Essays 331 - 360
of political life" (1969, 55). Mesthene sees technology as detrimental and provides examples. For instance, cities have mass trans...
enabled, he noted, by advances in chips, connectivity and computing devices" (Trembly, 2002; p. 18). Yoran (2002) sees a la...
early twentieth centuries established themselves. What this means in terms of how those great philosophers looked at the broader ...
in prison (Biniok, 2004). They contend that the costs of electronic supervision are unacceptable, even that such supervision viol...
In twenty pages this research paper discusses how technology can actually have a positive impact upon the environment through the ...
In fifteen pages the increasing trends of employing the technology of automated meter readings in the gas and electric utility ind...
In fifteen pages 3 sections designed to answer student posed questions regarding information technology and the workplace includes...
In four pages this paper examines how the mass media essentially deprived O.J. Simpson of a fair trial because of the global preju...
but by opening the world to accessible information in an ultimately timely manner it has also redefined stagnation, diversity, ava...
In six pages this paper examines the technology management of AMP Incorporated in a consideration of Managing Technology by Lowell...
In ten pages communications technology is the focus of this paper that considers how the global economy has been affected by the u...
11 pages and 5 sources. This paper provides an overview of the major changes in management accounting that have extended from sig...
In ten pages this paper examines technologies such as secure site and encryption in a consideration of digital economy technologie...
adopted, while the right-hand end of the curve depicts the period in which laggards adopt ET (Luftman 186). The next section of th...
to the Online courses. There are also intangible resources that must be considered, such as faculty time. One expert commented: "...
issues of concern include: authentication, authorization, encryption, misuse and abuse in addition to hackers (Posluns, 2002). One...
two areas that have seen a high input form ICT. The subject area is so broad we cannot look at the entire are in only a few page...
may do this with more backing and market power, SMaL had to compete with Casio. It is then with this in mind a company has to deve...
potential ramifications of cloning: "He believes that while it is impossible to accurately forecast what the psychological and soc...
Partners, 2003). Traffic World wrote that it is the delivery strategy that drives growth for this company (ebusinessforun.com, 20...
also a paradox in itself as for every $1 spent on IT we can see that there will be an associated increase in market value of the c...
Interestingly enough, the Bluetooth technology was named after Harald Bluetooth, who was King of Denmark during the 10th century ...
the telephone communication infrastructure. IP Telephone can be defined in the following way; "Internet telephony (IPT) is tra...
also building for the future. Current Issues and Trends Today, office automation and the use of Internet and Intranet appli...
The new literary genre dubbed 'cyberfiction' is considered in a five page research paper that discusses how technology's complicat...
able to communicate with one another -- and that transparency of information between the communities was important (Anonymous, 199...
dependent upon Carol having dinner with Buddy, the supervisor. It is also a hostile environment case because Buddy touches her, re...
the Internet, trading partners can bypass intermediaries and inefficient multi-layered procedures. Furthermore, Web-sites are avai...
solutions," which is reinforced with principles of "First in Coverage, First in Confidence, First Thing in the Morning." The overv...
In eight pages a niche marketing engineering company is featured in an information technology case study that examines strategic a...