SEARCH RESULTS

YOU WERE LOOKING FOR :Five Articles on Various Issues Involving Computer Technology

Essays 181 - 210

Business and the Use of Technology

learn lessons from the construction trade where building can either develop or may be designed especially with the users in mind. ...

IT and Systems Management

in mind when it comes to designing and implementing a system, as opposed to not doing so. While this might be a simplistic stateme...

Six Questions on Economics Answered

the way no enforceable rights will lead to opportunism. Coases theorem states that property rights give the market stability by al...

William Gibson's Cyberfiction Novel Johnny Mnemonic

The new literary genre dubbed 'cyberfiction' is considered in a five page research paper that discusses how technology's complicat...

'Strategic Intent' and Company Operations

relentlessly targeted Southwest in demarketing efforts, Southwest not only continued to exist. Eventually, it surpassed all of th...

HCI Practitioner Overview

In six pages usability testing and a practitioner of human computer interaction are discussed in this overview that includes histo...

Computer Evolution from Mainframe to Distributed Systems

has been the most long-standing and still carries one of the worlds most recognizable names. Early History of the Industry...

Future Role of IT and Telecommunication Companies

In twenty pages this paper discusses the connection between information technology and telecommunications companies in a considera...

Major Issues in Societal 'Telematics'

years, some so drastically that they have since been obliged to replace many of those workers who were "downsized." Though driven...

Saudi Arabia and the Exportation of Computers

resellers with some direct sales to individuals. Increasingly, direct sales primarily result from Internet exposure. Acme ...

Insurance and Bank Mergers and IT Issues

justice and respect that must be taken into consideration. Any merger between organizations but especially between banks and the i...

Women Who Seek Technology Careers and Their Characteristics

In a paper consisting of fifteen pages the environment and various issues that relate to women who pursue careers in technology ar...

Cockroach Eulogy

In five pages this lighthearted sample of creative writing involving a student's dorm roommate, a beloved pet cockroach....

Low and High Involvement and the Process of Making Purchase Decisions

In five pages this paper discusses the process of decision making when it involves making a purchase with low and high involvement...

Case Study on Flight Time

not developed a business plan. Indeed, the first time that this appears to occur is when an accountant is brought in to make the p...

A Nursing Perspective on Patient Mental Illness

This 15 page paper discusses seven patients who suffer from various forms of mental illness, and argues that there may be an under...

Banking Industry and Electronic Security

type of cryptography (2000). The Mississippi Secretary of States office for instance describes a digital signature as "a computer-...

Bray's So How Did I Get Here

international view has never been quite so harsh. It seems that America has a peculiar form of racism that continues to exist, but...

Nursing: Article Reviews

some determining the study was inconclusive, others saying certain interventions should be made universal and still others stating...

Ethics and medical technologies

are a number of research initiatives which deal with genetic mapping, therapy, and modification. Gene mapping, which is fundamenta...

Choosing a Computer

programs at later stages in the course, such as for analysis of results from primary research. There is also the need to be able ...

Organization That Contracts Services to Hospitals

This paper reports a number of issues in which the organization is involved. Issues include: measurements for performance and how ...

Hackers and Hacking

Hacking is an ongoing issue in computer security. This paper examining the issues associated with hacking. The paper starts by exa...

Work and Life Boundaries

ignore the home phone if he knows his boss wants him to come in early. This individual may be more stressed due to the fact that h...

Investigating Computer Fraud

This paper discusses the field of computer forensics, what it is, what investigators do, detection tools, cyberslacking, chain of ...

Workplace and Introduction of Technology

place on a daily basis such as: short term billing, long term leasing, invoicing, initial processing of customer information and v...

Post Industrialization Graphic Design

had it been possible to combine content and layout abilities in the same medium, and at the same time. The personal computer not ...

Careers in the US State Department- IT Security

It seeks an Information Technology Specialist to design and implement functional goals and protocols "for the rapid sharing and st...

Pathology Management and the Impact of New Technology

regions where several laboratories are working in tandem for different trusts. One of the elements which has been seen as most pro...

Academic Article Publishing Suitability

In seven pages this student supplied case study assesses an academic article's suitability for journal publishing....