SEARCH RESULTS

YOU WERE LOOKING FOR :Information Technology and Management at EasyJet

Essays 481 - 510

IT Managerial Promotion Within

In six pages this paper discusses how to promote information technology managers within the existing structure of a corporation. ...

Organizations and IT

In seven pages this paper assesses whether information technology assists or hampers organizations. Seven sources are cited in th...

Overview of Cisco Inc.

rapid growth is being supported by a strategy of build, buy and partner, with the firm making a number of acquisitions in order to...

Integratihng IT through a Paperless System

the global operations (Microsoft, 2009). If a system, is going to be paperless it is essential that it is up to date....

Firms Tend to Under-Invest in the are of Information Technology

Banker & Ravindran, 2006). On some level, this is true. Firms that have for example excellent web sites that are easily navigable ...

Implementing Information Technology Compliance

comparison IT application controls are designed to ensure that specific applications are functioning correctly, which may include ...

IT and Business Models

practical outcomes (Thompson, 2007; Wiseman, 1988). The concept of IT as a key part of strategy and the need for models to recogn...

Does IT Matter?

be yes, but there are reservations. As Carr (2008) points to the naysayers, there is no proof that IT does matter. Similarly, ther...

IT Transnational Management

2008). More than a decade ago, Reimers (1997) reminded readers that building a transnational organization required total global ...

MODELS AND SOURCES OF INTERNATIONAL ECONOMIC DEVELOPMENT

information technology is the way in which economic development occurs. This has worked well for countries such as India, which pr...

Constantly Evolving Information Technology

In eight pages this paper examines IT's past, present, and future potential. Six sources are cited in the bibliography....

Disaster Recovery Planning and Information Technology

II. Five Elements of Disaster Recovery Planning IIa. Preparedness and Training In general, a great deal of planning is directe...

MALCOLM AND UCB: A COMPARISON

of their operations and activities. The two aspects that are considered with the Baldrige National Award, especially as they perta...

Ethics In Information Technology

16). Monitoring and surveillance have come to represent just two of the villainous components of computer use in the late twentie...

Technology is Not Neutral

think we "fit" the services they offer. While this may be merely annoying when it comes to dealing with the junk mail, both snail ...

Evidence-Based Nursing Practice and Technology

This research paper consists of a longer version of khebptech.doc. The paper offers additional information on the impact that EBP ...

2020 and the Future of Information Technology

This 5 page paper gives an overview of how information technology may by in the year 2020. This paper includes issues such as busi...

Information Technology Projects

change. One dynamic that is often overlooked in IT change projects is the loss of productivity during and immediately after the ...

Characteristics Successful IT Manager

* Adopt a client service mindset so that the focus is always on what the client or customer needs and expects (Sisco, 2003). * Abi...

Use of Information Technologies in University Libraries

automation is also responsible for the creation and maintenance of digital technologies, which now make it possible to generate in...

New Dawn Drilling Case Study

that are used. The information is accumulated locally, put into Excel spread sheets and sent to the head office where it is input ...

Current Events in Auditing Information Technology

(The Institute of Internal Auditors, 2009a). Auditing problems revolving around extensible business reporting terminology will be...

FROM HERE TO ECONOMY - AN ANALYSIS

the guts to call Adam Smith, the so-called father of economics "not the brightest light in the galaxy?" Or who would consider John...

HACKERS AS SECURITY GUARDIANS

and once inside, decide to be destructive (Germain, 2004). Then there are the white hat hackers - those who deliberately break int...

Information Technology in the Business Environment

macro environmental assessment and this aids with a firm in choosing what industries to compete and where to position oneself (Bak...

MIS at a Large Snack Company

Interchange which exchanged information between computers. This allows employees in different areas to obtain information needed. ...

PATTON-FULLER AND IT

data both within the organization, or to external stakeholders. What OSI layers are directly involved? In the standard OSI...

Potential Impact of Macro Environmental Factors on Starbucks

as a direct result of the economic changes may have a low level of confidence which will impact on their spending and increase the...

Negative Outcomes Resulting from the Impact of IT on Globalization

demonstrating the current influences and the wonders of the modern world that have already taken place. We can argue it is only by...

Implementing an Inventory Control System

The paper uses a information technology development lifecycle approach to assess the way that a firm may introduce a computer syst...