• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

University Degree: Information Systems

Browse by

Currently browsing by:

Meet our team of inspirational teachers

find out about the team

Get help from 80+ teachers and hundreds of thousands of student written documents

  1. 1
  2. 2
  1. Website Design. This is a Texans Credit Union online website. It has recently been upgraded and allows the user to perform banking related functionality. Our area of focus for this project is the self service section of the website.

    Wire transferring funds to another bank account at another institution. Problems/Ideas: 1. Once a user is logged in additional activities shouldn't require resubmitting known information. For example when purchasing a CD the Texans Online System asks the user to submit the member name, member number, drivers license number etc... 2. Tax information should be displayable online and not just mailed to home address. 3. When ordering a Certificate of Deposit display the current rates offered to the customer. 4.

    • Word count: 3630
  2. The purpose of this paper is to provide an analysis of Cisco Systems primary business strategies and its utilization of information technologies to achieve a competitive advantage in the network equipment industry.

    The paper concludes with a final analysis of the success of Cisco Systems, including strategies and information technology that gave Cisco a competitive advantage. Cisco's current position in the industry for continued future success will also be addressed. SECTION I: THE NETWORK EQUIPMENT INDUSTRY A. Industry Profile The network equipment industry, although still in its infancy, is a booming industry made possible by the Internet revolution. Broad acceptance of the Internet has created new models for business, new means to motivate, organize and inform the public, and new thinking about how humans communicate.

    • Word count: 15746
  3. Network Proposal. Androsia Superior Fabrics has solicited the services of ML-DD IT Consultants to assess their current IT infrastructure, provide a comprehensive upgrade and implementation strategy for the network software and hardware design and install

    and London. This project must have all required amenities of a modern, efficient computer network, be successfully completed on time and within budget. Androsia Superior Fabrics initial network setup was not truly arranged as a computer network. In fact, the computers used within the company's business could be described as a "Sneaker Network" and were implemented as follows: Carmichael Road Branch (Head Office) * Currently a true computer network is not implemented. * 4 separate computers running Windows98 SEare used for various business transactions.

    • Word count: 5836
  4. This research is about Management of network operating system at Natural Forest Resources management and Agroforestry Centre (NAFRAC) in Shinyanga, Tanzania as the case study.

    In addition access security can be customized to meet NAFRAC requirements, which helps to protect sensitive data from loss, destruction, theft, or unauthorized disclosure. Above all, most client-server environments have discretionary access control which allows a system administrator to grant or deny access to a file (resource).This will further increase system security. Most network operating systems (NOS) provide a number of fault tolerance features, such as disk mirroring, disk duplexing, and disk stripping. These features serve to improve reliability and minimize network down time.

    • Word count: 11449
  5. The intention of this study is to analyze and explore the emerging field of grid technology. It delves into how the grid is being used to enhance the capabilities of existing distributed systems and data resources.

    the Grid 59 Figure 5.14: Separate Interaction with Databases on the Grid 61 Figure 5.15: Flowchart for Query Processing on the Grid 62 Figure 6.16: Proposed Structure for the University of Karachi Grid 68 Figure 6.17: Issuing Certificate to Grid User 69 LIST OF TABLES Table 2.1: US-CMS Grid Resources [TGB2004] 14 Table 5.2: Example Accounting Policy 66 Chapter 1 FUNDAMENTALS OF GRID COMPUTING The notion of linking people, computers, sensors and data with networks is decades old. However, the grid concept has gradually evolved and now, for the first time there is a coherent description of the hardware, software and applications required to create a functioning and persistent grid.

    • Word count: 21063
  6. Types of IT Security Threats

    Defending against this attack was not possible through the usual means of eMail virus protection, as users simply had to receive the eMail for the attack to come into effect. SYN attacks take advantage of the TCP three-way handshake. Attackers deploy a DoS using a SYN attack by, firstly, sending multiple SYN packets to the target. As any system would treat these incoming SYN packets, the target machine will send a SYN-ACK back to the attacker. However, the attacker will not respond to this phase of the handshake, often because the IP is spoofed, so the target will attempt to resend the SYN-ACK a number of times.

    • Word count: 3391
  7. Usability Evaluation Methods

    Furthermore, the advantages and disadvantages for one evaluation method from each of the approaches is selected elaborated upon. The second task involves performing a heuristic usability evaluation on an interactive website using Jakob Nielsen's heuristics. The process identifies usability problems on the website based on the heuristics that are not conformed to. An analysis of the results is then provided and a conclusion is drawn about the overall usability of the website with regards to the perceived severity of the problem identified. Part I: Analytical and Empirical Methods for Usability Evaluation Usability Concept Usability can be defined as the degree of satisfaction, efficiency and effectiveness to attain specified goals by designated users for having used a product in a particular context (ISO, in (Te'eni et al., 2007).

    • Word count: 6250
  8. Creating a shopping website with Project management

    Many Software tools were used to help build and run the website. PHP my admin was used to store all of the data. Mi-Linux was used to host the website and Ps Pad was used to build the website in PHP. Planning stages included creating backlogs which were regularly updated. After each sprint the group held review sessions to investigate the project progression. The backlogs were then updated. Individual activity sheets were completed by each group member weekly to enhance personal skills. Each member also completed diaries weekly showing their commitment to the project and their next week's targets.

    • Word count: 6895
  9. Computer Networks Architectures & Protocols

    One of the greatest of all of the benefits of using a hierarchal or layered approach to networking and communications protocols is the greater compatibility between devices, systems and networks that this delivers. The portability is a benefit to the layered networking protocol because it is much easier to port from one system or architecture to another, which reduces time wasting. Disadvantages of layered protocol The main disadvantages of a layered protocol consists primarily of overhead both in computation and in message headers caused by the abstraction barriers between the layers, this is because a message often has to be

    • Word count: 3245
  10. BIM and Facility Management

    The facility manager generally has the most influence upon the quality of life within a facility. The facility department has in practice sub departments (the blue squares). To ensure that everything is working properly and that everybody is happy with his or her working environment the facility department has set up a front- and back office system. That works as an assistant for the Facility Manager. When an employee (in this case a costumer of the facility management department) got a Wish, Need for information, Complain or an Interruption (WICI) they can contact he front office by phone or e-mail.

    • Word count: 3236
  11. Building Information Management. In this paper we asked the question how Facility Managers can use BIM to help them develop into the future. To give an answer to this question we first analysis the usability of BIM for Facility Managers.

    The main topics of this paper are Facility Management (FM) and Building Information Modeling (BIM). 1.1.1 BIM BIM is a tool for architects that was developed from 2D and 3D CAD applications in the 1990s. It was the first attempt to provide drawn elements with architectural properties and make rendering possible to create images that derive directly from the drawings. The basic concept is to allow architects to use their 3D models to extract all the required information such as building view and project drawings.

    • Word count: 3742
  12. Kudler Fine Foods Frequent Shopper Program

    Financially Kudler is able to handle the transition with profit margins doing quite well. There was no time frame given for the project but the estimation is going to be approximately six months. The resources are available (hardware availability, WAN software, utility functions such as high speed cable and/or DSL). Based on an overview of Kudler Fine Foods corporate policies and the culture of those that are employed by the company the employees are eager to help in the transition to the new system. Statement of Scope and Goals Kudler Fine Foods is currently a successful business but they seem to be losing focus on the important things such as customer satisfaction and prioritize their tasks to maximize their objectives for the fiscal year.

    • Word count: 3956
  13. Report for Ed Transformers

    Lastly, Ed Transformers should make the donations easy to use, first allowing the user to select a project to donate to, then a student, then they fill in a form stating how much they want to give, when they will do so and via what means (credit card, etc), and finally verifying the information at the end. This will all make the user experience more pleasant, and the success of the website will improve. 1. Introduction. Within this report, some key factors will be discussed, with reference to the Australian organization: Ed Transformers.

    • Word count: 5526
  14. Acceptability of Biometric Security System

    And obviously the method will provide hundred percent security. Pursuing these necessities, different methods have been developed at times. Some of them have been accepted and some became extinct. While talking about secure system professor Eugene H. Spafford said that, "The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards - and even then I have my doubts." [6]. But that could not stop people from trying to make the systems absolutely secure.

    • Word count: 4420
  15. In this coursework we will be designing a component based model for a business application in a healthcare pharmacy environment. It will comprise of a detailed view UML models, a suitable description of the system for a technology selection,

    Use case 2: Issue Prescription Principle Actor: GP, Pharmacy Scenario: 1. GP enters username and password 1.1. GP enters Incorrect Username/Password 1.2. User is asked to re-enter Username/password 2. GP Brings up Patient Details 3. GP issues a prescription 3.1. GP finds that the patient has an ADR, so the GP must prescribe an alternate medicine 3.2. GP fills out the Prescription form. 4. everyone goes home and has a cup of tea/coffee/hot chocolate/coke/water Exceptions: * GP may not issue a prescription to non registered Patients.

    • Word count: 6474

    The rapid growth in the medical field has encouraged expansion of knowledge, yet medical professionals are not aware of these relevant resources that are causing an immense change. It has been observed that the available information released in articles, researches, textbooks and medical journal are slowly disseminated. Apparently, the obstacles behind this meeting these needs include Inadequate access to clinicians to update their information resources, Poor organization of accessible information, Insufficient amount of time for inquiry, and Lack of interest of clinicians on available important information in their field (Smith, R.1996)

    • Word count: 4541
  17. Office systems project

    Doing this report has helped us has individuals to work as a team, it has also made us aware of the difficulties associated with managing a team based project, this help us develop ways of overcoming the problems that arise from team work. In addition, we learned better, communication, interpersonal skills The Report was requested by Mike Scott as a part of assessment for the Office Systems Unit. This report has detailed and coherent account for requirement analysis. This report is to be submitted on the 8th May 2008 EXECUTIVE SUMMARY This report reviews the possible options, available for analysing and designing a new system in regards of designing and developing an inventory stock control system for Titlas Ventures Limited.

    • Word count: 8633
  18. Balance ScoreCard

    The balanced scorecard is based on four perspectives. There are: * Financial Perspective * Customer Perspective * Internal Processes Perspective * Learning and Growth Perspective (Kaplan and Norton, 1996) This report will be based on these four perspectives. The balance scorecard will be applied to the IT system proposed to Titlas Ventures Limited. A number of implemental issues will also be looked at. In order for businesses to survive and flourish in this information age, businesses must use measurement and management systems derived from their strategies and capabilities.

    • Word count: 3273
  19. E-Commerce Strategy

    HSBC offers and manages their services through these four main segments: * Personal financial services. * Commercial banking. * Corporate investment banking and markets. * Private banking and other. 1.2 Purpose of Report E-commerce Strategy can be described as plan of action designed to enable organisations stay ahead of its competitors and achieve its business aims and objectives using electronic information technologies on the Internet. So, how does e-commerce really impact the performance and productivity of businesses? The report will attempt to analyse this question whilst answering several related questions along the way, they are listed below; * What are HSBC Missions and Aims?

    • Word count: 3831
  20. Privacy on the web and Identity Theft

    Whatever we browse it will get stored in the browsing history. We can delete the browsing history, cookies, saved password in the system and the web form information. To delete all these things right click from the internet explorer-properties-general-delete all. Once we had given delete all it takes all the browsing history, saved password, cookies and other web form information from the system. In the above internet properties we can delete the files history, cookies, saved password and web form information.

    • Word count: 3681
  21. Wireless network security

    Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range, according to NIST, (2005): Wireless Wide Area Networks (WWAN), WLANs, and Wireless Personal Area Networks (WPAN). WWAN includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM), LMDS, MMDS and Mobitex. WLAN, representing wireless local area networks, includes 802.11, HiperLAN, and several others. WPAN, represents wireless personal area network technologies such as Bluetooth and IR.

    • Word count: 6383

    An applicant can apply to take the certification anytime within one year of having taken the course. The tutors mark the test and a certificate is sent to the successful applicants. A company can also arrange to have a course delivered on-site. There is a one off payment for this regardless of the number of employees who attend. These courses can be arranged at reasonably short notice. This must be agreed with the tutor who will deliver the course. However the company must pay in advance and there is no cancellation permitted for this form of delivery.

    • Word count: 3205
  23. Information Security System

    So far we have known some types of risks and threats to computer systems in organisations. They are being: 1. Accidental error 2. Deliberate damage 3. Fraud To these categories I would also add a Physical threat, Unauthorised access and Malicious misuse. Let's have a look on each of them. Accidental error This is an important security issue which computer security experts should always put into consideration when designing security measures for a system. Accidental errors could occur at any time in a computer system but if we do have proper checks in place then it could not be the major concern. Accidental error includes corruption of data caused by programming error, user or operator error.

    • Word count: 3883
  24. ERP adoption and implementation.

    Two variables: perceived personal competence, organizational commitment, and two process outcome variables (perceived usefulness (PU) and perceived ease of use (PEU)). * To comment on the importance of the study to the IS field. * To link and test six hypotheses and how they affect the positive attitude towards change. INTRODUCTION A change is important part of an organization. Companies are placing an increased emphasis on operational coordination processes through enterprise integration. Enterprise integration is a key selling point of ERP software but ERP is not a technological panacea that provides instant supply chain management competence (Davenport, 1998)

    • Word count: 3465

Marked by a teacher

This document has been marked by one of our great teachers. You can read the full teachers notes when you download the document.

Peer reviewed

This document has been reviewed by one of our specialist student essay reviewing squad. Read the full review on the document page.

Peer reviewed

This document has been reviewed by one of our specialist student document reviewing squad. Read the full review under the document preview on this page.