SEARCH RESULTS

YOU WERE LOOKING FOR :Small Business and Information Technology

Essays 391 - 420

Current Events in Auditing Information Technology

(The Institute of Internal Auditors, 2009a). Auditing problems revolving around extensible business reporting terminology will be...

Influences of IT on a Financial Services Company

This 4 page paper looks at information technology in financial institutions and considers influences such as the Sarbanes-Oxley, v...

Advanced Practice Nurse And Informatics

Elderly, which requires a document signed by the doctor as well as certain health records to be faxed. Even though the same report...

Creativity and Innovation

of the sticky post it notes ma be seen as the creative use of an research project that initially had the aim of developing a new s...

Emerging Trends in Global Logistics and Physical Distribution Channels

increasing demands the trend is towards customisation and collaboration. More than ever before a larger number of goods are sent d...

Informaion Technology and the Construction Contractor

not been as visible. The starting point of construction has benefited from CAD layer programmes for many decades. However, it may ...

Recruitment in the IT Sector

This 5 page paper looks at the challenges facing human resource managers when recruiting for information technology (IT) jobs. The...

Does Technology Improve Learning

classroom with state-of-the art technology, it must be worth the expense. Part 2. Examples of studies investigating this questio...

Emerging Trends in Global Logistics and Physical Distribution Channels

as distributors and wholesalers and then the resellers who would sell to the end user. For some goods this push model works well, ...

Postgirot Bank Case Study

bank has relationships with almost all Swedish and need to be companies either directly or through an ounce. With 425,000 companie...

INFORMATION TECHNOLOGY: SECURITY BY ADMONITION

is to allow a networking system to cooperate with its user and what the user wants, while keeping the "bad things" out. He points ...

Considering the Implementation of an Information Technology Strategy for Local Government

the research to develop which takes all of the potential factors into account; dependant and interdependent influences as well as...

EDC and SLK Case Study

the management of the company, but by those who would be using system; in this case the accounts department, those who would be us...

Porter's Applicability to Retail's Information Technology

of operation of the organization. Thus it "is in these activities that a firm has the opportunity to generate superior valu...

Porter's 5 Forces Analysis & Value Chain - Retail Industry

companies. 3. Substitutes Products. Is it possible for a substitute product to capture the market? While it is always possible tha...

Integratihng IT through a Paperless System

the global operations (Microsoft, 2009). If a system, is going to be paperless it is essential that it is up to date....

MALCOLM AND UCB: A COMPARISON

of their operations and activities. The two aspects that are considered with the Baldrige National Award, especially as they perta...

MODELS AND SOURCES OF INTERNATIONAL ECONOMIC DEVELOPMENT

information technology is the way in which economic development occurs. This has worked well for countries such as India, which pr...

Constantly Evolving Information Technology

In eight pages this paper examines IT's past, present, and future potential. Six sources are cited in the bibliography....

Disaster Recovery Planning and Information Technology

II. Five Elements of Disaster Recovery Planning IIa. Preparedness and Training In general, a great deal of planning is directe...

IT Transnational Management

2008). More than a decade ago, Reimers (1997) reminded readers that building a transnational organization required total global ...

Overview of Cisco Inc.

rapid growth is being supported by a strategy of build, buy and partner, with the firm making a number of acquisitions in order to...

Firms Tend to Under-Invest in the are of Information Technology

Banker & Ravindran, 2006). On some level, this is true. Firms that have for example excellent web sites that are easily navigable ...

Does IT Matter?

be yes, but there are reservations. As Carr (2008) points to the naysayers, there is no proof that IT does matter. Similarly, ther...

MANAGEMENT, SECURITY AND INFORMATION TECHNOLOGY

man-in-the-middle attacks, wireless attacks, hackers doing their homework, monitoring vulnerability research, being persistent/pat...

The Benefit of Formalized Processes in an Organization

finance management, human resource management and IT processes. The value and advantages of formalizing and documenting those proc...

What Information TEchnology Managers Need to know for the Future

future proofing as a viable method of assuring continued growth. Indeed, IT managers must look forward and plan for changes that a...

Information Technology and Resource Management

Street Journal, Intel is selling its Centrino Wi-Fi chips for its cost to fabricate them. Why? For one thing, turning Wi-Fi techno...

Implementing Information Technology Compliance

comparison IT application controls are designed to ensure that specific applications are functioning correctly, which may include ...

TERRORISM AND INFORMATION AND COMMUNICATION TECHNOLOGY: THE HOWS AND WHYS

Introduction On November 5, 2009, Nidal Malik Hasan, a major in the U.S. Army and a psychiatrist, entered his workplace, th...