SEARCH RESULTS

YOU WERE LOOKING FOR :Information Technology in the Business Environment

Essays 541 - 570

PATTON-FULLER AND IT

data both within the organization, or to external stakeholders. What OSI layers are directly involved? In the standard OSI...

Choosing an Application to Create Value within an International Organization

In order to manage their inventory, including management with the vendors, Wal-Mart utilize an Oracle database, the database is on...

Leadership in the Real World

The writer chooses four modern business leaders and contrasts their different approaches to leadership to demonstrate the variety ...

What Information TEchnology Managers Need to know for the Future

future proofing as a viable method of assuring continued growth. Indeed, IT managers must look forward and plan for changes that a...

Contextual Differences in EU and US Business Environments

management is approached. The US has a very masculine approach to management in Europe there are areas, especially in the Scandina...

The Benefit of Formalized Processes in an Organization

finance management, human resource management and IT processes. The value and advantages of formalizing and documenting those proc...

MANAGEMENT, SECURITY AND INFORMATION TECHNOLOGY

man-in-the-middle attacks, wireless attacks, hackers doing their homework, monitoring vulnerability research, being persistent/pat...

Information Technology and Resource Management

Street Journal, Intel is selling its Centrino Wi-Fi chips for its cost to fabricate them. Why? For one thing, turning Wi-Fi techno...

Management Functions

it can be a purely academic exercise with the gather and assimilation of information and the development of this with the known go...

Implementing Information Technology Compliance

comparison IT application controls are designed to ensure that specific applications are functioning correctly, which may include ...

Integratihng IT through a Paperless System

the global operations (Microsoft, 2009). If a system, is going to be paperless it is essential that it is up to date....

Overview of Cisco Inc.

rapid growth is being supported by a strategy of build, buy and partner, with the firm making a number of acquisitions in order to...

Firms Tend to Under-Invest in the are of Information Technology

Banker & Ravindran, 2006). On some level, this is true. Firms that have for example excellent web sites that are easily navigable ...

Does IT Matter?

be yes, but there are reservations. As Carr (2008) points to the naysayers, there is no proof that IT does matter. Similarly, ther...

IT and the Implications of Outsourcing

results, the National Health Service in the UK has outsourced many services to a high level of criticism as has the London Ambulan...

ICT School Strategies Development

tackled by many studies. The concept of the digital divide with the technically able and the technical unable creating a social an...

Information Technology Portfolio Management

management is that it minimizes the risk associated with any available choice of action. The risk that exists arises from uncerta...

Dissertation Proposal on the Commercial Value of IT

measure this value rather than the use of the traditional productivity measures. This can then be expanded into the way value meas...

Wi Fi Network Selection and Integration

and professional journals, academic reference books and the internet. The development of wireless networks have been aided with...

Processes of Risk Management and Risk Assessment

One of the factors separating physical and IT projects is that in producing a building (or bridge, or airplane) everyone knows at ...

Portfolio Management and Information Technology Investigation

climate and atmosphere that exists only in the present time. If all possible sources of risk could be identified and accounted fo...

Information Technology and the Meeting of Organizational Structures and Operational Objectives

There are two types of organizational structures that tend to be used when it comes to IT management and objectives -- these are t...

Student Case Study on WOI Western Oceanography Instantiate Case Study

project is projected as taking part in four phases over a period of eight weeks. Mission Objectives The mission is convert the W...

Overview of IT Systems Development

Some of the methodologies pointed out include STRADIS, IE, or information engineering, structured systems analysis and design (SSA...

Information Technology Portfolio Management Investigation Proposal

When this is the case, those working on the project team are dependent on those working in affected areas for information regardin...

Business IT System Determination

down time in terms of badly recorded or lost data would end up helping the company save in expenses. As of now,...

School ICT and Student Research

disagreements. The data was collected with the use of self completing questionnaires. This option was chosen as it was felt this...

University Healthcare Call Center Construction and Implementation

nurse desk or to another location for prescription refill. Messages are recorded on paper message pads, after which the message i...

Information Technology Knowledge Needed by a Risk or Security Manager

nuts and bolts of I.T., or is a cursory knowledge sufficient? In part, the answer lies in management ideology. Do managers need to...

Information Technology Lessons, Student Performance, and Gender Differences

the division and difference that may exist within the classroom whether or not the digital divide has been overcome. One major d...