SEARCH RESULTS

YOU WERE LOOKING FOR :Why Passwords and Good Information Security Technologies Are Compromised by Users

Essays 121 - 150

Small Businesses and the Value of IT

receptive to the idea. However, upon meeting with Margaret at JavaBooks, the nature of the business need for information technol...

Information Technology and the Importance of Training and Retention

This paper provides a literature review on training and technology in the field of information technology and then addresses manag...

Organizational IT Growth and Management

In five pages this paper examines an information technology's growth and management and considers how success is dependent upon le...

DaimlerChrysler and IT

In seven pages DaimlerChrysler and Daimler Benz are examined in a consideration of information technology's benefits, challenges, ...

Summer Vacation Exercise in Creative Playwrighting

In six pages this original play that is based upon a genuine news story discusses a sexually compromising situation involving a ma...

Civil Rights in the Late Nineteenth Century and the Abandonment of the Freed Men

The Compromise of 1877 is the focus of this six page research paper that involved a close election in which Republican Rutherford ...

Computer Conferencing and Gender Bias

In ten pages this paper examines the burgeoning information technology and computer technology field in an argument that alleges g...

Public Policy Endurance and the Enabler of Compromise

In five pages public policy is examined within the context of compromise, which is supported with a discussion of The Bill of Righ...

Strategic Alignment and Communication Information Technology

In eight pages a niche marketing engineering company is featured in an information technology case study that examines strategic a...

1820 and 1850 Compromises

states and what free states could join the Union in order to maintain a balance wherein slave states never had the upper hand it s...

IT and Systems Management

in mind when it comes to designing and implementing a system, as opposed to not doing so. While this might be a simplistic stateme...

Essays on Computer Management

in it (especially on the Internet). The problem is, however, that "privacy" is one of those concepts that is difficult to ...

Information Technology Professionals and the Effects of Information Searching

his or her computer checks into a "third-party machine" and this is something that is controlled by a network administrator (Lee, ...

IT and MIS Strategic Uses

enabled, he noted, by advances in chips, connectivity and computing devices" (Trembly, 2002; p. 18). Yoran (2002) sees a la...

Database Questions and Software Development

Vawter and Roman (2001) refer to .NET as a product of "Windows DNA," indicating the similarity between .NET and forerunner Windows...

Business, Internet, and IS

the Internet, trading partners can bypass intermediaries and inefficient multi-layered procedures. Furthermore, Web-sites are avai...

COMPUTING AND PRODUCTIVITY: MYTH OR REALITY?

way to truly cut costs was to outsource jobs to other countries where wages were lower and where overhead wasnt quite the issue. F...

The Important of Giving Customers Clues

takes place and services are provided in human and physical context. Sending out the message in this way helps to reinforce the ex...

Devaluation and Inflation in Zimbabwe

A) While the government may try and outlaw inflation there are market pressures in any economy. Hoping down inflation and refusing...

Microsoft's Decision to Offer Multiple Internet Browser Options with Windows 7

presence ion the market. One Microsoft themselves may been arguing that despite spending such a large amount of development they ...

Implementing an eBusiness Solution

the traditional mail order and once on the internet, or even twice on the internet. With the traditional mail order when a custome...

Integrated Technology and Smart Business

is used, technophobes may be scared of the impact it will have; such as disempowering employees and eliminating jobs. Others may s...

Technology and Globalization

that the world was round, following the voyage of Christopher Columbus to America, when seeking to find a route to India, a journe...

Wireless Communication

The beginnings of wireless goes back to the eighteenth century when Marconi would obtain a patent to increase the Wireless Telegr...

Evaluation And Analysis Of User's Attention

interaction while some can glean all the knowledge they need straight from the textbook. With these and so many other varied appr...

Guest Service Management and Customer Satisfaction

company (Hooley et al, 2003). Loyalty is often perceived as a level of customer satisfaction, in a competitive industry it is like...

"Option Four" By Ramesh Ponnuru: Review

plays a role in mandating its recognition as a union, will it automatically segue into an issue of rights that have been heretofor...

HHH, Change Management, and Systems Thinking

Connected to the larger system, the hand is an integral part; separated from the system it quite literally is dead and fills none ...

Women And Depression

of their physical, biological and social milieu, and how we respond is governed by genetic make-up" (pp. 44-45). Postpartum-relat...

Managing the Information Technology Resource by Jerry N. Luftman Chapter Summaries

adopted, while the right-hand end of the curve depicts the period in which laggards adopt ET (Luftman 186). The next section of th...