SEARCH RESULTS

YOU WERE LOOKING FOR :What Information TEchnology Managers Need to know for the Future

Essays 661 - 690

Dissertation Proposal on the Commercial Value of IT

measure this value rather than the use of the traditional productivity measures. This can then be expanded into the way value meas...

ICT School Strategies Development

tackled by many studies. The concept of the digital divide with the technically able and the technical unable creating a social an...

IT and the Implications of Outsourcing

results, the National Health Service in the UK has outsourced many services to a high level of criticism as has the London Ambulan...

Technology as a Societal Addiction

weapons of mass destruction that are the center of world controversy today reflect that fact. These weapons do exist and they exi...

Student Case Study on WOI Western Oceanography Instantiate Case Study

project is projected as taking part in four phases over a period of eight weeks. Mission Objectives The mission is convert the W...

Ireland and China's ICT Industries

the same time, when choosing an environment in which to do business, it pays to look at the industries in both nations as well as ...

Tourist Industry and eTourism

means, such as hyperlinks. The information could include the location of restaurants, tube stations or other transport facil...

Case Study of Eastern Power Company

allowing bill payment online as well as facilitating complaints or communication with customer services by e-mail. However, these ...

Manuel Castells' IT Theory Evaluation

internet is the centre of communications and social function for society from social communications to the conducting of commerce....

An Argument Against Reforming Social Security at the Present Time

Roosevelt himself - promoted the plan as one in which individuals would pay into the system over the course of their working lives...

Wi Fi Network Selection and Integration

and professional journals, academic reference books and the internet. The development of wireless networks have been aided with...

Ireland, China, and ICT

reforming the state owned IT enterprises as well as encouraging a range of research and development in the areas of software and i...

Processes of Risk Management and Risk Assessment

One of the factors separating physical and IT projects is that in producing a building (or bridge, or airplane) everyone knows at ...

Health Care Staff Shortages

nurses by 2012 to eliminate the shortage (Rosseter, 2009). By 2020, the District of Columbia along with at least 44 states will ha...

Disaster Recovery Planning and Information Technology

II. Five Elements of Disaster Recovery Planning IIa. Preparedness and Training In general, a great deal of planning is directe...

IT Transnational Management

2008). More than a decade ago, Reimers (1997) reminded readers that building a transnational organization required total global ...

MODELS AND SOURCES OF INTERNATIONAL ECONOMIC DEVELOPMENT

information technology is the way in which economic development occurs. This has worked well for countries such as India, which pr...

Human Resource Management; Recruitment, Retention and Leadership

finishes with an outline of an approach to personal development. 2. Introduction Human relations management is arguably one of t...

MALCOLM AND UCB: A COMPARISON

of their operations and activities. The two aspects that are considered with the Baldrige National Award, especially as they perta...

School ICT and Student Research

disagreements. The data was collected with the use of self completing questionnaires. This option was chosen as it was felt this...

University Healthcare Call Center Construction and Implementation

nurse desk or to another location for prescription refill. Messages are recorded on paper message pads, after which the message i...

Overview of IT Systems Development

Some of the methodologies pointed out include STRADIS, IE, or information engineering, structured systems analysis and design (SSA...

Business IT System Determination

down time in terms of badly recorded or lost data would end up helping the company save in expenses. As of now,...

HACKERS AS SECURITY GUARDIANS

and once inside, decide to be destructive (Germain, 2004). Then there are the white hat hackers - those who deliberately break int...

IT Acquisition by Developing Nations and Strategies of Identification

at the structure of global trade it is already recognised that developing countries face many major disadvantages. They have less ...

Information Technology Design and Gender Bias

including illiterates, but the emphasis shift to what it terms the I-methodology. The I-methodology was able to take the i...

IT and Changes to Society

is never as robust as the high that preceded it, and it "ends with a sudden shock ... and the economy rolls over into the next con...

6 Cases and Technology

that companies that imitate the original and enter the market later (de Haviland had a passenger jet before Boeing, but who today ...

6 Articles on Technology

second problem that arises is when one design begins to dominate the market. For instance, what aircraft designer today wants to ...

Enterprise Resource Planning and Supply Chain Management

made (Harrington, 2002). In managing the supply chain there are many aspects that may be amended or adjusted to create val...