You are on page 1of 3

Review of Related Literature http://www.studymode.com/essays/Review-Of-Related-Literature-And-Studies-177904.

html In exploration, we find new techniques, new knowledge, even develop new substances, gadgets, equipment, processes or procedures, imagination and skill is employed by the researcher. The commodities, new devices, services, in technology are needs of man for a better fuller life which is the concern of the research. These useful arts are the products of the technological environment and the end-user is society in general. The excerpt was stated by Josefina Estolas in the book Fundamentals of Research (1995).

Science and technology are essential for national development and progress. The State shall give priority to research and development, invention, and their utilization, and to science and technology education according to the 1987 Philippine Constitution (Article XIV, Section 10). Since computer power was the critical resource, efficiency of processing became the main goal. Emphasis was placed on automating existing process such as purchasing or paying, often within single department as indicated by Jeffrey A. Hofer on Modern System Analysis and Design (1996).

A major purpose of a database system is to provide users with an abstract view of data. That is the system hides certain details of how the data are stored and maintained as stated by Abraham Silberschatz, Database System Concepts (1999).

A database is an organized collection of facts and information. An organizations database can contain facts and information on customers, employees, inventory, competitors, sales information and much more. Most Managers and executive believe a database is one of the most valuable and important parts of a computer-based Information System in accordance with Ralph M. Stairs Fundamentals of Information System (2001). Williams (1983) theorized economic well-being as a function of material and non-material aspects of ones financial situation. To identify economic well-being, she included money income, real or full income, agreement about distribution, and psychic income or perceived adequacy of income as independent variables. Fergusson, Horwood, and Beautrais (1981) described economic well-being with the level of financial inputs, such as income and assets. http://www.studymode.com/essays/Related-Literature-510186.html The purpose of this study was to develop a conceptual model that describes the relationship between personal financial wellness and employee job productivity and test a part of the model. This chapter presents the review of related research of the components of the conceptual model of personal financial wellness and employee job productivity. The literature about personal financial wellness, financial problems, financial stress, the relationship between stress and productivity are discussed. Also included are the need for workplace financial education, employee assistance program, employee assistance program and stress management, workplace financial education and its effectiveness, and productivity. This chapter ends with the summary of the literature review.

http://www.tandfonline.com/doi/abs/10.1080/01449299508914622#preview http://www.studymode.com/essays/Chapter2-Review-Of-Related-Literature-And-391986.html Prof. Damiana Eugenio (2002), a renowned Filipina folklorist, said that there is no universally accepted definition for the word folklore. But she gave a description that folklore is any form of knowledge that is handed down from generation to generation that portrays the way of life of ancestors of the chosen ethnic group can be considered part of folklore. http://is.muni.cz/?lang=en
The history of IS MU goes back to 1999 when Faculty of Informatics, Masaryk University, started its development. The System, which is currently used by more than 35.000 users a day visiting more than 3.500.000 pages, hosts several hundred applications some of which allow students to easily manage their inter-faculty studies, create their own study plans, and schedule their credit-winning activities. It facilitates the students' operations in that it guides them the way that ensures they follow all the rules related to their studies and study plans. After being put into operation, the Information System of Masaryk University succeeded in removing queues from Office for Studies (since the students can currently, for instance, enroll in terms and courses electronically), disposing of a lot of paperwork and making a lot of study-related acts easier.

http://www.studymode.com/essays/Ford-InformationSystem-92076.html
A Management Information system (MIS) can be distinct as an organized assembly of resources and procedures required to collect and process data and deal out information for use in decision-making. It serves the management echelon of the organization, providing managers with reports and, in some cases, with on-line access to the organization's current performance and historical records. Generally, a MIS is dependent on fundamental transaction processing or operational systems for their data. It is important to differentiate between information and an operational system. MIS as an information system will gather and collate data and distribute information from the current operational systems like the depot systems. Management information is a tool to be used and will never replace common sense. (Chappell, 2005) It is supplemented by other management tools and not used in separation. A single management report from a MIS is never used to make a policy decision. A number of reports over a period are used to establish a propensity and that is used as a basis for investigation. http://www.studymode.com/essays/Information-System-Risks-472133.html Information System Risk Management Claudia I. Campos

CJA 570 Cyber Crime and Information Systems Security July 5, 2010 Steven Bolt Abstract The realization of potential risks to an organizations information system has been increased in the past few years. The principles of risk management, vulnerabilities, internal threats, and external threats is the first step in determining which levels of security are necessary to protect and limit the risks to an organizations information system. This essay will describe the principles of risk management as they pertain to the information system and its associated technology of Professional Security Training School. Moreover, this essay will include an exploration of the vulnerabilities of their system, and specifically address the nature of potential internal and external threats, including natural or unintended events that can jeopardize the system. Finally, it will determine what levels of security are appropriate to secure the information system while allowing a maximum amount of uninterrupted workflow. Information System Risk Management Businesses realize that the security of their information system is a major part for an organization in the continued pursuit of organizational operations and providing services. The principles of risk management, identification, assessment, and prioritization must be determined by management prior to establish and implementing levels of information system security. In addition, vulnerabilities, internal threats, and external threats must be uncovered and addressed to secure the information system. Establishing different levels of security to secure the information system of Professional Security Training School (PSTS) will limit potential security threats. In analyzing the information system risks of PSTS, decisions must be made to deter or limit potential security threats, which are the client database, staff accessibility, and client privacy.

You might also like