SEARCH RESULTS

YOU WERE LOOKING FOR :Use of Information Technologies in University Libraries

Essays 481 - 510

Chemical Industry and the Effects of Information Technology

Dow Chemical officially takes the opposite view. As a matter of corporate policy, Dow Chemical conducts its business within the f...

Technology and Privacy Rights

and even peruse employee movement and behavior in the workplace utilizing closed-circuit TV (Benigno, 2002). As science-fiction s...

eCommerce and Information Systems

cultivating relationships with top automotive retailers that want access to the browsing car buyer, and sharpening its outreach to...

American Universities - Profit Driven Unfairness

complaints usually tend to arise because of the existence of affirmative action policies that stipulate quotas that universities m...

KUDLER FINE FOODS: MARKETING, ADVERTISING, SALES - AND TECHNOLOGY

In other words, marketing involves everything from ensuring the right products are being offered to the right consumers, to ensuri...

RIORDAN MANUFACTURING: STRATEGIC IT FACTORS

Focuses on strategic information technology factors to be considered by Riordan Manufacturing when it makes its move from Hangzhou...

SECURITY AT ST. JOHN’S HOSPITAL

isnt being seen - and read - by unauthorized personnel (such as the cleaning crew or perhaps the cleaning crews friends). The like...

TERRORISM AND INFORMATION AND COMMUNICATION TECHNOLOGY: THE HOWS AND WHYS

Introduction On November 5, 2009, Nidal Malik Hasan, a major in the U.S. Army and a psychiatrist, entered his workplace, th...

SUNSWEET, TECHNOLOGY AND LOGISTICS

There is little doubt that todays supply chain is becoming very complex and multifaceted. This is a result of consistent outsourci...

The Benefits of New Technology in the Classroom

are new and innovative ways in which information can be communicated between two or more parties. This not only applies to two fri...

Potential Impact of Macro Environmental Factors on Starbucks

as a direct result of the economic changes may have a low level of confidence which will impact on their spending and increase the...

Choosing an Application to Create Value within an International Organization

In order to manage their inventory, including management with the vendors, Wal-Mart utilize an Oracle database, the database is on...

PATTON-FULLER AND IT

data both within the organization, or to external stakeholders. What OSI layers are directly involved? In the standard OSI...

SOFTWARE APPLICATIONS AND ORGANIZATIONAL DEPARTMENTS

What is the best software and/or information system for various units and departments in a company? The answer to this is NOT...

The Strengths and Future of Betfair

technological development and procurement (Porter, 1985). These support activities may relate to more than only one section of the...

"Two Types of People" - Sample University Application

the real world. When one of them escapes one day, he would likely be met with pain and ridicule, but after adjusting to the light ...

THE IMPACT OF IT ON ADIDAS - AN OVERVIEW

Adidas Adidas AG is the #2 manufacturer of sporting goods worldwide behind rival Nike Inc. (Colbert, 2010). The company als...

How BPX changed in the 1990s

program (Cross, Earl and Sampler, 1997). They worked to create standards in the oil industry so information could be shared more e...

How to Use IT in Huamn Resource Management

benefits management but it is true for other functions of this department. Selecting technology is something that must be done w...

The Sociological Impact of Jealousy on Facebook

newspaper article, the text is fairly traditional and informal, and is targeted at an audience of casual readers who are assumed t...

Considerations for IT Implementation Projects

The writer looks at a number of issues that should be considered by those planning and implementing information technology project...

Chief Security Officers - Role and Responsibilities

stage of the plan necessarily involves developing an understanding of recent security breach events at similar institutions, ident...

Designing a Kiosk to Facilitate an Interactive Experience for Visitors to an Exhibition

from the proposal approval. The aim of this report is to identify suitable aspects of design for the kiosk and its installation,...

Overview of Medication Errors

the University of California at San Diego, researchers analyzed over 62 million death certificates for the years 1979 through 2006...

Requirement for a New IT System

involvement in the system, this will clarify the functionality requirements. Information will also be gathered from the users, suc...

Athletic Funding and Academic Crowding Out

ten such programs in the country. By way of contrast, the University of Floridas football coach routinely receives a salary of mor...

The IRS and Other Cheaters

Ariely and his team conducted a number of experiments at three universities to investigate the likelihood of cheating if the stude...

Evidence-Based Nursing Practice and Technology

This research paper consists of a longer version of khebptech.doc. The paper offers additional information on the impact that EBP ...

Title IX Violations Colleges

Sexual harassment is covered under Title IX of the Educational Amendments of 1972. The EEOC defines this as unwelcome sexual advan...

2020 and the Future of Information Technology

This 5 page paper gives an overview of how information technology may by in the year 2020. This paper includes issues such as busi...