Information Management Essays (Examples)

Studyspark

Study Document Study Document

Elon Musk And Power At Tesla

Pages: 6 (1701 words) Sources: 5 Document Type:Essay Document #:68738154

...Information management Tesla is a company that has had at least a 5 year relationship with its CEO Elon Musk. Up until recently Musk was also Chairman of the Board. He was removed from his role as Chairman as part of a settlement with the Securities and Exchange Commission (SEC). The settlement resulted from charges filed by the SEC relating to securities fraud when Musk’s public Tweet on Twitter about taking the company private and that he had “funding secured.” The statement was shown to be a lie (Gaydos, 2018). Musk settled with the SEC and paid a hefty fine and Robyn Denholm replace Musk as Chairman of the Board. Denholm had been a Board member for five years up to that point (Porter, 2018). Thus, up until Musk’s run-in with the SEC in 2018, he had been both CEO and Chairman of the Board—which can serve as a conflict of interest,……

References

References

Abels, P. B., & Martelli, J. T. (2013). CEO duality: how many hats are too many?. Corporate Governance: The international journal of business in society, 13(2), 135-147.

Dickins, D. (2010). CEO and COB duality: Does it matter. Internal Auditing, 25(4), 35-38.

Gaydos, R. (2018). Elon Musk may have violated Tesla’s conduct and ethics code after smoking up in podcast interview: report. Retrieved from  https://www.foxnews.com/tech/elon-musk-may-have-violated-teslas-conduct-and-ethics-code-after-smoking-up-in-podcast-interview-report 

Porter, J. (2018). Tesla has found a new chairperson to replace Elon Musk. Retrieved from  https://www.theverge.com/2018/11/8/18074800/tesla-new-chair-2018-robyn-denholm-elon-musk 

Yang, T., & Zhao, S. (2014). CEO duality and firm performance: Evidence from an exogenous shock to the competitive environment. Journal of Banking & Finance, 49, 534-552.

Studyspark

Study Document Study Document

Cyber Crime IT Security Auditing

Pages: 11 (3165 words) Sources: 7 Document Type:Research Paper Document #:36684821

… past, lost much to these crimes and, hence, must come up with plans to prevent such future occurrences. In this paper, the processes information technology security audits entail and how such audits enhance organizational IT security will be dealt with. According to research on the subject, IT … in the form of a methodical analysis by an outside specialist on compliance, for identifying any chinks in the armor of the company's information technology system.
Introduction
ICT advancements have meant the availability of vast quantities of data, which also creates considerable risks to the data itself, … of data, which also creates considerable risks to the data itself, computer systems, and critical infrastructures and operations it supports. Despite developments in information security, numerous information systems continue to display susceptibility to both external and internal breaches (Suduc, Bîzoi & Filip, 2010). Internal information security auditing enhances the likelihood of implementation of……

References

References

Almatari, O. and Helal, I., and Mazen, S., and El Hennawy, S. (2018). \\\\\\"Cybersecurity Tools for IS Auditing.\\\\\\" The 6th International Conference on Enterprise Systems, At Limassol, Cyprus 10.1109/ES.2018.00040.

Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant\\\\\\'s handbook: Systems analysis and design. CRC press.

Diamantopoulou, V., Tsohou, A., & Karyda, M. (2019). From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security (pp. 238-257). Springer, Cham.

Khan, M. (2017). Computer security in the human life. International Journal of Computer Science and Engineering (IJCSE), 6(1), 35-42.

Lenghel, R. D., & Vlad, M. P. (2017). INFORMATION SYSTEMS AUDITING. Quaestus, (11), 178.

Manaseer, S., & Alawneh, A. (2019). ON CYBERSECURITY AUDITING AWARENESS: CASE OF INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR. International Journal of Computer Science and Information Security (IJCSIS), 17(7).

Suduc, A. M., Bîzoi, M., & Filip, F. G. (2010). Audit for information systems security. Informatica Economica, 14(1), 43.

Studyspark

Study Document Study Document

Marketing Strategy Creation For OPG

Pages: 6 (1941 words) Sources: 4 Document Type:Essay Document #:63904043

… more value for customers.
Then expanding into catering for big events would also improve its standing in the community,…[break]…provides a way to collect information about potential customers. Big Data is here to stay and the pub needs to be using Big Data heuristics in order to identify … traffic is coming from to its website and who is interested in reviews of its restaurant. It can use social media to collect information about potential customers based on who follows the pub online and who is liking posts or taking part in social media challenges.
Selling ……

References

References

Dhar, V., & Chang, E. A. (2009). Does chatter matter? The impact of user-generated content on music sales. Journal of Interactive Marketing, 23(4), 300-307.

Lim, X. J., Radzol, A. M., Cheah, J. H., & Wong, M. W. (2017). The impact of social media influencers on purchase intention and the mediation effect of customer attitude. Asian Journal of Business Research, 7(2), 19-36.

Lin, C. F. (2002). Segmenting customer brand preference: demographic or psychographic. Journal of Product & Brand Management, 11(4), 249-268.

Trout, J. & Rivkin, S., (2006). Differentiate or die. In The marketing Gurus (ed. Murray). NY: Penguin.

Studyspark

Study Document Study Document

Maslow S Hierarchy Of Needs Model And Its Application In Human Resources

Pages: 12 (3607 words) Sources: 9 Document Type:Research Paper Document #:83319615

… example, a referral who is a family member or friend of the referring source is less likely to have a great relationship with management at the organization and is more likely to leave the company at some point than is a referral who is simply part of … its approach to moderating the effect of self-interest in employee referrals. One proposition mentioned by Eisenhardt (1989) is that “when the principal has information to verify agent behavior, the agent is more likely to behave in the interests of the principal” (p. 60). This means, from an ……

References

Bibliography

Bussin, M., & Christos, D. (2018). Blind hiring not as crazy as it sounds. HR Future,  2018(Sep 2018), 36-39.

CBS News (2017). Retrieved from  http://www.cbsnews.com/videos/meet-bozoma-saint-john-the-woman-tasked-with-fixing-ubers-image/ 

Eisenhardt, K. M. (1989). Agency theory: An assessment and review. Academy of management review, 14(1), 57-74.

Frank, L. (2018). How to Use Employee Referrals Without Giving Up Workplace Diversity. Retrieved from  https://hbr.org/2018/03/how-to-use-employee-referrals-without-giving-up-workplace-diversity 

Jensen, M., & Meckling, W. (1976) Theory of the firm: Man- agerial behavior, agency costs, and ownership structure. Journal of Financial Economics, 3, 305-360.

Larcker, D. F., & Tayan, B. (2017). Governance Gone Wild: Epic Misbehavior at Uber Technologies. Rock Center for Corporate Governance at Stanford University Closer Look Series: Topics, Issues and Controversies in Corporate Governance No. CGRP-70, 18-3.

Payscale. (2018). Retrieved from  https://www.payscale.com/data/job-referral s

ProActive Solutions. (2020). Agency theory. Retrieved from http://knowledgegrab.com/learners-zone/study-support/performance-management-review/framework-introduction-to-hrm/agency-theory/

Studyspark

Study Document Study Document

Self Regulation Proposal

Pages: 6 (1825 words) Sources: 6 Document Type:Essay Document #:60406308

… is not only a viable alternative to external regulation by third party agencies, it is also a necessary step towards the reduction and management of risk. Companies alone have the most access to records and numbers, to workers and actions that may need investigating: external regulators do … international stage. Third party regulators do not. Companies also have the means to monitor and regulate: RegTech has advanced to a point where information can be monitored, collected, analyzed and evaluated nearly instantaneously thanks to Big Data analytics. Finally, the company itself has the capacity to……

References

References

Arner, D. W., Barberis, J., & Buckey, R. P. (2016). FinTech, RegTech, and the reconceptualization of financial regulation. Nw. J. Int'l L. & Bus., 37, 371.

Arnone, M., & Padoan, P. C. (2008). Anti-money laundering by international institutions: a preliminary assessment. European Journal of Law and Economics, 26(3), 361-386.

Greene, E., & Odorski, C. (2015). SEC enforcement in the financial sector: addressing

Omarova, S. T. (2010). Rethinking the future of self-regulation in the financial industry. Brook. J. Int'l L., 35, 665.post-crisis criticism. Bus. L. Int'l, 16, 5.

Omarova, S. T. (2011). Wall street as community of fate: Toward financial industry self-regulation. University of Pennsylvania Law Review, 159(2), 411-492.

Pritchard, A. C. (2003). Self-regulation and securities markets. Regulation, 26, 32.

Studyspark

Study Document Study Document

Hurricane Katrina Military Response

Pages: 4 (1256 words) Sources: 3 Document Type:Essay Document #:19776713

… had not been trained for such a disaster either. A National Response Plan had not been developed nor was there a National Incident management System, which meant FEMA was not ready to act (Lewis, 2009; Select Bipartisan Committee to Investigate the Preparation for and Response to Hurricane ……

References

References

The Brookings Institution. (2007). 9/11, Katrina and the future of interagency disaster response. Retrieved from  https://www.brookings.edu/wp-content/uploads/2012/10/20070529.pdf 

E-PARCC Collaborative Governance Initiative. (2008). Collaboration Amid Crisis: The Department of Defense During Hurricane Katrina Teaching Note. Retrieved from  https://www.maxwell.syr.edu/uploadedFiles/parcc/eparcc/cases/Moynihan-%20Teaching%20Notes.pdf 

Lewis, D. E. (2009). Revisiting the administrative presidency: Policy, patronage, and agency competence. Presidential Studies Quarterly, 39(1), 60-73.

Philipps, D. (2017). Seven hard lessons responders to Harvey learned from Katrina. Retrieved from https://www.nytimes.com/2017/09/07/us/hurricane-harvey-katrina-federal-responders.html

Samaan, J. L., & Verneuil, L. (2009). Civil–Military Relations in Hurricane Katrina: a case study on crisis management in natural disaster response. Humanitarian Assistance: Improving US-European Cooperation, Center for Transatlantic Relations/Johns Hopkins University, Baltimore, MD/Global Public Policy Institute, Berlin, 413-432.

Select Bipartisan Committee to Investigate the Preparation for and Response to Hurricane Katrina. (2006). A failure of initiative. Retrieved from  http://govinfo.library.unt.edu/a257.g.akamaitech.net/7/257/2422/15feb20061230/www.gpoaccess.gov/katrinareport/mainreport.pdf 

Studyspark

Study Document Study Document

Code Of Conduct Policies Of US Universities

Pages: 4 (1254 words) Sources: 3 Document Type:Essay Document #:72322264

...Information management Code of Conduct Policies
Locate three Code of Conduct policies from three different universities/colleges.
Codes of conduct from three universities have been explained below;
Thomas Edison State University (TESU)
This code of conduct policy aims at defining and advising enrollees of the institution’s conduct code, and describing violations and associated penalties. Further, it outlines a student appeal and hearing process to aid those students who feel the institution has wrongly charged them with violation of scholastic integrity standards.
Boston University (BU)
The academic code of conduct of BU attempts at facilitating the cultivation of an environment conducive to student learning. It explains the ethical requirements of BU students, in addition to guaranteeing student responsibilities and rights owing to their being a member of an academic community. Additionally, it is clear on procedures and policies pertaining to academic conduct. It forms the basis of a professional atmosphere of student integrity in……

References

Bibliography

Boston University. (2019, December 28). Academic Conduct Code. Retrieved from Boston University:  https://www.bu.edu/academics/policies/academic-conduct-code/ 

Brown University. (2019, December 28). The Academic Code. Retrieved from Brown University:  https://www.brown.edu/academics/college/degree/sites/brown.edu.academics.college.degree/files/uploads/Academic-Code.pdf 

Thomas Edison University. (2019, December 28). Academic Code of Conduct. Retrieved from Thomas Edison University:  https://www.tesu.edu/academics/catalog/academic-code-of-conduct 

Studyspark

Study Document Study Document

Israeli Security Methods In U S Airports

Pages: 3 (1023 words) Sources: 6 Document Type:Essay Document #:94329495

… is through the use of security…[break]…must go through. The fast pass is basically a digital pre-check in which the traveler uploads all the information that would be sought out by a security interviewer ahead of time in order to qualify for the pass. Once the pass is ……

References

References

Gaines, L. K., & Miller, R. L. (2013). Criminal justice in action. Nelson Education.

Haaretz & Reuters. (2017). U.S. Airport Security Is Becoming a Bit More Israeli Today –Here\\\\\\\\\\\\'s What You Need to Know. Retrieved from  https://www.haaretz.com/us-news/u-s-airport-security-rules-are-changing-today-here-s-what-you-need-to-know-1.5460568 

Hasisi, B., Margalioth, Y., & Orgad, L. (2012). Ethnic profiling in airport screening: Lessons from Israel, 1968–2010. American law and economics review, 14(2), 517-560.

Lowrey, A. (2010, January 8). Foreign policy: The costs of Israel level security [Opinion]. NPR. Retrieved from  https://www.npr.org/templates/story/story.php?storyId=122352039 

NBC. (2018). NYC-Area Airports Set Record for Passenger Traffic, Rank Among Worst in U.S. for On-Time Performance. Retrieved from  https://www.nbcnewyork.com/news/local/JFK-LaGuardia-Newark-Airports-Record-Passenger-Traffic-Worst-On-Time-Performance-475559363.html 

Zeff, M. (2017). 2016 record year for Israeli air traffic. Retrieved from  https://www.jpost.com/Business-and-Innovation/2016-record-year-for-Israeli-air-traffic-477180 

Studyspark

Study Document Study Document

Quality Improvement Plan

Pages: 8 (2259 words) Sources: 3 Document Type:Essay Document #:15328013

… inputs at scheduled times thus reducing the time taken to manufacture the goods. The right suppliers can be identified and contracted since the information is collated in one central location. With a centralized database of suppliers’ rogue suppliers can be identified and expunged from the database. This … is being used for input-measurement. Reducing this number will ensure that processes are working as expected and the results can be seen. Supplier management should also be incorporated. This will ensure the company reaps benefits from having a centralized supplier management system that holds all the key information regarding its suppliers. With……

References

References

Brown, C. (2019). Why and how to employ the SIPOC model. Journal of business continuity & emergency planning, 12(3), 198-210.

Carvalho, M. S., Magalhaes, D. S., Varela, M. L., Sa, J. O., & Gonçalves, I. (2016). Definition of a collaborative working model to the logistics area using design for Six Sigma. International Journal of Quality & Reliability Management, 33(4), 465-475.

Shojaie, A. A., Raissi, S., & Dogahe, R. A. (2016). Impact analysis of TQM\\\\\\'s hard aspects on sigma level in electronics and telecommunication production process. International Journal of Productivity and Quality Management, 18(4), 425-439.

 

Studyspark

Study Document Study Document

Individuals Using Customary Practices In Times Of Crises

Pages: 17 (4950 words) Sources: 30 Document Type:Annotated Bibliography Document #:60738961

… note that most of the resources highlighted in this annotation have primarily focused on the relevance of customary practices in crisis and disaster management. It is therefore clear that minimal effort has been put in attempts to unravel how culture could get in the way of effective … clear that minimal effort has been put in attempts to unravel how culture could get in the way of effective crisis or disaster management. In the present study, the authors seek to piece together the local insights of inhabitants from three different regions in an attempt to … to disaster preparedness. Insights from this particular study will enable me to suggest ways through which the efficiency of traditional crisis and disaster management approaches could be enhanced to promote better outcomes on this front. The article appeared in a reputable peer-reviewed journal.
Bang, H.N., Miles, L.S. … article appeared in a reputable……

References

Roberts. A.R. (Ed.). (2005). Crisis Intervention Handbook: Assessment, Treatment, and Research (3rd ed.). New York, NY: Oxford University Press.

Sama’ila, A. (2019). Economic crisis and the coping strategies of indigenous automobile entrepreneurs in northern Nigeria, 1983-2014. Sociology International Journal, 3(6), 437-442.

Join thousands of other students and

"spark your studies".