SEARCH RESULTS

YOU WERE LOOKING FOR :Information Literacy at Work

Essays 1141 - 1170

Information Age and Social 'Technophobia'

who created the buggy whip? Many believe that technophobia is a modern syndrome, but in fact, it is not. During the Indust...

Business Process Reengineering and Information Technology

has come to embrace a more enlightened perspective with regard to addressing the ever-changing needs of commercial interchange, wi...

Organizational Efficiency and the Integration of Information Technology Solutions

it that has highlighted existing inadequacies all throughout the company structure. By examining each of these deficient areas in ...

Information Management Systems: Design and Implementation

the Second World War created a significant demand for private shipping companies that could move important freight from Mid-Wester...

Information System Risk Control

For instance, when a vulnerability is identified, the basic response is to implement some form of organizational "control", whethe...

Information Systems and Internet Troubleshooting

the source of the problem. A simple internet search on the topic of sudden shutdowns revealed some interesting advice directly fro...

Information Systems and their Relative Value to Organizations

an advantage based on information technology must look beyond the technology itself and develop some solution which incorporates a...

Information on Sickle Cell Anemia

This research paper offers a comprehensive discussion of sickle cell anemia that includes its causes and also the geographic and d...

Modern Organizational Information

In five pages this paper discusses modern business's organizational structural changes as a result of information dispersal and as...

Information Technology, Employee Abuses, and Company Protection

In six pages ways in which companies can structurally and technologically protect themselves from employee technology abuses are d...

Overview of Healthcare Information Systems

In seventy pages this paper examines healthcare information systems and the necessity for increased security and confidentiality w...

Oceanic and Coastal Management and the Importance of Geographic Information Systems

In eight pages this paper discusses research activities and resource management applications in an overview of Geographic Informat...

"Internet and Computer Law: Cases-Comments-Questions": A Discussion of the Principles Illuminated by Authors Peter B. Maggs, John T. Soma, and James A. Sprowl

and Computer Law: Cases-Comments-Questions", a casebook compiled by authors Peter B. Maggs, John T. Soma, and James A. Sprowl, out...

Data Warehouse Architecture Model For The NHS

This 92 page paper examines the potential of peer to peer (P2P) as an efficient architecture for the UK National Health Service (N...

Mozart/Sonata in A minor (K.310) & Sonata in D major (K.311)

him on a tour of Europe and, as a boy, Mozart gave concerts in all the major cities of Europe (Machlis 206). By the time he was th...

What Should This Psychologist Do

The scenario for this discussion is: a client's attorney has called and asks for the client's diagnosis and prognosis because the ...

Modallity Preferences

We all have a preference in terms of how we want to receive information and how we tend to convey information. This essay describe...

HRIS Discussion

Since the 1990s, information systems have played a key role in managing the functions of this division. Today, human resource info...

Cognitive Psychology as a Neurological Framework

of cognitive neuropsychology finds its contemporary origins in the 1960s, there are famous cases in history that appear to substan...

Coca-Cola Company Analysis

term Coca-Cola and penned the script that we all know so well today (The Coca-Cola Company, Heritage, 2006). Pembertons first fora...

Social Networking and the Learning Organization

there are at least six characteristics common to all organizations that others can label as being attuned to learning from events ...

The Concept of Learning

along the details of a high-profile news story that illustrates the person has discovered something he did not previously know. T...

Federal Shield Law: A Journalist's Right

From anonymous to citizen to professional to criminal, informants are comprised of various types of individuals who uphold an asso...

Turkle's "Can You Hear Me Now?" - Summary/Response

his species - has long been a determinant of how advanced human beings have become throughout the ages. Fire established man as a...

High Nursing Turnover Rate

based on a research study that surveyed over 2,000 RNs who provide direct nursing care in three mid-western hospitals. This result...

Censorship

in 2005, according to the American Library Association (ALA) (Manzo 26). The ALA defines a "challenge" as "any formal, written com...

Healthcare Associated Infection/MRSA & VRE

guidelines on how to address cleaning and disinfecting issues as they impact on the problem of HAIs. Before offering conclusion, t...

Determining the Safety and Effectiveness of a New Anti-Cancer Agent

epitope using an IgG antibody from a breast cancer patient. This epitope, KASIFLK, is one expressed preferentially by breas...

Implications Of Implied Warranties In The Technology Sector

protect consumers from shoddy workmanship and defective products. The small print on the back of a package or bottom of a service...

Epidemiology & STDs

associations, testing hypotheses, and identifying the causes of health-related states or events" (Merrill and Timmreck, 2006, p. 2...