SEARCH RESULTS

YOU WERE LOOKING FOR :Questions on Information Technology Acquisitions

Essays 481 - 510

School ICT and Student Research

disagreements. The data was collected with the use of self completing questionnaires. This option was chosen as it was felt this...

University Healthcare Call Center Construction and Implementation

nurse desk or to another location for prescription refill. Messages are recorded on paper message pads, after which the message i...

Making Management Decisions and IS Technology

a component of DSS has led to the development of a general framework for the integration of both DSS and software agents. These r...

Assessment of Value Creation

the values that may be gained. If they were not then these were tools which could have been used. The first tool...

Future Business and Technology

be initially heard by the bank manager, but a loan servicing officer may have to assess credit information and other variables bef...

GE's eBusiness and Information Systems

to choose a destination, "put a plan in place, and move from where we are to where we need to go. From an IT and an implementation...

Forensics and 'Cyber' Crime

computer system with the intent to destroy or manipulate data is more than enough reason to augment security measures. According ...

IT Project Tender Invitation Case Study

to support the window operating system and alternate operating systems on the computers in the network. The system will also need ...

3 Technology Questions

has strong a weak forms (Cross et al, 1974). Question 2 The open source software movement may be seen in relation to the way th...

IT Value Assessment

but the ultimate cause of structural problems is that of organizational design. "Good people in a poorly designed organizational ...

Information Techology Outsourcing Trends

Outsourcing is becoming more and more prevalent. The purpose of outsourcing is to achieve optimum results for the functions that a...

Family, People, the Contemporary World, and the Effects of Technology

most profound technological change can be the quietest. Personal computers seemed to exist only in the world of hackers until one ...

Logistics Project Management and Solving Problems

to meet and has made large decisions without consulting the manager. The situation has affected the morale of the staff, the manag...

Risk Management, Security, and Communication

to inappropriate individuals or departments. This can perhaps best be illustrated by looking at the use of IT within a corporate s...

Steinway's Supply Chain

chain, they are firm infrastructure, human resource management, technological development and procurement (Porter, 1985). At all l...

Identity Theft Protection

loaded onto his computer and being spied on for a short time by coworkers. Jackson (2001) was able not only to gain access...

Overview of IT Project Process Stages

and also who it is that will be using the system and who it is that this use will impact on, for example, in a hospital this will ...

IT and KM

One company that has successfully used KM to integrate thousands of employees and the skills they bring to the office is Pricewate...

Ford Motor Company and IT

than the company could go without IT. It is a claim that is quite logical as even ordinary individuals with a computer realize tha...

Security Issues and the Effects of Organizational Culture

of organization. All of these things are significant in the decision-making process. First, what is organizational culture and why...

Computer Age and Privacy Issues

modern technology in general. The ease with which personal information can be unscrupulously gleaned from the multitude of comput...

Operations Management and IT, TQM, and JIT Effects

* Manufacturing flexibility is essential (Green and Inman, 2000). * Customers define quality (Green and Inman, 2000). * Team effor...

Resource Need and Marketing

allow transportation and also to support the construction. This will also include not only the presence of resources such as elect...

Marketing and the Effects of IT

with the use of many marketing tools, from one to many advertising and marketing, through to bilateral communication with the use ...

Overview of VoIP Technology

traditional telephone companies (VoIP). The development of this market has a umber of supplier, such as VocalTec, 3Com, Cisco, a...

Hybrid Management Consistency and Mintzberg's Position

clowns again ... is when they are approaching my car, offering to wash the windshield" (Berry, 2001; p. 23). Countless programmer...

British Airways and IT

database, which was supported by both of the scenarios and arose due to this ling term planning. The culture of adopting and the...

National Health Service Information System Implementation Methodology

this thesis makes use of the Actor Network Theory it is appropriate to use a research paradigm that may be seen as able to cope wi...

Technology in Government, Its Responsibility and Role

In six pages this paper discusses the relation of Internet technology and the role the government should play regarding the protec...

Industrial Effects of IT

is still perceived as strong, and the use of computers has moved from being seen as a source of competitive advantage., to a neces...