SEARCH RESULTS

YOU WERE LOOKING FOR :Ethics and Information Technology

Essays 1981 - 2010

Privacy Issues Involving Online Portals and Personal Information

that entity to maintain the boundaries of confidentiality, keeping any and all private data within the confines of that particular...

Information Use and Best Practices

the company. iv. Communication can be two-way. v. Keeps clients informed without involving impersonal letters or costly telephone ...

Article Review on Information Systems Management

391). * Directing effective management of IS resources (Booth and Philip, 2005, p. 391). * Aligning investments with business goal...

Eliminating Malaria Through Geographic Information Systems

Across the Globe (5) With the link between the mosquitoes and malaria the main form of control has been to eliminate the Anophe...

Education and Successful Information Systems' Building

parents and students; it appears that the students, teachers and community members in Boston do not agree (Wildstrom, 2002). Wild...

Strategic Plan for Butler Information Service, Inc.

a diversified portfolio of services to assist with commercial relocation and facility transition throughout the world. This stra...

Management Information Systems in Schools Research

is narrower and more concentrated by looking to information to be gained in-depth from a smaller quantity of subjects. Often this...

Ritz Carlton Hotels and Guest Satisfaction Improved Through Customer Information Databases

staff member who hears or sees information that they believe will make the guest more comfortable (Berinato, 2002). The Ritz-Car...

Apple Computers and the Information Age

the information revolution is not able to contribute to the development of democratic systems, even though it clearly can offer th...

Review of Army Transforms Information Systems Management Paradigm by James H. Ward

reports, it becomes more efficient and effective" (Ward, 2003). The logic behind Wards (2003) endorsement of ISM for the Army is...

21st Century Retrieval of Information

Many patrons can access the information from their home computers so that they do not even have to go to the library to see if a b...

Identifying Information for Marketing and Hotel in Aqtau City, Kazakhstan

lower income groups. Overall, the GDP per capita in the country was only $8,200 in 2005 and 19% lived below the poverty line (CIA,...

Real-Time Information in the Hospital Setting

real-time applications, patient records are updated instantly as information is added to them. Thus the physician making rounds h...

Hospital Information Systems

interfaces with the a new computerized patient order entry system. Therapists use tablets at the patient bedside, which enhances m...

Cell Phones and Cancer: Examining Sources of Information

that has been devoted to it over the years, we still do not know what causes cancer. We know what cancer is and in most situation...

Urban Planning and the Geographic Information System

in the design of cities as well as perhaps the design of a single building. Additionally, GIS is a tool utilized for comprehending...

Hospital Information Systems: Identifying Pathways

to transfer data recorded by the monitors by telephone to the clinic. Nurses orchestrate this data transfer and conduct an initia...

Bioethics: Space And Military Technology

its dying masses. Even after realizing the mess made from human conspicuous consumption, there has been a lukewarm rally to take ...

Bus Manufacturing

of the idea should be carried out. Next, the team needs to list resources needed to develop the system and match resources to the...

The Ethical, Legal and Social Implications of Developing Smart Home Living

at al, 2010). The potential benefits has resulted in a large investment, for example the i2home project which was funded by the E...

California Police Officers: Certain Physique And Weight Management

weight management in California police departments is now a focal point to maintaining a strong police force and decreasing the po...

Improving Security Performance in an Organization with the Use of RFID Smart Cards and Biometric Data

of security measures that make up a security policy. Traditionally, there have been the use of ID cards; ID cards would be issued ...

Educational Equity And Diversity: Technology And The Digital Divide

for this special group with the intervention of technological advancement in the school setting. Current generations of exception...

Strategy at Anadarko Petroleum

The oil industry already was operating under pressure before adding the complications of the Gulf Coast hurricanes of 2005. In th...

Business Dynamics of ZDNet News

rely on ZDNet to deliver deep insight into IT planning, vendor consideration, and product selection" (ZDNet, 2006). To accomplish...

Case Briefs

brought suit against Imarflex in 1985 for trademark infringement and for breach of contract. * Sengoku sold heaters bearing the Ke...

Positron Emission Tomography (PET): The Potential Pitfalls of Reimbursement

availability of such reimbursement, however, comes the potential for certain pitfalls. Those pitfalls include the overuse of the ...

Past and Present Motion Picture Special Effects Technology

actual event with which the audience is familiar with an example being the Pearl Harbor catastrophe of December 1941 that was repr...

Issues of Authenticity/Internet & TV

informing the citizenry on what they need to know to be responsible as co-policymakers within a democratic framework.2 When news a...

The 16 Slice CT

al., 1987; Miller, Muller, and Vedal, 1989). Despite its usefulness in a broad variety of applications, however, HCRT has some dr...