SEARCH RESULTS

YOU WERE LOOKING FOR :Current Events in Auditing Information Technology

Essays 451 - 480

GE's eBusiness and Information Systems

to choose a destination, "put a plan in place, and move from where we are to where we need to go. From an IT and an implementation...

Forensics and 'Cyber' Crime

computer system with the intent to destroy or manipulate data is more than enough reason to augment security measures. According ...

Baker and Young Information Systems Upgrade Recommendations

had to call on them and they did not have to place a phone call. Likewise the process of delivering the information to a central d...

IT Value Assessment

but the ultimate cause of structural problems is that of organizational design. "Good people in a poorly designed organizational ...

Accounting Profession and the Effects of Information Systems

however, technological accounting functions were mainly stand-alones - they werent a whole lot different from the old by hand ledg...

2 Industries and Ethical Standards

is Gatifloxacin." Before the doctor can order the medication, yet another screen pops up and tells the doctor that he needs to tak...

IT Project Tender Invitation Case Study

to support the window operating system and alternate operating systems on the computers in the network. The system will also need ...

New Dawn Drilling Case Study

that are used. The information is accumulated locally, put into Excel spread sheets and sent to the head office where it is input ...

Characteristics Successful IT Manager

* Adopt a client service mindset so that the focus is always on what the client or customer needs and expects (Sisco, 2003). * Abi...

How Technology Can Help Organizations Fulfill Ethics Goals

This is just one example. The point is that computers can be used to make the hiring and promotion process fair. In this way, ethi...

MALCOLM AND UCB: A COMPARISON

of their operations and activities. The two aspects that are considered with the Baldrige National Award, especially as they perta...

HACKERS AS SECURITY GUARDIANS

and once inside, decide to be destructive (Germain, 2004). Then there are the white hat hackers - those who deliberately break int...

MODELS AND SOURCES OF INTERNATIONAL ECONOMIC DEVELOPMENT

information technology is the way in which economic development occurs. This has worked well for countries such as India, which pr...

Disaster Recovery Planning and Information Technology

II. Five Elements of Disaster Recovery Planning IIa. Preparedness and Training In general, a great deal of planning is directe...

IT Transnational Management

2008). More than a decade ago, Reimers (1997) reminded readers that building a transnational organization required total global ...

IMPLEMENTING A TECHNOLOGY SYSTEM IN A COMPANY

and installation guys, on the other hand, probably wouldnt care about a training schedule or support strategy. A companys receptio...

Information Technology and Management at EasyJet

in with the strategy and the people who use it. It is only by appreciating the technological environment within EasyJet as a whole...

Postgirot Bank Case Study

bank has relationships with almost all Swedish and need to be companies either directly or through an ounce. With 425,000 companie...

IT Applications for Small Business or Small Offices of Large Organizations

mimic those used in large companies. Small businesses typically do not have resources to pay employees who are not directly invol...

EDC and SLK Case Study

the management of the company, but by those who would be using system; in this case the accounts department, those who would be us...

Porter's 5 Forces Analysis & Value Chain - Retail Industry

companies. 3. Substitutes Products. Is it possible for a substitute product to capture the market? While it is always possible tha...

RIORDAN MANUFACTURING: STRATEGIC IT FACTORS

Focuses on strategic information technology factors to be considered by Riordan Manufacturing when it makes its move from Hangzhou...

SECURITY AT ST. JOHN’S HOSPITAL

isnt being seen - and read - by unauthorized personnel (such as the cleaning crew or perhaps the cleaning crews friends). The like...

A Comparison of Logistics Operations for an Online Company and a Bricks and Mortar Company

The writer of different areas of logistics comparing an established online business with an established retail business. Using an ...

KUDLER FINE FOODS: MARKETING, ADVERTISING, SALES - AND TECHNOLOGY

In other words, marketing involves everything from ensuring the right products are being offered to the right consumers, to ensuri...

TERRORISM AND INFORMATION AND COMMUNICATION TECHNOLOGY: THE HOWS AND WHYS

Introduction On November 5, 2009, Nidal Malik Hasan, a major in the U.S. Army and a psychiatrist, entered his workplace, th...

Information Technology Infrastructure at Turk Heavy Transport

some unique need related to the implementation of a project; a task which often involves delivery of heavy or awkward equipment - ...

The Benefits of New Technology in the Classroom

are new and innovative ways in which information can be communicated between two or more parties. This not only applies to two fri...

SUNSWEET, TECHNOLOGY AND LOGISTICS

There is little doubt that todays supply chain is becoming very complex and multifaceted. This is a result of consistent outsourci...

How BPX changed in the 1990s

program (Cross, Earl and Sampler, 1997). They worked to create standards in the oil industry so information could be shared more e...