SEARCH RESULTS

YOU WERE LOOKING FOR :Information Technology Design and Gender Bias

Essays 301 - 330

Technology is Not Neutral

think we "fit" the services they offer. While this may be merely annoying when it comes to dealing with the junk mail, both snail ...

Ethics In Information Technology

16). Monitoring and surveillance have come to represent just two of the villainous components of computer use in the late twentie...

New Dawn Drilling Case Study

that are used. The information is accumulated locally, put into Excel spread sheets and sent to the head office where it is input ...

Use of Information Technologies in University Libraries

automation is also responsible for the creation and maintenance of digital technologies, which now make it possible to generate in...

Characteristics Successful IT Manager

* Adopt a client service mindset so that the focus is always on what the client or customer needs and expects (Sisco, 2003). * Abi...

How Technology Can Help Organizations Fulfill Ethics Goals

This is just one example. The point is that computers can be used to make the hiring and promotion process fair. In this way, ethi...

Current Events in Auditing Information Technology

(The Institute of Internal Auditors, 2009a). Auditing problems revolving around extensible business reporting terminology will be...

MODELS AND SOURCES OF INTERNATIONAL ECONOMIC DEVELOPMENT

information technology is the way in which economic development occurs. This has worked well for countries such as India, which pr...

Constantly Evolving Information Technology

In eight pages this paper examines IT's past, present, and future potential. Six sources are cited in the bibliography....

Disaster Recovery Planning and Information Technology

II. Five Elements of Disaster Recovery Planning IIa. Preparedness and Training In general, a great deal of planning is directe...

IT Transnational Management

2008). More than a decade ago, Reimers (1997) reminded readers that building a transnational organization required total global ...

HACKERS AS SECURITY GUARDIANS

and once inside, decide to be destructive (Germain, 2004). Then there are the white hat hackers - those who deliberately break int...

MALCOLM AND UCB: A COMPARISON

of their operations and activities. The two aspects that are considered with the Baldrige National Award, especially as they perta...

FROM HERE TO ECONOMY - AN ANALYSIS

the guts to call Adam Smith, the so-called father of economics "not the brightest light in the galaxy?" Or who would consider John...

Information Technology Projects

change. One dynamic that is often overlooked in IT change projects is the loss of productivity during and immediately after the ...

IMPLEMENTING A TECHNOLOGY SYSTEM IN A COMPANY

and installation guys, on the other hand, probably wouldnt care about a training schedule or support strategy. A companys receptio...

Considering the Implementation of an Information Technology Strategy for Local Government

the research to develop which takes all of the potential factors into account; dependant and interdependent influences as well as...

INFORMATION TECHNOLOGY: SECURITY BY ADMONITION

is to allow a networking system to cooperate with its user and what the user wants, while keeping the "bad things" out. He points ...

Information Technology; Business Solutions

which may include the organizational goals and the need to be able to demonstrate accountability. One area where information tec...

Information Technology and Management at EasyJet

in with the strategy and the people who use it. It is only by appreciating the technological environment within EasyJet as a whole...

Direct Marketing and IT's Influence

In thirty two pages this paper discusses relevant topics and cases in this examination of how direct marketing has been affected b...

IT Applications for Small Business or Small Offices of Large Organizations

mimic those used in large companies. Small businesses typically do not have resources to pay employees who are not directly invol...

EDC and SLK Case Study

the management of the company, but by those who would be using system; in this case the accounts department, those who would be us...

Information Technology System Standardization and Streamlining

In five pages this paper examines expanding business and necessary changes to an IT system in a consideration of streamlining and ...

IT Certification Classes

competitive factor; by obtaining such additional certification, it announces to potential employers that ones primary focus remain...

Amazon.com, the Internet, and IT

In eight pages this paper examines the information technology uses of Amazon as a way of creating competitive advantage and also c...

Organizational Value Through Information Technology and Management

In seven pages reactive and proactive strategies along with disaster recovery and balanced scorecards are among the topics discuss...

IT's Impact on HRM's Changing Role

In seventeen pages this paper examines how human resource management has been affected by computers and the use of information tec...

Postgirot Bank Case Study

bank has relationships with almost all Swedish and need to be companies either directly or through an ounce. With 425,000 companie...

Porter's Applicability to Retail's Information Technology

of operation of the organization. Thus it "is in these activities that a firm has the opportunity to generate superior valu...