SEARCH RESULTS

YOU WERE LOOKING FOR :Changing Technology and Resulting Moral and Social Threats

Essays 931 - 960

Social Work Case Study on Task Achievement Scaling Intervention

to at an earlier time. Though assignment of levels 1 - 4 is subjective in that it is not solidly based on measurable results, the...

Distance Learning Program Initiation

to the Online courses. There are also intangible resources that must be considered, such as faculty time. One expert commented: "...

Tom Sawyer by Mark Twain

him--and pay for the privilege. Tom realizes that "Work consists of whatever a body is obliged to do and that Play consists of wha...

George M. Soares Prabhu Dialogue on South Asia and Eucharist as an Impetus for Social Change

the manner by which Soares Prabu (1992) strives to enact social change by virtue of Eucharist, it is important to understand there...

Managing the Information Technology Resource by Jerry N. Luftman Chapter Summaries

adopted, while the right-hand end of the curve depicts the period in which laggards adopt ET (Luftman 186). The next section of th...

1960s Cultural Revolution

(increases in drug use) (Garrett 288). A prominent feature of the decade is that young people became alienated from the traditiona...

Selection, Theory, and Measurement in Change Management

future, but the business process changes that current technology will facilitate is ongoing and permanent. The proposed changes f...

The Benefits of New Technologies on E-Commerce

1995 world wide only 1 financial institution had web banking, by 2002 this increased to 6,000 had this. In 1995 only 50 financial ...

The 'Hooking Up' Trend from a Sociological Perspective

the 1960s, there was a strong anti-war movement and a strong movement against anything consider to be conservative or an instituti...

Enlightenment Philosophy and Religion

belief, but at the "priests and their stupid or hypocritical instruments . . we shall think of them only to pity their victims and...

How the Diamond Age Contributes to the Philosophy of Technology

social class ended up in the hands of a poor girl. It was actually stolen by her brother who associated with a bad crowd. It is im...

Reflective Paper on a Social Studies Lesson Plan

before using it as an instructional model in future classroom activities. Improvement in Teaching Practice Viewing student per...

Capital Structure of Ohio Casualty Corp

million1 this is made up of $4,336.7 debt and $1,426.4 in equity. This means that 77.3% of the company capital is debt and only 22...

Scope Mouthwash; Marketing Case Study

$4 million in marketing including trial samples, coupons and other promotional activities, over a 3 three month period between 199...

Web 2.0/Wave of Corp. Future

have been posted by a university, an institution or a business firm and consist of a series of inter-linked pages (Belcher 34). We...

Greenfield/Science Changes, People Do not

use that will be the real issue, the pivotal point around which the ramifications of technology will revolve. Greenfield goes on...

Social Change from a Functional and Conflict Perspective

structures. The rise of the union at the turn of the twentieth century is one example as is its downward trend in more recent year...

Week 3 Discussion Questions

government never would have made such a demand of a small multinational because a small company would not have the necessary resou...

The United States - A Reluctant Welfare State

the challenge of numerous social problems throughout its history (Jansson, 2000). During the colonial period, indentured servants ...

Improvement Processes

been adding a cost. The process of improvement was akin to the introduction of a just in time management system associated with ...

National Educational Technology Plan

This is immediate feedback for both teacher and students on their level of understanding. The teacher can then repeat the lesson o...

Biometric Technology & Identity Theft

Also, identity thieves have found that the resources of law enforcement are totally inadequate in regards to this type of lawbreak...

Wireless Communication

The beginnings of wireless goes back to the eighteenth century when Marconi would obtain a patent to increase the Wireless Telegr...

Dialect, Accent/Southeast England

reality of this situation is that some accents are associated more closely with the accent that is perceived as the societal norm ...

Genetically Modified Food

from individual cells and all of the offspring are genetically identical. Bioengineering is not a new technology. In was...

Emphasizing Technology as an Educational Principle

in terms of social advantages is more than apparent and this dichotomy extends beyond the individual to the community and to the n...

Accounting Standards; Will Enron Happen Again?

the GEC directors took control of the company, and therefore the accounts this ?10 million profit turned into a $4.5 million loss ...

The Effects of Organizational Culture

Darrin worked for an advertising agency and the entire show centered around the pressures of his job and his ever-present boss Lar...

Web Services Technologies

key to the development as it is this that specifies the way in which the interoperability will be achieved, allowing the different...

Development & Sub-Sahara

to develop (Terray 38). According to classical evolutionary theory, as argued by early sociologists such as Auguste Comte, socia...