Information Systems Essays (Examples)

Studyspark

Study Document Study Document

Customer Persona For Filshie Clip System

Pages: 12 (3656 words) Sources: 11 Document Type:Capstone Project Document #:94593472

… which they understand the needs and demands of their specific target market or customers. Through these online communities, Facebook, Twitter and Google obtain information on value-in-use. The information is then utilized to shape their value creation processes and enhance service delivery, which in turn generates significant competitive advantage over rivals.

Duran ……

References

References

Antoun, L., Smith, P., Gupta, J. K., & Clark, T. J 2017. The feasibility, safety, and effectiveness of hysteroscopic sterilization compared with laparoscopic sterilization. American journal of obstetrics and gynecology, vol. 217, no. 5, pp.e571-570. e576. 

Beerthuizen, R 2010. State-of-the-art of non-hormonal methods of contraception: V. Female sterilisation. The European Journal of Contraception & Reproductive Health Care, vol. 15, no. 2, pp.124-135.

De Toni, D., Milan, G.S., Saciloto, E.B., & Larentis, F 2017. Pricing strategies and levels and their impact on corporate profitability. Revista de Administracao, vol. 52, no. 2, pp.120-133.

Duran, A 2018. Sink or swim: how to create buyer personas to ensure marketing success. Forbes. Viewed 20 August 2019,

Griffin, A, Noble, CH, Durmusoglu, SS, Luchs, MI, & Swan, S 2015. ‘Chapter 3 Personas: powerful tools for designers’, in Design Thinking : New Product Development Essentials from the PDMA, John Wiley & Sons, Incorporated, Hoboken.

Johnson, S., Pion, C. & Jennings, V 2013. Current methods and attitudes of women towards contraception in Europe and America. Reproductive Health, vol. 10, no. 7, pp.1-9.

Kotler, P., & Keller, K. L. (2015). Marketing Management, Global Edition. Pearson Education Limited: Boston, MA.

Magrath, A.J 1986. When Marketing Services, 4Ps are not enough. Business Horizons, pp.4450.

Studyspark

Study Document Study Document

Reforming The High School System

Pages: 10 (2967 words) Sources: 7 Document Type:Essay Document #:70939676

… the Socratic method of dialogue and inquiry. This made students more engaged. Instead of sitting in their desks like passive receptacles waiting for information to be downloaded into their brains, they become more like participants in their own education, taking ownership of the educative process (Micheletti). The … bodies and minds are maturing and they resent being asked to sit like docile five year olds waiting to receive their nugget of information. They have questions—millions of questions—and the teacher should be there to help answer them. The idea that the teacher is there only to … of their first 22 years of life on this planet in school, sitting in a desk, expected to be docile and receive the information that is being given them without question. If they question or resist, they are deemed problematic and life is made very difficult for ……

References

Works Cited

Adorno, Theodor and Max Horkheimer. The culture industry: Enlightenment as mass deception. Stardom and celebrity: A reader, 34, 2007.

DoSomething.org. “11 Facts about High School Dropout Rates.”  https://www.dosomething.org/us/facts/11-facts-about-high-school-dropout-rates#fn1 

Freire, Paulo. Pedagogy of the oppressed. Bloomsbury Publishing USA, 2018.

Kristjánsson, Kristján. \\\\\\\\\\\\"There is Something About Aristotle: The Pros and Cons of Aristotelianism in Contemporary Moral Education.\\\\\\\\\\\\" Journal of philosophy of education 48.1 (2014): 48-68.

Lickona, Thomas. \\\\\\\\\\\\"The return of character education.\\\\\\\\\\\\" Educational leadership 51.3 (1993): 6-11.

Micheletti, Gabrielle. “Re-Envisioning Paulo Freire\\\\\\\\\\\\'s “Banking Concept of Education’.” Inquiries Journal 2.2 (2010): 1.  http://www.inquiriesjournal.com/articles/171/re-envisioning-paulo-freires-banking-concept-of-education 

Plato. Allegory of the Cave.  https://web.stanford.edu/class/ihum40/cave.pdf 

Studyspark

Study Document Study Document

Role And Purpose Of Advocacy In The Health Care Delivery System

Pages: 5 (1453 words) Sources: 4 Document Type:Essay Document #:38970574

… of quality care he or she needs no matter where he is in the world. Advocates are there to promote quality care, improve systems of care, and foster and facilitate the application of preventive care. Without advocates, patients and populations will have no one to support them, … patient and the population, who put the needs of the patient and the population at the front and center of health care delivery systems. They identify the needs of the patient/population, advocate on their behalf by lobbying for governmental policy changes or implementation of new regulations, increase ……

References

References

Ahmadinejad, F., Abbaszadeh, A., & Davoodvand, S. (2016). Patient advocacy from the clinical nurses\\\\' viewpoint: a qualitative study. Journal of medical ethics and history of medicine, 9(5).

Benatar, S. R. (2013). Global Health and Justice: R e?examining our Values. Bioethics,  27(6), 297-304.

Earnest, M. A., Wong, S. L., & Federico, S. G. (2010). Perspective: physician advocacy: what is it and how do we do it?. Academic medicine, 85(1), 63-67.

World Health Organization (WHO). (2015). Global Health Ethics Key issues Global Network of WHO Collaborating Centres for Bioethics. Retrieved from:  http://apps.who.int/iris/bitstream/handle/10665/164576/9789240694033_eng.pdf;jsessionid=BF56A5C93A3B735876DBBF060A0652FC?sequence=1 

World Health Organization. (2016). Online public hearing to help inform the scope of the forthcoming WHO guidelines on health policy and system support to optimize community based health worker programs. Retrieved from: http://www.who.int/hrh/news/2016/pico_form/en/

Studyspark

Study Document Study Document

Barriers That Prevent Implementation Of IoT Within Small Businesses

Pages: 18 (5252 words) Sources: 37 Document Type:Case Study Document #:25628514

… the IoT.
The use of the UTAUT model is also highly appropriate for the purposes of this study because individual acceptance levels of information technology (IT) have been a key focus of many of the studies concerning new technology implementations to date (Venkatesh, Thong & Xu, 2016). … and Wang (2018), “After the Internet and mobile communication network, the Internet of Things has become an important trend in the development of information technology, greatly promoting the reform of the information industry in the world” (p. 2386). The IoT can be conceptualized graphically as depicted in Figure 1 below.
Figure 1. Representative Internet of … the most important features of IoT applications include the fact that conventional mobile devices such as smartphones, various types of personal computers, video systems and other handheld devices as well as objects that have traditionally not been viewed as being amenable can be incorporation into……

References

References

Ahamed, J., & Rajan, A.V. (2016). Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 1-5.

Aishah, S., Sahandi, R., Prakoonwit, S., & Khan, W. (2019). Big data and IoT opportunities for small and medium-sized enterprises (SMEs). In Handbook of Research on Big data and the IoT. doi: 10.4018/978-1-5225-7432-3.ch005

An, N. & Wang, J. (2018, October). Research and practice on innovative methods of ideological and political education for college student. Educational Sciences Theory and Practice, 18(5), 2386-2391.

Banham, R. (2016, July-August). IoT complexity: As the Internet of Things expands, the risks-and questions of liability-become more complicated. Risk Management, 63(6), 39-44.

Bhardwaj, A., Subramanyam, G. V., Avasthi, V. & Sastry, H. (2016). Review of solutions for securing end user data over cloud applications. International Journal of Advanced Computer Research, 6(27), 2277-2291.

Bok, H. (2014, September). An empirical study on factors influencing Internet advertising effects. Advances in Management, 7(9), 6-9.

Business.com. (2018). Disaster preparedness for small businesses. Business.com, September 26. Retrieved from  https://www.business.com/articles/business-disaster-prep/ .

Cass, J. (2019). Internet of Things: What it is, how it works, examples and more. Just Creative. Retrieved from  https://justcreative.com/2018/11/19/internet-of-things-explained/ .

Studyspark

Study Document Study Document

Cyber Crime IT Security Auditing

Pages: 11 (3165 words) Sources: 7 Document Type:Research Paper Document #:36684821

… past, lost much to these crimes and, hence, must come up with plans to prevent such future occurrences. In this paper, the processes information technology security audits entail and how such audits enhance organizational IT security will be dealt with. According to research on the subject, IT … in the form of a methodical analysis by an outside specialist on compliance, for identifying any chinks in the armor of the company's information technology system.
Introduction
ICT advancements have meant the availability of vast quantities of data, which also creates considerable risks to the data itself, … system.
Introduction
ICT advancements have meant the availability of vast quantities of data, which also creates considerable risks to the data itself, computer systems, and critical infrastructures and operations it supports. Despite developments in information security, numerous information systems continue to display susceptibility to both external and internal breaches (Suduc, Bîzoi & Filip,……

References

References

Almatari, O. and Helal, I., and Mazen, S., and El Hennawy, S. (2018). \\\\\\"Cybersecurity Tools for IS Auditing.\\\\\\" The 6th International Conference on Enterprise Systems, At Limassol, Cyprus 10.1109/ES.2018.00040.

Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant\\\\\\'s handbook: Systems analysis and design. CRC press.

Diamantopoulou, V., Tsohou, A., & Karyda, M. (2019). From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security (pp. 238-257). Springer, Cham.

Khan, M. (2017). Computer security in the human life. International Journal of Computer Science and Engineering (IJCSE), 6(1), 35-42.

Lenghel, R. D., & Vlad, M. P. (2017). INFORMATION SYSTEMS AUDITING. Quaestus, (11), 178.

Manaseer, S., & Alawneh, A. (2019). ON CYBERSECURITY AUDITING AWARENESS: CASE OF INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR. International Journal of Computer Science and Information Security (IJCSIS), 17(7).

Suduc, A. M., Bîzoi, M., & Filip, F. G. (2010). Audit for information systems security. Informatica Economica, 14(1), 43.

Studyspark

Study Document Study Document

Cloud Computing And Cost Effectiveness

Pages: 5 (1591 words) Sources: 5 Document Type:Annotated Bibliography Document #:36737117


Annotated Bibliography
Carcary, M., Doherty, E., & Conway, G. (2015). The adoption of cloud computing by Irish SMEs- an exploratory study. Electronic Journal of information systems Evaluation, 17(1), 3.
This article ascertains that the major reason why SMEs in Ireland adopt cloud computing is for cost-effectiveness. The study shows that … cloud computing. Different from desktop computing, where hard disk crashes can result in the destruction and loss of the firm’s valuable data and information, the same does not apply in the cloud where data is stored effectively.
The cost-effectiveness of cloud computing is perceptible. Rather than purchasing … services that are metered permit corporations to employ a more wide-ranging variety of capabilities devoid of incurring the expenses associated with enforcing these systems and applications within their own IT divisions.
Attaran, M. (2017). Cloud Computing Technology: Leveraging the Power of the Internet to Improve Business Performance. … IT divisions.
Attaran, M.……

References

References

Attaran, M. (2017). Cloud Computing Technology: Leveraging the Power of the Internet to Improve Business Performance. Journal of International Technology and Information Management, 26(1), 112 – 137.

Carcary, M., Doherty, E., & Conway, G. (2015). The adoption of cloud computing by Irish SMEs- an exploratory study. Electronic Journal of Information Systems Evaluation, 17(1), 3.

Elmonem, M. A. A., Nasr, E. S., & Geith, M. H. (2016). Benefits and challenges of cloud ERP systems–A systematic literature review. Future Computing and Informatics Journal, 1(1-2), 1-9.

Shankar, K. (2016). Effectiveness of Cloud Computing in Global Business. Journal of Applied Management-Jidnyasa, 8(1), 66-73.

Xue, C. T. S., & Xin, F. T. W. (2016). Benefits and challenges of the adoption of cloud computing in business. International Journal on Cloud Computing: Services and Architecture, 6(6), 01-15.

Studyspark

Study Document Study Document

Veteran Benefits Administration

Pages: 8 (2465 words) Sources: 3 Document Type:Implementation Paper Document #:56829115

… Archives and Records Administration (2016), it was found that “the VA has a large volume of unscheduled records, particularly those residing in electronic information systems.” In that regard, therefore, it would be prudent to implement a robust electronic records management system. Aziz, Mohammad, Mokhtar & Ambari (2017) point … life cycle” (10733). The authors further observe that EDRMS ought to be considered critical infrastructure when it comes to the protection of valuable information and the efficient utilization of the same at the organizational or agency level. It therefore follows that a robust, efficient, and effective records … the records that the agency handles happen to be extremely sensitive – effectively meaning that it would be imperative to ensure that the data/information contained therein is not accessed by unauthorized third parties. This is more so the case when it comes to veteran financial records, rehabilitation ……

References

References

Aziz, A.A., Mohammad Y., Mokhtar, U.A. & Ambari, D.I. (2017). Establishing Policy for the Implementation of Electronic Document and Records Management System in Public Sector in Malaysia: The Influencing Factors. Advanced Science Letters, 23(11), 10732-10736.

National Archives and Records Administration (2016). Department of Veterans Affairs Records Management Program: Records Management Inspection Report. Retrieved from  https://www.archives.gov/files/records-mgmt/pdf/va-2016-inspection.pdf 

U.S. Department of Veteran Affairs (2020). About VBA. Retrieved from  https://www.benefits.va.gov/BENEFITS/about.a sp

Studyspark

Study Document Study Document

Challenges In Management Facing Transformational Leaders Service

Pages: 5 (1606 words) Sources: 5 Document Type:Annotated Bibliography Document #:57833590

… formulating and empirically testing a model based on transformational leadership elements as well as diffusion of innovation model phases, utilizing PLS technique and information from as many as 154 companies, for studying the implementation of novel technology, namely MCC (mobile cloud computing). Factors like corporate vision, supportive … and identifying the personal needs of others (both indications of offering individual support), have been linked strongly to the implementation of a major information systems innovation like MCC. It reveals that understanding the effect of the leadership element individually on innovation dissemination is important, instead of retaining them … comprehensive construct. The authors conclude that empathetic, efficient leadership, right from the vision stage to the stage of institutionalization, proves crucial to adopt information technology cloud innovation successfully. Superior communication skills, involving ensuring team motivation, personnel being up- to- date on reform and growth, and regular emphasis … analysis using SEM (structural……

References

References

Al Ahmad, S., Easa, N. F., & Mostapha, N. (2019). The Effect of Transformational Leadership on Innovation: Evidence from Lebanese Banks. European Research Studies Journal, 22(4), 215-240.

Aldholay, A. H., Isaac, O., Abdullah, Z., & Ramayah, T. (2018). The role of transformational leadership as a mediating variable in DeLone and McLean information system success model: The context of online learning usage in Yemen. Telematics and Informatics, 35(5), 1421-1437.

Carreiro, H., & Oliveira, T. (2019). Impact of transformational leadership on the diffusion of innovation in firms: Application to mobile cloud computing. Computers in Industry, 107, 104-113.

Zappalà, S., & Toscano, F. (2019). Transformational leadership and innovation adoption: Is there a moderation role of personal initiative and job control?. Psychologica, 119.

Zhang, Y., Zheng, J., & Darko, A. (2018). How does transformational leadership promote innovation in construction? The mediating role of innovation climate and the multilevel moderation role of project requirements. Sustainability, 10(5), 1506.

Studyspark

Study Document Study Document

Starbucks Use Of Wireless Technology

Pages: 2 (686 words) Sources: 5 Document Type:Term Paper Document #:87468045

… (Global Positioning System) in its Application to know the location of the customer on the basis of which it sends notification and music information to help select the customer their taste of music as this system provides accurate position, time and speed information through satellite.[footnoteRef:1] This has increased customer engagement and brand loyalty as the App offers other unique features too but the tracking of location ……

References

References

Brewin, B. (2001, Jan 08). Starbucks takes wireless leap. Computer World .

Greenemeier, L. (2014, June 24). Starbucks to Offer Wireless Caffeine for Smartphones. Scientific American .

How Household Names Use GIS. (2019, October 9). USC Dornsife.

Torrington, M. (2016, April 12). Starbucks: A Case Study in Effective Mobile App Marketing. Digital Turbine.

Wheeler, C. (2014). Going BIG with GIS. Esri User Conference.

Studyspark

Study Document Study Document

Walt Disney

Pages: 12 (3606 words) Sources: 1 Document Type:Case Study Document #:25870152

...Information systems Disney Studios and the Online Streaming Wars
1
Disney was at its best when it was not just Eisner but rather the triumvirate of Eisner, Wells and Katzenberg. The three complemented one another well, but individually and on their own they could not recreate the same magic. Thus, strategy formulation and implementation has to start with the question of who is calling the shots and making the decisions at Disney? Who is bringing the vision? What is the vision? This has to be clearly defined and it has to be directional. Once the direction is defined, the parenting strategy has to be defined: this is the “manner in which management coordinates activities, transfers resources, and cultivates capabilities among product lines and business units” (Wheelan, Hunger, Hoffman & Bamford, 2010, p. 5). The strategy has to focus on what the company is doing with its human capital. Intangible assets are human……

References

References

Wheelen, T. L., Hunger, J. D., Hoffman, A. N., & Bamford, C. E. (2010). Strategic management and business policy. Upper Saddle River, NJ: Prentice Hall.

Join thousands of other students and

"spark your studies".