SEARCH RESULTS

YOU WERE LOOKING FOR :Information Systems Case Studies

Essays 781 - 810

CONVENTIONAL ACCOUNTING - IS IT ENOUGH THESE DAYS?

thousands of people. Enron, technically, followed GAAP procedure. There is nothing in GAAP that says companies cant push debt of b...

Use of Information Technologies in University Libraries

automation is also responsible for the creation and maintenance of digital technologies, which now make it possible to generate in...

Technology and Decision-Making in Nursing

showing substantial improvement over these early versions. Recognizing that the task of designing a CDSS is formidable, the Deci...

HPV Policy in a Nationwide Chain of Health Clinics

sexually active. There have been numerous attempts around the nation to make HPV vaccination mandatory. Unfortunately, many of t...

An Overview of Medicaid Eligibility

state to state and from group to group. There are special rules for those who live in nursing homes and for disabled children livi...

HUMAN RESOURCES SYSTEM ANALYSIS: AN OVERVIEW

staff retention and management, training, allocation of resources (including human resources) and overall productivity (Beulen, 20...

Websites Design Methodologies

In five pages website design system methodologies that are information based, relationship based and structure based are discussed...

Business, Internet, and IS

the Internet, trading partners can bypass intermediaries and inefficient multi-layered procedures. Furthermore, Web-sites are avai...

HACKERS AS SECURITY GUARDIANS

and once inside, decide to be destructive (Germain, 2004). Then there are the white hat hackers - those who deliberately break int...

U.S. Army Pay Systems

salary is vastly different, $48,468 for the civilian and $26,967 for the military sergeant but the total package tells another st...

Implementing an Inventory Control System

The paper uses a information technology development lifecycle approach to assess the way that a firm may introduce a computer syst...

KUDLER: SYSTEM FOR NEWSLETTER AND COUPONS

are okay with this, the cashier can take their name and e-mail information. If not, then nothing more needs to be done. The...

Chemical Engineering and Process Control

Process control extends to all arms of the chemical engineering process. Consider, for example, the difficulties in production th...

No Child Left Behind and SIF

has numerous data reporting mandates and it also require that data be accessible. Todays Student Information Systems (SIS) must be...

HHH, Change Management, and Systems Thinking

Connected to the larger system, the hand is an integral part; separated from the system it quite literally is dead and fills none ...

A Wireless Network for a Healthcare Organization

analysts may obtain much of the data in advance they may not be able to foresee of data required by management. The ability to acc...

Technology’s Impact in the Business World; Cause and Effect

with thee increased control that is given over the inventory. In many industries tools such as just in time inventory control are ...

The Importance Of Metrics For Monitoring Organizational Performance

against previous performance, idea goals or best practice figures. Metric may be used in a variety of context, form use in single ...

CAT and SISP - A Review of 2 Articles

evaluation may be useful (Thompson and Weiss, 2011). Once first stage is complete, and the determination that CAT is suitable, the...

Designing a Kiosk to Facilitate an Interactive Experience for Visitors to an Exhibition

from the proposal approval. The aim of this report is to identify suitable aspects of design for the kiosk and its installation,...

Customer Trust and Security of Information

to maintain trust between the people engaging in transaction" such that customers remain entirely satisfied with the level of trus...

Tourism and National Value Systems

This essay pertains to the influence of national values systems and their impact on organizational culture and employee working re...

Biggest Hacking in U.S. History

Just before Thanksgiving 2013, malware was installed on Target's security and payments system that was designed to capture all the...

Introducing Technology - Smoking Cessation Program

This is a followup paper to a proposal to implement a smoking cessation program in a mental health hospital. In this essay, a heal...

Addressing Operations Problems at Riordan Manufacturing

barcode scanner to check in incoming material. The supervisor no longer will be needed to deal with paperwork unless there is a d...

HRM and IS

In thirteen pages this paper discusses the value of information systems in human resources management. Twenty sources are cited i...

Cable Broadcasting Technology

In approximately three pages broadcast cable technology is discussed in a technical system information overview. There is no bibl...

IT Applications for Small Business or Small Offices of Large Organizations

mimic those used in large companies. Small businesses typically do not have resources to pay employees who are not directly invol...

Overview of IT Systems Development

Some of the methodologies pointed out include STRADIS, IE, or information engineering, structured systems analysis and design (SSA...

Probation's Failures and Successes

In five pages this paper examines the U.S. corrections system in a consideration of its history, failures, and successes with stat...