SEARCH RESULTS

YOU WERE LOOKING FOR :Information Technology Business Solutions

Essays 511 - 540

Home Health and Hospice Company Business Requirement Analysis

critical matters, employee requests for information often go unanswered for too long. Results can and have been employee frustrat...

Chapters Nine and Ten of Managing the Information Technology Resource by Jerry N. Luftman

computer support specialist, system analyst, database administrator and desktop publishing specialist. In order to qualify as an...

Knowledge Management and the Roles of ICT and Social Processes

which interaction takes place and arte key to the formation of culture within an organization. Social process take place regardles...

Information Technology Lessons, Student Performance, and Gender Differences

the division and difference that may exist within the classroom whether or not the digital divide has been overcome. One major d...

Case Study of Eastern Power Company

allowing bill payment online as well as facilitating complaints or communication with customer services by e-mail. However, these ...

Manuel Castells' IT Theory Evaluation

internet is the centre of communications and social function for society from social communications to the conducting of commerce....

Tourist Industry and eTourism

means, such as hyperlinks. The information could include the location of restaurants, tube stations or other transport facil...

Ireland and China's ICT Industries

the same time, when choosing an environment in which to do business, it pays to look at the industries in both nations as well as ...

Ireland, China, and ICT

reforming the state owned IT enterprises as well as encouraging a range of research and development in the areas of software and i...

Processes of Risk Management and Risk Assessment

One of the factors separating physical and IT projects is that in producing a building (or bridge, or airplane) everyone knows at ...

Wi Fi Network Selection and Integration

and professional journals, academic reference books and the internet. The development of wireless networks have been aided with...

Information Technology Portfolio Management

management is that it minimizes the risk associated with any available choice of action. The risk that exists arises from uncerta...

Information Technology Policy Development

transactions, worth more than $1 trillion, in the 12 months ended March 30, the first time it has passed the $1 trillion mark in a...

Dissertation Proposal on the Commercial Value of IT

measure this value rather than the use of the traditional productivity measures. This can then be expanded into the way value meas...

MALCOLM AND UCB: A COMPARISON

of their operations and activities. The two aspects that are considered with the Baldrige National Award, especially as they perta...

Information Technology and Current Issues

meaning is larger than this Henderson (2002), describes this as the difference between the information literate and the informatio...

Competitive Advantage and Technology

and Millar (1985) noted some 20 years ago that information technology ends up creating a competitive advantage by offering the bus...

Information and Communications Technology Interview and Interpretation

a predicable change as may be expected if we were to apply the theories of Clark (et al, 1988). In terms of identify there are m...

HACKERS AS SECURITY GUARDIANS

and once inside, decide to be destructive (Germain, 2004). Then there are the white hat hackers - those who deliberately break int...

FROM HERE TO ECONOMY - AN ANALYSIS

the guts to call Adam Smith, the so-called father of economics "not the brightest light in the galaxy?" Or who would consider John...

Characteristics Successful IT Manager

* Adopt a client service mindset so that the focus is always on what the client or customer needs and expects (Sisco, 2003). * Abi...

Information Technology Projects

change. One dynamic that is often overlooked in IT change projects is the loss of productivity during and immediately after the ...

Current Events in Auditing Information Technology

(The Institute of Internal Auditors, 2009a). Auditing problems revolving around extensible business reporting terminology will be...

Technology is Not Neutral

think we "fit" the services they offer. While this may be merely annoying when it comes to dealing with the junk mail, both snail ...

Recruitment in the IT Sector

This 5 page paper looks at the challenges facing human resource managers when recruiting for information technology (IT) jobs. The...

Ethics In Information Technology

16). Monitoring and surveillance have come to represent just two of the villainous components of computer use in the late twentie...

New Dawn Drilling Case Study

that are used. The information is accumulated locally, put into Excel spread sheets and sent to the head office where it is input ...

Use of Information Technologies in University Libraries

automation is also responsible for the creation and maintenance of digital technologies, which now make it possible to generate in...

Informaion Technology and the Construction Contractor

not been as visible. The starting point of construction has benefited from CAD layer programmes for many decades. However, it may ...

Creativity and Innovation

of the sticky post it notes ma be seen as the creative use of an research project that initially had the aim of developing a new s...