Skip to content
    • info@phantran.net
  • Connecting and sharing with us
  • -
  • About us
    • info@phantran.net
HKT ConsultantHKT Consultant
  • Home
  • Corporate Management
    • Entrepreneurship
      • Startup
      • Entrepreneurship
      • Growth of firm
    • Managing primary activities
      • Marketing
      • Sales Management
      • Retail Management
      • Import – Export
      • International Business
      • E-commerce
      • Project Management
      • Production Management
      • Quality Management
      • Logistics Management
      • Supply Chain Management
    • Managing support activities
      • Strategy
      • Human Resource Management
      • Organizational Culture
      • Information System Management
      • Corporate Finance
      • Stock Market
      • Accounting
      • Office Management
  • Economics of Firm
    • Theory of the Firm
    • Management Science
    • Microeconomics
  • Research Methodology
    • Methodology
      • Research Process
      • Experimental Research
      • Research Philosophy
      • Management Research
      • Writing a thesis
      • Writing a paper
    • Qualitative Research
      • Literature Review
      • Interview
      • Case Study
      • Action Research
      • Qualitative Content Analysis
      • Observation
      • Phenomenology
    • Quantitative Research
      • Statistics and Econometrics
      • Questionnaire Survey
      • Quantitative Content Analysis
      • Meta Analysis
      • Statistical Software
        • STATA
        • SPSS
        • SEM-AMOS
        • SmartPLS
        • Eviews
Monitoring Employees on Networks: Unethical or Good Business?

The Internet has become an extremely valuable business tool, but it’s also a huge distraction for workers on the job. Employees are wasting valuable company time by surfing inappropriate websites (Facebook, shopping, sports, etc.), sending and re­ceiving personal email, texting to friends, and down­loading videos and music. According to a survey by International Data

1 Comments

19
Jun
Cellular Systems

Today 81 percent of U.S. adults own mobile phones, and 69 percent own smart­phones (eMarketer, 2018). Mobile is now the leading digital platform, with total activity on smartphones and tablets accounting for two-thirds of digital media time spent, and smartphone apps alone capturing more than half of digital media time (Comscore, 2017). Digital cellular

2 Comments

19
Jun
Wireless Computer Networks and Internet Access

An array of technologies provides high-speed wireless access to the Internet for PCs and mobile devices. These new high-speed services have extended Internet ac­cess to numerous locations that could not be covered by traditional wired Internet services and have made ubiquitous computing, anywhere, anytime, a reality. 1. Bluetooth Bluetooth is the popular name for

1 Comments

19
Jun
The Web

The web is the most popular Internet service. It’s a system with universally accepted standards for storing, retrieving, formatting, and displaying informa­tion by using a client/server architecture. Web pages are formatted using hy­pertext, embedded links that connect documents to one another and that also link pages to other objects, such as sound, video, or

4 Comments

19
Jun
RFID and Wireless Sensor Networks

Mobile technologies are creating new efficiencies and ways of working through­out the enterprise. In addition to the wireless systems we have just described, radio frequency identification systems and wireless sensor networks are having a major impact. 1. Radio Frequency Identification (RFID) and Near Field Communication (NFC) Radio frequency identification (RFID) systems provide a powerful

2 Comments

19
Jun
Google, Apple, and Facebook Battle for Your Internet Experience

Three Internet titans—Google, Apple, and Facebook—are in an epic struggle to dominate your Internet experience, and caught in the crossfire are search, music, video, and other media along with the devices you use for all of these things. Mobile devices with advanced functionality and ubiq­uitous Internet access are rapidly overtaking tradi­tional desktop machines as

19
Jun
Hackers Target the U.S. Presidential Election: What Happened?

September 2015, Special Agent Adrian Hawkins of the U.S. Federal Bureau of Investigation (FBI) phoned the Democratic National Committee (DNC) with troubling news about its computer network: At least one DNC com­puter system had been penetrated by hackers linked to the Russian govern­ment. Yared Tamene, the DNC tech-support contractor who fielded the calls, conducted

1 Comments

21
Jun
Why Systems are Vulnerable

When large amounts of data are stored in electronic form, they are vulnerable to many kinds of threats. Through communications networks, information sys­tems in different locations are interconnected. The potential for unauthorized access or damage is not limited to a single location but can occur at many access points in the network. Figure 8.1

2 Comments

21
Jun
Malicious Software: Viruses, Worms, Trojan Horses, and Spyware

Malicious software programs are referred to as malware and include a variety of threats such as computer viruses, worms, and Trojan horses. (See Table 8.1.) A computer virus is a rogue software program that attaches itself to other software programs or data files to be executed, usually without user knowledge or permission. Most computer

2 Comments

21
Jun
Hackers and Computer Crime

A hacker is an individual who intends to gain unauthorized access to a com­puter system. Within the hacking community, the term cracker is typically used to denote a hacker with criminal intent, although in the public press, the terms hacker and cracker are used interchangeably. Hackers gain unauthorized access by finding weaknesses in the

1 Comments

21
Jun
Internal Threats: Employees

We tend to think the security threats to a business originate outside the or­ganization. In fact, company insiders pose serious security problems. Studies have found that user lack of knowledge is the single greatest cause of network security breaches. Many employees forget their passwords to access computer systems or allow coworkers to use them,

1 Comments

21
Jun
Software Vulnerability

Software errors pose a constant threat to information systems, causing untold losses in productivity and sometimes endangering people who use or depend on systems. Growing complexity and size of software programs, coupled with demands for rapid delivery to markets, have contributed to an increase in soft­ware flaws or vulnerabilities. For example, in February 2017

3 Comments

21
Jun
Legal and Regulatory Requirements for Electronic Records Management

U.S. government regulations are forcing companies to take security and con­trol more seriously by mandating the protection of data from abuse, exposure, and unauthorized access. Firms face new legal obligations for the retention and storage of electronic records as well as for privacy protection. If you work in the healthcare industry, your firm will

21
Jun
Electronic Evidence and Computer Forensics

Security, control, and electronic records management have become essential for responding to legal actions. Much of the evidence today for stock fraud, embezzlement, theft of company trade secrets, computer crime, and many civil cases is in digital form. In addition to information from printed or typewritten pages, legal cases today increasingly rely on evidence

1 Comments

21
Jun
What are the components of an organizational framework for security and control?

Even with the best security tools, your information systems won’t be reliable and secure unless you know how and where to deploy them. You’ll need to know where your company is at risk and what controls you must have in place to protect your information systems. You’ll also need to develop a security pol­icy

21
Jun
What are the most important tools and technologies for safeguarding information resources?

Businesses have an array of technologies for protecting their information resources. They include tools for managing user identities, preventing unau­thorized access to systems and data, ensuring system availability, and ensuring software quality. 1. Identity Management and Authentication Midsize and large companies have complex IT infrastructures and many sys­tems, each with its own set of

2 Comments

21
Jun
How Secure Is the Cloud?

Over the last several years, many companies have altered their IT strategies to shift an increasing share of their applications and data to public-cloud infra­structure and platforms. However, using the public cloud disrupts traditional cybersecurity models that many companies have built up over years. As a re­sult, as companies make use of the public

1 Comments

21
Jun
How do enterprise systems help businesses achieve operational excellence?

Around the globe, companies are increasingly becoming more connected, both internally and with other companies. If you run a business, you’ll want to be able to react instantaneously when a customer places a large order or when a shipment from a supplier is delayed. You may also want to know the impact of these

3 Comments

21
Jun
How do supply chain management systems coordinate planning, production, and logistics with suppliers?

If you manage a small firm that makes a few products or sells a few services, chances are you will have a small number of suppliers. You could coordinate your supplier orders and deliveries by using just a telephone and fax machine. But if you manage a firm that produces more complex products and

1 Comments

21
Jun
How do customer relationship management systems help firms achieve customer intimacy?

You’ve probably heard phrases such as “the customer is always right” or “the cus­tomer comes first.” Today these words ring truer than ever. Because competitive advantage based on an innovative new product or service is often very short lived, companies are realizing that their most enduring competitive strength may be their relationships with their

1 Comments

21
Jun
  • 1
  • …
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • …
  • 196
Theories of the firm
  • Theory of Organizational structureTheory of Organizational structure
  • Plan d’actions
  • Social Theories and ConceptsSocial Theories and Concepts
  • Decision TheoryDecision Theory
  • Organizational Ecology TheoryOrganizational Ecology Theory
  • Institutional TheoryInstitutional Theory
  • Contingency TheoryContingency Theory
  • The Invisible hand of Adam SmithThe Invisible hand of Adam Smith

Most Read in 30 days

Methodology & Skills
  • Doing Management Research: A Comprehensive GuideDoing Management Research: A Comprehensive Guide
  • A Comparison of R, Python, SAS, SPSS and STATA for a Best Statistical SoftwareA Comparison of R, Python, SAS, SPSS and STATA for a Best Statistical Software
  • Research methodology: a step-by-step guide for beginnersResearch methodology: a step-by-step guide for beginners
  • Learn Programming Languages (JavaScript, Python, Java, PHP, C, C#, C++, HTML, CSS)Learn Programming Languages (JavaScript, Python, Java, PHP, C, C#, C++, HTML, CSS)
  • Create your professional WordPress website without codeCreate your professional WordPress website without code
  • Quantitative Research: Definition, Methods, Types and ExamplesQuantitative Research: Definition, Methods, Types and Examples
  • Qualitative methods: what and why use them?Qualitative methods: what and why use them?

Connecting and sharing with us

... by your free and real actions.

hotlineTComment and discuss your ideas

Enthusiastic to comment and discuss the articles, videos on our website by sharing your knowledge and experiences.

hỗ trợ hkt Respect the copyright

Updating and sharing our articles and videos with sources from our channel.

hỗ trợ hkt Subscribe and like our articles and videos

Supporting us mentally and with your free and real actions on our channel.

HKT Channel - Science Theories

About HKT CHANNEL
About HKT CONSULTANT

Website Structure

Corporate Management
Startup & Entrepreneurship
Management Science
Theories of the firm

HKT Consultant JSC.

      "Knowledge - Experience - Success"
- Email: Info@phantran.net
- Website:
phantran.net

  • Home
  • Corporate Management
    • Entrepreneurship
      • Startup
      • Entrepreneurship
      • Growth of firm
    • Managing primary activities
      • Marketing
      • Sales Management
      • Retail Management
      • Import – Export
      • International Business
      • E-commerce
      • Project Management
      • Production Management
      • Quality Management
      • Logistics Management
      • Supply Chain Management
    • Managing support activities
      • Strategy
      • Human Resource Management
      • Organizational Culture
      • Information System Management
      • Corporate Finance
      • Stock Market
      • Accounting
      • Office Management
  • Economics of Firm
    • Theory of the Firm
    • Management Science
    • Microeconomics
  • Research Methodology
    • Methodology
      • Research Process
      • Experimental Research
      • Research Philosophy
      • Management Research
      • Writing a thesis
      • Writing a paper
    • Qualitative Research
      • Literature Review
      • Interview
      • Case Study
      • Action Research
      • Qualitative Content Analysis
      • Observation
      • Phenomenology
    • Quantitative Research
      • Statistics and Econometrics
      • Questionnaire Survey
      • Quantitative Content Analysis
      • Meta Analysis
      • Statistical Software
        • STATA
        • SPSS
        • SEM-AMOS
        • SmartPLS
        • Eviews
  • About us