Viewing papers 1-30 of 287 for information AND technology AND (it) AND issues AND in AND e business

NOTE:  We can write a brand new paper on your exact topic!  More info.
123. . .Last ›
X Filters 

IT Management Challenges Business Process Research Paper

… Nevertheless, the value chain does not explain the number of service oriented businesses in operation. Businesses can develop additional concepts of value network and value shop in order to handle different businesses (Cunningham & Froschl, 2009).

Businesses must be aware of the value that networks rely on growth for attracting additional customers. When there is an increase in the numbers of people using value network, the network becomes a site where transactions are made. This means that each participant must value the value network. The strategy of dominating on the networkforces other industry players to on the network to follow suit. Nonetheless, such competitors fail to reach the limits and end up merging with leading companies like eBay (Davenport & Beers, 2005). Companies going global…. [read more]

Information Technology (IT) Essay

… One way to look at this is through a matrix:





Shrinks the world and allows for a more robust economy globally.

May cause the haves and have nots to become even more disparate.

Social Networking

Allows for greater transparency in government and communications

Decreases face-to-face contact and may marginalize the family

Leisure Time

Increases access to global network of sports and entertainment

Reduces live-performance interaction and revenues -- decreases contact between individuals; may lower academic performance

Cellular Technology

Increases global communication

Decreases face-to-face, community, and family dialog


Improves all areas of transportation, manufacturing, and distribution

Makes life more complex, increases gap between rich and poor


Improvements in medicine, technology for masses

Increases technicism and theocracy; new and more efficient…. [read more]

Voice Technologies Term Paper

… Voice Technologies

The past standards in catering to the clients of an organization are fast being replaced by the pressures from a group of clients, associates and workforce who are more and more impacted by a societies whose mobility is on the rise, and which are looking for products as well as services within a setting wherein the lag period among innovation as well as its maturity is becoming lesser. Maintaining pleasing, and effectively providing services to clients in an effective manner needs novel potential to provide support, interact with and know the clients. (Nuance: Conversations-Europe, Cannes) the match between the task and the technology, environment and guidance provided are found to be the distinguishing elements in adopting voice technology in a fruitful manner. (Goette…. [read more]

E-Business Entry Essay

… (Kessler, Bierly and Gopalakrishnan 2001)

3. Successful managers keep in view the needs of the customer and design their e-business strategy accordingly. (Berggren and Thomas 2001).

Important lessons from the big organizations:

Leonard-Barton, Wilson and Doyle (1995) studied Hewlett-Packard's case and discuss in length the pains HP took in 1980s to learn from past successes and failures. A study was conducted and its findings were to be incorporated in HP's new product development process. This study took help from the findings of 1976 study called Project SAPPHO, by Sussex University. It was important to learn how innovation managers developed successful business strategies. Some of the key findings included

Innovation managers had to have a better understanding of customer's needs

They need to pay greater attention…. [read more]

E-Business Web Server Every Computer Term Paper

… The two largest and most widely supported issuing authorities are VeriSign and Thawte. The Verisign certificate price schedule is much higher than that of Thawte (see table below), but the VeriSign certificate is supported by a larger number of the older browsers.

And, VeriSign includes insurance against fraud and offers better service in processing certificate requests.

However, I would still recommend Thawte to save money when time to process a certificate request is flexible.

Cost Per Year



U.S. And Canada






4.0 Log Analysis

Log analysis got its start crunching server logs and uncovering broad Web site trends such as page views and user clickstream behavior. Today the focus has expanded to include business reporting -- pinpointing the effectiveness…. [read more]

Computerized Accounting Information Systems Essay

… IDS detect an intrusion activity in the company network system while IPS prevents the intrusion of third party into the company network.

Another strategy that organizations could employ to manage AIS is to employ IT experts who will assist the organizations to design effective information systems tailored to the organizational business process. Such process would assist the organizations to eliminate the wasteful financial resources that could arise from paying up the ready-made accounting software that may not be suitable for the company business objectives.

More importantly, firm needs to draw up a comprehensive IT policy for AIS implementation. Company should mandate all company employees to follow up the company IT policy to protect the company information systems against alteration or loss. Effective and efficient management…. [read more]

Information Technology Skills I Acquired Term Paper

… The list of technologies that emerged from American military research is endless, many of which are now common products, such as computer mouse, flat-screen displays, night-vision goggles, and satellite global positioning.

Since research funds started drying up after the Cold War, some defense experts predict that a major increase in U.S. government-sponsored research would reverse the decline in commercial spin-offs." (Freedburg, 1378) Without information systems, the U.S. military would still be blasting away at the landscape in a large-scale barrage of ammunition.

Navy Secretary Gordon England griped to his staff about the piles of paperwork on his desk and asked whether it could all be computerized. Everything needs to be computerized, properly organized and properly stated so that there is no guarantee of a mistake."…. [read more]

Lifecycle Management Information Protection Essay

… The key differentiator is the inherent presence of metadata known as 'Application Accelerator' which are aware of the application that is running. It is through this awareness that the solution is able to know the dormancy of data that stays in the original applications, covering business code that govern the timing when the data becomes inactive. (Madan, 2011)

The primary advantage is that users are able to develop their own Accelerator templates in order to go for archiving custom applications. To assist this, Informatica has a Dormant Data Analyser Tool to target dormant records and summary capabilities so as to extract relationships in applications that are custom built and data warehouses. (Madan, 2011)


Jericho Forum. (2009) "COA Paper Information Life Cycle Management"

Retrieved 20…. [read more]

Global E-Business Essay

… Global e-Business: Business Consultancy

Owning a business can be a serious challenge, as can moving that business into new markets - especially if those markets are international in nature. For purposes of this paper/report, the business is a well-established organization, but being a business consultancy company it is operated from the home of the business owner. That means there is no specific brick and mortar location other than the home-based business location of the owner of the company. The market for the expansion will be international. With the advent of the internet and how strongly it has been used for business in recent years, there should be no problem working online and getting businesses in other countries to respond to that, as opposed to requiring…. [read more]

Ethical Issues in Information Technology, by Richard Research Paper

… Ethical Issues in Information Technology, by Richard T. DeGeorge

The world we live in is continuously changing and the most commonly used explanation is the rapid pace at which technology is developing. And since these developments have had significant implications to the global environment and lead to major improvements, their beneficial role is undisputed. However, one cannot dismiss the fact that technology is more and more commonly being used as to break organizations' and individuals' privacy, cause fraud or steal copyrighted materials. All these raise the question of the ethical and moral regulations which govern the technological sector.

Richard DeGeorge points out the five categories of it ethical issues: issues in the usage of technology in business; issues in the it business; issues dealing with…. [read more]

Business Communication and Technology Barnes, Cynthia Research Paper

… Business Communication & Technology

Barnes, Cynthia, and Cavaliere, Frank. (2009). To Teach or Not to Teach: The Ethics of Metadata. Education, 129(4), 788-792.

Metadata has been causing problems over the past several years due to the fact that word processing and other well-known and often-used computer software programs become "more receptive to" collaboration (Barnes, 2009, p. 788). That is the viewpoint of this article. What is metadata? It is the personal information about a person, that is contained in computer-generated documents, and is accidentally sent to others, Barnes explains. This is a potentially scary situation, not because some personal information is being transmitted to others, but because computer uses don't realize what is happening. This article reviews the problems associated with metadata, and provides research…. [read more]

Security Issues of Online Communities Term Paper

… Security Issues of Online Communities

Online communities have emerged in recent years as a result of the rapid growth of the Internet, arousing intrigue in citizens, policy-makers and government officials. An online community is a group of people who interact in a virtual environment. They have a purpose, are supported by technology, and are guided by norms and policies. The problem with the term "online community" is that it often refers to a wide range of online activities, and has as a result, been subject to different definitions. Although online communities exist predominantly online, they vary depending on the software environment supporting them, purpose, size and duration of existence, culture of their members, and governance structure (Preece,, 2003). The characteristics of an online community…. [read more]

Evolution of Social Interactions: Social Media and Technology Essay

… The subject matter is of a rather personal nature, and the researcher reckons that participants would be more comfortable sharing some of the information with a trusted party than with a stranger. In this regard, provision will be made and the participants' reactions to the analysis taken into consideration. The study intends to be fair, accurate, and valid to itself, as well as to the participants, and all questions will, therefore, be related to the research questions.

Interview question number one: How would you describe your i) online relationships and ii) real-life relationships? This question seeks to obtain the view of the participant on the nature of either relationship. It aims at analyzing the nature of CMC-based relationships vis-a-vis face-to-face interactions.

Question two: What techniques…. [read more]

Security Issues of Cloud Computing Data Analysis Chapter

… Security Issues in Cloud Computing

The name Cloud computing was coined from the drawings oftentimes employed to illustrate the internet. Cloud computing is an innovative consumption and new delivery approach for IT services. The cloud computing concept illustrate a change in thought, that end users do not need to understand the details of a particular technology since the provider completely handles it. Users can use the services at the rate established by their specific needs. This service can be given at any time. Because this innovation is becoming more popular, new tools and technologies are now appearing to create, to access, operate and sustain the clouds. These tools should handle a huge number of operations in the cloud transparently sans service interruptions. Cloud computing provides…. [read more]

E-Business Integrity at Lockheed-Martin Term Paper

… E-Business Integrity at Lockheed-Martin

The intent of this memo is to discuss the many strategies Lockheed-Martin continues to take with regard to ensuring ethical business behavior, in addition to legal and regulatory compliance. Specifically focusing on the policies and procedures of the company to ensure the integrity and further development of best practices in ethical use of e-business activities, this memo highlights the steps Lockheed-Martin has taken to become a front-runner in these specific areas of compliance to ethical standards. In addition, the stance the company has taken on intellectual property rights and the ethical use of online data collected from employees' use of e-mail and Web browsing are also presented. Recommendations for improving these policies within Lockheed-Martin are also presented in the final section…. [read more]

Information Technology (IT) Issues in E-Business Research Paper

… role of information assurance on improving trust and efficiency in e-Business.

IT issues in E -Business

The field of Information technology has affected the way business is conducted across the whole world. There are however certain issue that affect this mode of conducting business and transactions. Fears of data loss and information security do dominate the field. In this paper we present the key issues that affect E-business in order to come up with a clear cut recommendation on how to tackle these issues. There are various issues affecting the effectiveness of e-business. The main issues that are detrimental to the success of various e-business strategies are explored and emphasis put on means of improving the effectiveness of various e-business platforms. The paper concludes with…. [read more]

E-Business Systems and Enterprise Term Paper

… e-Business Systems and Enterprise Systems

Discuss your recommendation for e-business systems and Enterprise Business Systems needed to support the business growth?

First, any proposed e-business system and is related Enterprise Business System needs to be agile and flexibility enough to meet the unique process needs (Carayannopoulos, 2009) and role needs of the tire store. The e-business system specifically needs to be flexible enough to allow for rapid updates to pricing, inventory, product definitions in the catalogs, and the use of sales promotions online as well (Elmore, 2005). The e-business side of the system needs to be attuned to marketing, selling and service needs of the small store. There as a result need to be applications that are available on a 24/7 basis to customers if…. [read more]

IT Acquisition Management Business Plan

… #1 Ethics and Training

Can meet all requirements


Supports; no conflict

Risk of conflict between business ethics and social ethical standards

Highest costs but Affordable, will need regular sessions held from trained IT professionals

Increased business awareness


Alternative. #2 Use E-business structures

Can meet all requirements


Supports; no conflict

No prior experience could lead to amateur e-business constructions and rigid structures in the initial stages

Higher costs but under the urgency and necessity of it application, it will be considered affordable

Long-term benefits for conducting business beyond time and space limitations and taking the business national without investing in tangible assets


Template 5: Alternative #1 Risk Analysis Results

Alternative Solution #1 (Tentative Solution Rank Order #1): Ethics and Training - Risk…. [read more]

E-Business and E-Commerce Identify Thesis

… E-Business and E-Commerce

Identify and explain briefly three consequences that increased information density can bring selling and buying products online.

Of the many consequences of increased information density on selling and buying products online, the three most prevalent are defined in this short essay. The first is the need on the part of those companies selling online to guide their customers to the best possible combination of products and services. Called guided selling (Lager, 2006) this is strategically important for any company selling online as it provides navigation to prospects and customers across the spectrum of products and services. Guided selling is comparable to having an organizations' best salesperson online.

The second consequence of increase information density is the need for more efficient forms of…. [read more]

Information Technology the Reference Company Term Paper

… Needless to say, two different system methodologies have a decided impact on the design architecture. Essentially, the push or pull approach to total design can also be found in previous information systems that are upgradeable to accommodate smart business systems.

The design methodology set forth below focuses on the push design approach since the pull design approach is very open-ended and varies from one installation to another. An important part of this push approach is the development of corporate-wide storage of aged and real-time data. A well-designed, corporate-wide approach assists a company in such processes as data, information, and knowledge acquisition, intelligence inference and explanation, and validation of company strategies, procedures, rules, standards, and heuristics. Concurrent with the development of the corporate-wide data storage by…. [read more]

Information Technology in Peru Term Paper

… In response many private organizations have set up their portals and e-commerce sites in Peru. Independent estimates point to the fact that e-commerce would find more takers in future. [Bernstein, 2000]

Hardware and Software production

IT Hardware manufacturing is very little in Peru. While the local IT hardware requirement was estimated at $660.3 million, Peru's contribution was on $7.2 million. Most of the equipment is imported from Spain. After the government has done away with monopolies in the IT sector, imports from other countries are expected to rise.

In the software sector there were 150 companies in 1998, who produces small applications which fit into domains like banking, accounting and customized applications for small businesses. Foreign companies like IBM, Microsoft, SAP, Oracle and Novell also…. [read more]

Does Technology Affect Marketing? Term Paper


The objective of this work is to develop knowledge relating to the marketing discipline historically and to the present and in terms of the future. The question this work seeks to answer is whether new technologies are a major threat to marketing as posited in the work of McKenna (2002) and to state either an agreement or a disagreement with McKenna's statement.

Marketing has been defined as "...a societal process by which individuals and groups obtain what they need and want through creating, offering and freely exchanging products and services of values with others." (Kotler, 2003) the work of McCarthy (1978) entitled: "Basic Marketing: A Managerial Approach" relates the 'Marketing Mix: 4Ps" which are: (1) place; (2) price; (3) product;…. [read more]

IT Strategies to Maximize the Competitive Advantage Term Paper

… ¶ … IT Strategies to Maximize the Competitive Advantage of Organizations

This paper will examine how IT strategies, also referred to e-business or e-commerce strategies, are utilized by an organization to maximize the competitive advantage of the organization within the market place. This will include analyzing IT strategy in terms of global strategy and this will touch upon how an organization handles marketing. Basically strategy requires leadership and it is interesting how it interacts with all aspects of the organization in order to succeed. Specifically this paper will use four models: SWOT, Porters Five Forces, 7s model and Value Chain to analyze IT strategy within the Chinese nutrition market. This includes health food and vitamins. Specifically these four models will analyze the IT Strategy (or…. [read more]

Ethics Issues on Intellectual Property Term Paper

… The UDRP was started in November 1999 and has turned out to be quite popular. (Jim, 2001)

Another problem in the Internet is the use of hyperlinks. Electronic business thrives on advertising and there have been a number of cases involving hyperlinks and advertising. Hyperlinks are provided to enable the user to access a different web page. There are many cases where an individual uses a hyperlink, without permission, to link to another website. This can lead to many problems in e-business. For example the Microsoft Seattle website used a hyperlink which provided a user access to Ticket master Corporation's web page for purchasing tickets to certain events. Ticket master filed a complaint because the hyperlink that was provided by Microsoft's website allowed the user…. [read more]

Outsourcing it Relevant to it Acquisition Term Paper

… Outsourcing It

a management strategy that farms out non-core organizational activities to vendors who specialize in these activities in order to execute them more efficiently (Peled 2001)


Cost Savings

Access to new skill sets

Access to cutting edge technology


Loss of intellectual property

Poor Communication

High Costs

Limited Technologies

IT Outsourcing and acquisition

Acquisition of new skill sets

Business acquisitions

AT&T and IBM

CACI and American Management Systems

Systems Management Specialists (SMS) and the SMS business unit

IT Outsourcing has become a major phenomenon in the business world. Businesses have found that outsourcing reduces costs and allows for expansion. The purpose of this discussion is to investigate it outsourcing as it relates to acquisition. The discussion will include a review of the Advantages…. [read more]

It Revolution Is Leading the Businesses Essay

… ¶ … IT revolution is leading the businesses around the world towards a Digital Convergence. The e-technology is changing the traditional business milieu into e-environments with profound applications of the e-technologies in the conduct of the business. The internet culture is getting global. One can observe every where that how the use of e-technologies, from the use of the high-speed internet connections for e-mailing, information gathering and research, video conferencing, use of cellular telephones connected to internet, smart phones, wireless networks, is effecting the business conduct. Hence IT has given birth to an entirely new internet business culture (Jovarauskien?, and Pilinkien?, 2009).

Today, we expect and prefer to purchase goods and services online, connect to our business colleagues online through e-mails or through cell-phones; we…. [read more]

Impact of Technology and Management of United Parcel Service Term Paper

… Information Technology

Technology and Management of United Parcel Service

The purpose of this case study is to review the journal article from University of Maryland College Library's database entitled "Competing with it: The UPS Case" published in Volume 7 Number 2, Journal of American Academy of Business, Cambridge in September 2005

The United Parcel Service, Inc. is a package delivery company, express carrier, package deliverer and global provider of specialized transportation and logistic services and has been in business for more than 90 years expanding from a small delivery service to one that is global. The technological integration with IBM as well as various service applications are presented on the logistics group website at developed an it network that is synchronous with global…. [read more]

Economics in the IT Industry Research Proposal

… Cloud Computing is pervasive and used for supporting a myriad of applications, as diverse as Google and Yahoo Mail to sophisticated Customer Relationship Management (CRM) applications including Oracle OnDemand and others who all run entirely over the Internet. Cloud Computing is an area where IT is showing how effectively it can be used as a technology base for rapidly reducing costs while increasing performance and value (Han, 205). In addition to the cost advantage of Cloud Computing, applications developed on it as a platform are more easily modified and tested with customers for feedback, ensuring higher levels of adoption relative to traditional software. Cloud Computing applications are also beginning to become more integrated to databases, enterprise systems and order management platforms and systems, as…. [read more]

Critique E-Business Operations Term Paper

… ¶ … E-Business Operations

From the perspective of making online payments, the problems most often encountered by customers and vendors when making e-business payments electronically are related to volume of sales. "Purchasing goods and services over the Internet between businesses is the largest and fastest growing component of the entire e-payment world." (Report 1) Not only will the business-to-customer market sector increase, but the business-to-business (B2B) sector will grow at least twice as fast.

The primary driver in B2B transactions is the back end of electronic bill presentment and payment applications. Not only does the e-business merchant face chargebacks and fraud, but must find the right banker to deal with their charge cards that will guarantee documentation, privacy and discretion, but has the confidence of…. [read more]

123. . .Last ›
NOTE:  We can write a brand new paper on your exact topic!  More info.