Saturday, December 28, 2019

Leadership Is A Personal Journey Essay - 1018 Words

The study of leadership teaches leaders about what motivates people to work. Thus, it’s understood that all motivated employees, and team players will be more productive. Therefore, the study of various theories and models of motivation, such as Maslow’s hierarchy of needs model, and Herzberg’s two factor theory are carefully studied to improve leader’s ability to motivate their employees. Also, studying leadership enables leaders to understand people and the work environment better. However, most importantly, the study of leadership is a personal journey. Helping a person to develop their leadership potentials, which enables one to develop their leadership potentials. Therefore, understanding leadership is really learning about understanding yourself. When I decided to take this leadership class. My expectations were to learn more about myself, how to effectively communicate with difficult people, and become a better leader. My expectations were met. Howe ver, I have also learned that I need to develop my interpersonal skills to bring people together. As I reflect over the leadership course, my weaknesses are a need to develop my interpersonal skills, and having an introvert personality. Interpersonal skills are life skills that I use every day to communicate and interact with other people, both individually, and in groups. Steps that I will take to improve my interpersonal skills are expressing more appreciation for team members and support staff, actively listen, slow toShow MoreRelatedPersonal Narrative : Leadership Journey1962 Words   |  8 PagesLeadership Journey Where do I come from? I come from a middle-class family and I grew up with my mom most of the time. My parents split when I was about three and I mostly lived my mom while I was growing up. We lived in Eden Prairie, Minnesota which is a suburb about 20 minutes outside of the Twin Cities. As I was growing up, I saw my father on the weekends, but most of the time with my mom. Looking back to the identity map that we did a few weeks ago, I think the biggest thing that defined meRead MoreAnalysis of Strengths and Weaknesses1022 Words   |  4 Pagesdimensions. These include personal and professional accountability, career planning, personal journey disciplines and reflect practice reference behaviors and tenets. The intent of this analysis is to evaluate my strengths and weaknesses in each of these four areas. In addition, a discussion will be completed on how current leadership skill sets will be used for advocating change in my workplace. The conclusion of the paper will concentrate on one personal goal for leadership growth, including an implementationRead MoreLeaders Are Born Or Made?801 Words   |  4 Pageschicken or the egg. It is a question, which all of us ponder through our own journey in leadership. For most of us, becoming an effective leader is hard and daunting work. Some of us grow up wanting to be leaders, while others sort of just fall into leadership, without really realizing when or how they became leaders. For some, leadership begins at an early age, perhaps during childhood. Others begin their journey later on in life, as they enter the workforce and co-workers are naturally drawnRead MoreThe Importance Of Being A Nurse Leader986 Words   |  4 PagesInstitute of Medicine report The Future of Nursing: Leading Change, Advancing Health identified the need for strong and capable leadership if the vision for transforming health care is to ever be realized† (Mazzoccoli Wolf, 2016,p.1). As stated by the report, it suggests that the n ursing profession should bring out leaders who are fully equipped to take on leadership positions across the board. This should be nursing practice, politics, policy and in organizations. In this paper, it`s challengingRead MoreTrue North Is Leaders Essence Of Who You Are Our Deepest Beliefs, Values, And The Principles1170 Words   |  5 Pagesimportant for a leader, for instance, leader’s most treasured values, passions and motivations, and other sources of satisfaction in life. True North is about leader’s journey towards integrity and authenticity. It pulls a leader toward the purpose of his/her leadership. When a leader follows his/her internal compass, then the leadership will be authentic. Even though, others may influence a leader, True North comes from leader’s life stories. No two individuals can have the same True North. All individualsRead MorePersonal Growth Is The Most Important Factor Of My Development Plan1071 Words   |  5 PagesPersonal growth is the most important factor of my development plan at my current stage in life. Due to the increased competitive nature of young up and comers I feel that I may be limited for opportunities and advancement. Creating an in-depth leadership development plan will assist me in building up on my leadership skills and abilities. Although this leadership development plan is only a guideline, the real learning process is an ongoing journey. It’s a mark of respect and fairness to includeR ead MoreLeadership Style And Personal Strengths Essay1410 Words   |  6 PagesUsing Leadership Style and Personal Strengths to Succeed in a Doctoral Program Leadership is an important outcome of the doctor of nursing practice (DNP) program (Zaccagnini White, 2014). Measurement tools are available that identify leadership style (Clark, 2010) and personal talents, called Signature Themes (Gallup, Inc., 2010). When leadership style and personal strengths are identified, they can be maximized to achieve success (Clark, 2010; Gallup, Inc., 2010). This paper provides both aRead MoreServant Leadership By Robert K. Greenleaf1666 Words   |  7 Pageship Servant Leadership is â€Å"an approach to leadership with strong altruistic and ethical overtones that asks and requires leader to be attentive to the needs of their followers and empathize with them; they should take care of them by making sure they become healthier, wiser, freer and more autonomous, so that they too can become servant leaders† (Valeri, 2007). Although there is not many servant leaders in this world but the concept of servant is one of the most leadership approach leaders todayRead MoreEssay on Combining Nursing Leadership with Advocacy1349 Words   |  6 PagesCombining Nursing Leadership with Advocacy Grand Canyon University Trends and Issues in Health Care NRS-440V June Helbig July 18, 2013 Combining Nursing Leadership with Advocacy According to Dictionary.com, a strength is the quality or state of being strong, a mental power, force, or vigor; a weakness is the lack of strength, an inadequate quality. We all have and carry our own strengths and weaknesses of qualities. As I’ve learned in class this week, every nurse can be a leader. It wasRead MoreProfile of a Leader: Colin Powell Essay1085 Words   |  5 Pagesblocks of every organization. General Colin Powell is the embodiment of an American leader. After years of military excellence, he continued his career on a political level, retiring after 35 years of servant leadership. In his retirement, General Powell wrote his autobiography My American Journey. This narrative outlines his life achievements and failures. In this paper, General Colin Powell will be defined in the context of achieving excellence, starting with how he was taught and what experiences

Friday, December 20, 2019

Diversity - 2047 Words

SUNY Empire State College Diversity Research Paper: M5 Diversity Audit Angela Politzi Diversity in the Workplace BME-213164 Dr. Robin Churray June 7, 2015 Criteria For the criteria of measuring the effectiveness of the diversity within MasterCard, I will research different aspects that reflect their commitment to having a strong diversity image. I will assess their various diversity programs and analyze how they are benefiting the organization, in terms of capturing market share and retaining and attracting diverse employees. I will also look at their hiring practices, and search for statistics on how many diverse employees hold executive positions. I will also research their supplier diversity commitment and see how their†¦show more content†¦MasterCard has also partnered up with other minority-focused organizations, such as Women 2.0, which is focused on connecting talented women in technology to existing entrepreneurs (6). The relationship between Women 2.0 and MasterCard will help create communities of innovative women in technology, and to help them cultivate future leaders of these women and provide continuous support through the ir careers (6). MasterCard’s Diversity Efforts (List of Thoughtful Questions amp; Answers) 1. What kind of programs are offered for employees to join to show their pride of their diverse background? What are the goals of these programs? What has been accomplished as result of these programs? MasterCard provides diverse programs for their employees in the form of what they call Business Resource Groups (BRGs). The goal of these various groups is to â€Å"identify business programs that address the needs of diverse consumers by providing feedback on new ideas and initiatives, partnering with specific organizations, and reaching out to their communities† (2). Accomplishments as a result of these BRGs can be represented by the relationships fostered with other organizations, such as Women 2.0 (6), whom represents the needs of the BRG â€Å"The Women’s Leadership Network† (WLN). The efforts that result from this business relationship will providing growing opportunities forShow MoreRelatedDiversity And Diversity For A Company873 Words   |  4 PagesDiversity is a key contributor in today’s workforce. Many factors effect diversity and there are guidelines a company can follow to ensure it is diverse. Diversity and inclusion can be tools to create a competitive advantage for a company and can help solve issues by looking at problems from different perspectives. It also contributes to the employees by allowing for work with many types of people. According to Phillips and Gully (2014) â€Å"Diversity awareness enables you to hire, retain and motivateRead MoreDemographic Diversity And Cultural Diversity1700 Words   |  7 PagesDEMOGRAPHIC AND CULTURAL DIVERSITY GOPI KRISHNA CHALLA RIVIER UNIVERSITY Demographic and Cultural Diversity ABSTRACT The research is concerning Organizational Behavior which includes unusual types of Organizations with dissimilar types of public behaviors. Among that Demographic Diversity and Cultural Diversity of an Organization is extremely significant to turn into a triumphant organization or company in the marketplace Especially the Demographic and Cultural Diversity show the in good physicalRead MoreEssay on Diversity in the Workplace1258 Words   |  6 Pages Diversity in the workplace is a subject that has gained increased attention in the workplace over the past few years. After all, the impact of affirmative action and equal employment opportunity programs on the nations work force is undeniable. Women and minorities were the first to dramatically alter the face of the economic mainstream, while gays, persons with disabilities and senior citizens followed not far behind. The result is a diverse American labor force representing a microcosm of ourRead MoreDiversity and Inclusion Paper1085 Words   |  5 PagesThinking About Diversity and Inclusion Paper SOC/315 December 15, 2010 Professor Dr. Lorthridge Introduction This paper will discuss and focus on the four dimensions of diversity: ethnicity, gender, differences in skills, abilities and personality traits and how they have an impact in my workplace. To be able to go further in this paper one should understand the definition of diversity. Diversity is a variety between people associated to factors such as culture, employment status, educationRead MoreThe Diversity Audit Project : Starbucks1406 Words   |  6 Pagesof the diversity audit project is to teach students how to analyze and measure diversity efforts of potential employers and as potential customers. In this globalizing world these skills are more important than ever. Many companies are making changes to diversify their employees and their customer base; this project is focused on investigating one company’s efforts. After this project students can expect to have gained a deeper knowledge of how to measure a company’s level of diversity and analyzeRead MoreThe Impac t Of Workplace Diversity On The Workplace997 Words   |  4 Pages Workplace diversity is a term which describes the inclusion of people in the workplace regardless of their cultural differences such as gender, race and sexuality. Rather than disregarding them, diverse workplaces utilise these differences to widen the range of experiences and skills among their employees as stated by the Australian Breastfeeding Association (2012). Some professions, however, are more diverse than others. According to the Diversity Inclusion: Unlocking Global Potential - GlobalRead MoreDiversity and Inclusion1102 Words   |  5 PagesDiversity is a notion, when applied to the majority of circumstances, can create a positive conclusion. The trick to producing a positive outcome is often how the different aspects are brought together. Consider a classic dinner combination peas and carrots, the two colors look appealing and the two flavors comes together as one making a superb side dish. Now consider oil and water, these two substance are not often considered a good c ombination. Although, this is not always the case; olive oil andRead MoreDiversity And Inclusion For Diversity1920 Words   |  8 PagesIn the most simplest terms diversity and inclusion can be explained by diversity being the mix and inclusion is getting the mix to work well together. In broader terms, diversity is anything that can be used to differentiate groups and people from one another. This can be anything from life experiences, learning styles, personality types to race, gender, sexual orientation or even county of origin. These differences can be used to achieve quality teaching, learning and support services. InclusionRead MoreDiversity And Equality And Diversity1852 Words   |  8 PagesDiversity tends to be established by people from different spheres of life including different ethnicities, cultures, and social settings. It allows individuals to appreciate and understand the interdependence of culture, the environment in which people are living, and humanity. Diver sity also helps individuals to build alliances and unity despite having a difference regarding their beliefs, religion, and culture. It helps one to recognize and appreciate that people are born different regardingRead MoreEssay about Managing Diversity in the Workplace1449 Words   |  6 Pagesorganizations need diversity to become more creative and open to change. Maximizing and capitalizing on workplace diversity has become an important issue for management today (UCSF). Workplace diversity refers to having a variety of different types of people working together within a place of business. Employee gender, race, religion, sexual preference, physical appearance, family or marital status, education, culture, personality, or tenure establishes diversity in the workplace. Diversity is rapidly

Thursday, December 12, 2019

Security Essay Example For Students

Security Essay Security is the discipline of using effective protection measures to safeguard important assets from abuse. In other words, security is about protecting important things. Protection involves not just mechanisms (such as locks and doors), but also proper selection and use of mechanisms. Properly applied, the various disciplines of information security really come down to risk management that is not fundamentally different from risk management in other situations such as finance and insurance. In learning how to think constructively about managing risks, often the following common sense vocabulary is used:Asset: something important that needs protectionRisk: likelihood of threat leading to actual abuseCost (1): reduction in value of abused assetCost (2): amount of resources required to use security measures to protect an assetBenefit: the value of a security measureIt would be great if these terms asset, value, threat, risk, cost, benefit could be used scientifically, but when it comes to information systems, most of them are pretty squishy. Nevertheless, even a best guess is remarkably useful. If guesses about relative value and likelihood are consistently applied, then it is usually possible to decide on the priority of potential improvements in information security. Cost becomes a matter of budget. Most people with authority over funds for security can, if properly informed, make good decisions about how to allocate the budget. In many instances, it is possible to analy ze whether the incremental value of a high budget would be significant. Understanding of information security technology is necessary to make informed judgements like these. Fortunately, the essential technological aspects are not rocket science. There are several types of security issues: data security, computer security, system security, communication security, and network security. The term information security is often used to encompass all of them and to distinguish them from closely related and important issues such as physical security, operational security, and personnel security that do not rely primarily on computing technology. Computing is as risky as any other aspect of modern life, and in some sense more so because of the complexity of computing systems. Vulnerabilities exist at all levels: network, operating system, middleware and application because all software has bugs, administration is error-prone and users are unreliable. It is virtually impossible to develop any significant system without some errors in it. We know how to build bridges so the imperfections are tolerable. That is, we can build bridges that do not crash (if proper engineering methodology is followed), but we cannot build systems and applications that do not crash. In computing systems, flaws are often bugs repeatable situations in which the system behaves in an unintended manner. Each bug can also be a security vulnerability, if the bug can be used in a way that allows a failure of security: either authorized users exceeding their privileges, or unauthorized users gaining access to systems. Furthermore, the complexities of modern computing systems make them difficult to manage. Configuration and administrative errors also create security vulnerabilities. It can be difficult to determine whether the system is properly configured. For example, to harden Windows NT for usage on the Internet, Microsoft recommends over a hundred specific configuration changes that effectively turn off many features that led people to want to use NT. In addition, security experts have other recommendations in addition to those described by Microsoft. Computing, like life, has many threats. But what are the risks? Given the wide rage of threats, the sheer number of vulnerabilities, and the ever-increasing number of attackers, the risk is nearly 100 per cent that some incident will occur if information security is not addressed in a systematic manner. .ub45c0950265be246558333b55fb7c362 , .ub45c0950265be246558333b55fb7c362 .postImageUrl , .ub45c0950265be246558333b55fb7c362 .centered-text-area { min-height: 80px; position: relative; } .ub45c0950265be246558333b55fb7c362 , .ub45c0950265be246558333b55fb7c362:hover , .ub45c0950265be246558333b55fb7c362:visited , .ub45c0950265be246558333b55fb7c362:active { border:0!important; } .ub45c0950265be246558333b55fb7c362 .clearfix:after { content: ""; display: table; clear: both; } .ub45c0950265be246558333b55fb7c362 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .ub45c0950265be246558333b55fb7c362:active , .ub45c0950265be246558333b55fb7c362:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .ub45c0950265be246558333b55fb7c362 .centered-text-area { width: 100%; position: relative ; } .ub45c0950265be246558333b55fb7c362 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .ub45c0950265be246558333b55fb7c362 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .ub45c0950265be246558333b55fb7c362 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .ub45c0950265be246558333b55fb7c362:hover .ctaButton { background-color: #34495E!important; } .ub45c0950265be246558333b55fb7c362 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .ub45c0950265be246558333b55fb7c362 .ub45c0950265be246558333b55fb7c362-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .ub45c0950265be246558333b55fb7c362:after { content: ""; display: block; clear: both; } READ: Karl Marx Essay PaperThere are many different avenues of attack. Inadequate data security can provide unauthorized users access to sensitive information. Inadequate computer security can result from the use of weak passwords and allow abuse of user accounts. Applications filled with bugs can allow unauthorized transactions. Inadequate system security can result from a mis-configured operating system and allow unintended network access. Eavesdropping and password reuse are examples of inadequate communication security which can result in impersonation of individuals. Inadequate network security can lead to unintended Internet access to private systems. There are many examples of inadequate security. Who is hurt by these attacks? Internet access in this scenario affects the on-line consumer greatly, sometimes in

Wednesday, December 4, 2019

Importance of IT for Woolworth Samples †MyAssignmenthelp.com

Question: Discuss about the Importance of IT for Woolworth. Answer: Introduction: Woolworth limited is the company that is located in Australia and headquartered at Sydney. It is the supermarket that operates in retail industry of Australia and also considered as the leading firm in the industry. This is because the company has great market share in the industry. It owns around 3000 stores all over Australia and New Zealand. In terms of technology, the company always remains number one amongst all the other competitors (Applegate, Austin and McFarlan, 2007). This is because the company tries to update its processes with the latest technologies so as to attain the competitive advantage in this field. The major example of Woolworths being technological active is its online business. This website of the company provides the facilities to the customers in order to buy the products online and get it on the doorsteps. There is a need of more technological improvement and involvement of IT in all the process of the company because involvement of IT results in reduction o f human efforts and thus helps the company to get the output soon and efficiently. Importance of IT for Woolworth: The major problem that the company is facing is in regard to the online business of the company. It has been identified by the company that the online platform o the company does not have the capability and the functionality to support the customers and also dies not have any capability to plan the growth (Bass, 2007). The company wants the platform that allows the firm to enhance its functionality and the online business. It is very important for the company to implement the IT tools in one or the other function of the business, the first areas where the implementation is important is customers service. As Woolworth is the firm that is customer oriented so it is very much important for the company to serve the customer with the products along with provision of great service after purchase. That can be given by the online portals only. There is much other process where the IT is important for the company. One of them is the customer relationship management. Implementation of IT tools in such a process results in enhancing the customer relationship. Promotion management is one of the fields where the IT tools tea very much important (Brenner, Zarnekow and Wittig, 2012). The online tools of promotion provide the companies a great chance to reach the masses with low cost. IT tools requirements: Implementation of the software and the technology in the organization process requires the organization to take some of the steps in order to implement the software. Some of the pre-requisite are discussed below: Planning: It is the first step to any new process. Planning is the process that results in making the blueprint of the whole activities sequentially in order to achieve the objective, in case of implementation of the IT tool, the planning is done in order to design the software, the requirement of hardware etc. Cost: Cost is the major part of this whole process of software implementation. The cost that is involved in this field is related to hiring and training cost, designing cost, installation cost etc. Installation: Installation is the part that allows the company like Woolworth to install the program in the functions where it is required (Dos Santos, 2011). There are many projects in Woolworth that has been implemented such collaboration with Olympics, project galaxy etc. Training: Training is the stage where the employees of the organization are being trained in order to use the installed program very efficiently. Training is important because the employees are very much new to the software that has been introduced to them (Buhalis and Law, 2008). Thus, training session needs to be conducted in order to train the employees for the same. Employees not only improve their ability professionally by training but also have the capability to develop themselves at individual level. IT usage in Woolworths: There are many processes and functions where the company has incorporated new technologies. Some of them are discussed below: Project galaxy: Project galaxy is about introducing the new SAP system. This system is regarding the improvement of the customer relationship management. Other than this field this SAP is also related to the performance reporting, ordering processes and buying. This project has different aspects of promotion management as well (Celuch, Murphy and Callaway, 2007). This is the new online portal and its training is provided to the people or the employees of the company. This project was the final part of the project of technological up gradation that was started in 1999. The project name was project refresh. This project focuses on restructuring the whole business of the company. Olympic software: It is software that allows the company keeps the track records of the sales of the company. As the company was facing the challenge of online business and wants to enhance the same so it is very much important for the company to implement the changes in its online portal. Introduction of chrome technology: it has been identified that the windows software of the company has been replaced by the new Google Chrome technology. Around 85% of the Woolworths devices are using this technology and makes the price easier for the people. The company has announced that for 12months, it is going to be transitioned into a chrome technology. This replacement by the company is done because that company wants to be updated in very latest technology and facilitates to their employees with the same (Davenport, 2013). Several changes have been made in the portal and the online processes that have been used such as, replacement of Microsoft email from the Gmail that provides more facilities to collaborate and connect with each other. Chrome boxes have been introduced by the company that allow the firm for video conferencing etc. implementation of the Google devices in the company is possible because of the web based service of citrix. This is also a tool of IT that helps in installation part of the new software program. Woolworth is amongst the first companies which have installed the Google Apps. Project mercury: Project mercury is the supply chain development program of the company. This program looks at many processes such as what are the thing and the products ordered from the vendors, how it reached to the distribution and so on. Benefits of IT for Woolworth: Increase the sales: It has been analyzed that after using the IT tools the sales of the company has been increased. This is because these IT tools improve the efficiency of the process and the functions of the company. Sales of the company depend on the interaction between the customers and the employees or the company (Farkas, 2007). As Woolworth is the firm that has improved its customers service relationship by implementing the IT tool, and providing the services to the customers online helps the customers to make good relation with the company and vice versa. Reduction of the cost: Most of the human work id replaced by the technology and thus this makes the work more efficient and faster. This results in reduction of the cost and the elimination of the non-value added functions. Removal of such activities also reduces the cost of whole process and the function. Individual development of the employees: As the new programs have been installed in the company so the company focuses on train the employees for the same. This makes the employees more developed in regard with the technology. This not only develops the professional knowledge of the employees but also develop them individually (Kohli and Grover,2008). Easy monitoring of the processes: Online portal allow the company to keep the record. It replaces all the prior practices that are being dine on the spreadsheet. The new software helps in storing the data automatically about the order, store products etc. Risk associated with the IT tools: Data protection: As discussed that Woolworth is the company that is suing the latest technologies in all its process. Changing or replacing the old process requires the new process to be installed and transferring of data from old to new. This may ruin the security of the data and the data may be leaked. This is because to install the new program the company depends on third party firm and has to provide all the details about the company to that third party which may not be so much secured (Li, Peters, Richardson and Weidenmier Watson, 2012). Privacy: Privacy is the risks in terms of customers. If the customers shop online from Woolworth, they save their personal details and made their account on the portal. This portal then automatically accesses their details. This develops the issue of privacy. Maintenance and monitoring of It tools: Monitoring means evaluating the IT tools to check whether it is functioning according to the plan or not and maintenance means making the required changes in the tools. Monitoring requires a sequential process to be conducted I order to evaluate the tools (Rogsch and Klingsch, 2012). This helps in identifying the deviation and drawbacks in the IT tools. Any deviation if identified is corrected at the same time. In case of Woolworth, the company is very much focused in the monitoring process. It can be identified by the fact that the company has replaced its windows with the Google chrome functions so as to make their process more efficient and easy to deal with (Turban, Leidner, McLean and Wetherbe, 2008). Monitoring also help in reducing the risks associated with the IT tools in the company. If the audit of the IT tools and the team is regularly conducted than any of the threat can be detected and the corrective actions can be made over it. Conclusion: This study helps in analyzing the involvement of information technology in business. The business that has been chosen in the study is Woolworth. It has been analyzed that Woolworth has introduced the IT tool in almost all the processes on order to introduce the human efforts and make their process more efficient and faster (Riel and Becker, 2008). There are many requirements that need to be considered before implementation of any IT tool. These requirements re training, installing, cost of the installation etc. there are some risk also associated with the use of IT tools such as security of the data, privacy and other similar threats. Thus, monitoring of these tools is necessary to detect the threat at early stage so that it can remove at the same time. References: Applegate, L.M., Austin, R.D. and McFarlan, F.W., 2007.Corporate information strategy and management: text and cases. Boston: McGraw-Hill/Irwin. Bass, L., 2007.Software architecture in practice. Pearson Education India. Brenner, W., Zarnekow, R. and Wittig, H., 2012.Intelligent software agents: foundations and applications. Springer Science Business Media. Buhalis, D. and Law, R., 2008. Progress in information technology and tourism management: 20 years on and 10 years after the InternetThe state of eTourism research.Tourism management,29(4), pp.609-623. Celuch, K., Murphy, G.B. and Callaway, S.K., 2007. More bang for your buck: Small firms and the importance of aligned information technology capabilities and strategic flexibility.The Journal of High Technology Management Research,17(2), pp.187-197. Davenport, T.H., 2013.Process innovation: reengineering work through information technology. Harvard Business Press. Dos Santos, M.A., 2011. Minimizing the business impact on the natural environment: A case study of Woolworths South Africa.European Business Review,23(4), pp.384-391. Farkas, M.G., 2007.Social software in libraries: building collaboration, communication, and community online. Information Today, Inc.. Kohli, R. and Grover, V., 2008. Business value of IT: An essay on expanding research directions to keep up with the times.Journal of the association for information systems,9(1), p.23. Li, C., Peters, G.F., Richardson, V.J. and Weidenmier Watson, M., 2012. The consequences of information technology control weaknesses on management information systems: The case of sarbanes-oxley internal control reports.Mis Quarterly,36(1). Riel, M. and Becker, H.J., 2008. Characteristics of teacher leaders for information and communication technology.International handbook of information technology in primary and secondary education, pp.397-417. Rogsch, C. and Klingsch, W., 2012. Basics of Software-Tools for Pedestrian MovementIdentification and Results.Fire technology,48(1), pp.105-125. Turban, E., Leidner, D., McLean, E. and Wetherbe, J., 2008.Information technology for management, (With CD). John Wiley Sons.