SEARCH RESULTS

YOU WERE LOOKING FOR :Computer Age and Information Ethics

Essays 541 - 570

HR and Microsoft

In twenty pages this paper examines Microsoft's human resources in a consideration of management philosophy, involvement labor rel...

Post Scandal Organizational Ethics' Climate Improvements

In eight pages this paper discusses corporate ethics in an examination of how to improve the business climate in the aftermath of ...

GPS and the Air Cargo Industry

Global Positioning Systems are discussed in this comprehensive paper that includes a great deal of information. The information is...

Workplace and IT

In fifteen pages 3 sections designed to answer student posed questions regarding information technology and the workplace includes...

Comparing Republicans and Democrats Official Web Sites

Watch", "Democrats in Depth", "Democrats Missed Vote Watch", "2003 Winter Meeting Photos". The last item in this right si...

Media Ethics' Decline and Postmodernity

ancillary factors of our culture such as what clothing we consider most appropriate or what foods we choose to eat. Sometimes how...

Two Studies of Information Technology

gratification and for some purchases the inability to see and feel what they are. These different elements are seen as reassuring ...

Types of Information Systems

it had to do something about its customers (Levinson, 2002). They simply werent being serviced well (Levinson, 2002). When America...

Human Resource Project for Duke Energy Corporation

2003). Duke also identifies the companys values that include: integrity; stewardship; inclusion; initiative; teamwork; and accou...

Crime Investigations and the Media's Role

has also led to accusations of copycat crimes. Overall, it has been determined that the best balance of this relationship is too m...

The Use of Breathalyzers

a few different models that are used by law enforcement officials today. One device utilized infrared rays, another uses fuel cell...

E-Business Security, Firewalls, and Routers

multiple firewalls for the many different components of the organizations e-infrastructure Why are Firewalls and Routers Needed? ...

IT Abuse Prevention

In the case of computers and Internet access, loss of privacy represents one of the biggest concerns. Empowering the individual w...

The Field of Forensic Entomology

the skin. The field of urban entomology can be of importance because the forensic entomologist can be a crucial part of civil jud...

Issues of Organizational Information Management

school of thought there is support for recognition as a motivator. Work of Maslow indicated a hierarchy of needs (NetMBA, 2005). T...

Digital And Psychological Profiling Of Cyber Crime

still in its infancy; only in the recent past have inroads been made in overcoming the boundaries inherent to such undesirable tec...

Assumptions About The Male Gender And Eating Disorders

eating disorder can affect those who are average-sized, as well. It is estimated that one to two percent of American adults are b...

Forecasting for a Fast Food Outlet

and ice creams sold in the summer, this looks at the trends rather than just the past performance. Regression analysis takes th...

Organizational Information Systems

Originally seeking to be a virtual company carrying no inventory of its own (Gruppo, 2000), Amazon abandoned that plan shortly aft...

Taking Video Games to China

two or three weeks, so that they will get hooked" (Srinivasan, 2005). Indian programmers are indeed being "hooked" and the compan...

Information Systems Technology Projects Fail

all projects falls between 66 percent and 90 percent depending on which survey data one relies on. Engle (2007) reported that 90 ...

Determining the Safety and Effectiveness of a New Anti-Cancer Agent

epitope using an IgG antibody from a breast cancer patient. This epitope, KASIFLK, is one expressed preferentially by breas...

Garland's "Daily Life Of The Ancient Greeks"

impression made infinitely clearer with truths rather than myths. The evolutionary value of Garlands (2008) research provides a b...

IT Forensics: Digital Evidence

reason than the tangible factor inherent to typical sites. The extent to which tangible investigations are inherently valuable to...

System Development Life Cycle: Compare/Contrast

a specific definition and set of goals for the project" (Ntuen, 1991, p. 33). II. SYSTEM DEVELOPMENT LIFE CYCLE MODELS Ever sinc...

Family Nurse Practitioner

either ill or injured, and therefore requires the aid of health care professionals. One might also feel that "person" underscores ...

High-Tech Crime: How The Criminal Justice System Has Had To Change Its Approach

equipped to penetrate any computer system with the intent to take, destroy or manipulate the information found upon that system; i...

Wellness & Nutrition for Healthy Aging

nurses facilitate the "recognition and communication" of these concepts, permitting "thoughts to be shared through language" (Davi...

Computer Security

a large group of Milwaukee hackers known as 414s, whose infiltration impacted such organizations as the Los Alamos National Labora...

Internet Usage by Two Companies - Gateway 2000 and DLJ Direct

taking itself too seriously and has collectively remembered to have fun in business as well as build profitability. All com...