Research Papers on Management Of Info Systems

Click on any of the term papers to read a brief synopsis of the research paper. The essay synopsis includes the number of pages and sources cited in the paper.

  • Exploring Learning Management Systems - Skillsoft

    In a paper of five pages, the writer looks at learning management systems. The software "Skillsoft" is examined in depth. Paper uses five sources.


    Describes how social media networks such as Facebook and LinkedIn can be beneficial to a learning organization. There are 7 sources listed in the bibliography of this 6-page paper.

  • Data and Two Hypothetical Businesses

    Foodie is an app that uses big data to understand user's food preferences. Wandr uses big data to link travelers with other travelers. Both are hypothetical companies. The essay discusses stakeholders, social media, and what each company does. No Bibliography

  • Data Analytics Plan

    Big Data Analytics is becoming more common in healthcare institutions because the outcomes include cost reduction, error reduction, better patient care, and many other outcomes. This paper is a Big Data Analytics process map. No Bibliography.

  • Should Your Company Accept Credit Cards Over the Internet?

    Nowadays, a company that cannot or will not accept credit cards for payment over the Internet is at a distinct disadvantage in terms of customer acceptance. This paper examines the issues a company wishing to start accepting credit cards must face, such as security and software available. This paper has seven pages and five sources are listed in the bibliography.

  • Implementation of CRM at Verizon

    This 10 page paper discusses the implementation of customer relationship management (CRM) at Verizon. The paper looks at how and why the project was initiated, how it was planned, the identification of business needs, the design of the system and the result of the CRM implementation. The bibliography cites 10 sources.

  • Encryption Program 'Pretty Good Privacy'

    In seven pages this paper discusses the email privacy protection offered by the encryption program 'Pretty Good Privacy.' Seven sources are cited in the bibliography.

  • Google And Internet Search Engine Industry

    This 4 page paper begins with a brief overview of Google, Inc. The paper provides an analysis of Google using Porter's 5 Force analysis. Bibliography lists 6 sources.

  • Hospital Information Systems and Inventory Process

    In four pages this paper discusses a hospital's inventory system automation upgrade as featured in a December 2003 article that appeared in Hospital Materials Managements. There are no other sources cited.

  • Middle Managers and the Negative Impact of Information Technology Growth

    In ten pages this paper examines the rapid growth of IT and how middle management positions have been adversely affected in terms of the difficulty to successfully fill them. Twelve sources are cited in the bibliography.

  • The Use of Technology at Tesco

    This 6 page paper looks at the way that the UK supermarket chain Tesco uses technology and manages information and the way it has helped the company gain and retain its' dominant position. The paper considers the history of technology and information management within the firm and discusses the current use of the loyalty card as well as technology in inventory management including EDI and RFID. The bibliography cites 6 sources.

  • Technology at Shell

    This 5 page paper examines the use of different types of technology and information systems art Shell, the paper starts by looking at the technology in developing creative thinking at managerial level, the paper then moves on to look at information systems and technology used in the oil drilling aspects of the business. The bibliography cites 4 sources.

  • Competitive Advantage Through Information Systems

    In a paper of four pages, the writer looks at information systems. The role of J2EE developers and information systems in competitive advantage is examined. Paper uses five sources.

  • Information Management at Sony

    This 11 page paper looks at the use of information management systems by Sony. The paper examines the company background before looking at the way information is used, including management information systems and the creation of a division to deal specifically with information issues. The bibliography cites 4 sources.

  • Information Management

    The 16 page paper is written in five sections and looks at the subject of information management. The first section considers the way in which the management of information has changed in recent years and the way it has developed into knowledge management. The second section discusses the way that information flows through a company and the way that it is managed to create useful knowledge. The third section discusses the practical management of information including its collection and storage and what can go wrong with the process. Before section discusses the way that information systems can help companies effectively meet strategic and operational objectives. The last section discusses some of the potential challenges that information management will face in the future. The bibliography cites 6 sources.

  • Architectures of Data Storage and Access

    In a paper of eleven pages, the writer looks at information systems. The virtues of different types of systems such as storage area networks and network attached storage are compared. Paper uses five sources.

  • Corporate Strategy and Information Technology

    The writer looks at different issues concerned with the way that strategy is linked to information technology. The first part of the paper examines the interdependent nature of strategy and information technology one operation. The second section of the paper discusses the use of information technology at a large corporation, looking at the way in which it has value. The final section of the paper discusses potential differences and similarities between IT/IS and IT/IS strategies. Eight sources are cited in the bibliography this seven page paper.

  • Information Systems Technology Projects Fail

    This 14 page research paper responds to two questions; What factors contribute to the failure of information technology systems projects? and How does leadership affect the success or failure of information technology projects? A literature review reports the excessive proportion of information technology projects that fail, the major reasons projects fail, the categories incorporated in a project and the phases in any project. The analysis section discusses the importance of communication and suggests and justifies the transformational leadership style as the most appropriate for project leadership in today's complex world. Statistical data are included. Examples are included. Bibliography lists 15 sources.

  • Leading Plastics Injection Molding Company

    This company, Riordan Manufacturing, has headquarters in San Jose, California. This essay considers the company's operations systems and makes recommendations for greater efficiency. There are five sources listed in the bibliography of this four page paper.

  • Quality Initiatives of Rosenbluth Travel Agency

    In three pages this paper discusses how quality service initiatives can be continued by the U.S. based Rosenbluth travel agency.

  • Professional Morality, Ethics, Email Privacy, and System Administrators

    In ten pages this paper examines Internet privacy issues and ethical problems that confront many systems administrators. Eight sources are cited in the bibliography.

  • Controlling Workplace Internet Usage Through Planning

    In five pages the problems of Internet usage are supplemented with a balanced plan to deal with privacy and security issues. There are five sources cited in the bibliography.

  • Outsourcing and In-House Services - Contemporary IT Infrastructure

    In a paper of fifteen pages, the writer looks at the process of implementing a new IT infrastructure at a major corporation. Riordan Manufacturing provides a valuable example for exploring the difference between ASP outsourcing and in-house services. Paper uses eight sources.

  • Factors One Should Consider When Establishing A Useful Management Accounting Information System

    This 5 page paper considers what factors need to be looked at before a company decides upon, and implements a new management accounting information system. Factors discussed include functionality, current and future information needs, the decision whether to buy or lease and influence and impact on employees. The bibliography cites 5 sources.


    Discusses the advantage and disadvantages of cloud computing, with focus on the security issues. There are 5 sources listed in the bibliography of this 14-page paper.

  • Overview of Decision Support Systems

    In four pages Decision Support Systems are explained and their uses are considered through examples.

  • How Decisions Are Made

    In eight pages this paper examines decision support systems, management support systems and their role in the decision making process and also considers Simon's and other strategic model approaches. Eight sources are listed in the bibliography.

  • Mobile Telephone Company and a Decision Support System

    In five pages a mobile telephone company is examined within the context of establishment an Internet based Decision Support System that requires an understanding of its developmental methods and what constitutes and effective online Decision Support System. Ten sources are cited in the bibliography.

  • Factors Influencing CRM Implementation in a Logistic Environment

    This 46 page paper is a proposal and literature review for research to identify the different influencing factors that are present when a firm wants to successfully introduce customer relationship management (CRM) system. The paper gives an introduction with aims and several hypotheses to be tested and then undertakes an input literature review, considering the different elements of CRM implementation that may be influential. Factors consider range from the functionality of the system, its ability to access and interpret data to the management of human factors and managing change. The paper then gives a methodology to be used for the primary research along with a short timetable and budget. The bibliography cites 41 sources.


    This 10-page paper examines the concept of customer relationship management (CRM) through a case study concerning Evergreen Investments. Bibliography lists 3 sources.

  • Research into the Use of CRM in a Kazakhstan Hotel

    This 5 page paper is a proposal for a study to look at the best type of CRM to use in a hotel in Kazakhstan. The paper includes an introduction, objectives, brief literature review and presents an outline methodology for primary research. The bibliography cites 18 sources.

  • About Security Officers

    This essay discusses security guards/officers by responding to more than a dozen questions about the industry and the officers. Some of the many issues discussed are identifying threats from natural disasters, crime, and accidents, phishing, cybercrimes, risks to utilities and entertainment and many other issues. There are twenty-two sources used in this fifteen page paper.

  • Decisions and Data Warehousing

    In ten pages this research paper discusses decisions made in information storage and data warehousing with a definition of data warehousing and why businesses decided to use it along with pertinent issues such as security, maintenance, operation, and implementation included. Ten sources are cited in the bibliography.

  • Modern Corporations and Data Processing

    In four pages data processing within the corporate sector is examined in a discussion of such topics as data warehouses and information architecture along with their value to modern business. Nine sources are cited in the bibliography.

  • The Basics of Algorithms

    In ten pages this research paper considers basics of data structures and algorithms in terms of design, graphing, heaps, hashing, trees, data types, and queues. There are eleven sources cited in the bibliography.


    This 9-page paper suggests steps and methods to technology project plans for a fictitious rehab center's web-based customer service design and Internet banner advertising. Bibliography lists 9 sources.

  • Assessment Three Cinema Websites Using Nielsen's 10 Heuristics

    This 27 page paper examines three cinema websites which markets the cinema and encourage ticket sales. The three websites assessed in terms of their target population and the way they are presented with reference to Neilson's 10 usability heuristics. The cinemas chosen for the assessment the Odeon, Vue and a small independent called Palace Cinema. The websites assessed the UK websites for the cinema. The bibliography cites eight sources.

  • The Roles of the Computer and E-Commerce in a Video Store

    A two-part paper investigating the growing necessity of e-commerce and the computer in business, and examines computer-cataloguing system options for a video-rental store's website. The author applies conclusions from the first part to the video-rental business discussed in part two. This twenty-three page paper has thirty sources listed in the bibliography.

  • Creating Value with ERP Enterprise Resource Planning

    (ERP)is becoming more popular, this 17 page paper considers how ERP may be used to create value and why it may sometimes fail. The paper starts by looking at the reasons firms may choose to migrate to an ERP system, the benefits of that system and the potential. The paper then looks at the way the implementation should be managed before considering the way in which a bank has used ERP to create value. The bibliography cites 19 sources.

  • ERP Risks

    This 3 page paper looks at the risks which may be faced when a US company acquire a Scottish company and plan to install an ERP system. The paper looks briefly at a range of different risks. The bibliography cites 3 sources.

  • Recommendations for the Implementation of ERP

    This 6 page paper is the recommendations section of a larger paper. The paper recommends the implantation of an ERP system and justification for the recommendation as well as the approach that should be adopted to manage the implementation. The bibliography cites 7 sources.

  • Sunburst Hotels and ERP

    In six pages a student submitted case study provides answers to four questions regarding Sunburst's need for an ERP system and also addresses pertinent technical and operating concerns.

  • Hersey's and the ERP System Implementation

    In five pages this student submitted case study provides answers to questions concerning Hersey's faulty ERP system design and implementation. Three sources are listed in the bibliography.

  • Responsibilities of the Security Manager with Regard to Understanding Financial Management and Accounting

    This 3 page paper discusses why it’s important to have a Security Manager who understands something about finance and accounting, and what they might mean to internal and external threats to the company. Bibliography lists 5 sources.

  • Overview of India's Tata Consultancy Services

    In three pages this global software services consultancy firm based in India is examined in an overview of company mission, offered services, clients, and various other aspects. Two sources are cited in the bibliography.

  • Technology/Hospitality Industry

    A 4 page research paper that discusses the many uses of technology in today's hospitality industry. Technology has changed the way in which the hospitality industry operates. It has gone from pen-and-paper accounting to utilization of the latest computer and automated technology. The writer discusses property management systems and other innovations. Bibliography lists 5 sources.

  • Riordan Information Technology Systems

    The writer identifies the various IT systems that are used at Riordan Manufacturing, discussing on of the systems considering the potential problems of the system if it failed. The potential ways in which the weaknesses may be reduced is also discussed. Four sources are cited in the bibliography of this five page paper.


    Focuses on data storage and information retrieval trends and tools in healthcare situations. There are 4 sources listed in the bibliography of this 4-page paper.

  • The Bead Bar Network

    This 6 page paper looks at a case study provided by the student; Bead Bar, to assess the outline of a potential network structure. The paper considers the background of the company, the use of the network, topology and architecture and the inherent advantages and disadvantages in the choices made. The recommendations made included a distributed network and a client/server architecture. The bibliography cites resources.

  • Systems of Decision Support

    In five pages the marketing sphere is examined in terms of the functioning of an expert system with its pros and cons and money saving implementation benefits discussed. Five sources are cited in the bibliography.

  • Information Systems Management and Expert Systems

    In ten pages IS technologies are examined in a discussion that supports expert systems' application. Seven sources are cited in the bibliography.

  • Chemical Engineering and Process Control

    In seven pages this paper discusses process control as it relates to chemical engineering with system design and information management among the topics covered. Two sources are cited in the bibliography.

  • The Use of Customer Relationship Management in High End Fashion

    The fashion industry is highly competitive and gaining customer loyalty can be a challenge. The writer looks at the luxury end of the fashion market and considers the way that some of the high end fashion houses manage their relationship with their customers, looking at both the haute couture and prêt-a-porter markets. Fifteen sources are cited in this fourteen page paper.

  • An Overview of ATM or Asynchronous Transfer Mode

    In five pages ATM and ATM networks are examined in terms of advantages, disadvantages, and their implications. Six sources are cited in the bibliography.

  • Social Networking and its Future Implications for a Non Profit Making Organization

    This 22 page paper considers the potential impact that social networking may have on a non profit organization. After an introduction the paper considers three different methodologies before choosing one, and then looks at what is meant by social networking and the way it is undertaken and influencing society already. The paper then moves on to a consequence analysis, discuses the way it will impact in planning by looking at soft systems methodology and finally considering ethical implications. The bibliography cites 17 sources.

  • Automobile Manufacturer's eBusiness System Enhancement

    In seven pages this paper considers how an automobile manufacturer can enhance its ecommerce system with a project description, relevant headings, and the addition of components and functions. Two sources are cited in the bibliography.

  • Balanced Scorecard; The IT Balanced Scorecard As An Extension of the Business Balanced Scorecard

    This 9 page paper looks at the concept and the use of balanced scorecards in business, considering their general use and potential benefits as well as costs and comparing the IT balanced scorecard proposed by Van Grembergen with the business balanced scorecard of Kaplan and Norton. The bibliography cites 11 sources.

  • Using a Balanced Scorecard in a Bank

    The use of balanced scorecards is increasing; the writer assesses the way that a balanced scorecard (BSC) may be used in a bank. Looking at potential measures for each of the dimensions, the way it may be used and the potential inclusion in an incentive scheme for the bank executives. Three sources are cited in this six page paper.

  • Management Support Systems and Outsourcing

    The use of Management Support Systems (MSS) and outsourcing are two separate events that are both seeing increased occurrences. This 16 page paper considers the way in which the potential impacts of outsourcing management support systems. The paper starts by considering what is meant by a Management Support System (MSS) and how they are used. The potential advantages and disadvantages of outsourcing are then discussed before being applied to the potential outsourcing of MSS services or functions. The bibliography cites 12 sources.

  • Information Management

    This 9 page paper is written in 4 parts. The first part looks at information management methods and system, including paper files, databases and management information systems. The second part of the paper considers storage issues, the third part looks at decision making and the last part of the paper outlines the stages to running a meeting. The bibliography cites 4 sources.

  • Cyber Attacks in Healthcare

    Few people realize how vulnerable healthcare operations systems, from electronic health records to connected medical devices, are to cyber attacks. There have been major cyber attacks against some healthcare organizations involving millions of patient records. This essay discuses three major threats to healthcare operation systems. There are five sources used in this five page paper.a

  • JC Gear Risk Case Study

    JC Gear has a choice; they can buy software off the shelf or design their own. The writer identifies and discusses the potential sources of risk for each decision and compares the risk for the two choices. Three sources are cited in the bibliography of this three page paper.

  • Business Intelligence Competitive Tool of Data Mining

    In seven pages data mining is discussed as an important competitive tool of business intelligence with a sample of PNC's bank purchase of Unica's Model 1 in order to sustain a marketing competitive advantage while at the same time expanding their base of customer satisfaction. Six sources are cited in the bibliography and a one page outline is also included.

  • Data Mining and Business Intelligence

    In a paper consisting of seven pages data mining is considered in terms of how it can be used as a competitive instrument of business intelligence with the examination of a PNC Bank Corporation case study. There are six bibliographic sources cited.

  • Cyer Law Privacy v. Security

    Businesses have an interest in free information flows. Businesses are also under a threat from cyber criminals and terrorists. While mitigated by a number of laws, but those same laws also allow for access under shared business conditions, making it difficult to find a balance between security over privacy rights. This 5 page paper with 7 sources explores these issues.

  • Overview of Computer Security

    In ten pages this research paper focuses on computer security and its breaches with statistics covering its type, incidences, and losses for 1998 along with security techniques to protect computers against hacking along with improvement recommendations. Six sources are cited in the bibliography.

  • Significance of Database Security

    In ten pages the possibility of database attacks by hackere are discussed in an examination of database security and its importance with a consideration of tools that are designed to prevent such external threats. Eight sources are cited in the bibliography.

  • Technology Helps Companies Become Global

    This 5 page paper begins with reports of entrepreneurs in developing countries who are becoming successful because of technology. The paper then discusses how Zurich Financial Services Group became a truly global company by improving their technology. Bibliography lists 2 sources.

  • Overview of Information Security Management

    In ten pages this paper discusses information security management in an overview that describes how information leakage or security breaches can be prevented in the computerized workplace. Eight sources are cited in the bibliography.

  • History, Design, and Usage of Neural Networks

    In sixteen pages this paper discusses neural networks in a consideration of history, design, uses as systems of decision support and also includes its artificial intelligence developmental role. Twelve sources are cited in the bibliography.

  • Overview of Neural Networks

    In twenty five pages the process of neural networking is considered in an overview that includes its history, applications, and decision making capacity. Twenty sources are cited in the bibliography.

  • Business Process Re-engineering - Implementing a New ICT System

    This 14 page paper looks at the way business process re-engineering can take place in a firm. Using a fictitious example of a firm which wants to change the way it manages the goods inwards and outwards as part of the value chain by introducing a new ICT sysytem. The paper outlines the problems and looks at what is needed and then consider the way that the change may be facilitated, using the tools of requirements engineering and change management in order to achieve the end goals. The bibliography cites 4 sources.

  • Sony's Information Management

    In four pages this paper discusses information management at Sony in a corporate profile and consideration of processes, procedures, hardware, product information, control of inventory, and company wide inventory accounting. Three sources are cited in the bibliography.

  • Russell Corporation's Information Management

    In eight pages the Russell sportswear corporation is examined in a consideration of how it manages its systems of information technology to its best strategic and competitive marketing advantage. Nine sources are cited in the bibliography.

  • Knowledge Management

    This 11 page paper looks at knowledge management and the ways in which a firm can gain value from a knowledge management strategy or system. The paper defines what it is meant by knowledge management, looks at the different types of knowledge management that can take place and the barriers to successful implementation and what approaches should be taken in terms of knowledge creation and leveraging knowledge to overcome potential barriers. The bibliography cites 13 sources.


    This 3-page paper discusses the concept of knowledge management by reviewing case studies for knowledge management implementation by Frito-Lay and Roads & Traffic Authority. Bibliography lists 4 sources.

  • Knowledge Management Implementation; Two Cases

    This 7 page paper looks at the way knowledge management is implemented in different organization, uses two case studies; one where the implementation was successful and one where it has not yet succeeded; the e-government system implemented at Chaoyang District in China and the Shanghai company GEM services implementation of ERP. The implementation of knowledge management at both of these organizations is examined and compared. The bibliography cites 11 sources.

  • Wi Fi Network Selection and Integration

    In twelve pages this paper discusses adopting a Wi Fi network and various modes of implementation and information technology infrastructure integration. Ten sources are listed in the bibliography.

  • Medical Records Decentralization Literature Review

    In five pages this paper considers medical records' decentralization in a review of the current literature on the subject.

  • Magnetic Disc Storage Industry and EMC

    In twenty five pages EMC's status in the magnetic disc storage industry is considered in a paper that includes an executive summary, analysis of the industry, strategies, and conclusions based on the presented research. Fifteen sources are cited in the bibliography, with two illustrations and one table provided.

  • Proposal for a Small Business Management Information System

    In fifteen pages this paper examines how a small business can create a management information system to meet its need in a proposal of 2 possible computer solutions, pricing, and suggestions. Six sources are cited in the bibliography.

  • The Need for a New Management Information System

    This 8 page paper looks at a fictitious retail company and a single process which needs improvement. The example is a retail store and the way details regarding customers are taken when sales are made and tied up with financing documents. The paper looks at the culture and systems of the firm, what is needed in terms of software and hardware, conceptual design outline, a short factor evaluation, risk and benefit assessment and plan maintenance. The bibliography cites 5 sources.

  • The Benefits of Adopting a Management Information System

    The use of management information systems (MIS) has a number of potential benefits. Using an example of a fictitious firm Javabooks, a small retail outlet, the way MIS may be used is assessed. The writer then looks at potential sources of cost savings with MIS. Five sources are cited in the bibliography of this four page paper.

  • Mobile Technology

    Wireless and mobile devices have become part of everyone's life even if they do not own a smart phone. This paper defines these technologies. It then compares the use of them between Delta Airlines and Southwest airlines. There are twelve sources used in this six page paper.


    This 7-page paper discusses supply chain management and planning, using Motorola Inc.'s CGIS division as an example. Bibliography lists 3 sources.

  • Wireless Networks for a Small Business; Governance and Security

    This 10 page paper looks at the issues a small business may need to consider when implementing a wireless network. The 802.11 family is examined and the governance and security issues are discussed with reference to ISO 17799. The bibliography cites 7 sources.

  • A Wireless Network for a Healthcare Organization

    The writer discusses some of the issues a healthcare organization, such as a HMO, may need to look at if planning to install a wireless local area network (WLAN). Issues discussed include the benefits following installation, the potential architecture, and security of the equipment and information on the system. Eight sources are cited in the bibliography of this five page paper.

  • LAN Computer Network Construction

    In nine pages a Layered Approach Network for business is examined in a consideration of various standards, procedures, and techniques with definitions and construction issues as well as a description of each layer in this computer network provided. Nine sources are cited in the bibliography.

  • Amazon and the Potential for New Technology

    This 7 page paper looks at the way may benefit from the adoption of new technology. The paper considers the use of RFID for stock control to compliment the existing systems and increase value in the value chain. The first part of the paper looks at how this would add value to Amazon. The last page discusses the way the change could be introduced. The bibliography cites 10 sources.

  • Technology in an Organization

    This 3 page paper considers a firm that is losing its’ edge and suggests the use of new technology, outlining the benefits and disadvantages and how it may be implemented, The example used is the introduction of RFID in a winery. The bibliography cites 2 sources.


    Applies the technology acceptance model (TAM) to online shopping in Saudi Arabia. There are 30 sources listed in the bibliography of this 12-page paper.

  • Outsourcing at Wachovia and the Bank of America

    Outsourcing has become a common strategy for firms looking to cut costs. However, this is not the only motivation to undertake outsourcing. This 18 page paper compares and contrasts Bank of America and Bank of Wachovia outsourcing decisions, negotiations, and solutions. The bibliography cites 11 sources.

  • Proposal for Payroll Database Management

    In five pages an upper management decision regarding a proposed payroll database management system for employees and checks is presented. Two sources are cited in the bibliography.

  • CPM and PERT Management Tools of Project Planning

    In twenty one pages this paper discusses how management utilizes Critical Path Management and Program Evaluation and Review Technique in project planning with risk management one of the topics considered. Fourteen sources are cited in the bibliography.


    This 8-page paper provides a PERT sequencing analysis and explanation for Empress Silks. Bibliography lists 1 source.

  • Personal Privacy and Data Processing

    In five pages this research paper examines privacy issues in the electronic information age with a consideration of EU's privacy rules along with primary U.S. regulations also discussed. Four sources are cited in the bibliography.

  • Chad's Creative Concepts Management and Change Implementation

    In sixteen pages this report considers how to implement management changes in this successful small business through IT supply management and production advantages, production process redesign, supplies and warehousing among other possible options. Seven sources are cited in the bibliography.

  • Porter's 5 Forces Analysis & Value Chain - Retail Industry

    This 8 page essay explains each Force in Porter's Five Force Analysis process. It then explains each of the categories and supporting factors found in Porter's generic value chain analysis process. The writer uses Wal-Mart as an excellent example in the retail industry of how information technology can be used to create value as well as a competitive advantage. Bibliography lists 6 sources.

  • Project Proposal; A New Computer System for a Retail Firm

    This 4 page paper is a project proposal for the implementation of an integrated computer system for a small chain of retail stores. The organizational situation is reviewed, objectives are identified and then the 9 knowledge areas of PMBOK are briefly considered. The bibliography cites 3 sources.

  • DHL and RFID Technology

    This 3 page paper discusses DHL's decision to use RFID technology and their most recent idea to equip trucks with RFID. The writer also reports their latest innovation, RFID with temperature sensor. Bibliography lists 4 sources.

  • Wal-Mart And RFID

    A 3 page paper that reports Wal-Mart's 2003 decision to have its largest suppliers adopt RFID technology. Examples are provided of companies who complied. The essay discusses Wal-Mart's own delay in equipping stores. The benefits of this technology are also discussed. Bibliography lists 4 sources.

  • RFID Improves Supply Chain

    A company in Alaska has a sustained problem with recording certain expenses. Transportation costs are melded into the price of goods, which means the manager does not know exactly what the items themselves cost. RFID is recommended. There are two sources used in this four page paper.

  • Improving Security Performance in an Organization with the Use of RFID Smart Cards and Biometric Data

    This is an in-depth paper examining the potential use of smartcards in order to improve security within an organization needs to control entrance into the facility. The idea is that a smart card, with embedded RFID technology may be used to gain access through automated entrance points, with identity verified through the use of biometric data. The paper starts with an introduction, presents an in-depth literature review examining the importance of security, the technology and the way in which it may be utilized, ending with a case study supported by suggested methodology and then some potential results. Fifty-one sources are cited in the bibliography of the seventy-three page paper.

  • Being a Security Manager

    This research paper looks at what is involved in being a security manager and then discusses this role in relation to risk management and whether or not the two areas are sufficiently different to justify a completely different division. Risk management is defined, as is the fucntion of the security manager and the types of security breaches that the manager must addresses are described. This eight page paper has eight sources in the bibliography.

  • Information Technology Security, Web Services and Database Management Systems

    This 14 page paper is written in three parts. Each part of the paper looks at a different type of technology, outlining the purpose and the motivation for it's' existence, how it functions, how it is used by organizations, the market and the way it may evolve in the future. The technologies discussed include information technology security, focusing on cryptography, web services and database management systems. The bibliography cites 15 sources.

  • Case Study of JK Potter Supermarket

    In three pages a student submitted case study examines consumer habit data interpretation by a UK supermarket in a consideration of knowledge and data warehousing. Five sources are listed in the bibliography.

  • Student Submitted Case Study on ILI

    In four pages this student case study on an early Internet auction company includes an assessment of corporate strategy.


    Focuses on Subaru of America's transportation management system and how it operates. There is 1 source listed in the bibliography of this 3-page paper.

  • The Use of ICT in Corporations

    One of the operations that we know gives a company a competitive advantage is a well-managed supply chain. Along the lines of corporate success is also the implementation of information and communications technology, in fact, companies cannot succeed today without it. This paper discusses ICT in terms of supply chain management. The essay represents part of a research study about the cement industry in Africa and whether or not ICT improves it. There are eight sources used in this 15 page paper.

  • Wal-Mart Design

    This paper discusses aspects and dimensions of organization design and the role of technology in performance. Wal-Mart is used as an example of effective use of technology in their overall design and structure. There are twelve sources listed in the bibliography of this nine page paper.

  • Questions on Information Technology Acquisitions

    In four pages and 5 parts this paper answers IT acquisitions' questions involving strategy and company alignment, U.S. General Services Administration's contract value for federal agency IT purchase, reduction of IT acquisition figures that are ongoing, acquisition evaluation approaches, and IT outsourcing advantages and disadvantages. Five sources are listed in the bibliography.

  • Overview of Data Warehousing

    In five pages this research paper considers data warehousing in terms of the communications and technology history, definition of current usage, three factors of evaluation, and its nine benefits with the potential for a Virtual Warehouse System also examined. Eight sources are cited in the bibliography.

  • Task Management Monitoring and Standards

    In twelve pages this paper discusses the corporate management of task in a consideration of the significance of monitoring performance and establishing standards with a balanced scorecard monitoring system among the topics examined. Eleven sources are listed in the bibliography.

  • Systems versus Enterprise Architecture

    A 6 page research paper that, first of all, offers a 2 page summary that differentiates systems architecture from enterprise architecture. Then, the writer summarizes the content of 2 web sites and 1 journal article. The final page offer findings and conclusions. Bibliography lists 10 sources.

  • XML and Web Services Development

    This paper on web services development focuses upon XML's importance in twelve pages with ecommerce, Australian corporate globalization, and international trade among the topics of discussion. Eighteen sources are cited in the bibliography.


Most Relevant Research Papers

Click on any of the term papers to read a brief synopsis of the research paper. The essay synopsis includes the number of pages and sources cited in the paper.


Copyright © 1994-2020 The Paper Store Enterprises, Inc. & Research Papers Online. All rights reserved.