SEARCH RESULTS

YOU WERE LOOKING FOR :How to Use Soft Systems Methodology SSM

Essays 451 - 480

Internal and External Hardware and Software Development Process Efficiency and Effectiveness of Automotive Systems

In fifty pages this paper examines how the automotive industry's development process has been assisted through technology uses, mo...

3 Articles on IT Reviewed

In six pages this paper reviews 3 articles researching various information technology aspects such as new system development for t...

Comparison of Selective and Universal Welfare Approaches

In nine pages this paper uses the example of the UK in this comparative analysis of universal and selective approaches to the welf...

Organizational Reward Systems and Motivation

In eight pages various motivational and reward systems that can be used in the workplace are assessed in terms of the pros and con...

The System of Trokosi

by a spokesman for the fetish priests, Togbe Atsu Eklo of the Adzimashi shrine, which appealed to the gods and their ancestors to ...

Of Sound Mind and Body and Descartes

This research report examines rationalizations used by Descartes and his own belief system. Various issues are explored and scient...

Controlled Release Systems of Drug Delivery and the Role of Polymers

to degradation at the site of administration whether administered by subcutaneous, intramuscular, intestinal, buccal, rectal, nasa...

Citibank Asia Pacific Information Systems and 'Let a Hundred Flowers Bloom'

In ten pages this paper uses case study data regarding Citibank's Asia Pacific information systems and applies the cultural saying...

Lawsuits Against the Tobacco Industry

This 7 page paper discusses the relationship between tobacco use and the legal system, particularly with regard to underage smokin...

Declining Customer Service and Bank Mergers

In five pages the Canadian banking system is used as the focus of this examination of how increased bank mergers have meant decrea...

The Significance of Computer-Aided System Engineering Tools

The writer describes the use of computer-aided system engineering (CASE) tools and their significance for business. The writer arg...

History, Design, and Usage of Neural Networks

In sixteen pages this paper discusses neural networks in a consideration of history, design, uses as systems of decision support a...

Internet and IT

In eighteen pages this paper discusses business information systems and the increase in Internet technology uses. Twelve sources ...

Psychological Views of the Insanity Legal Defense

In eight pages the legal system is discussed in an overview of how the insanity defense is used from a psychological point of view...

U.S. Health Care

picked up through government programs and often receive quality health care. Those who make too much money to qualify for free med...

Comparative Analysis of Canada's Private and Public Education Systems

In six pages this paper compares private and public education systems in Canada in terms of the results each produces. There are ...

Television's On Demand Video

for small audiences (OBrien). Transport Standards Video on Demand is supported by two major systems...

Overview of IT/Oakland Family Medicine

This research paper/essay describes the IT systems used by Oakland Family Medicine, which is associated the MaineGeneral Medical C...

Implmenting VMI in Indian Company

Rajat Mehra's company is a bottler for Coca-Cola and five other beverages. Their customers represent a range of semi-literacy in f...

Compare Culture Three Automotive Companies

Corporate cultures have been identified as competitive advantages and this paper briefly explains the culture at three auto compan...

Lone Star College System

Lone Star College, founded in 1973, is the largest higher education institution in the Houston, Texas area. It is also one of the ...

Dramatic Changes in One District

One school district in a very remote and isolated area needed to change dramatically. They were in crisis. This paper describes ho...

Church in the Middle Ages

This paper discusses our issues about the separation of Church and state. It also discusses the power of the church in the middle ...

Biggest Hacking in U.S. History

Just before Thanksgiving 2013, malware was installed on Target's security and payments system that was designed to capture all the...

Branch Davidians and More

This essay discussed three topics. One topic is a discussion on why people violate safety rules. Another compares Waco and MOVE. T...

Chapter 9, Forensics Handbook, An Analysis

This paper discusses the five-stage model developed by the Vera Institute, which describes the process used to enter adolescents i...

Lone Star College System Analyasis

The crisis of a nursing shortage will continue for at least another three years. Some colleges have added additional programs in a...

Proposal Hospital Implement Electronic Management

Information technology plays a major role in mitigating different issues such as increasing demand, constrained resources, continu...

School Deviancy and Crime

a perspective, and as such will act accordingly. As two authors note, "Until we make schools engaging learning communities whose m...

Implementation of Japan's 5S System

In five pages this system is defined and its uses are also identified. Ten sources are listed in the bibliography....