SEARCH RESULTS

YOU WERE LOOKING FOR :technology research papers

Essays 1171 - 1200

Need a Brand New Custom Essay Now?  click here
Criminal Justice, Law Enforcement, and the Impact of Technology

has developed over the past decade. Even more prevalent than in-field computer systems is the vast computer resources whi...

Accounting Profession and the Effects of Information Systems

however, technological accounting functions were mainly stand-alones - they werent a whole lot different from the old by hand ledg...

IT System Design

were available to enhance the decision and design processes. 1. Terms of Reference Harley Davidson are a well known motorbike m...

Students with ADHD and Educational Strategies

can be cared to asking the student what steps they need to take to complete the assignment (Salend, Elhoweris and Garderen, 2003)....

2004 Articles on Personal Computing

the world even more than the Internet alone, were looking at huge storage and filing and tracking problems. That means were also g...

Suppressing Fires with the New Sapphire System

want to consider replacing Halon systems if possible due to the environmental concerns. The introduction of the Sapphire Fire Supp...

Baker and Young Information Systems Upgrade Recommendations

had to call on them and they did not have to place a phone call. Likewise the process of delivering the information to a central d...

Contemporary World and 'Sacred' Technology

Work, Leisure, Community and Everyday Life" author Richard Florida (2002) contends that we have changed because we have sought ch...

Information Techology Outsourcing Trends

Outsourcing is becoming more and more prevalent. The purpose of outsourcing is to achieve optimum results for the functions that a...

8 Points of a Productivity Audit

take form. During necessary organizational strategy revisions, the mission statement is one of the first documents addressed; by ...

Internal Auditing and Use of Technology

they occur on a continuing and regular basis. This is the case for risk management; personnel database and skills inventory...

Intellectual Property Rights and Visual Communications Technology

means they will be safer. Such paradigms have been used to control crime, but there are a myriad of legal issues when it comes to ...

Risk Management, Security, and Communication

to inappropriate individuals or departments. This can perhaps best be illustrated by looking at the use of IT within a corporate s...

Educational Uses of Technology Use

the computer overwhelmingly favors the visual learner. As long as the individual can read, it makes little if any difference how ...

K through 12 Instructional Technology

best for them. * Provides a "full picture" result that standard approaches may not be capable of illustrating meaningfully....

Management Information Systems and the Credit Card Industry

style of credit cards, all the way to redeeming award points summary online, a service offered by Citibank both in Malaysia and in...

IT Value Assessment

but the ultimate cause of structural problems is that of organizational design. "Good people in a poorly designed organizational ...

Competitive Advantage and Southwest Airlines

the U.S. Department of Transportation gave a name to the phenomenon - the Southwest Effect (Southwest, 2003). It refers to the con...

5 'Golden Threads' and Their Implications

and Shared Minds Implications for business are clear. All of these threads weave together in the effective organization to...

Technology and Visionary Design Systems

planning in the manufacturing sector. Product Data Management (PDM) was created in the 1980s as a means of storing CAD document...

Film Industry and Technology

Though the request for this paper was to focus on technology in film during the past 50 years, no paper on this would be complete...

WLAN Weaknesses in Security

A wireless LAN uses radio technology in order to transfer the data between the different terminals (Cisco, 2003). Institutions suc...

Workplace Stress and Technology

workplace stress in terms of offering stress management courses for fear of opening themselves to potential lawsuits. DeF...

Javacom Case Study on Risk Assessment and Behavior

involves analyzing influence factors that could have an impact on the base cost estimate (Igbal and Rye, 2002). Ranging is the pro...

Human Resource Management and New Technologies

check, act; recognition of the need for continuous improvement; and the use of measurement to evaluate systems and practices and t...

Literature Review of Global Brands' Localization and Technology

Before beginning, it is helpful to analyze what, the definition of global branding actually is. In its most simple form, global b...

Operations Management and IT, TQM, and JIT Effects

* Manufacturing flexibility is essential (Green and Inman, 2000). * Customers define quality (Green and Inman, 2000). * Team effor...

Family, People, the Contemporary World, and the Effects of Technology

most profound technological change can be the quietest. Personal computers seemed to exist only in the world of hackers until one ...

21st Century Database Management

in large companies this is a monumental task. In older times, when companies were reliant on a paper trail, the work was not as da...

Logistics Project Management and Solving Problems

to meet and has made large decisions without consulting the manager. The situation has affected the morale of the staff, the manag...