SEARCH RESULTS

YOU WERE LOOKING FOR :Workplace Technology and Privacy Laws

Essays 511 - 540

Issues of Privacy Associated with Web Browsers

Why are cookies used? Generally, for those of us that access the Internet through a public ISP, each request we make to a web site...

Banking Sector and Technology's Impact

In eight pages the impact of technology on banking is examined in an overview of talking teller machines, biometrics, and issues i...

Case Analysis of Information Systems Management

In five pages this case analysis presents a problem definition regarding privacy invasion through data mining, problem justificati...

Arguing Against Industry or Business Use of Polygraph Testing

In three pages this paper argues against polygraph testing in the corporate sector as an invasion of employee privacy. Four sourc...

The Ownership of Information

This 9 page paper examines the question of who owns information, as well as the ethics of using information just because it is ava...

Supreme Court Case of Stenberg v. Carhart and Partial Birth Abortion

In eight pages this paper examines privacy issues with regards to partial birth abortion as addressed by this April 2000 Supreme C...

Constitutional Rights v. Internet Privacy

Current Issues & The Conflicts Involved In terms of time, the Internet is basically still in its infancy. Its origin can be trac...

Post Second World War and Technology's Impact

In five pages this paper considers how in the years since World War II technological advancements have profoundly changed employee...

Advantages and Disadvantages of Online Pharmacies

In eight pages this paper discusses Internet pharmacies in a consideration of advantages and disadvantages which includes privacy ...

John J. Miller's Article 'Private Parts' and US Privacy Issues

In six pages this article is discussed within the context of lost citizen privacy as the result of government surveillance and inf...

Privacy Issues Concerning Intel's Pentium III Processor

In five pages this paper examines the privacy issues involving the Pentium III processor by Intel. Ten sources are cited in the b...

Internet and Privacy Issues

In ten pages this paper examines the Internet and the recent concerns over privacy issues. Fifteen sources are cited in the bibli...

Totalitarianism Themes in 1984 by George Orwell

be infiltrated by hackers. In some ways the tables have turned. 1998 is not 1984. Rather, it is a topsy turvy world where the thes...

Individuals and the Impact of Trends

In five page this research paper examines abortion, gun control, communication privacy, and gay marriage issues in a consideration...

Sexual Conduct and Privacy Rights

In eight pages this research paper discusses sexual behavior and argues that privacy rights are guaranteed in the U.S. Constitutio...

Conflict Between Public Education Administrative Policies and Rights of Students

In six pages this paper discusses public education in a consideration of the conflicts that exist between administrative policies ...

Individual Rights Usurped by the U.S. Supreme Court

generally supports freedom of speech, the current conservative move is to protect children from pornography and foul language on t...

Social Work and Service User Rights

experience, in such a way as to determine the rules that ought to govern human conduct, the values worth pursuing and the characte...

Hypothetical Connecticut Case Issues

the individuals right to privacy is the one that will take precedence. Requiring retina scanning as a matter of course would be c...

2D Ultrasound Technology versus 3D Ultrasound Technology

obvious; two dimensional imaging is a more limited view, and the distinctions that can be made because of the use of a more graphi...

Daycare Centers and Surveillance Cameras

evolved simultaneously with opportunities for privately accessed public interaction. In general, daycare centers are not conside...

Sports Fans and Advanced Sports Technology's Negative Effects

Americas favorite pastime seen better days. The lure of money is the single most important lure that has allowed advanced t...

Controlling Workplace Internet Usage Through Planning

and fundamentals go to balancing conflicting ideas about the use of information. Many employees feel that they should have the rig...

Information Technology's Pyramid Levels

for creating value for the larger organization, providing a "map" of precisely where the organization needs to be going next. ...

Planning Strategy and Information Technology's Value

are dependent on the efficient use of the higher levels of corporate information available now. Astute organizations are cognizan...

Online Shopping Analysis of Singapore's NTUC FairPrice Supermarket Website

unless the customer or his/her agent is there to sign for it and make payment (FairPrice, Terms 2002). Third, the Terms and Condi...

Example of 1974's Privacy Act

hands of the wrong individuals. Out of the Report of the Secretarys Advisory Committee on Automated Data Systems (commissioned by ...

Online Retailers, Social and Legal Issues

and regulation (Ramin Communications, 1998). Along these lines, privacy still continues to be a huge social issue when it comes to...

Privacy Right of the Average Citizen

wake of arrests stemming from the September 2001 bombings. Interestingly enough, this idea of a persons right to privacy was alr...

Privacy Impact of the USA Patriot Act

claim that the new rule violates the constitutional right to counsel (2002). Indeed, the act does change things and suggesting th...