SEARCH RESULTS

YOU WERE LOOKING FOR :Cultural Traditions and Technology

Essays 91 - 120

HOFSTEDE'S CULTURAL DIMENSIONS: U.S., VIETNAM AND CHINA

Some years later, Hofstede added a fifth dimension, that of Long-Term Orientation. LTO determines the degree to which a society em...

Chicago Pizza in the Czech Republic

for there to be many cultural differences. Being fluent in the language may serve to create understanding, but alone it will not ...

James Rachels and Cultural Relativism

within cultures, and its important that these relative differences remain. However, he goes on to criticize, these are not issues ...

Social and Cultural Influence of 'The Storm' by Kate Chopin

of the elements made her laugh as she lay in his arms. She was a revelation in that dim, mysterious chamber; as white as the couch...

Political and Cultural Satire in Gay's The Beggars Opera

This paper examines how Gay employs political and cultural satire in The Beggars Opera in 7 pages....

Cultural Anthropology and the Theories of Clifford Geertz

In a paper consisting of 9 pages this paper examines cultural development in an overview of the theories of Clifford Geertz....

Banking Industry and Computer Technology

banking, and so on. Workplaces are good places to examine how the dreams and dilemmas of computerization really work out for larg...

Chaka by Mofolo

Chaka by Mofolo is analyzed from an African cultural perspective in 5 pages....

Case Study of Vtel and the Cultural Changes Resulting from New Technology

In five pages this paper discusses the problem and theories associated with this topic with suggestions also offered. Six sources...

Corporate Strategy and Information Technology

are the earliest know treaties on the subject (Goldenberg, 1997). His influence in business is strongest in Asian countries and th...

DEATH, DYING AND AMERICAN CULTURE: 1900-2010

all that terrific. What is wrong with this picture? Why would an elderly man put himself through such discomfort, simply to...

Employee Training and Information Systems

In nine pages this paper discusses the importance of training employees in information system technology in an assessment of such ...

Self Concept and Personality

was. In addition, children from abusive families are likely to grow into abusers themselves. Now, were not intimating that...

American Experience of the Orthodox Jews and the Amish

is similar in many ways to the Amish. This is particularly true in regard to the role their women have played in their culture. ...

Uhry's Driving Miss Daisy

by employing a chauffeur. Miss Daisy has strict ideas of what is right and proper, and having been brought up in Jewish social cul...

Medication and Cultures

This research paper describes how health beliefs and cultural views of medication influence health behaviors. Three pages in lengt...

The Pyramid Building of Ancient Egypt and the Beginnings of Engineering, Technology, and Cultural Dynamics

machines constructed of short pieces of wood; from the second tier the stones were raised by a similar machine to the third; and s...

The Hundred Secret Senses by Amy Tan and Oppositions

In five pages this paper discusses how the author portrays East and West cultural oppositions....

Will the Dragon Rise Again? Reviewed

In three pages this paper discusses China's post Confucianism cultural and philosophical transitions within the context of this bo...

Modern Instructional Strategies and Computer Technology

In five pages modern instructional strategies are examined within the context of computer technology's influence and the impact on...

Educational Project on Using Computers

In six pages this proposed education project discusses the value of computers as a learning tool with study areas including classr...

Cultural Impact of Computer Technology During the Past Two Decades

of attending class, abiding by the pre-established schedules of instructors, following a curriculum upon which they had little tim...

Overview of VoIP Technology

traditional telephone companies (VoIP). The development of this market has a umber of supplier, such as VocalTec, 3Com, Cisco, a...

Information Technology Security, Web Services and Database Management Systems

many forms cryptography complexity increasing the difficulty breaking the code is achieved with the use of prime numbers. One most...

Implementing New Technology; A Consideration Of Virtual Private Networks

be seen in a range of commercial and non commercial environment. One recent example has been the adoption of a VPN by the Honolulu...

Climate Change and Technology

in opinion over the last few decades, with a general acceptance that it is the human influences which is causing damage to the env...

The Use of Technology at Tesco

a reward card it may be argued that as well as customers benefiting from the rewards Tesco have found a way of making it very cost...

Cultural Meanings of Silence

things for the good of all the community, and that winning is good for all, not just the individual. There are apparently...

IP Telephony

is, how it works and how it compares to traditional forms of telecommunications. By understanding what the technology is and how i...

Educational And Instructional Technology

430 silent filmstrips for military personnel between 1941 and 1945 (University of Texas, 2008). This technology was soon adopted i...