Management Information Systems Essays (Examples)

Studyspark

Study Document Study Document

How To Use Employee Referrals To Increase Workforce But Still Be

Pages: 10 (3022 words) Sources: 5 Document Type:Research Paper Document #:50167640

… example, a referral who is a family member or friend of the referring source is less likely to have a great relationship with management at the organization and is more likely to leave the company at some point than is a referral who is simply part of … its approach to moderating the effect of self-interest in employee referrals. One proposition mentioned by Eisenhardt (1989) is that “when the principal has information to verify agent behavior, the agent is more likely to behave in the interests of the principal” (p. 60). This means, from an ……

References

Bibliography

Bussin, M., & Christos, D. (2018). Blind hiring not as crazy as it sounds. HR Future,  2018(Sep 2018), 36-39.

CBS News (2017). Retrieved from  http://www.cbsnews.com/videos/meet-bozoma-saint-john-the-woman-tasked-with-fixing-ubers-image/ " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Maslow S Hierarchy Of Needs Model And Its Application In Human Resources

Pages: 12 (3607 words) Sources: 9 Document Type:Research Paper Document #:83319615

… example, a referral who is a family member or friend of the referring source is less likely to have a great relationship with management at the organization and is more likely to leave the company at some point than is a referral who is simply part of … its approach to moderating the effect of self-interest in employee referrals. One proposition mentioned by Eisenhardt (1989) is that “when the principal has information to verify agent behavior, the agent is more likely to behave in the interests of the principal” (p. 60). This means, from an ……

References

Bibliography

Bussin, M., & Christos, D. (2018). Blind hiring not as crazy as it sounds. HR Future,  2018(Sep 2018), 36-39.

CBS News (2017). Retrieved from  http://www.cbsnews.com/videos/meet-bozoma-saint-john-the-woman-tasked-with-fixing-ubers-image/ " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Self Regulation Proposal

Pages: 6 (1825 words) Sources: 6 Document Type:Essay Document #:60406308

… standards and concepts that promote accountability and ethical leadership. Only in this way can self-regulation be effective.
In the light of existing regulatory systems failing to produce the desired outcomes, it is reasonable to accept that self-regulation is a viable alternative. The way it would work is … is not only a viable alternative to external regulation by third party agencies, it is also a necessary step towards the reduction and management of risk. Companies alone have the most access to records and numbers, to workers and actions that may need investigating: external regulators do … international stage. Third party regulators do not. Companies also have the means to monitor and regulate: RegTech has advanced to a point where information can be monitored, collected, analyzed and evaluated nearly instantaneously thanks to Big Data analytics. Finally, the company itself has the capacity to……

References

References

Arner, D. W., Barberis, J., & Buckey, R. P. (2016). FinTech, RegTech, and the reconceptualization of financial regulation. Nw. J. Int'l L. & Bus., 37, 371.

Arnone, M., & Padoan, P. C. (2008). Anti-money laundering by international institutions: a preliminary assessment. European Journal of Law and Economics, 26(3), 361-386.

Greene, E., & Odorski, C. (2015). SEC enforcement in the financial sector: addressing

Omarova, S. T. (2010). Rethinking the future of self-regulation in the financial industry. Brook. J. Int'l L., 35, 665.post-crisis criticism. Bus. L. Int'l, 16, 5.

Omarova, S. T. (2011). Wall street as community of fate: Toward financial industry self-regulation. University of Pennsylvania Law Review, 159(2), 411-492.

Pritchard, A. C. (2003). Self-regulation and securities markets. Regulation, 26, 32.

Studyspark

Study Document Study Document

Hurricane Katrina Military Response

Pages: 4 (1256 words) Sources: 3 Document Type:Essay Document #:19776713

… had not been trained for such a disaster either. A National Response Plan had not been developed nor was there a National Incident management System, which meant FEMA was not ready to act (Lewis, 2009; Select Bipartisan Committee to Investigate the Preparation for and Response to Hurricane ……

References

References

The Brookings Institution. (2007). 9/11, Katrina and the future of interagency disaster response. Retrieved from  https://www.brookings.edu/wp-content/uploads/2012/10/20070529.pdf 

E-PARCC Collaborative Governance Initiative. (2008). Collaboration Amid Crisis: The Department of Defense During Hurricane Katrina Teaching Note. Retrieved from  https://www.maxwell.syr.edu/uploadedFiles/parcc/eparcc/cases/Moynihan-%20Teaching%20Notes.pdf 

Lewis, D. E. (2009). Revisiting the administrative presidency: Policy, patronage, and agency competence. Presidential Studies Quarterly, 39(1), 60-73.

Philipps, D. (2017). Seven hard lessons responders to Harvey learned from Katrina. Retrieved from https://www.nytimes.com/2017/09/07/us/hurricane-harvey-katrina-federal-responders.html

Samaan, J. L., & Verneuil, L. (2009). Civil–Military Relations in Hurricane Katrina: a case study on crisis management in natural disaster response. Humanitarian Assistance: Improving US-European Cooperation, Center for Transatlantic Relations/Johns Hopkins University, Baltimore, MD/Global Public Policy Institute, Berlin, 413-432.

Select Bipartisan Committee to Investigate the Preparation for and Response to Hurricane Katrina. (2006). A failure of initiative. Retrieved from  http://govinfo.library.unt.edu/a257.g.akamaitech.net/7/257/2422/15feb20061230/www.gpoaccess.gov/katrinareport/mainreport.pdf 

Studyspark

Study Document Study Document

Israeli Security Methods In U S Airports

Pages: 3 (1023 words) Sources: 6 Document Type:Essay Document #:94329495

… is through the use of security…[break]…must go through. The fast pass is basically a digital pre-check in which the traveler uploads all the information that would be sought out by a security interviewer ahead of time in order to qualify for the pass. Once the pass is ……

References

References

Gaines, L. K., & Miller, R. L. (2013). Criminal justice in action. Nelson Education.

Haaretz & Reuters. (2017). U.S. Airport Security Is Becoming a Bit More Israeli Today –Here\\\\\\\\\\\\'s What You Need to Know. Retrieved from  https://www.haaretz.com/us-news/u-s-airport-security-rules-are-changing-today-here-s-what-you-need-to-know-1.5460568 

Hasisi, B., Margalioth, Y., & Orgad, L. (2012). Ethnic profiling in airport screening: Lessons from Israel, 1968–2010. American law and economics review, 14(2), 517-560.

Lowrey, A. (2010, January 8). Foreign policy: The costs of Israel level security [Opinion]. NPR. Retrieved from  https://www.npr.org/templates/story/story.php?storyId=122352039 

NBC. (2018). NYC-Area Airports Set Record for Passenger Traffic, Rank Among Worst in U.S. for On-Time Performance. Retrieved from  https://www.nbcnewyork.com/news/local/JFK-LaGuardia-Newark-Airports-Record-Passenger-Traffic-Worst-On-Time-Performance-475559363.html 

Zeff, M. (2017). 2016 record year for Israeli air traffic. Retrieved from  https://www.jpost.com/Business-and-Innovation/2016-record-year-for-Israeli-air-traffic-477180 

Studyspark

Study Document Study Document

Quality Improvement Plan

Pages: 8 (2259 words) Sources: 3 Document Type:Essay Document #:15328013

… inputs at scheduled times thus reducing the time taken to manufacture the goods. The right suppliers can be identified and contracted since the information is collated in one central location. With a centralized database of suppliers’ rogue suppliers can be identified and expunged from the database. This … is being used for input-measurement. Reducing this number will ensure that processes are working as expected and the results can be seen. Supplier management should also be incorporated. This will ensure the company reaps benefits from having a centralized supplier management system that holds all the key information regarding its suppliers. With……

References

References

Brown, C. (2019). Why and how to employ the SIPOC model. Journal of business continuity & emergency planning, 12(3), 198-210.

Carvalho, M. S., Magalhaes, D. S., Varela, M. L., Sa, J. O., & Gonçalves, I. (2016). Definition of a collaborative working model to the logistics area using design for Six Sigma. International Journal of Quality & Reliability Management, 33(4), 465-475.

Shojaie, A. A., Raissi, S., & Dogahe, R. A. (2016). Impact analysis of TQM\\\\\\'s hard aspects on sigma level in electronics and telecommunication production process. International Journal of Productivity and Quality Management, 18(4), 425-439.

 

Studyspark

Study Document Study Document

Individuals Using Customary Practices In Times Of Crises

Pages: 17 (4950 words) Sources: 30 Document Type:Annotated Bibliography Document #:60738961

… responses to them using case studies from Bangladesh, Kenya, Nepal, the Phillipines, and Saipan. The premise behind this paper is that early warning systems (EWSs) often fail in countries where social and cultural determinants prevail and because disaster risk reduction institutions (DRRs) misunderstsood how people perceive risks … were warned to prepare for earthquakes, floods, and volcanis eruptions. The authors provide evidence of 2 determinants limited the success of early warning systems: social and cultural. In Keyna, the EWS was said to fail because of social determinants because people mistrust authorities and there were problems … note that most of the resources highlighted in this annotation have primarily focused on the relevance of customary practices in crisis and disaster management. It is therefore clear that minimal effort has been put in attempts to unravel how culture could get in the way of effective … clear that minimal effort has……

References

Roberts. A.R. (Ed.). (2005). Crisis Intervention Handbook: Assessment, Treatment, and Research (3rd ed.). New York, NY: Oxford University Press.

Sama’ila, A. (2019). Economic crisis and the coping strategies of indigenous automobile entrepreneurs in northern Nigeria, 1983-2014. Sociology International Journal, 3(6), 437-442.

Studyspark

Study Document Study Document

Warehouse And Material Handling

Pages: 9 (2845 words) Sources: 13 Document Type:Research Proposal Document #:94857550

… Basically, the company will maintain direct control of the product up until the ownership is transmitted to the customer. What is more, the management of the organization will be able to safeguard and manage the goods as they please and in relation to their own standards (Voortman, … and will key role to the distribution system of the firm in terms of greater flexibility, decreased costs and also greater control and management. In my opinion, a warehouse location that facilitates ease in accessibility and also cost effectiveness. For this reason, I believe that Tangjong Pagar ……

References

References

Adler, D. (Ed.). (2007). Metric handbook. Routledge.

Alberto, P. (2000). The logistics of industrial location decisions: An application of the analytic hierarchy process methodology. International Journal of Logistics, 3(3), 273-289.

Bhatnagar, A. (2010). Textbook of supply chain management. New Delhi: Sanbun Publishers.

Buurman, J. (2002). Supply chain logistics management. New York: McGraw-Hill.

Heizer, J., & Render, B. (2006). Additional Problems: Principles of Operations Management/Operations Management. Prentice Hall.

Interlake. (2019). Warehouse layout design. Retrieved from:  https://www.interlakemecalux.com/warehouse-manual/warehouse-design/warehouse-layout 

Mulcahy, D. E., & Sydow, J. (2008). A supply chain logistics program for warehouse management. Auerbach Publications.

Radaev, A., & Leventsov, V. (2018). THE METHODOLOGY FOR SUBSTANTIATING THE MATERIALS HANDLING EQUIPMENT OF A UNIT LOAD WAREHOUSING SYSTEM. International Journal for Quality Research, 12(4).

Studyspark

Study Document Study Document

Data Security Using RFID Bands At Music Festivals

Pages: 5 (1616 words) Sources: 6 Document Type:Essay Document #:97930410

… is the new technological method for quick identification of the user, especially if used for public events like music festivals. It makes data management easier, so that information about the attendees is managed technically by capturing data from scanners and transmitting it to the computer without the user's physical contact. This … scanners and transmitting it to the computer without the user's physical contact. This paper is about managing adult attendees at music festivals whose information would be stored in RFID wrist bands linked to their Twitter, Facebook, and credit/debit bank cards. The following sections would probe into its … media activities with the attendees' check-in function, enabling the event's enhanced promotion value-added marketing potential.
Description of Five or More Types of Personal/Private information Data That Will Be Collected, Stored, Processed With the Use Case
The type of data collected and stored on the RFID wrist bands … the……

References

References

Event Tribe. (n.a.). The top 10 benefits of using RFID for events. Retrieved from  https://www.eventbrite.com/blog/academy/the-top-10-benefits-of-using-rfid-for-events/ 

ID&C. (n.a.). How to RFID wristbands work? Retrieved from  https://www.idcband.com/blog/how-do-rfid-wristbands-work/ 

Kacicki, T. (2019, July 15). 4 commonly overlooked facts about RFID wristbands. Intellitix. Retrieved from  https://intellitix.com/hub/four-commonly-overlooked-facts-rfid 

OECD. (2008). OECD policy guideline on RFID.  https://www.oecd.org/sti/ieconomy/40892347.pdf 

Quirk, R.E. & Borrello, S.J. (2005). RFID: Rapid deployment and regulatory challenges. Retrieved from  https://www.pharmamanufacturing.com/assets/Media/MediaManager/VenableRFIDpaper.pdf?SESSID=62935cf41f5a19909f5bb3ae3a598490 

Williamson, A., Tsay, L., Kateeb, I.A. & Burton, L. (2013). Solutions for RFID smart tagged card security vulnerabilities. AASRI Procedia, 4, 282-287. DOI: 10.1016/j.aasri.2013.10.042

Studyspark

Study Document Study Document

Clinical Informatics

Pages: 11 (3264 words) Sources: 12 Document Type:Essay Document #:78574553

Clinical Decision Support and Electronic Health Records
Introduction
information technology has revolutionized nearly every aspect of life, from how people recreate to how they work. This is no less true in the … how patient safety, the nursing role and electronic medical records are impacted.
Clinical Informatics Concepts in the 21st Century
Controlling the flow of information to promote efficiency, security, and safety is the number one priority of clinical informatics. 21st century concepts for how this can be accomplished … is the number one priority of clinical informatics. 21st century concepts for how this can be accomplished include training in how to find information, how to appraise information, and how to apply information. One common mistaken assumption among nurses is that having clinical informatics skills simply means to have computer literacy (Khezri & Abdekhoda, 2019). While … component, it is by no means the full concept of informatics. In……

References

References

Cho, O. M., Kim, H., Lee, Y. W., & Cho, I. (2016). Clinical alarms in intensive care units: Perceived obstacles of alarm management and alarm fatigue in nurses. Healthcare informatics research, 22(1), 46-53.

Effken, J., Weaver, C., Cochran, K., Androwich, I., & O’Brien, A. (2016). Toward a central repository for sharing nursing informatics’ best practices. CIN: Computers, Informatics, Nursing, 34(6), 245-246.

Elsayed, W. A., Hussein, F. M., & Othman, W. N. (2017). Relation between nursing informatics competency and nurses’ attitude toward evidence-based practice among qualified nurses at Mansoura Oncology Center. International Journal of Nursing Didactics, 7(6), 26-33.

Drolet, B. C., Marwaha, J. S., Hyatt, B., Blazar, P. E., & Lifchez, S. D. (2017). Electronic communication of protected health information: privacy, security, and HIPAA compliance. The Journal of hand surgery, 42(6), 411-416.

Haupeltshofer, A., Egerer, V., & Seeling, S. (2020). Promoting health literacy: What potential does nursing informatics offer to support older adults in the use of technology? A scoping review. Health Informatics Journal, 1460458220933417.

Kharbanda, E. O., Asche, S. E., Sinaiko, A. R., Ekstrom, H. L., Nordin, J. D., Sherwood, N. E., & O’Connor, P. (2018). Clinical decision support for recognition and management of hypertension: a randomized trial. Pediatrics, 141(2).

Khezri, H., & Abdekhoda, M. (2019). Assessing nurses’ informatics competency and identifying its related factors. Journal of Research in Nursing, 24(7), 529-538.

Kleib, M., & Nagle, L. (2018). Factors associated with Canadian nurses\\\\\\\\\\\\' informatics competency. CIN: Computers, Informatics, Nursing, 36(8), 406-415.

Join thousands of other students and

"spark your studies".