YOU WERE LOOKING FOR :Knowledge and Information Management
Essays 361 - 390
In seventeen pages this paper examines how human resource management has been affected by computers and the use of information tec...
in some manner from its existence) is counterbalanced, however, by our desire to keep some information private. Branscomb (1995) ...
In twelve pages this paper examines resource information management integration considerations and includes systems definitions, t...
In thirty pages this paper discusses Cathay Pacific Airways' uses of IT in strategic management with technology's direct and indir...
percent are male. The average age of employees is 34.3 years and the largest age group is between 30 and 39 years - 49.9 percent a...
within the same system. A typical example would be a company which has businesses spread over many manufacturing environments. I...
In ten pages this research paper examines commercial real estate and IS's industry role in a consideration of GIS, DDS, and the RE...
This 8 page paper looks at a fictitious retail company and a single process which needs improvement. The example is a retail store...
many forms cryptography complexity increasing the difficulty breaking the code is achieved with the use of prime numbers. One most...
Gilbert, 2003). In order to get to the top of a corporate hierarchy, women have been advised to "mimic the sometimes coldhearted, ...
the store improving customer service quality, but it might not generate sufficient income to pay the extra costs. Coppola, Erchk...
was a role for Human Resources in this scenario. One technique used by Continental was to hire friends (Brenneman, 1998). This mig...
there are at least six characteristics common to all organizations that others can label as being attuned to learning from events ...
replace the existing computer, particularly when it never has performed to the expectations with which it was acquired. The curre...
change. One dynamic that is often overlooked in IT change projects is the loss of productivity during and immediately after the ...
principles" (Tepper, 2009). Rather than these factors, Chew and Kelley feel that the differences in their results originate with d...
to criminal issues were not sufficient to address computer fraud. To an extent, wire and mail fraud issues were addressed in the p...
man-in-the-middle attacks, wireless attacks, hackers doing their homework, monitoring vulnerability research, being persistent/pat...
Street Journal, Intel is selling its Centrino Wi-Fi chips for its cost to fabricate them. Why? For one thing, turning Wi-Fi techno...
its tightly enforced on most websites that sell books and music. Another piece of legislation that is trying to be pushed...
order to create value within the supply chain. The use of the system started out as a dialing in network which facilitated...
In nine pages diabetes and its various aspects are considered regarding illness management including medication alternatives, non ...
What is the best software and/or information system for various units and departments in a company? The answer to this is NOT...
benefits management but it is true for other functions of this department. Selecting technology is something that must be done w...
Discusses vulnerabilities to Wal-Mart's supply chain management and IT systems and proposes solutions. There are 5 sources listed ...
In order to manage their inventory, including management with the vendors, Wal-Mart utilize an Oracle database, the database is on...
but as the views on the role and duties of a HR department may vary there will also need to be more general questions, concerning ...
future proofing as a viable method of assuring continued growth. Indeed, IT managers must look forward and plan for changes that a...
lower price, thereby beating their competitors, or they could charge the same price and realize a greater profit (Quick MBA, 2007)...
their study was that: "... a best practices study is important at this time is the industrys consolidation. The industrys intense ...