0115 966 7955 Today's Opening Times 10:00 - 20:00 (BST)

Information Systems Dissertation Examples

Search to find a specific information systems dissertation or browse from the list below:

Web-base Quality Management Systems

Chapter 1 Introduction 1.1 Defining Quality, History and Achieving International Quality Standards Quality is a perceptual, conditional and somewhat subjective attribute and may be understood differently by...

Impact of VoIP on the Future of Telephony

With the dawning of a new age of pervasive computing, there is a greater requirement for the exchange of data to be made possible between...

Importance of Knowledge Management in Organisations

CHAPTER ONE 1.0 Introduction This chapter provides a brief introduction about the research topic along with the research aims and objectives in detail. Further in this chapter,...

Use Case: An Analysis

Use Case A use case diagram depicts the units of functionality of the system as well as the actors capable of carrying out these functions. An...

Analysis of Unified Modelling Language

Chapter 1: Introduction Context of the Problem The Unified Modeling Language is a graphical modeling language used for the visualization, specification, construction, and documentation of object-oriented software...

Information Technology Advantages and Disadvantages

The importance of Information Technology The importance of technology comes from that Technology has an important impact on innovation and the development of societies...

Advantages of E-banking

Chapter 1: Introduction Introduction Nowadays, Malaysia is a multi sector economy and technology development based on the presence of many technological inventions. Traditional banking act as physical...

Security Forensics and Risk Management

Acknowledgement Foremost I would like say thanks to god for all support in all my life and secondly University of Greenwich to give this my life...

Literature Review on Risk Management

Software Project Management (CI6113) Title: Reviewing the Past Research Papers on Risk Management Abstract Risk Management is nowadays the important research topic in the many critical business areas...

Analysis of Company Network Models

CHAPTER 1 ABSTRACT The purpose of this exercise is to provide a detailed design document as per the requirements given in various formats by the Client...

Sisterhood Method to Calculate Maternal Deaths

CHAPTER THREE: METHODOLOGY Introduction In this chapter, the methodology of this study is presented. This chapter also aims to justify the research design. The theoretical and practical...

Analysis and Detection of Metamorphic Viruses

Chapter 1 Introduction 1.1 Motivation Metamorphic Viruses are very special type of viruses which have ability to reconstruct into entirely new offspring which is...

Analysis of Intrusion Detection Systems (IDS)

Introduction Intrusion detection systems (IDS) were developed in 1990’s, when the network hackers and worms appeared, initially for the identification and reporting of such attacks. The...

Infinity Computer Systems Distributed Database

CHAPTER 1 - Company Profile Company Profile: Infinity computer systems is a Sri Lanka based company engaged in selling computers, computer components and software applications to the...

Development of Hospital Management System

Introduction Hospital Management is a web based application to manage the activities related to doctor and patient. Hospital Management is based on distributed architecture. This involves...

Consumer Analysis of Restaurant Industry

Abstract The aim of the study was to examine customers' definition of quality when it comes to restaurant services and the preferences and opinions in restaurants...

Developing of Online Enrolment System

Preface This software project management plan is intended to act as an outline of the development of a new honours system for Buena Vista College Administration....

Introduction to E-learning: Types, Benefits and Strategies

Chapter 2. Background and Related Work Introduction During the last decade the amount of literature published in the field of eLearning has grown noticeably, as has the...

Skill Requirements for IS Professionals in E-learning

Skills requirements for information system professionals in the e-learning sector This research project is an investigation into the skills required for Information Systems (IS) professionals working...

Designing and Implementing E-procurement

CHAPTER ONE: Background Study Overview The project is designing and implementing e-procurement on business-to-business transactions, it first identifies current procurement process and explores how to...

Impact of Identity Theft in E-Commerce

ABSTRACT In the world of today, where time is money and information is a corporate asset, protection of data confidentiality and integrity has become critical. Today,...

Efficiency of IT Audit in Corporate Governance

Critical Research Analysis On The Effectiveness Of IT Auditing For Corporate Governance Chapter 1: Introduction 1.1 Introduction Auditing is one of the essential elements for the successful functioning...

Analysis of Role-based Access Control (RBAC)

ABSTRACT Access control systems within an enterprise system are used to control the actions, functions, applications, and operations of legitimate users within an organization and to...

Types of Security Threats and Protection Against Them

Introduction While attacks on computers by outside intruders are more publicized, attacks perpetrated by insiders are very common and often more damaging. Insiders represent the greatest...

Computer Network Security within Organisations

Networking and Management Introduction A computer network is a connection of two or more computers in order to share resources and data. These shared resources can include...

Communication Media for Banking Industry

Chapter 1: Introduction Introduction Today's world is world of technology. Everyday a new technology is introduced that can assist people in order to do their daily works...

Strategies for Utilising IT in Business Operations

EXECUTIVE SUMMARY Carsem founded in the year 1972 and had been acquired by Hong Leong Group in the year 1984. Carsem had been allocating most of...

Relationship between Business Strategy and IT Strategy

BUSINESS-IT ALIGNMENT (BITA) The relationship between Business strategy and IT strategy and the influence of organisation culture on this strategic alignment in Saudi firms will form...

Advantages and Disadvantages of Biometrics

ABSTRACT Organisations have goals and therefore acquire assets to ensure these goals are met and the continuity guaranteed. Financial sector while trying to promote...

Get help with your dissertation
Find out more
Build Time: 0.0016 Seconds