SEARCH RESULTS

YOU WERE LOOKING FOR :Evolution of Management Information Systems

Essays 541 - 570

Knowledge Management and Information Technology

we have in pursuing innovation is a combination of Peters controlled chaos, a firm grasp on strategic planning, the ability to see...

Hotel and IS Applications

give accurate real-time views of current business results, which can be invaluable in todays hypercompetitive and fast-paced busin...

European Union and Democracy

In 5 pages democratizing the EU is examined in terms of its progress pertaining to public participation in the process, informatio...

Organizational Value Through Information Technology and Management

In seven pages reactive and proactive strategies along with disaster recovery and balanced scorecards are among the topics discuss...

Diversity Management

In five pages this paper examines how to manage workplace diversity in a consideration of population statistics, executive informa...

Reviewing the Political Party System in Canada

In eight pages this paper discusses the system operations, offers background information on the parties including policies and sup...

Case Study of Travelstore.com

A Travelstore.com case study is presented in seven pages and includes both challenges, opportunities, and success through informat...

Xerox's Eureka

In ten pages Eureka's information systems at Xerox are examined in terms of how it increases social capital, productivity, and dec...

A Case Study in Requirements of Functional Human/Computer Interactions

This paper examines functionality issues required by a video shop to set up a database information system to allow customers easie...

CONVENTIONAL ACCOUNTING - IS IT ENOUGH THESE DAYS?

thousands of people. Enron, technically, followed GAAP procedure. There is nothing in GAAP that says companies cant push debt of b...

Technology and Decision-Making in Nursing

showing substantial improvement over these early versions. Recognizing that the task of designing a CDSS is formidable, the Deci...

Use of Information Technologies in University Libraries

automation is also responsible for the creation and maintenance of digital technologies, which now make it possible to generate in...

U.S. Army Pay Systems

salary is vastly different, $48,468 for the civilian and $26,967 for the military sergeant but the total package tells another st...

HACKERS AS SECURITY GUARDIANS

and once inside, decide to be destructive (Germain, 2004). Then there are the white hat hackers - those who deliberately break int...

POLITICS AND LEGISLATION IN INFORMATION SECURITY MANAGEMENT

its tightly enforced on most websites that sell books and music. Another piece of legislation that is trying to be pushed...

BACKGROUND AND EXPLANATION OF SARBANES-OXLEY

for major corporations took place in 2004 (Borrus, 2005). Impact on Accounting Controls The Act, for the most part, has...

MANAGEMENT, SECURITY AND INFORMATION TECHNOLOGY

man-in-the-middle attacks, wireless attacks, hackers doing their homework, monitoring vulnerability research, being persistent/pat...

Information Technology and Resource Management

Street Journal, Intel is selling its Centrino Wi-Fi chips for its cost to fabricate them. Why? For one thing, turning Wi-Fi techno...

Designing a Kiosk to Facilitate an Interactive Experience for Visitors to an Exhibition

from the proposal approval. The aim of this report is to identify suitable aspects of design for the kiosk and its installation,...

Customer Trust and Security of Information

to maintain trust between the people engaging in transaction" such that customers remain entirely satisfied with the level of trus...

CAT and SISP - A Review of 2 Articles

evaluation may be useful (Thompson and Weiss, 2011). Once first stage is complete, and the determination that CAT is suitable, the...

A Wireless Network for a Healthcare Organization

analysts may obtain much of the data in advance they may not be able to foresee of data required by management. The ability to acc...

Tourism and National Value Systems

This essay pertains to the influence of national values systems and their impact on organizational culture and employee working re...

Introducing Technology - Smoking Cessation Program

This is a followup paper to a proposal to implement a smoking cessation program in a mental health hospital. In this essay, a heal...

IT and Effective Valuation

In a paper of four pages, the writer looks at valuation of information systems. The metrics utilized for assessing efficiency and ...

Cathay Pacific Airways, Strategic Management and the Uses of Information Technology

In thirty pages this paper discusses Cathay Pacific Airways' uses of IT in strategic management with technology's direct and indir...

HPV Policy in a Nationwide Chain of Health Clinics

sexually active. There have been numerous attempts around the nation to make HPV vaccination mandatory. Unfortunately, many of t...

Change and Geocast Network Systems

In five pages this paper discusses the problems confronting Geocast Network Systems when it introduced a new product and concept f...

Business Strategies and Information Technology

structure. Leavitt (1998) makes the point that those companies which are the most likely to be successful develop an overall strat...

Theory and Nursing Management

resulted in harvesting being accomplished at a greater rate. There came a point, however, at which the addition of extra workers ...