SEARCH RESULTS

YOU WERE LOOKING FOR :Business and Information Technology

Essays 361 - 390

Identity Theft Protection

loaded onto his computer and being spied on for a short time by coworkers. Jackson (2001) was able not only to gain access...

Overview of IT Project Process Stages

and also who it is that will be using the system and who it is that this use will impact on, for example, in a hospital this will ...

Climate Change and Technology

in opinion over the last few decades, with a general acceptance that it is the human influences which is causing damage to the env...

Technology In The Management Of Distribution Companies

have to be put into the system by the logistics management of the company. A major benefit has been increased efficiency with the ...

IMPLEMENTING A TECHNOLOGY SYSTEM IN A COMPANY

and installation guys, on the other hand, probably wouldnt care about a training schedule or support strategy. A companys receptio...

INFORMATION TECHNOLOGY: SECURITY BY ADMONITION

is to allow a networking system to cooperate with its user and what the user wants, while keeping the "bad things" out. He points ...

IP Telephony

is, how it works and how it compares to traditional forms of telecommunications. By understanding what the technology is and how i...

Considering the Implementation of an Information Technology Strategy for Local Government

the research to develop which takes all of the potential factors into account; dependant and interdependent influences as well as...

Educational And Instructional Technology

430 silent filmstrips for military personnel between 1941 and 1945 (University of Texas, 2008). This technology was soon adopted i...

Ethics In Information Technology

16). Monitoring and surveillance have come to represent just two of the villainous components of computer use in the late twentie...

Technology is Not Neutral

think we "fit" the services they offer. While this may be merely annoying when it comes to dealing with the junk mail, both snail ...

Information Technology Lessons, Student Performance, and Gender Differences

the division and difference that may exist within the classroom whether or not the digital divide has been overcome. One major d...

Case Study of Eastern Power Company

allowing bill payment online as well as facilitating complaints or communication with customer services by e-mail. However, these ...

New Dawn Drilling Case Study

that are used. The information is accumulated locally, put into Excel spread sheets and sent to the head office where it is input ...

Use of Information Technologies in University Libraries

automation is also responsible for the creation and maintenance of digital technologies, which now make it possible to generate in...

Characteristics Successful IT Manager

* Adopt a client service mindset so that the focus is always on what the client or customer needs and expects (Sisco, 2003). * Abi...

Information and Communications Technology Interview and Interpretation

a predicable change as may be expected if we were to apply the theories of Clark (et al, 1988). In terms of identify there are m...

Information Technology Portfolio Management

management is that it minimizes the risk associated with any available choice of action. The risk that exists arises from uncerta...

Information Technology Policy Development

transactions, worth more than $1 trillion, in the 12 months ended March 30, the first time it has passed the $1 trillion mark in a...

Dissertation Proposal on the Commercial Value of IT

measure this value rather than the use of the traditional productivity measures. This can then be expanded into the way value meas...

ICT School Strategies Development

tackled by many studies. The concept of the digital divide with the technically able and the technical unable creating a social an...

Manuel Castells' IT Theory Evaluation

internet is the centre of communications and social function for society from social communications to the conducting of commerce....

Tourist Industry and eTourism

means, such as hyperlinks. The information could include the location of restaurants, tube stations or other transport facil...

Ireland and China's ICT Industries

the same time, when choosing an environment in which to do business, it pays to look at the industries in both nations as well as ...

Ireland, China, and ICT

reforming the state owned IT enterprises as well as encouraging a range of research and development in the areas of software and i...

Processes of Risk Management and Risk Assessment

One of the factors separating physical and IT projects is that in producing a building (or bridge, or airplane) everyone knows at ...

Wi Fi Network Selection and Integration

and professional journals, academic reference books and the internet. The development of wireless networks have been aided with...

Portfolio Management and Information Technology Investigation

climate and atmosphere that exists only in the present time. If all possible sources of risk could be identified and accounted fo...

Information Technology and the Meeting of Organizational Structures and Operational Objectives

There are two types of organizational structures that tend to be used when it comes to IT management and objectives -- these are t...

School ICT and Student Research

disagreements. The data was collected with the use of self completing questionnaires. This option was chosen as it was felt this...