SEARCH RESULTS

YOU WERE LOOKING FOR :Ethics and Information Technology

Essays 301 - 330

GE's eBusiness and Information Systems

to choose a destination, "put a plan in place, and move from where we are to where we need to go. From an IT and an implementation...

Forensics and 'Cyber' Crime

computer system with the intent to destroy or manipulate data is more than enough reason to augment security measures. According ...

Future Business and Technology

be initially heard by the bank manager, but a loan servicing officer may have to assess credit information and other variables bef...

IT Value Assessment

but the ultimate cause of structural problems is that of organizational design. "Good people in a poorly designed organizational ...

Information Techology Outsourcing Trends

Outsourcing is becoming more and more prevalent. The purpose of outsourcing is to achieve optimum results for the functions that a...

2 Industries and Ethical Standards

is Gatifloxacin." Before the doctor can order the medication, yet another screen pops up and tells the doctor that he needs to tak...

IT System Design

were available to enhance the decision and design processes. 1. Terms of Reference Harley Davidson are a well known motorbike m...

Accounting Profession and the Effects of Information Systems

however, technological accounting functions were mainly stand-alones - they werent a whole lot different from the old by hand ledg...

Operations Management and IT, TQM, and JIT Effects

* Manufacturing flexibility is essential (Green and Inman, 2000). * Customers define quality (Green and Inman, 2000). * Team effor...

Family, People, the Contemporary World, and the Effects of Technology

most profound technological change can be the quietest. Personal computers seemed to exist only in the world of hackers until one ...

Logistics Project Management and Solving Problems

to meet and has made large decisions without consulting the manager. The situation has affected the morale of the staff, the manag...

Risk Management, Security, and Communication

to inappropriate individuals or departments. This can perhaps best be illustrated by looking at the use of IT within a corporate s...

Steinway's Supply Chain

chain, they are firm infrastructure, human resource management, technological development and procurement (Porter, 1985). At all l...

Identity Theft Protection

loaded onto his computer and being spied on for a short time by coworkers. Jackson (2001) was able not only to gain access...

Overview of IT Project Process Stages

and also who it is that will be using the system and who it is that this use will impact on, for example, in a hospital this will ...

Making Management Decisions and IS Technology

a component of DSS has led to the development of a general framework for the integration of both DSS and software agents. These r...

Assessment of Value Creation

the values that may be gained. If they were not then these were tools which could have been used. The first tool...

National Health Service Information System Implementation Methodology

this thesis makes use of the Actor Network Theory it is appropriate to use a research paradigm that may be seen as able to cope wi...

Technology in Government, Its Responsibility and Role

In six pages this paper discusses the relation of Internet technology and the role the government should play regarding the protec...

Industrial Effects of IT

is still perceived as strong, and the use of computers has moved from being seen as a source of competitive advantage., to a neces...

Information Management and Hotels

their study was that: "... a best practices study is important at this time is the industrys consolidation. The industrys intense ...

Overview of Medication Errors

the University of California at San Diego, researchers analyzed over 62 million death certificates for the years 1979 through 2006...

Motivation and the Building of Teams

those skilled have become more specialised. In effect the ultimate team maybe compared to the single craftsman, and the modern tea...

Hotel Industry and IT

a joint venture called The Hotel Industry Switch Co (THISCO). THISCO linked airline computer reservation systems and a majority of...

IT Outsourcing

emerging service companies to deliver accounting, human resources, data processing, internal mail distribution, security, plant m...

Characteristics Successful IT Manager

* Adopt a client service mindset so that the focus is always on what the client or customer needs and expects (Sisco, 2003). * Abi...

Technology is Not Neutral

think we "fit" the services they offer. While this may be merely annoying when it comes to dealing with the junk mail, both snail ...

New Dawn Drilling Case Study

that are used. The information is accumulated locally, put into Excel spread sheets and sent to the head office where it is input ...

Evidence-Based Nursing Practice and Technology

This research paper consists of a longer version of khebptech.doc. The paper offers additional information on the impact that EBP ...

IMPLEMENTING A TECHNOLOGY SYSTEM IN A COMPANY

and installation guys, on the other hand, probably wouldnt care about a training schedule or support strategy. A companys receptio...