SEARCH RESULTS

YOU WERE LOOKING FOR :Portfolio Management and Information Technology Investigation

Essays 511 - 540

Economic Productivity Paradox Overview

In six pages this paper examines the economic productivity paradox in an overview of its background, information technology expend...

Mergers and IT Considerations

In eight pages this paper discusses mergers and what needs to be considered regarding information technology issues. Six sources ...

Engineering Economy Principles

In seven pages this paper examines the so called 'new economy' of engineering that is attributed to information technology and bus...

Educational Computing Instructional Strategies

In fifteen pages this paper examines the integration of information technology into different kids of educational units. Ten sour...

Competitiveness of Taiwan and IT

In fifty pages this literature review examines how information technology has contributed to the competitive position of Taiwan. ...

Strategic Impact Of E-Business Supply Chain Management; The Case of Asda

and with regular supplies needing to be delivered there can be a high opportunity cost where stocks of goods are depleted, not onl...

IMPLEMENTING A TECHNOLOGY SYSTEM IN A COMPANY

and installation guys, on the other hand, probably wouldnt care about a training schedule or support strategy. A companys receptio...

Information: Determining Value And Accuracy

for known facts. However, it is important to realize that bias can - and does - exist even when an author is both qualified and r...

Computer Age and Privacy Issues

modern technology in general. The ease with which personal information can be unscrupulously gleaned from the multitude of comput...

Ford Motor Company and IT

than the company could go without IT. It is a claim that is quite logical as even ordinary individuals with a computer realize tha...

Security Issues and the Effects of Organizational Culture

of organization. All of these things are significant in the decision-making process. First, what is organizational culture and why...

FROM HERE TO ECONOMY - AN ANALYSIS

the guts to call Adam Smith, the so-called father of economics "not the brightest light in the galaxy?" Or who would consider John...

HACKERS AS SECURITY GUARDIANS

and once inside, decide to be destructive (Germain, 2004). Then there are the white hat hackers - those who deliberately break int...

New Dawn Drilling Case Study

that are used. The information is accumulated locally, put into Excel spread sheets and sent to the head office where it is input ...

Characteristics Successful IT Manager

* Adopt a client service mindset so that the focus is always on what the client or customer needs and expects (Sisco, 2003). * Abi...

How Technology Can Help Organizations Fulfill Ethics Goals

This is just one example. The point is that computers can be used to make the hiring and promotion process fair. In this way, ethi...

Porter's 5 Forces Analysis & Value Chain - Retail Industry

companies. 3. Substitutes Products. Is it possible for a substitute product to capture the market? While it is always possible tha...

Recruitment in the IT Sector

This 5 page paper looks at the challenges facing human resource managers when recruiting for information technology (IT) jobs. The...

Advanced Practice Nurse And Informatics

Elderly, which requires a document signed by the doctor as well as certain health records to be faxed. Even though the same report...

Technology’s Impact in the Business World; Cause and Effect

with thee increased control that is given over the inventory. In many industries tools such as just in time inventory control are ...

Creativity and Innovation

of the sticky post it notes ma be seen as the creative use of an research project that initially had the aim of developing a new s...

Does Technology Improve Learning

classroom with state-of-the art technology, it must be worth the expense. Part 2. Examples of studies investigating this questio...

EDC and SLK Case Study

the management of the company, but by those who would be using system; in this case the accounts department, those who would be us...

IT Project Tender Invitation Case Study

to support the window operating system and alternate operating systems on the computers in the network. The system will also need ...

Forensics and 'Cyber' Crime

computer system with the intent to destroy or manipulate data is more than enough reason to augment security measures. According ...

Assessment of Value Creation

the values that may be gained. If they were not then these were tools which could have been used. The first tool...

Future Business and Technology

be initially heard by the bank manager, but a loan servicing officer may have to assess credit information and other variables bef...

Family, People, the Contemporary World, and the Effects of Technology

most profound technological change can be the quietest. Personal computers seemed to exist only in the world of hackers until one ...

Steinway's Supply Chain

chain, they are firm infrastructure, human resource management, technological development and procurement (Porter, 1985). At all l...

Identity Theft Protection

loaded onto his computer and being spied on for a short time by coworkers. Jackson (2001) was able not only to gain access...