SEARCH RESULTS

YOU WERE LOOKING FOR :Current Issues on Information Technology

Essays 301 - 330

Risk Management, Security, and Communication

to inappropriate individuals or departments. This can perhaps best be illustrated by looking at the use of IT within a corporate s...

Assessment of Value Creation

the values that may be gained. If they were not then these were tools which could have been used. The first tool...

Information Technology and VMS Operating Systems

"is a 32-bit, multitasking, multiprocessing virtual memory operating system" (Article 73391, 2001). OpenVMS Alpha is the 64-bit v...

Overseas Offshoring Information Technology Services

century. What is the impact of such significant outsourcing to small business and American workers? For one thing, globali...

IT Value Assessment

but the ultimate cause of structural problems is that of organizational design. "Good people in a poorly designed organizational ...

Business Questions Relating to Information Technology

is facilitated by a remote procedure call vehicle that is considered a fundamental middleware piece of the DCE (Compaq, 2001). T...

IT Project Tender Invitation Case Study

to support the window operating system and alternate operating systems on the computers in the network. The system will also need ...

Overview of Becoming an Information Technology Consultant

obtaining the job they can do well (Smith, 2001). There are some ways in which a person can find their market niche (Smith, 2001)...

Information Technology Consulting

regarding success/failure rates of consultants. These data do not seem to be available. It would be impossible to calculate the ra...

Business and Information Technology Questions Answered

ERP. ERP is a set of tools, which are often modular units of a software application which bring together the management of differe...

Future Business and Technology

be initially heard by the bank manager, but a loan servicing officer may have to assess credit information and other variables bef...

GE's eBusiness and Information Systems

to choose a destination, "put a plan in place, and move from where we are to where we need to go. From an IT and an implementation...

Forensics and 'Cyber' Crime

computer system with the intent to destroy or manipulate data is more than enough reason to augment security measures. According ...

Business and Information Technology in a Consideration of Siemens Business Services and Microsoft

scope and scale of operational concerns. The issues that concern Microsoft may be seen as those which are currently seen in the in...

School ICT and Student Research

disagreements. The data was collected with the use of self completing questionnaires. This option was chosen as it was felt this...

Information Technology Knowledge Needed by a Risk or Security Manager

nuts and bolts of I.T., or is a cursory knowledge sufficient? In part, the answer lies in management ideology. Do managers need to...

University Healthcare Call Center Construction and Implementation

nurse desk or to another location for prescription refill. Messages are recorded on paper message pads, after which the message i...

Enterprise Resource Planning and Supply Chain Management

made (Harrington, 2002). In managing the supply chain there are many aspects that may be amended or adjusted to create val...

Portfolio Management and Information Technology Investigation

climate and atmosphere that exists only in the present time. If all possible sources of risk could be identified and accounted fo...

Overview of IT Systems Development

Some of the methodologies pointed out include STRADIS, IE, or information engineering, structured systems analysis and design (SSA...

Information Technology Portfolio Management Investigation Proposal

When this is the case, those working on the project team are dependent on those working in affected areas for information regardin...

Business IT System Determination

down time in terms of badly recorded or lost data would end up helping the company save in expenses. As of now,...

Information Technology and the Meeting of Organizational Structures and Operational Objectives

There are two types of organizational structures that tend to be used when it comes to IT management and objectives -- these are t...

Processes of Risk Management and Risk Assessment

One of the factors separating physical and IT projects is that in producing a building (or bridge, or airplane) everyone knows at ...

Ireland and China's ICT Industries

the same time, when choosing an environment in which to do business, it pays to look at the industries in both nations as well as ...

Manuel Castells' IT Theory Evaluation

internet is the centre of communications and social function for society from social communications to the conducting of commerce....

Tourist Industry and eTourism

means, such as hyperlinks. The information could include the location of restaurants, tube stations or other transport facil...

Information Technology Lessons, Student Performance, and Gender Differences

the division and difference that may exist within the classroom whether or not the digital divide has been overcome. One major d...

Internet Technology and Society

As the request in this paper was to analyze implicit system of thought that inform the technology, we can probably use the hypothe...

Competitive Advantage and Technology

and Millar (1985) noted some 20 years ago that information technology ends up creating a competitive advantage by offering the bus...