Management Information Systems Essays (Examples)

Studyspark

Study Document Study Document

Barriers That Prevent Implementation Of IoT Within Small Businesses

Pages: 18 (5252 words) Sources: 37 Document Type:Case Study Document #:25628514

… the IoT.
The use of the UTAUT model is also highly appropriate for the purposes of this study because individual acceptance levels of information technology (IT) have been a key focus of many of the studies concerning new technology implementations to date (Venkatesh, Thong & Xu, 2016). … and Wang (2018), “After the Internet and mobile communication network, the Internet of Things has become an important trend in the development of information technology, greatly promoting the reform of the information industry in the world” (p. 2386). The IoT can be conceptualized graphically as depicted in Figure 1 below.
Figure 1. Representative Internet of … the most important features of IoT applications include the fact that conventional mobile devices such as smartphones, various types of personal computers, video systems and other handheld devices as well as objects that have traditionally not been viewed as being amenable can be incorporation into……

References

References

Ahamed, J., & Rajan, A.V. (2016). Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 1-5.

Aishah, S., Sahandi, R., Prakoonwit, S., & Khan, W. (2019). Big data and IoT opportunities for small and medium-sized enterprises (SMEs). In Handbook of Research on Big data and the IoT. doi: 10.4018/978-1-5225-7432-3.ch005

An, N. & Wang, J. (2018, October). Research and practice on innovative methods of ideological and political education for college student. Educational Sciences Theory and Practice, 18(5), 2386-2391.

Banham, R. (2016, July-August). IoT complexity: As the Internet of Things expands, the risks-and questions of liability-become more complicated. Risk Management, 63(6), 39-44.

Bhardwaj, A., Subramanyam, G. V., Avasthi, V. & Sastry, H. (2016). Review of solutions for securing end user data over cloud applications. International Journal of Advanced Computer Research, 6(27), 2277-2291.

Bok, H. (2014, September). An empirical study on factors influencing Internet advertising effects. Advances in Management, 7(9), 6-9.

Business.com. (2018). Disaster preparedness for small businesses. Business.com, September 26. Retrieved from  https://www.business.com/articles/business-disaster-prep/ .

Cass, J. (2019). Internet of Things: What it is, how it works, examples and more. Just Creative. Retrieved from  https://justcreative.com/2018/11/19/internet-of-things-explained/ .

Studyspark

Study Document Study Document

Cyber Crime IT Security Auditing

Pages: 11 (3165 words) Sources: 7 Document Type:Research Paper Document #:36684821

… past, lost much to these crimes and, hence, must come up with plans to prevent such future occurrences. In this paper, the processes information technology security audits entail and how such audits enhance organizational IT security will be dealt with. According to research on the subject, IT … in the form of a methodical analysis by an outside specialist on compliance, for identifying any chinks in the armor of the company's information technology system.
Introduction
ICT advancements have meant the availability of vast quantities of data, which also creates considerable risks to the data itself, … system.
Introduction
ICT advancements have meant the availability of vast quantities of data, which also creates considerable risks to the data itself, computer systems, and critical infrastructures and operations it supports. Despite developments in information security, numerous information systems continue to display susceptibility to both external and internal breaches (Suduc, Bîzoi & Filip,……

References

References

Almatari, O. and Helal, I., and Mazen, S., and El Hennawy, S. (2018). \\\\\\"Cybersecurity Tools for IS Auditing.\\\\\\" The 6th International Conference on Enterprise Systems, At Limassol, Cyprus 10.1109/ES.2018.00040.

Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant\\\\\\'s handbook: Systems analysis and design. CRC press.

Diamantopoulou, V., Tsohou, A., & Karyda, M. (2019). From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security (pp. 238-257). Springer, Cham.

Khan, M. (2017). Computer security in the human life. International Journal of Computer Science and Engineering (IJCSE), 6(1), 35-42.

Lenghel, R. D., & Vlad, M. P. (2017). INFORMATION SYSTEMS AUDITING. Quaestus, (11), 178.

Manaseer, S., & Alawneh, A. (2019). ON CYBERSECURITY AUDITING AWARENESS: CASE OF INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR. International Journal of Computer Science and Information Security (IJCSIS), 17(7).

Suduc, A. M., Bîzoi, M., & Filip, F. G. (2010). Audit for information systems security. Informatica Economica, 14(1), 43.

Studyspark

Study Document Study Document

Cloud Computing And Cost Effectiveness

Pages: 5 (1591 words) Sources: 5 Document Type:Annotated Bibliography Document #:36737117


Annotated Bibliography
Carcary, M., Doherty, E., & Conway, G. (2015). The adoption of cloud computing by Irish SMEs- an exploratory study. Electronic Journal of information Systems Evaluation, 17(1), 3.
This article ascertains that the major reason why SMEs in Ireland adopt cloud computing is for cost-effectiveness. The study shows that … and also adaptability by enabling the entity to decrease its capacity.
Shankar, K. (2016). Effectiveness of Cloud Computing in Global Business. Journal of Applied management-Jidnyasa, 8(1), 66-73.
This article examines the efficacy of cloud computing in the operation of global business. Shankar demonstrated that one of the key aspects … cloud computing. Different from desktop computing, where hard disk crashes can result in the destruction and loss of the firm’s valuable data and information, the same does not apply in the cloud where data is stored effectively.
The cost-effectiveness of cloud computing is perceptible. Rather than purchasing … services that are metered……

References

References

Attaran, M. (2017). Cloud Computing Technology: Leveraging the Power of the Internet to Improve Business Performance. Journal of International Technology and Information Management, 26(1), 112 – 137.

Carcary, M., Doherty, E., & Conway, G. (2015). The adoption of cloud computing by Irish SMEs- an exploratory study. Electronic Journal of Information Systems Evaluation, 17(1), 3.

Elmonem, M. A. A., Nasr, E. S., & Geith, M. H. (2016). Benefits and challenges of cloud ERP systems–A systematic literature review. Future Computing and Informatics Journal, 1(1-2), 1-9.

Shankar, K. (2016). Effectiveness of Cloud Computing in Global Business. Journal of Applied Management-Jidnyasa, 8(1), 66-73.

Xue, C. T. S., & Xin, F. T. W. (2016). Benefits and challenges of the adoption of cloud computing in business. International Journal on Cloud Computing: Services and Architecture, 6(6), 01-15.

Studyspark

Study Document Study Document

Veteran Benefits Administration

Pages: 8 (2465 words) Sources: 3 Document Type:Implementation Paper Document #:56829115

… and compensation, rehabilitation and employment, loan guaranty, and insurance. In the year 2016, the National Archives and Records Administration (2016) released a records management inspection report which was categorical that “the VA Records management Program lacks several basic records management fundamentals.” The relevance of VA records cannot be overstated when it comes to veterans’ benefits government accountability. In that regard, therefore, it would … overstated when it comes to veterans’ benefits government accountability. In that regard, therefore, it would be prudent to implement a robust electronic records management system.
B: Fit for the Organization
It is important to note that “the mission of VBA, in partnership with VHA and NCA, is … The keeping of meaningful, proper, and accessible records happens to be in line with this mandate. However, in an assessment of VA’s records management conducted in the year 2016 by the National Archives and Records Administration (2016),……

References

References

Aziz, A.A., Mohammad Y., Mokhtar, U.A. & Ambari, D.I. (2017). Establishing Policy for the Implementation of Electronic Document and Records Management System in Public Sector in Malaysia: The Influencing Factors. Advanced Science Letters, 23(11), 10732-10736.

National Archives and Records Administration (2016). Department of Veterans Affairs Records Management Program: Records Management Inspection Report. Retrieved from  https://www.archives.gov/files/records-mgmt/pdf/va-2016-inspection.pdf 

U.S. Department of Veteran Affairs (2020). About VBA. Retrieved from  https://www.benefits.va.gov/BENEFITS/about.a sp

Studyspark

Study Document Study Document

Application Of Quality And Safety Concepts

Pages: 11 (3179 words) Sources: 8 Document Type:Case Study Document #:72132391

… Even with the above challenges, mistakes and inefficiencies persist within the healthcare domain owing to the low-key technology utilized by the sector for management. Most healthcare systems across the globe continue to stick to a pen-and-paper system, including those in developed nations such as America. This is an obstacle on … is also an increase in litigation and administrative costs on account of such mistakes and inefficiencies (Amit, 2019). Of particular concern is: patient information exchange when patients are shifted between departments or hospitals. Conventionally-performed record sharing of patients is ineffective and time-consuming, as well as puts patient … and time-consuming, as well as puts patient data in jeopardy (i.e., risk of data leaks and loss of confidentiality/ privacy). Inefficient or partial information interchange may be highly dangerous if the patient requires complex or emergency treatment.
Hence, this paper holds that the sole means of addressing … Quality Improvement)……

References

Bibliography

Alotaibi, Y. K., & Federico, F. (2017). The impact of health information technology on patient safety. Saudi Med J, 38(12), 1173–1180.

Amit, M. (2019, January 28). 5 Problems Which Healthcare Technology Can Solve for a Healthier World. Retrieved from Net Solutions:  https://www.netsolutions.com/insights/5-healthcare-problems-which-digital-technologies-can-solve-for-a-fit-and-healthy-world/ 

DeSanctis, G., & Poole, M. S. (1994). Capturing the Complexity in Advanced Technology Use: Adaptive Structuration Theory. Organization Science, 5(2), 121-147.

Feldman, S. S., Buchalter, S., & Hayes, L. W. (2018). Health Information Technology in Healthcare Quality and Patient Safety: Literature Review. JMIR Med Inform, 6(2).

Halamka, J., Mandl, K., & Tang, P. (2008). Early Experiences with Personal Health Records. Journal of the American Medical Informatics Association, 15(1), 1-7.

IOM. (1999). To Err is Human: Building a Safer Health System. National Academy of Sciences.

Singh, H., & Sittig, D. (2016). Measuring and improving patient safety through health information technology: The Health IT Safety Framework. BMJ Quality & Safety, 25, 226-232.

Weigel, F., Hall, D. J., & Landrum, W. H. (2009). Human/Technology Adaptation Fit Theory for Healthcare. SAIS 2009 Proceedings.

Studyspark

Study Document Study Document

DNP Essentials Outline For A Capstone Project

Pages: 3 (499 words) Document Type:Essay Document #:28791726

Section Seven: Implications and LimitationsImplications to Practice/Policy Changes· The project seeks to promote changes in nursing practice with regards to pain management and improving communication of pain medication schedule in the postpartum setting.Essential I: Scientific Underpinnings· Kristen Swanson’s Theory of Caring.· Relationship-based Care model.· Changing … to relationship-based care.· Application of the five processes of care described in Swanson’s Theory of Caring in the postpartum setting.· Promoting effective pain management nursing practice through the five process of care to help enhance patient outcomes.Essential II: Organizational and Systems Leadership· Development of clinical practice guidelines with regards to pain management in the postpartum setting.· Promoting the use of evidence-based interventions in pain management in the postpartum setting.· Through this project, evidence-based practice will become the basis of nursing practice in the postpartum setting and enhancing patient … feedback from the IRB.· The implication for practice is enhancing the development of a plan……

Studyspark

Study Document Study Document

Nike S Colin Kaepernick Ad Campaign

Pages: 7 (2187 words) Sources: 6 Document Type:Research Paper Document #:13776078

… and financial analysis before addressing the strategic issue. Alternatives are also discussed along with a recommendation and an implementation plan. Before beginning, background information on Nike is provided here below.
Company Vision/Mission
Nike’s Vision is to “to bring inspiration and innovation to every athlete in the world.” Its mission … Buyers have a handful of brands to choose from.
Bargaining Power of Buyer Threats
· The Internet has allowed buyers to have more information about products than ever before. Influencers on social media have a big impact on who makes purchases according to Freberg, Graham, McGaughey and ……

References

References

About Nike. (2020). Retrieved from  https://about.nike.com/ 

Bartash, J. (2020). Apple’s Covid-19 warning. Retrieved from  https://www.marketwatch.com/story/how-much-will-covid-19-hurt-the-us-economy-its-anyones-guess-right-now-2020-02-12 

Delventhal, S. (2019). Nike facing challenging dynamics. Retrieved from  https://www.investopedia.com/news/nike-facing-challenging-dynamics-goldman-sachs/ 

Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.

Neikirk, T. (2019). Nike sales are again way up. Retrieved from  https://hillreporter.com/nike-sales-are-again-way-up-following-conservative-boycott-40033 

Nusser, S., Mahle, I., & Pätzmann, J. U. (2015). How Social Commerce Communication can support Brand Loyalty: An Analysis of Nike‘s Efforts in Facebook Community Management. Markenbrand, (4/2015), 48-57.

Oyedele, A. (2018). Nike surges. Retrieved from  https://markets.businessinsider.com/news/stocks/nike-earnings-q4-2018-2018-6-1027328545 

Storey, G. (2019). Nike and the importance of meaningful brand values. Retrieved from  https://polpeo.com/nike-and-the-importance-of-meaningful-brand-values/

Studyspark

Study Document Study Document

Virtual Learning Solutions For English As Second Language Students

Pages: 11 (3230 words) Sources: 10 Document Type:Research Paper Document #:70086670

… to learn to swim. In the digital era, digital natives have been using technology since birth and it is older teachers and educational systems that are slow to recognize this fact. This paper will show how technology enhances ESL students' learning experience related to ESL instructional practices … the visual, aural, and spatial dimensions lacking in the lean channels that are commonly used today” (Kahai et al., 2007, p. 61). Virtual systems can help learners by giving them more opportunities to collaborate with others, learn from people who are peers as opposed to just learning ……

References

References

Alvarez-Marinelli, H., Blanco, M., Lara-Alecio, R., Irby, B. J., Tong, F., Stanley, K., & Fan, Y. (2016). Computer assisted English language learning in Costa Rican elementary schools: an experimental study. Computer Assisted Language Learning, 29(1), 103-126.

Beetham, H., & Sharpe, R. (Eds.). (2013). Rethinking pedagogy for a digital age: Designing for 21st century learning. NY: Routledge.

Cassady, J. C., Smith, L. L., & Thomas, C. L. (2017). Supporting emergent literacy for English language learners with computer?assisted instruction. Journal of Research in Reading.

Jiang, H., Tang, M., Peng, X., & Liu, X. (2018). Learning design and technology through social networks for high school students in China. International Journal of Technology and Design Education, 28(1), 189-206.

Kahai, S. S., Carroll, E., & Jestice, R. (2007). Team collaboration in virtual worlds. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 38(4), 61-68.

Kasapo?lu-Akyol, P. (2010). Using educational technology tools to improve language and communication skills of ESL students. Novitas-Royal, 4(2).

Meskill, G., & Mossop, J. (2003). Technologies use with learners of ESL in New Your State: Preliminary report. Retrieved from  https://www.albany.edu/lap/Papers/technology%20use.htm 

Park, J. Y. (2011). Design education online: Learning delivery and evaluation. International Journal of Art & Design Education, 30(2), 176-187.

Studyspark

Study Document Study Document

Advantages And Disadvantages Of Interrelationships Between Organizational

Pages: 16 (4728 words) Sources: 28 Document Type:Essay Document #:81594345

… to manage six different human resources or accounting operations, instead of a single, centralized operation. This implies that there is repetition of functions, systems of management, development of policies and others (Daft, 2015).
Matrix Organizational Structure
The matrix organizational structure facilitates flexibility. An organization utilizing a matrix structure within … by the government, the ultimate decision making undertaken by Air India is not only formalized but also centralized and the highest level of management reports to the Ministry of Civil Aviation.
Situated at the Safdarjung Airport in the city of New Delhi, the responsibility of the Ministry … (Civil Aviation, 2019).
The complexities of Air India’s business structure significantly impact the company’s organizational functions. It is imperative to note that the management of Air India Limited has been entirely Indian, both before and after the merger. The inference of this is that the company should … interacted with one……

References

References

Air India. (2019). Board of Directors. Retrieved from:  http://www.airindia.in/board-of-directors.htm 

Aquinas, P. G. (2008). Organization structure and design. India: Excel Books India.

Burns, T., & Stalker, G. M. (2005). Mechanistic and organic systems. Organizational Behavior, 2, 214-25.

Choo, S., & Bowley, C. (2007). Emerald Article: Using training and development to affect job satisfaction. Journal of Small Business and Enterprise Development, 14(2),339 - 352.

Cichocki, P., & Irwin, C. (2014). Organization design: A guide to building effective organizations. Kogan Page Publishers.

Civil Aviation. (2019). About Us: Organizational Setup. Retrieved from:  http://www.civilaviation.gov.in/en/aboutus/orgsetup 

Cunliffe, A. L. (2008). Organization theory. New York: Sage.

Cunliffe, A. L., & Luhman, J. T. (2012). Key concepts in organization theory. New York: Sage.

Studyspark

Study Document Study Document

Aging Workforce

Pages: 10 (3030 words) Sources: 9 Document Type:Research Paper Document #:49724192

… workplace
Introduction
The workforce is aging in the 21st century (Heggeness, Carter-Johnson, Schaffer, & Rockey, 2016). An aging workforce presents certain challenges for management in today’s workplace. Not only does it mean that the workplace will consist of multiple generations of workers, each with their own strengths … with having an aging workforce. Most of these risks can easily be addressed and require simply a little accommodation on the part of management.
To prevent issues like ageism from rearing up, however, managers should discuss the importance of diversity and inclusivity in the workplace. Just because … (Truxillo et al., 2015). Cognitive changes can be result in challenges related to fluid intelligence—i.e., age-related alterations in the person’s ability to process information, rely upon memory or focus and pay attention during a task. Crystallized intelligence presents another cognitive change and refers to the person’s ability … see the value in staying……

References

References

Burtless, G., & Quinn, J. F. (2002). Is working longer the answer for an aging workforce? Working Papers in Economics, 82.

Ciutiene, R., & Railaite, R. (2015). Age management as a means of reducing the challenges of workforce aging. Engineering Economics, 26(4), 391-397.

Heggeness, M. L., Carter-Johnson, F., Schaffer, W. T., & Rockey, S. J. (2016). Policy implications of aging in the NIH-funded workforce. Cell Stem Cell, 19(1), 15-18.

Koh, T. Y., Rowlinson, S., & Pollock, S. (2019). Dealing with Ageing Workforce in the Hong Kong Construction Industry: an Initial Exploration. Proceedings of the Creative Construction Conference (2019) 091

Lassila, S. (2019). Managing Risks of an Aging Workforce. Construction Executive, 2020. Retrieved from  https://constructionexec.com/article/managing-risks-of-an-aging-workforce 

Perry, L. S. (2010). Designing the workplace for the aging workforce. White paper, Zurich in North America, Retrieved December, 20, 2010.

Schwartz, J., Monahan, K., Hatfield, S. & Anderson, S. (2018). No time to retire redesigning work for our aging workforce. Deloitte.

Streb, C. K., Voelpel, S. C., & Leibold, M. (2008). Managing the aging workforce:: Status quo and implications for the advancement of theory and practice. European management journal, 26(1), 1-10.

Join thousands of other students and

"spark your studies".