid pace as well (Mennecke & West 2001). One study indicates that at least one third of the companies using RAD have data that ...

IS and Risk Assessment

hackers can readily infiltrate any given companys entire computer system with the intent to destroy data is more than enough reaso...

Small Business and Systems Problem Resolution

information technology to create strategic business advantages. It would use an outside IT company to come in and evaluate their ...

Tool of Earned Value Management

in time management, quality circles and resource based models. Another tool that has been used effectively has been the Earned Val...

Biggest Hacking in U.S. History

Just before Thanksgiving 2013, malware was installed on Target's security and payments system that was designed to capture all the...

GIS Case Study

given regarding the way the system work, if we look at the inputs, the transformation process and the outputs we can consider the ...

General Insurance Company Case Study

This 11 page paper looks at a case study supplied by the student, describing the current manual information systems that are in pl...

Real-Time Information in the Hospital Setting

real-time applications, patient records are updated instantly as information is added to them. Thus the physician making rounds h...