SEARCH RESULTS

YOU WERE LOOKING FOR :Computer Security and Internal Corporate Hacking

Essays 151 - 180

Dell Inc.

country (Dell Annual Report, 2000). This company has achieved some amazing results, by 2000 the company was selling $50 million a ...

Comparing China and South Africa

see some similarities when it comes to South Africa. In this paper, well compare the two countries in terms of these categories, t...

Claims Processing and IBM and EDS Affiliated Computer Services

are from magazines and journals. The Internet, used properly, is a sound and reliable resource, as long as researchers remember t...

Claims Processing Outsourcing

of shifting/delegating/transferring a service/process/function to a third-parties/external service provider which would otherwise ...

Workplace Productivity Increased by Palmtop Computer

This paper consists of nine pages and presents a fictitious proposal writing sample that argues to a corporate board how palmtop c...

Role of Management in Avoiding Y2K Catastrophe

In fifty pages this comprehensive research paper examines how management in the corporate sector can successfully tackle the probl...

Plan Proposal for Computer Game Business

In thirteen pages and five sections the CuttingEdge computer game business is examined in a proposed plan that includes company in...

Apple Computer's Organizational Culture

Culture Hofstede, Neuijen, Ohayv and Sanders described organizational culture as the "patterns of shared values and beliefs that ...

E-mail's Influence on Corporate Management Practices

A paper discussing the impact and influence e-mail has had on the corporate landscape. The author discusses the impact of other c...

Successful Ecommerce Website Design

This paper considers how to successfully design a corporate ecommerce website in an overview of ten pages that considers character...

eCommerce Strategy of Dell

In five pages Dell's corporate rise within the personal computer industry is assessed in terms of its ecommerce strategy. Four so...

Importance of Database Security

most critical resource in todays enterprises is information, whether they are industrial, commercial, educational, or civic. As su...

Gateway and Dell Websites

In seven pages these two computer manufacturers' websites are evaluated with a brief corporate description provided and then an an...

Comparative Advantage of Dell Computer

In six pages the personal computer industry and its changes are examined in the responses of corporate giants, Gateway, Compaq, an...

Computer Hardware Change Management and its Implications

In six pages this paper examines how computer hardware changes have significant risk and reward implications for corporate managem...

Indian International IT Company Satyam Computer Services, Ltd.

Additionally, Satyam has forged numerous alliances over the years, including with IBM, Siebel and Microsoft. Satyams U.S. subsidia...

Analysis Two Major Computer Companies

a dictator. All final decisions were made by him, just like Jobs and like Jobs, he was a micromanager. Dell believed that good pla...

Two Fraud Cases

Fraud continues to be rampant in the corporate world. Prudential Securities were charged with late trading. A manager for Johnson ...

Culture and Belief as it Respects Information Security

it is important to examine culture to see how a culture of security can impact an ordinary business. One part of culture is how an...

Why Passwords and Good Information Security Technologies Are Compromised by Users

cases, there are four critical factors that affect the proper usage of passwords: Multiple passwords; Password content; Perceived ...

Afghanistan Development - Review And Recommendations

nations employ many Afghans. On April 29-30, 2007, Afghanistan held the Fourth Afghanistan Development Forum (ADF) in Kabul (Afg...

Scheduling

place concurrently at the same time) rather than consecutively (one at a time after each other). Possible paths Total number of ...

Literature Review for Use in a Project on Leadership in Kuwait

or values. It is by understanding leadership and its influences that the way leadership may be encouraged and developed in the con...

Planning and the External Environment

met. To consider the way planning takes place at all levels the process itself and the approaches can be examined. Mintzberg (et...

Assessment of an IT Web Site

include a jobs section as well as a section containing white papers across a large number of different areas such as SOX complianc...

Article on Allocation of Costs

by the project, use of department that are using those resources. In the case of all costs being allocated to a single project or ...

Developing a Marketing Plan for Viagra

to influencers Pfizer may appeal to men who would not otherwise come forward. It is undertaken in a tasteful manner, in line with ...

Global Data Security

type of electronic data and information is highly vulnerable to breaches. The Global Security Market and Trends This is a growi...

Corporate Culture: Impact Upon Customer Relations And Social Responsibility

is not something often at the forefront of modern day business dealings. According to Lena C. Pripp-Kovac, head of corporate resp...

Current Thinking and Management Issues Regarding Corporate Governance

sort through the shards of Enrons collapse, the concept of corporate governance can make a difference in many areas as it enhances...