SEARCH RESULTS

YOU WERE LOOKING FOR :Ethics and Information Technology

Essays 151 - 180

INFORMATION SCIENCE AND ETHICS

Examines ethics among the various sub-disciplines of information science. There are 2 sources listed in the bibliography of this 3...

Legality and Ethical Concerns in Counseling

This 3 page paper gives an overview of many issues concerning ethics for the professional counselor. This paper includes issues su...

An Assessment of the Foundation for Ethical Decision Making within the New Belgian Brewery

The writer utilizes a case supplied by the student, which are presents information on the way in which the new Belgian Brewery (N...

Overview of Engineering Ethics

been utilized in the protection of public interest, especially when issues of safety can be impacted by widespread public response...

Ethical Issues and the Responsibility of Marketers; Marketing Tobacco, Alcohol and Financial Services

their goods, and while the UK may have controls, many other countries, especially developing countries, do not have those controls...

Data Collection in Developing and Developed Nations

of culture is useful when considering the collection of data as it will help with both the collection and also the interpretation ...

Twentieth Century Leaders

1994). Hitler proved an able and courageous soldier in World War I, winning the coveted Iron Cross twice. He was blinded temporar...

Continental Airlines: Demonstrating a Link Between Ethics and Human Resource Management

was a role for Human Resources in this scenario. One technique used by Continental was to hire friends (Brenneman, 1998). This mig...

IT Security Ethics - Assessing the Differing Approaches

and academic institutions, the concept has spread to address the basic concern of what behaviors are appropriate when dealing with...

Capital One Credit Card Company

fees, payment history, parties to transactions, and credit card usage (Capital One, Privacy, 2002). * Credit bureaus to determine ...

Data Warehouse Architecture Model For The NHS

This 92 page paper examines the potential of peer to peer (P2P) as an efficient architecture for the UK National Health Service (N...

Information Technology; Business Solutions

which may include the organizational goals and the need to be able to demonstrate accountability. One area where information tec...

Information Technology and Management at EasyJet

in with the strategy and the people who use it. It is only by appreciating the technological environment within EasyJet as a whole...

INFORMATION TECHNOLOGY: SECURITY BY ADMONITION

is to allow a networking system to cooperate with its user and what the user wants, while keeping the "bad things" out. He points ...

Considering the Implementation of an Information Technology Strategy for Local Government

the research to develop which takes all of the potential factors into account; dependant and interdependent influences as well as...

Managerial Impact of Developments in Information Technology

that outsourced some of their IT needs, Kodak and British Petroleum Exploration (BPX), because the management structures were very...

Information Technology Recommendations

company and the clients. Software such as Sage will be capable of generating invoices and creating accounts, it is also available ...

Porter's Applicability to Retail's Information Technology

of operation of the organization. Thus it "is in these activities that a firm has the opportunity to generate superior valu...

The Dowding Universal Business Model and Its Influences on Information Technology

as customers, suppliers and managers. With the ten aspects there are a total of fifty five elements (Dowding, 2001). The third...

Information Technology Portfolio Management

management is that it minimizes the risk associated with any available choice of action. The risk that exists arises from uncerta...

Information Technology Policy Development

transactions, worth more than $1 trillion, in the 12 months ended March 30, the first time it has passed the $1 trillion mark in a...

Information Technology Knowledge Needed by a Risk or Security Manager

nuts and bolts of I.T., or is a cursory knowledge sufficient? In part, the answer lies in management ideology. Do managers need to...

Information Technology in Brazil

to develop a thriving ICT industry, and Brazil has done just that. The criteria for making this judgment were: first, the enviro...

Large Information Technology Projects Management

in large complex projects (McElhearn, 2004, Kerzner, 2004). If we look at the different aspects of the projects such as lifecycle ...

Information Technology Design and Gender Bias

including illiterates, but the emphasis shift to what it terms the I-methodology. The I-methodology was able to take the i...

Information Technology Strategies and Business Challenges

especially with the goal being toward an enterprise information system that would help improve efficiencies while reducing costs a...

Information Technology Portfolio Management Investigation Proposal

When this is the case, those working on the project team are dependent on those working in affected areas for information regardin...

Portfolio Management and Information Technology Investigation

climate and atmosphere that exists only in the present time. If all possible sources of risk could be identified and accounted fo...

Information Technology and the Meeting of Organizational Structures and Operational Objectives

There are two types of organizational structures that tend to be used when it comes to IT management and objectives -- these are t...

THE RELATIONSHIP BETWEEN INFORMATION TECHNOLOGY AND ORGANIZATIONAL STRATEGIES

to have better outcomes - rather than spending a lot of money (not to mention wasted time and effort) on the latest IT fad, these ...