SEARCH RESULTS

YOU WERE LOOKING FOR :Societal and Workplace Impact of Computers

Essays 1681 - 1710

U.S. Navy Admiral Grace Brewster Murray Hopper

technology that would be more accessible to everyone through a common language" (OHanlon, 2001)....

Handling Stress and Ted Pollock's 'Mind Your Own Business'

solution to time pressures, but much of this is because the article is written in an upbeat style, flows well for rapid absorption...

Case Study on Computer Crime

experts, criminal activity with computers can be broken down into three classes -- first being unauthorized use of a computer, whi...

Are Computers a Friend or Enemy of Education?

Wilson (2001) notes, however, that: "To take a meaningful role, online educational resources must become...

Computer Network Design and Analysis of Performance During Peak Usage and Increased User Numbers

design. The most common element affecting system performance in a network environment during both times of disaster and tim...

Purpose of the Occupational Safety and Health Act

for example, in order for work to cease on the construction site until the problem is fixed. Clearly, it behooves the foreman to ...

Research Proposal on the Deterrent of Capital Punishment

example, a parent might threaten to spank a child and the fear of the spanking would have a deterrent effect. Thus, the child woul...

Issues of Privacy, Workers, and the Internet

monitored if they arent doing their jobs properly, or are using Internet resources for things other than work-related tasks. Downl...

Computer Information System Design

the file specifies the rest of the information in arbitrary order. Each piece of information is specified by that information foll...

Industry Report of Internet Computer Marketing in Europe

higher tech products, such as computers it may be argued that the potential market may be more attractive. Simply by the nature of...

Workplace and English Only Rules

and living in America it should be expected that only that national language should be used at work. Whether the native tongue is...

Careers in the US State Department- IT Security

It seeks an Information Technology Specialist to design and implement functional goals and protocols "for the rapid sharing and st...

Corporate Expatriates and Effective Use

Molen, 2003). Further, the authors report there is a dearth of empirical evidence that address expatriate effectiveness Mol, Born ...

The Coco Store and HCI Theory

includes the perceptions and reactions of the reviewer. Biological and cognitive basis for perception According to Greenberg (19...

Reviews of Articles on Training in the Workplace

with that problem or challenge being solved by either an individual, a team within the organization, or the organization as a whol...

The Coco Store Website's Interface Design

taking advantage of users intuition and prior experience. Background information What is a human-computer interface? In regards ...

Application of Auditing Techniques of Information Systems

of the details of transactions as well as balances ("Is Auditing," 2004). CAATs may also produce a large range of audit evidence ...

Workplace Leadership Theory

see increase their productivity and value adding contributions. The leader has to understand expectancy theory in terms of leaders...

Thailand Marketing and Business

may be seen as similar in complexity to the average OECD with a total of 19 stages being required, against an OECD average of 18, ...

Sandia National Laboratories' MentorPal 'Living System' Software

system with boundaries, metabolism, defining code, purpose, complexity and a defined size, that also is self-organizing and operat...

Computer Technology and Effective Educator Communications

use in todays business environment, all of which are appropriate to specific sets of circumstances. The business environment is t...

3D Computer Graphics and Film Special Effects

72). Morrow and the two children were killed instantly. While tighter safety precautions were immediately instituted by the film i...

Email Laws and Relevant Literature

level of infiltration that existed in relation to computers functions - such as email - and individual privacy. The government ha...

Criminal Investigations and Forensic Psychology

To understand the growing importance of computers in criminal investigation consider the practically limitless applications of DNA...

Language Cases of Discrimination

by speaking only in Spanish, even while they leered in her direction. Upon investigation, the salesmen proclaimed their innocence,...

Employment Relationships and Stress

divorce and even marriage are stressful, but these are suffered by individuals, and a caring employer can usually help. The situat...

Educators, Computer Technology, and Effective Communication

to be able to agree on a definition" (Leadership Theories: Definition and framework, 2004). Though definitions can vary, one basi...

Classrooms, Technology, and Teacher Education

may inevitably have to use. The Problem Statement Increasingly, the use of microcomputers in the classroom setting has bee...

Overview of Information Security Management

the ability to read directions can become a hacker because information on how to hack abounds on the Internet, in publications and...

Workplace Rights of Employee Privacy

write policies regarding e-mail usage - this can also help protect against legal problems (York, 2000). When companies are open an...