SEARCH RESULTS

YOU WERE LOOKING FOR :How to Use Soft Systems Methodology SSM

Essays 451 - 480

Neuman and Rogers Systems Model Application

the realization of the "dehumanizing" of patients that led to them being referred to as "Bed x," "Case x" or some other nameless, ...

Systems Failure Planning Through Hybrid Managers

of failure in this we will consider that determination to indicate that the system has, at one stage worked, failure due to never...

Knowledge Management (KM) Processes

careful to not be blinded by the bells and whistles of technology or the "gee-whiz" factor. Instead, they must be able to determin...

Punishment and Prisons in England During the Victorian Age in Great Expectations by Charles Dickens

accountable. In one of his most memorable works, Great Expectations (1860-1861), Dickens tackled the social hypocrisy that was ru...

Overview of IT/Oakland Family Medicine

This research paper/essay describes the IT systems used by Oakland Family Medicine, which is associated the MaineGeneral Medical C...

Implmenting VMI in Indian Company

Rajat Mehra's company is a bottler for Coca-Cola and five other beverages. Their customers represent a range of semi-literacy in f...

Lone Star College System

Lone Star College, founded in 1973, is the largest higher education institution in the Houston, Texas area. It is also one of the ...

Chapter 9, Forensics Handbook, An Analysis

This paper discusses the five-stage model developed by the Vera Institute, which describes the process used to enter adolescents i...

Lone Star College System Analyasis

The crisis of a nursing shortage will continue for at least another three years. Some colleges have added additional programs in a...

Proposal Hospital Implement Electronic Management

Information technology plays a major role in mitigating different issues such as increasing demand, constrained resources, continu...

Biggest Hacking in U.S. History

Just before Thanksgiving 2013, malware was installed on Target's security and payments system that was designed to capture all the...

Branch Davidians and More

This essay discussed three topics. One topic is a discussion on why people violate safety rules. Another compares Waco and MOVE. T...

IT System Contingency Planning Process

The paper presents a process which may be used for disaster recovery and contingency planning, focusing on IT assets and systems. ...

Dramatic Changes in One District

One school district in a very remote and isolated area needed to change dramatically. They were in crisis. This paper describes ho...

Church in the Middle Ages

This paper discusses our issues about the separation of Church and state. It also discusses the power of the church in the middle ...

Museum Needs and Challenge, New CMS

This paper pertains to computer and collections management systems (CMS) as they are used in contemporary museums. It also address...

Theory Utilization, Betty Neuman

This research paper describes how an advanced practice nurse used Neuman's systems model and assessment tool to aid in developing ...

Cultural Differences in Sociotechnical Systems

In a paper of four pages, the writers look at cultural differences in sociotechnical systems. An article on such a topic is examin...

S-D Logic - A New Paradigm for Value Creation

The writer reviews an article entitled "On value and value co-creation: A service systems and service logic perspective", which ad...

Security Measures in Operating Systems

In a paper of twelve pages, the writer looks at security measures for operating systems. A variety of such measures are compared a...

The Potential Benefit of FDI from China to Africa

Africa is one of the world's poorest regions. It has been argued that one strategy which is useful for economic development to all...

The Canadian Justice System and Fitness to Stand Trial

In a paper of eleven pages, the writer looks at the Canadian justice system. Fitness to stand trial is examined in respect to a nu...

Oil Trade in Africa and China

In a paper of three pages, the writer looks at Africa and China's oil trade. The imbalances in this trade system are explored. Pap...

Taxation Comparison

In a paper of three pages, the writer looks at systems of taxation. Value added taxes are compared with income taxes. Paper uses t...

Neurotoxicity

This research paper uses a case study as background and addresses the topic of neurotoxins, focusing on Anatoxin-A and Saxitoxin....

Education and the Integration of Technology

as keeping track of grades and attendance records (Gray 2010). By the same token, at least 96% of teachers report the use of word ...

The Problem with Literacy Teaching in Schools

To potential value of a dialogic pedagogy has been recognized in different government policies. For example, in 2005 with the EPPI...

Customer Trust and Security of Information

to maintain trust between the people engaging in transaction" such that customers remain entirely satisfied with the level of trus...

Systems Development Life Cycle - Multinational Applications

are identified, alternative solutions are suggested, and the costs and benefits of the project are quantified. This surveying of t...

Filmless Radiographic Imaging - An Overview

obvious. By and large, film cameras have been replaced with consumer grade digital cameras, and more people now take photographs w...