SEARCH RESULTS

YOU WERE LOOKING FOR :Information Technology Uses by Managers

Essays 121 - 150

DaimlerChrysler and IT

In seven pages DaimlerChrysler and Daimler Benz are examined in a consideration of information technology's benefits, challenges, ...

Information Uses in an Exotic Fruit Case B Study

In five pages organizational flow of information is the focus of this student supplied case study with technology uses and system ...

Computer Conferencing and Gender Bias

In ten pages this paper examines the burgeoning information technology and computer technology field in an argument that alleges g...

An Information Technology Presentation Example

A paper consisting of 7 pages demonstrates how to organize an information technology presentation in a way that can inspire studen...

Modern Instructional Strategies and Computer Technology

In five pages modern instructional strategies are examined within the context of computer technology's influence and the impact on...

COMPUTING AND PRODUCTIVITY: MYTH OR REALITY?

way to truly cut costs was to outsource jobs to other countries where wages were lower and where overhead wasnt quite the issue. F...

Information Technology and Competitive Advantage

A literature review of information technology and how it can be used to acquire competitive advantage consists of five pages. Sev...

Information Access and Computer Science

In seven pages the technology of computer information retrieval systems is examined and discusses how it can be incorporated into ...

Business and Information Technology

In five pages this paper explores the many business uses of information technology in a consideration of competitive advantage and...

Strategic Alignment and Communication Information Technology

In eight pages a niche marketing engineering company is featured in an information technology case study that examines strategic a...

Amazon.com, the Internet, and IT

In eight pages this paper examines the information technology uses of Amazon as a way of creating competitive advantage and also c...

IT Changing, Value, and Performance

In seven pages this paper discusses information technology development and integration over the past two decades in an evaluation ...

Information Transference Analysis

the value of grassroots knowledge is a managerial investment. Management may feel more comfortable in hiring outside of the ranks...

History, Present, and Future of SQL

In five pages this paper discusses SQL in a consideration of its history, uses in the present, and the future promise it holds in ...

IT and Business Models

practical outcomes (Thompson, 2007; Wiseman, 1988). The concept of IT as a key part of strategy and the need for models to recogn...

The Benefit of Formalized Processes in an Organization

finance management, human resource management and IT processes. The value and advantages of formalizing and documenting those proc...

Negative Outcomes Resulting from the Impact of IT on Globalization

demonstrating the current influences and the wonders of the modern world that have already taken place. We can argue it is only by...

The Use of ICT in Corporations

One of the operations that we know gives a company a competitive advantage is a well-managed supply chain. Along the lines of corp...

Privacy Issues and IT

their electronic mail and telephone conversations, and nearly every other aspect of their individual lives?" (1999, p. 620). Br...

HACKERS AS SECURITY GUARDIANS

and once inside, decide to be destructive (Germain, 2004). Then there are the white hat hackers - those who deliberately break int...

Technology Questions

In five pages a Q and A format is used to answer 2 questions posed by a student regarding health care professionals and the import...

Daily Mail and General Trust

2. Introduction The Daily Mail is a well known UK newspaper, with a long history. The group which publish the Daily Mail; the Da...

Why Passwords and Good Information Security Technologies Are Compromised by Users

cases, there are four critical factors that affect the proper usage of passwords: Multiple passwords; Password content; Perceived ...

Climate Change and Technology

in opinion over the last few decades, with a general acceptance that it is the human influences which is causing damage to the env...

Implementing an Inventory Control System

The paper uses a information technology development lifecycle approach to assess the way that a firm may introduce a computer syst...

BROADWAY CAFÉ - A CASE ANALYSIS

www.paperwriters.com/aftersale.htm Introduction When it comes to operating a business, owners these days have a vast a...

IT and MIS Strategic Uses

enabled, he noted, by advances in chips, connectivity and computing devices" (Trembly, 2002; p. 18). Yoran (2002) sees a la...

5 'Golden Threads' and Their Implications

and Shared Minds Implications for business are clear. All of these threads weave together in the effective organization to...

Information Technology Infrastructure at Turk Heavy Transport

some unique need related to the implementation of a project; a task which often involves delivery of heavy or awkward equipment - ...

Performance Appraisal - Motivation

as is the equity theory of motivation. In fact, the senior managers behaviors violate all three process theories of motivation exp...