Information Technology Essays (Examples)

1000+ documents containing “information technology”.

In the early days of information technology, some of the industry’s leading professionals were self-taught people who mastered computers as they became increasingly common in the modern workforce. Today’s information technology profess

View More...
Sort By:
By Keywords
Reset Filters

Example Essays

Essay
Information Technology Change Management in Home Health
Pages: 5 Words: 1391

Information Technology Change Management in Home Health Care
I hope enjoyed time holidays. Now back work . In team task week, a topic weekly focus debate paper labor unions change process. There sufficient information argue sides. Let . See: The labor union change process difficult employees management; I labor union make process a bit easier parties.

Implementing Information Technology Change in a Health Care Facility

There is a shift from the traditional institutionalized health care provision to home-based care provision. The shift comes amid increasing cases of chronic and terminal diseases that require constant monitoring and timely diagnosis for quick recovery. In the health care arena, the need to uphold quality of care to patients and their immediate family members is paramount. This need can fail to be met if the global advancements in management system that facilitate service delivery are not embraced. The potential to improve home health care lies in the…...

mla

References

Bridges, W. (2003). Managing Transitions: Making the Most of Change. 2nd ed. Cambridge: Perseus Publishing.

Cohen D. (2005). The Heart of Change Field Guide: Tools and Tactics for Leading Change in Your Organization. Boston: Harvard Business School Press.

Kotter, J.C.D. (2002). The Heart of Change: Real Life Stories of How People Change Their Organization. Boston: Harvard Business School Press.

Essay
Information Technology a Home Network
Pages: 4 Words: 1182

Processing examples are conversion of encoded or typed words to printable format or running of computer programs such as the Statistical Package for Social Sciences (SPSS). Lastly, controlling ensures that all other four operations of the computer are efficiently working together, while at the same time, ensuring also that each operation does not interfere with the other operations. Examples of control measures in the computer are warnings or prompts that pop up whenever an operation is detected to overlap with another operation and the System Task Manager to monitor the activities and determine the speed and efficiency of processing within the computer.
4. Ergonomics is the science wherein technical fields such as engineering and industrial design are used to develop ideas, devices, and solutions that are suitable to the working conditions of the user. In the field of information technology and computer-mediated jobs, ergonomics is critical because it ensures that…...

Essay
Information Technology Acts What Were the Advances
Pages: 2 Words: 660

Information Technology Acts
What were the advances in information technology that resulted in new ethical issues necessitating the creation of each act?

One of the common challenges that most regulations will face is keeping up with the changes in the technology. As the law, is designed to provide everyone with some kind of protection against potential abuse. However, improvements in technology have transformed the way that everyone is living their daily lives. This is when the laws must be updated to reflect these advancements. In some cases, this involves taking existing regulations and addressing specific issues. While at other times, this requires implementing new guidelines that will address specific moral and ethical issues. Two such regulations are: the Fair Credit eporting Act of 1970 and the Do Not Call Implementation Act of 2003.

Fair Credit eporting Act of 1970

The Fair Credit eporting Act of 1970 was implemented to address the large amounts of…...

mla

References

Do Not Call List. (2012). FTC. Retrieved from:  http://www.fcc.gov/encyclopedia/do-not-call-list 

The Fair Credit Reporting Act. (2004). FTC. Retrieved from:  http://www.ftc.gov/os/statutes/031224fcra.pdf 

Pursuant to Do Not Call Implementation Act. (2005). FTC. Retrieved from:

 http://www.ftc.gov/os/2003/09/dnciareport.pdf

Essay
Information Technology and Its Uses
Pages: 22 Words: 5994

Nanotechnology attempted to show the potential of this new technology and included the wide range of fields that are connected to the concept of the nanometer scale. These include machining, imaging, metrology or measurement, micromachines, instrumentation and machine tools, scanning probe microscopy, fabrication of components, nanoelectronics, molecular engineering, among others. (Journal Review: Nanotechnology)
Another important step in the development of this technology in both a practical and theoretical sense was the development of " bottoms up" programs and research initiatives. As noted above, the 'bottoms up' approach is considered to be the area where the greatest potential for nanotechnology applications exist. In 1991 Japan's Science and Technology Agency began instituted a "bottom-up" approach, in which "...very small structures are built up from molecular components using, for example, scanning probe microscopes. "(Nanotechnology Race: MITI Adopts 'Bottom-Up' Strategy_)

Since the 1990s there have been an increasing number of developments that have contributed to…...

mla

Works Cited

Ant n, Philip S., Richard Silberglitt, and James Schneider. The Global Technology Revolution: Bio/Nano/Materials Trends and Their Synergies with Information Technology by 2015. Santa Monica, CA: Rand, 2001. Questia. 7 Aug. 2008  http://www.questia.com/PM.qst?a=o&d=103975612 .

History of Information Technology and Systems. 7 Aug. 2008.  http://www.tcf.ua.edu/AZ/ITHistoryOutline.htm 

Short History of Nanotechnology. 7 Aug. 2008.  http://www.foresight.org/nano/history.html 

Coates, Joseph F., John B. Mahaffie, and Andy Hines. "The Promise of Genetics." The Futurist Sept.-Oct. 1997: 18+. Questia. 7 Aug. 2008  http://www.questia.com/PM.qst?a=o&d=5000547737 .

Essay
Information Technology to Transform a
Pages: 6 Words: 2228

And this money is required to be raised from the market as the company does not generate this amount of revenue either from profits or from internal accruals. (DeHayes, 2003)
5. What should Tim do now?

After taking into account all the known and understood pros and cons, there are some points on which Tim has to take action. These are (i) the manner in which to raise capital needed either through fresh issue of shares or depend on Venture Capital -- VC funding. In case his project is a runaway success, he will definitely get more doses of VC funding, however any failure will ruin him. He has to use a number of channel partners like sales forces, territory wise, and websites to sell the software to various customers. (DeHayes, 2003)

6. Prepare the presentation Tim should make to the board.

A i) Ladies and Gentlemen, I take this opportunity to present…...

mla

Reference

Auditel Inc. (2003) "Telecom Expense Management Training -Phase III" Retrieved 4 May, 2007 at  http://www.auditelinc.com/Telecommunications_Training_Phase_III.aspx 

Bennett, Elizabeth. (2006, Aug) "Taming the Wireless Beast." Baseline. Retrieved 4 May, 2007 at http://www.rivermine.com/articles/Baseline_Sodexho_article.pdf

Cass Information Systems Inc. (2007) "Telecom Expense Mgt" Retrieved 4 May, 2007 at  http://www.cassinfo.com/casstelecom/expensemgmt.html 

DeHayes, Daniel W. (2003) "Teletron, Inc.: Using Information Technology to transform a company" Case Study.

Essay
Information Technology's Impact on Quality
Pages: 12 Words: 3529

The need for continually creating and updating the security techniques and technologies involved in an enterprise system is the ethical responsibility of the IT professional.
In order to successfully protect the information and intellectual property assets of a firm, an IT professional also needs to make a personal commitment to stay as current as possible on existing and future technologies (Pemberton, 1998). This commitment needs to be supported by the leaders of an IT organization within a firm, complete with budgets created to pay for ongoing certification and training. The continual pursuit of professional competence is an ethical requirement of any IT professional and any leader of an IT function must continually focus on how to create a culture that embraces learning and change (Gotterbarn, 1999). From an ethical standards standpoint, lifetime learning is not an option, it's a requirements. As knowledge is the precursor to behavior, IT professionals need…...

mla

References

Butcher, M.. (2009). At the foundations of information justice. Ethics and Information Technology, 11(1), 57-69.

Christina Cary, H Joseph Wen, & Pruthikrai Mahatanankoon. (2003). Data mining: Consumer privacy, ethical policy, and systems development practices. Human Systems Management, 22(4), 157-168.

Timothy Paul Cronan, Lori N.K. Leonard, & Jennifer Kreie. (2005). An Empirical Validation of Perceived Importance and Behavior Intention in IT Ethics. Journal of Business Ethics, 56(3), 231-238.

Dillon, R.. (2010). Respect for persons, identity, and information technology. Ethics and Information Technology, 12(1), 17-28.

Essay
Information Technology Is a Constantly
Pages: 2 Words: 653

In the nursing field, there is becoming a concept such as the digital divide among nurses. Even though many nurses are familiar with the Internet and access it on a daily basis, there are some nurses who are familiar with other emerging technologies as it pertains to nursing and there are some nurses who feel that navigating the Internet is the only technology they need to know (Lupianez-Villanueva et al., 2011).
There is more that needs to be done in order to bring all nurses up to a speed where they are competent and comfortable using information technology. Information technology must become a mandatory part of nursing curriculum in colleges and universities nationwide. There is a known shortage of workers in this field and the shortage will continue to grow if there is a growing reluctance to learn new technologies. As more and more newly educated nurses are entering the…...

mla

References

Fetter, M.S. (2009). Baccalaureate nursing students' information technology competence -- Agency perspectives. Journal of Professional Nursing, 25(1), 42-49.

Lupianez-Villanueva, F., Hardy, M., Torrent, J. And Ficapal, P. (2011). The integration of information and communication technology into nursing. International Journal of Medical Informatics, 80(2), 133-140.

Essay
Information Technology One of the Main Sources
Pages: 4 Words: 1522

Information Technology
One of the main sources of development of human beings is through the development of knowledge and in this exercise; we shall be talking about a group in our society who are mainly interested in the development of knowledge -- a university. In these organizations also, information technology now plays an important role as the storage and transfer of knowledge within the organizations and from outside the organization. In this, information technology has to play a major role.

In earlier times, it was felt that knowledge had to be accumulated over a lifetime, and this consisted of facts, events, procedures and other matters. This was stored in our memories, while today a lot of the storage takes place in the memory disks of computers whose capacity keeps increasing and it is the job of the information technology specialist who has to advise us on where the information is to be…...

mla

REFERENCES

Abdullah, Mohd Syazwan; Benest, Ian; Evans, Andy; Kimble, Chris. "Knowledge Modeling

Techniques for Developing Knowledge Management Systems" Retrieved from www.cs.york.ac.uk/mis/docs/ECKM2002.pdf Accessed 12 November, 2005

Carvalho, Rodrigo Baroni de; Ferreira, Marta Araujo Tavares. (October 2001) "Using

information technology to support knowledge conversion processes" Information Research. Vol. 7; No. 1. Retrieved from   Accessed 12 November, 2005http://informationr.net/ir/7-1/paper118.html 

Essay
Information Technology an Effective Project
Pages: 6 Words: 1908

It is possible to avoid becoming a victim of such crimes through some basic precautionary methods. Firstly, it is essential to store or discard personal information in a careful manner. This means personal documents should not be left lying around or shared through internet. All personal information should be stored in a secure place. All sorts of old receipts, expired cards, bank statements and checks should be disposed of in an appropriate manner so that nobody can glean any sort of information by rummaging through the trash. (United States Department of Justice, 2010); (Vacca, 2002); (June, 2000)
Secondly, one must be very careful about divulging personal identifying information like Social Security Number to people through the Internet or telephone. Persons impersonating bank officials may ask for essential information like passwords or account information using which identity theft can be done. Third, billing cycles must be constantly checked. In case bills…...

mla

References

Baschab, John; Piot, Jon; Carr, Nicholas. (2007) "Executive's Guide to Information

Technology." Wiley.

Beard, Jon W. (1996) "Impression management and information technology."

Praeger.

Essay
Information Technology Aligning MIS Goals
Pages: 3 Words: 895

For example, it is no longer advisable to use a paper-based payroll, as apart from being more likely to become subject to fraud, it is an environmental hazard. Imagine the filing needs for a payroll for 100 people in one year only. Also, there's the consideration that almost everyone has and uses email. Electronic mail enables immediate correspondence between separate entities and quicker responses to urgent matters.
More than this, integrating IT into strategic planning provides consistency in quality and ability to create a system of resource-based theories (RT). According to a study by Mario Caldeira, Paul Cragg and John Ward on Information System Competencies in Small and Medium-Sized Enterprises: "Resource-based theory (RT) has been developed to explain how organizations can achieve competitive advantage. This theory focuses on the idea of costly-to-copy attributes of the firm as an essential way to achieve superior performance. According to resource-based theory, resources that…...

mla

Bibliography:

Caldeira, Mario; Cragg, Paul and Ward, John. "Information System Competencies in Small and Medium-Sized Enterprises" Retrieved November 13, 2006 from www.som.cranfield.ac.uk/som/research/documents/Paper_UKAIS_Final.pdf

Essay
Information Technology the Reference Company Is the
Pages: 5 Words: 1633

Information Technology
The reference company is the oil giant Chevron. Because there is a growing demand for the development of Internet, intranet, and extranet business-to-business (B2B) transaction capabilities, the Stamford, Connecticut -- based Gartner Group predicts that by the year 2004 more than 50% of all enterprises will use the Internet for more than 80% of their external procurement activities. Meanwhile, almost every company offering products and/or services has developed or is developing Web sites ranging from information-only sites, known in the industry as "brochureware," to sophisticated Web-commerce sites where customers can select and purchase products ranging from music CDs to automobiles.

To make the transition to a successful E-commerce operation, nearly two-thirds (61%) of the 250 IT executives surveyed by Information Week esearch say E-business has prompted the reengineering of the IT department. And about three-fifths (59%) say business processes and functions had to be reengineered. Most affected were technological skill…...

mla

References

Earl, Michael J. Information Management: The Organizational Dimension. Oxford University Press, 1998.

Jan Van Den Ende, Nachoem Wijnberg; The Organization of Innovation in the Presence of Networks and Bandwagons in the New Economy. International Studies of Management & Organization, Vol. 31, 2001.

Essay
Information Technology IT CSR Strategic Corporate the
Pages: 6 Words: 1952

Information Technology (IT) CS
Strategic Corporate

The modern day businesses are more globalized based on which economic and corporate concerns have given rise to the concept of corporate social responsibility. The new economy has had a great effect on the knowledge that the stakeholders now have. One of the main aims of corporate social responsibility is that corporations being an important part of the society and communities must address various environmental and societal concerns. Based on this, many companies by the help of implementing CS have worked on the importance and implementation of human rights, environmental standards, as well as labor. Here it needs to be added that the corporate social responsibility extends outside the doors of an organization into the communities and societies in which the organization operates. The boundaries of corporate social responsibility of the organization involves not only the employees and workers of the organizations but the stakeholders, suppliers,…...

mla

References

Bueble, E. (2009). Corporate Social Responsibility: CSR Communication as an Instrument to Consumer-Relationship Marketing. GRIN Verlag.

Editors of Bottletree Books LLC. (2007). Facebook Fanatic: Explode Your Popularity, Secure Your Privacy and Buzz Your Band on Facebook. Bottletree Books LLC.

Horrigan, B. (2010). Corporate social responsibility in the 21st century: debates, models and practices across government, law and business. Edward Elgar Publishing.

Satava, M.R., Gaspari, A., and Lorenzo, D.N. (2007). Emerging Technologies in Surgery. Springer.

Essay
Information Technology Acts the Advancement of Information
Pages: 3 Words: 1084

Information Technology Acts
The advancement of information technology has generally been considered to be a good thing, but there are also problems that have been created by it. Some of these have to do with the lack of privacy, and others have to do with the protection of the most vulnerable members of society. Two acts will be discussed here: the Children's Internet Protection Act of 2000 and the Telephone Consumer Protection Act (TCPA) of 1991. In both cases, the advancement of information technology created ethical issues that led to the need for the acts. When individuals and companies work to create new technology, it seems as though they often do not spend much time thinking about the possible ramifications of that technology. In some cases the technological advances are used in ways that were not expected, so the ramifications could not have been realistically seen or envisioned at the time…...

mla

References

Biggerstaff, R.R. (2001). State Courts and the Telephone Consumer Protection Act of 1991: must States Opt-in? Can States Opt-out? 33 Conn. L. Rev. 407.

McClure, C.R. & Jaeger, P.T. (2009). Public Libraries and Internet Service Roles: Measuring and Maximizing Internet Services. New York: ALA Editions.

Sorkin, D.E. (1997). Unsolicited Commercial E-Mail and the Telephone Consumer Protection Act of 1991, 45 Buffalo L. Rev. 1001.

Essay
Information Technology Acts While Information Technology Today
Pages: 2 Words: 657

Information Technology Acts
While information technology today has many distinct advantages, it is also important to acknowledge that there are some specific potential drawbacks. These drawbacks relate especially to the right to privacy of people making use of information technology. Users of Internet subscription services, for example, expect certain privacy rights in terms of the contact and personal information they choose to divulge. At the same time, large institutions like learning establishments and health insurance companies are required to provide their clients with a certain level of privacy assurance. For this reason, certain technological advances have required a revision of legislation to ensure that the privacy of citizens is protected. Two such pieces of legislation include The Family Education ights And Privacy Act (FEPA) of 1974 and the Health Insurance Portability and Accountability Act (HIPAA) of 1996.

FEPA

The Family Education ights and Privacy Act of 1974 was passed to address the right…...

mla

References

Gilland, A.T. (2011, Jan). Balancing between two goods: Health Insurance Portability and Accountability Act and ethical compliancy considerations for privacy-sensitive materials in health sciences archival and historical special collections. Journal of Medical Library Association, Vol. 99 No. 1. Retrieved from:  http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3016646/ 

Shiley, C.S. (2003, Jun). Putting the Rights into the Family Education Rights and Privacy Act: Enforcement and the Private Right of Action. Retrieved from: http://www.mit.edu/people/cshiley/Thesis/DANCE-DANCE-FERPA.pdf

Essay
Information Technology -- Annotated Bibliography Information Technology
Pages: 4 Words: 1128

Information echnology -- Annotated Bibliography
Information echnology

Baker, N. (2011). he Borderless Enterprise. Internal Auditor, August, 28 -- 33.

his article endeavors to explain the various trends in digital media. he author contends the use of digital technology is evidence of a deeper trend and shift in global culture. he article is as philosophical as it is technical. his article could be considered a technical article or a philosophy of technology article.

Durkee, D. (2010). Why Cloud Computing Will Never Be Free. Communication of the ACM, 53(5), 62 -- 70.

his author intends to prepare readers about the revolutionary changing in the market because of cloud computing. he article could be intended for both beginners and experts in cloud computing. he author describes the fundamental characteristics of clouds and cloud computing. he author describes models and strategies regarding marketing and pricing of cloud computing. he author does a thorough job of providing context and background…...

mla

The article describes a different sort of flood that is occurring in Thailand. The flooding is of data. The article describes the data floods in Thailand as well as the strategies handling data floods. This article is intended for CIOs as well as those who work closely with CIOs and even those who hire CIOs. The tone of this article is that of prevention and to learn from the examples of what is happening in Thailand.

Shankar, R. (2011). Securing the Cloud. Silicon India, January, 34 -- 36.

This author proclaims that no cloud can ever be fully secure, yet there are measures that can be taken to secure clouds. He puts the responsibility of securing clouds to the SMB owners. This author, like other authors, prescribes some actions, but mainly recommends a change in mind-set or perspective when considering security threats as well as their solutions.

Q/A
Can you help me with an essay outline on due diligence related to deal making?
Words: 474

Due diligence refers to the process of doing a proper investigation into something before taking an action.  Due diligence can have applications in a number of different contexts, but is most often discussed in the context of some type of business deal, when a person or organization has to make a decision about whether or not to enter into some type of business relationship (usually an investment relationship) with another type of person or organization.  Due diligence can be as simple as studying publicly available information to determine whether or not to purchase a stock....

Q/A
Can you help me with some resources and bibliography for essay on assisted living?
Words: 593

Example Bibliography for an essay on assisted living.

Writing about assisted living facilities can be challenging, because many of the sources that you will find online will be advertising for assisted living, rather than factual and informative pieces.  An assisted living facility is a housing facility for people who cannot or choose not to live independently.  They can range from facilities where there is a minimum amount of help to full-care nursing facilities.  In fact, many facilities offer a range of housing options, which are adaptable as a person’s ability to live independently....

Q/A
I need help with how do people in developing countries (rural area) achieve economic change through smart phones?
Words: 345

Smart phones and other mobile technology have the potential to be real game changers in terms of economic development in developing countries.  Prior to the advent of mobile technology, developing countries were limited in economic development because they lacked the infrastructure to hasten that development.  However, with information technology and mobile connectivity increasing, economic development can occur in areas that are otherwise isolated because of a lack of developed infrastructure.  In addition, while economic development is a definite bonus of these technologies, there are some concerns about how they impact communities on....

Q/A
need an example essay to help me write mine, in which you discuss the different forms of generic, transferable, core or key attributes that will address the skills gap that currently resides in south African supply chain industry?
Words: 622

Below is an example essay to help give you ideas when writing your own paper.

Title: Bridging the Skills Gap in the South African Supply Chain Industry

Introduction:
In today's rapidly evolving global economy, the supply chain industry plays a vital role in ensuring the efficient flow of goods and services. However, South Africa's supply chain sector faces a significant skills gap, hindering its growth and competitiveness. To address this challenge, it is essential to identify and cultivate generic, transferable, core, or key attributes that can bridge this gap effectively. This essay will discuss the different forms of such attributes....

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now