SEARCH RESULTS

YOU WERE LOOKING FOR :Use of Information Technologies in University Libraries

Essays 91 - 120

Information Access and Computer Science

In seven pages the technology of computer information retrieval systems is examined and discusses how it can be incorporated into ...

Information Technology and Competitive Advantage

A literature review of information technology and how it can be used to acquire competitive advantage consists of five pages. Sev...

Business and Information Technology

In five pages this paper explores the many business uses of information technology in a consideration of competitive advantage and...

Strategic Alignment and Communication Information Technology

In eight pages a niche marketing engineering company is featured in an information technology case study that examines strategic a...

Amazon.com, the Internet, and IT

In eight pages this paper examines the information technology uses of Amazon as a way of creating competitive advantage and also c...

Organizational IT Growth and Management

In five pages this paper examines an information technology's growth and management and considers how success is dependent upon le...

DaimlerChrysler and IT

In seven pages DaimlerChrysler and Daimler Benz are examined in a consideration of information technology's benefits, challenges, ...

Information Uses in an Exotic Fruit Case B Study

In five pages organizational flow of information is the focus of this student supplied case study with technology uses and system ...

Computer Conferencing and Gender Bias

In ten pages this paper examines the burgeoning information technology and computer technology field in an argument that alleges g...

An Information Technology Presentation Example

A paper consisting of 7 pages demonstrates how to organize an information technology presentation in a way that can inspire studen...

Modern Instructional Strategies and Computer Technology

In five pages modern instructional strategies are examined within the context of computer technology's influence and the impact on...

British Airways and IT

database, which was supported by both of the scenarios and arose due to this ling term planning. The culture of adopting and the...

Business Case Study on Information Systems' Implementation

that however good a system is and whatever the benefits it will give the employees, either directly or indirectly there will be so...

Outsourcing and the Pharmaceutical Industry

to expand their capacity for research and basically, to increase their overall productivity (Borchardt, 2000). The analysis fram...

IT Abuse Prevention

In the case of computers and Internet access, loss of privacy represents one of the biggest concerns. Empowering the individual w...

Information Management and Hotels

their study was that: "... a best practices study is important at this time is the industrys consolidation. The industrys intense ...

Privacy Issues and IT

their electronic mail and telephone conversations, and nearly every other aspect of their individual lives?" (1999, p. 620). Br...

Technology Questions

In five pages a Q and A format is used to answer 2 questions posed by a student regarding health care professionals and the import...

Case Study on Dubai Ports Authority

the Bill of Lading, the delivery order, and the bill of entry. Another major player in the situation was the Dubai Customers Depa...

Two Studies of Information Technology

gratification and for some purchases the inability to see and feel what they are. These different elements are seen as reassuring ...

Human Resource Project for Duke Energy Corporation

2003). Duke also identifies the companys values that include: integrity; stewardship; inclusion; initiative; teamwork; and accou...

Overview of VoIP Technology

traditional telephone companies (VoIP). The development of this market has a umber of supplier, such as VocalTec, 3Com, Cisco, a...

Computer Age and Information Ethics

technology in general. The ease with which personal information can be unscrupulously gleaned from the multitude of computerized ...

Business, Internet, and IS

the Internet, trading partners can bypass intermediaries and inefficient multi-layered procedures. Furthermore, Web-sites are avai...

Making Management Decisions and IS Technology

a component of DSS has led to the development of a general framework for the integration of both DSS and software agents. These r...

IT and MIS Strategic Uses

enabled, he noted, by advances in chips, connectivity and computing devices" (Trembly, 2002; p. 18). Yoran (2002) sees a la...

5 'Golden Threads' and Their Implications

and Shared Minds Implications for business are clear. All of these threads weave together in the effective organization to...

Essays on Computer Management

in it (especially on the Internet). The problem is, however, that "privacy" is one of those concepts that is difficult to ...

COMPUTING AND PRODUCTIVITY: MYTH OR REALITY?

way to truly cut costs was to outsource jobs to other countries where wages were lower and where overhead wasnt quite the issue. F...

Why Passwords and Good Information Security Technologies Are Compromised by Users

cases, there are four critical factors that affect the proper usage of passwords: Multiple passwords; Password content; Perceived ...