SEARCH RESULTS

YOU WERE LOOKING FOR :Controlling New Technologies

Essays 1981 - 2010

IT Use in Hotels; The Impact on Room Rates

al, 2000). The IT is being used with the aim of increasing productivity of the staff and enhance the revenues rather that to aid w...

Resource Dependency Theory, Contingency Theory and Core Technology

over a great deal with social exchange theory and the study of politics in the workplace (Huczyniski and Buchanan, 2003). The use ...

The Appeal Industry

This 10 page paper examines the influences on the apparel industry in the United States. The paper starts by looking at the genera...

TERRORISM AND INFORMATION AND COMMUNICATION TECHNOLOGY: THE HOWS AND WHYS

Introduction On November 5, 2009, Nidal Malik Hasan, a major in the U.S. Army and a psychiatrist, entered his workplace, th...

Information Technology Infrastructure at Turk Heavy Transport

some unique need related to the implementation of a project; a task which often involves delivery of heavy or awkward equipment - ...

CASE ANALYSIS: CARE GROUP

of data across the network because of a test of knowledge management application sharing. The result was a 100% collapse of applic...

Evolution of Technology and Communication

the last several decades. Some of the major communication tools were invented in the 1400s, such as the newspaper which first appe...

A Case of Trademark Confusion

properly! The development of trademark law was based on the desire to protect the interests of companies and to allow for distinc...

Who Profits From Innovation? The Determining Factors

another? The predominate cause of variance in who profits from innovation seems to be structural; the "boundaries" of an organizat...

SOCIO-TECHNICAL SYSTEMS -- TELEBANK

In this day and age of technology, many companies are using the technology to monitor employees, even going so far as using comput...

The Value of Effective Organizational Communication: A Technological Overview

technological advancements are occurring along the lines of communications needs. For example, look at where the computing industr...

Book Industry Approaches to Communication Technologies

communication technologies have led to our age being branded the "Information Age". What this means in todays business environment...

Situation Assessment of Kudler Fine Food

finding a new niche market, or expanding on an existing niche market to make up for force in the main market. The company is also...

Memo Undermining Support for Organic Farming

way in which the under nourished may be fed. The issue for the communities in which poverty causes under nourishment it not an eco...

Adding a Catering Business

highlights a company that provides party favors specifically for weddings, and how astute management of Internet search engine use...

PBS/Corp. Partnerships & Strategic Alliances

this trend, Austin points out that the "era of ever-bigger national government is coming to an end" (Austin, 2000, p. 7). In previ...

Comparing Marathon Oil and Valero Energy

5,000 retail outlets that the company does not own. The company has a total level of 22,068 employees and with an income...

U.S. and the Effects of Identity Theft

first arrests of its kind when the FBI successfully captured a large group of Milwaukee hackers known as 414s, whose infiltration ...

Essays on Health Care

before, with the result that there is a "pill" for virtually any physical condition. Individuals taking any kind of ethical drug ...

The Machine Stops

first examines Forsters story and then examines particular thematic elements from the story that seem quite relevant today. These ...

Description of Susan Getting Her Realtor License

Durham, North Carolina educational services firm as data processing manager. She had only four programmers - the entire IT depart...

Indian Company MphasiS BFL Limited

acquiring MphasiS, such as system integration expertise, blue chip customers, like Citibank, Charles Schwab, Morgan Stanley Dean W...

Evaluating Harrah's Entertainment

children who are wandering around on their own. They also warn their customers that they will prosecute any minor using false iden...

IT Project Task List and Risk Management Plan

old systems to new needs, but Acme Hospital appears not to be hindered by this affliction. It fully expects to acquire all new ha...

Integrated Technology and Teacher Staff Development Program

Impact Aid; and Encouraging Freedom and Accountability (Bush, 2001). The call for accountability on a state and national ...

eBusiness and Technology Linkage Factors

to e-business include trading partners, competitors, customers, legal and regulatory (Ramachandran and Tan, 2001). The internal fa...

Chinese Cinematic Art

Even today, if we look at the extent to which Chinese cultural ideology has made its way to the West via art and...

Technology, Mother Nature, and Ethics

term, or hire a human incubator, or go through various forms of testing and treatments to try to conceive a baby naturally, but so...

Military Operations and IT

easily by insiders (Shaw, Ruby and Post, 1998). In the second case described above, the enlisted man was a convicted hacker to who...

HRM and Kraft Foods Inc.

(Brand Strategy, 2006). The restructuring plan runs through 2008, thus, one might think that will be the end of Krafts labor reduc...