SEARCH RESULTS

YOU WERE LOOKING FOR :Acme Widgets and Information Technology Management

Essays 421 - 450

Computers in the Future and the Internet

In seven pages this paper considers Ralph M. Stair and George Walter Reynolds' text Principles of Information Systems - A Manageri...

Future Role of IT and Telecommunication Companies

In twenty pages this paper discusses the connection between information technology and telecommunications companies in a considera...

Documentation in the Digital Age

In twenty pages the creation and storage of information in the age of digital technology are discussed with the preservation of di...

Online Analytical Processing and Data Mining

In five pages information technology is discussed in a consideration of OLAP and data mining processes, which are compared as well...

Outsourcing IT

In fifteen pages a hypothetical case study involving a fictitious car manufacturer is utilized in a discussion of what outsourcing...

Russell Corporation's Information Management

In eight pages the Russell sportswear corporation is examined in a consideration of how it manages its systems of information tech...

IT Planning Crucial Factors for Business

In five pages this report discusses the business applications of information technology in a consideration of some critical planni...

Human Resource Model Thesis and Management

In sixty five pages this paper presents statistics, diagrams, graphs, and charge in a study of 'Home-Based Laser Assemble Employee...

Banking Industry and IT

In five pages this paper considers commercial banking and the contributions of information technology with a discussion of such to...

Outsourcing and the Pharmaceutical Industry

to expand their capacity for research and basically, to increase their overall productivity (Borchardt, 2000). The analysis fram...

Technology and Privacy Rights

and even peruse employee movement and behavior in the workplace utilizing closed-circuit TV (Benigno, 2002). As science-fiction s...

eCommerce and Information Systems

cultivating relationships with top automotive retailers that want access to the browsing car buyer, and sharpening its outreach to...

Overview of VoIP Technology

traditional telephone companies (VoIP). The development of this market has a umber of supplier, such as VocalTec, 3Com, Cisco, a...

British Airways and IT

database, which was supported by both of the scenarios and arose due to this ling term planning. The culture of adopting and the...

Technology in Government, Its Responsibility and Role

In six pages this paper discusses the relation of Internet technology and the role the government should play regarding the protec...

Industrial Effects of IT

is still perceived as strong, and the use of computers has moved from being seen as a source of competitive advantage., to a neces...

Information Management and Hotels

their study was that: "... a best practices study is important at this time is the industrys consolidation. The industrys intense ...

National Health Service Information System Implementation Methodology

this thesis makes use of the Actor Network Theory it is appropriate to use a research paradigm that may be seen as able to cope wi...

IT Outsourcing

emerging service companies to deliver accounting, human resources, data processing, internal mail distribution, security, plant m...

Hotel Industry and IT

a joint venture called The Hotel Industry Switch Co (THISCO). THISCO linked airline computer reservation systems and a majority of...

Motivation and the Building of Teams

those skilled have become more specialised. In effect the ultimate team maybe compared to the single craftsman, and the modern tea...

Business and Ethics

practical science that help guide behaviour (Laudon, 1995). This may appear very detached from information technology, ho...

Future Business and Technology

be initially heard by the bank manager, but a loan servicing officer may have to assess credit information and other variables bef...

Assessment of Value Creation

the values that may be gained. If they were not then these were tools which could have been used. The first tool...

Forensics and 'Cyber' Crime

computer system with the intent to destroy or manipulate data is more than enough reason to augment security measures. According ...

Steinway's Supply Chain

chain, they are firm infrastructure, human resource management, technological development and procurement (Porter, 1985). At all l...

Identity Theft Protection

loaded onto his computer and being spied on for a short time by coworkers. Jackson (2001) was able not only to gain access...

Overview of IT Project Process Stages

and also who it is that will be using the system and who it is that this use will impact on, for example, in a hospital this will ...

Marketing and the Effects of IT

with the use of many marketing tools, from one to many advertising and marketing, through to bilateral communication with the use ...

Case Study on Dubai Ports Authority

the Bill of Lading, the delivery order, and the bill of entry. Another major player in the situation was the Dubai Customers Depa...