SEARCH RESULTS

YOU WERE LOOKING FOR :How Employees View Technology A Research Proposal

Essays 151 - 180

Fictitious Sleep Shell Product Proposal

In eight pages a marketing survey, financial information, and 4 charts are featured in this fictitious product investment proposal...

Professional Purchase Proposal for an Electrocardiograph

In eight pages a proposal is presented to sell an ECG to a hospital administrator in this paper....

A Proposal to Examine How The Effectiveness of Advertising May be Improved

with the quote "Half the money I spend on advertising is wasted; the trouble is I dont know which half". This indicated the proble...

Delimitations, Limitations, Summary/Research Proposal

criminal justice system (Romero and Lee, 2008). This suggests that the proposed study could be delimited still further by focusing...

PROMOTIONAL CONTEST - SELLING A BOOK

February 13, with the winner to be announced on February 14. We restrict it to this two-week period to put a sense of urgency into...

Prostate Victims & Their Partners/Quality of Life

et al, 2007). Over the last several decades, clinicians have come to regard treatment decisions in terms of quality of life "ben...

Proposal for Scoria

proposal to change the operating procedures concerning the greasing of the equipment at Scoria. This is current undertaken by staf...

Ethics and General Motors (GM)

2008). The plant closing, for Isidore (2008), suggests that depending on pickup trucks and SUVs for sustenance is no longer a viab...

Plan to Keep Construction Managers

with an aggregate value in excess of a billion dollars. The company was founded in 1978. * Tom Manchester, president and project m...

Stem Cell Research: An Ethical Dilemma

effectiveness is directly impacted by provisions for quality assurance. For the most optimum outcome stem cell research must yiel...

Biometric Technology & Identity Theft

Also, identity thieves have found that the resources of law enforcement are totally inadequate in regards to this type of lawbreak...

Security and Wireless Technologies

issues of concern include: authentication, authorization, encryption, misuse and abuse in addition to hackers (Posluns, 2002). One...

Business, Internet, and IS

the Internet, trading partners can bypass intermediaries and inefficient multi-layered procedures. Furthermore, Web-sites are avai...

William Gibson's Cyberfiction Novel Johnny Mnemonic

The new literary genre dubbed 'cyberfiction' is considered in a five page research paper that discusses how technology's complicat...

ITM Application of Company Manufacturers

within the same system. A typical example would be a company which has businesses spread over many manufacturing environments. I...

The Adoption of Technology by Senior Citizens

In a paper of seven pages, the writer looks at technology use by senior citizens. Adoption of technology is examined through the d...

Benefits of Technology Outweigh the Problems

This 10 page paper gives an overview of the positive and negative elements of technology. This paper includes research and studies...

Technology That is Environmentally Friendly

In twenty pages this research paper discusses how technology can actually have a positive impact upon the environment through the ...

3 Articles on IT Reviewed

In six pages this paper reviews 3 articles researching various information technology aspects such as new system development for t...

Proposal of Automobile Black Boxes

and the force of impact. While airbag sensors record a vehicles motion just prior to a crash, thus far, this information has not b...

Reducing the Problem of Absenteeism

motivation, low levels of trust and the perception of unfairness. These results are highly aligned with relevant theory. The res...

Web 2.0/Wave of Corp. Future

have been posted by a university, an institution or a business firm and consist of a series of inter-linked pages (Belcher 34). We...

Research and the Value of Educational Technology

In a paper of nine pages, the writer looks at educational technology. The importance of planning and evaluation in the use of tech...

The Benefits of New Technologies on E-Commerce

1995 world wide only 1 financial institution had web banking, by 2002 this increased to 6,000 had this. In 1995 only 50 financial ...

Managing the Information Technology Resource by Jerry N. Luftman Chapter Summaries

adopted, while the right-hand end of the curve depicts the period in which laggards adopt ET (Luftman 186). The next section of th...

Electronic Monitoring Devices/Parolees and Prisoners

in prison (Biniok, 2004). They contend that the costs of electronic supervision are unacceptable, even that such supervision viol...

University Healthcare Call Center Construction and Implementation

nurse desk or to another location for prescription refill. Messages are recorded on paper message pads, after which the message i...

Dissertation Proposal on the Commercial Value of IT

measure this value rather than the use of the traditional productivity measures. This can then be expanded into the way value meas...

Motivation and the Performance of the Employees

and explained. For employers that have operations within the scientific management paradigm where there are often operations that ...

Muslim Women - Oppressed

injustice" (Cudd, 2006, p. 23). This means that oppression is perpetuated through some sort of social institution or through the p...