Web-base Quality Management Systems Quality is a perceptual, conditional and somewhat subjective attribute and may be understood differently by different people in different spheres of life.
Example Information Systems Dissertations
Search here to find a specific article or browse from the list below:
Impact of VoIP on the Future of Telephony With the dawning of a new age of pervasive computing, there is a greater requirement for the exchange of data to be made possible between computing…
Importance of Knowledge Management in Organisations The main aim of this research study is to evaluate whether knowledge management is important in today’s organisations and also to discover whether…
Use Case: An Analysis A use case diagram depicts the units of functionality of the system as well as the actors capable of carrying out these functions. An actor is a…
Analysis of Unified Modelling Language How does the transformation between sequence and Class diagrams make systems easier to develop and maintain and avoid system development documents…
Information Technology Advantages and Disadvantages The importance of technology comes from that technology has an important impact on innovation and the development of societies and economies.
Advantages of E-banking The dramatic growth in internet usage has generated a segment of customers with the ability and desire to conduct banking transactions completely online…
Security Forensics and Risk Management The preventive controls are controls may in the form of software or hardware or ant configuration to prevent the error or vulnerabilities.
Literature Review on Risk Management Risk Management is nowadays the important research topic in the many critical business areas and industrial areas. Project teams do not achieve their…
Analysis of Company Network Models Network models may change due to the implementation of different technologies which are applicable to us. But the goal of each model is finally same…
Sisterhood Method to Calculate Maternal Deaths The sisterhood method is an indirect technique for deriving population-based estimates of maternal mortality. This method is often recommended by the…
Analysis and Detection of Metamorphic Viruses Metamorphic Viruses are very special type of viruses which have ability to reconstruct into entirely new offspring which is completely different than…
Analysis of Intrusion Detection Systems (IDS) The main purpose of the project is to evaluate the security capabilities of different types of IDPS technologies in maintaining the network security.
Infinity Computer Systems Distributed Database Infinity computer systems is a Sri Lanka based company engaged in selling computers, computer components and software applications to the local buyers.
Development of Hospital Management System In the existing system the data required for the Hospital management is maintained in records. These are to be updated according to the requirements…
Consumer Analysis of Restaurant Industry The aim of the study was to examine customers’ definition of quality when it comes to restaurant services and the preferences and opinions in…
Developing of Online Enrolment System The purpose of this project is to upgrade the existing enrolment system for Buena Vista College. The upgrade will consist of an added function…
Introduction to E-learning: Types, Benefits and Strategies In this part of the literature review, we focus on eLearning by providing a discussion about the definitions of eLearning, eLearning types and the…
Skill Requirements for IS Professionals in E-learning This research project is an investigation into the skills required for Information Systems (IS) professionals working in the commercial e-learning sector.
Designing and Implementing E-procurement The project is designing and implementing e-procurement on business-to-business transactions, it first identifies current procurement process and…
Impact of Identity Theft in E-Commerce The aim of this research was to find and assess the impact and the level of identity theft in e-commerce. This was achieved by using analytic induction…
Efficiency of IT Audit in Corporate Governance The aim of this dissertation is to critically analyse the efficiency of IT audit in the corporate governance among the UK business organizations.
Analysis of Role-based Access Control (RBAC) We try to give a comparison between RBAC and traditional access control models and try to evaluate the different industries where these models can be…
Types of Security Threats and Protection Against Them Common cases of computer-related employee sabotage include: changing data; deleting data; destroying data or programs with logic bombs; crashing systems…
Computer Network Security within Organisations Different businesses require different computer networks, because the type of network utilized in an organisation must be suitable for the organisation.