SEARCH RESULTS

YOU WERE LOOKING FOR :Dealing with Disaster using Computer Networks

Essays 1591 - 1620

Email Laws and Relevant Literature

level of infiltration that existed in relation to computers functions - such as email - and individual privacy. The government ha...

Criminal Investigations and Forensic Psychology

To understand the growing importance of computers in criminal investigation consider the practically limitless applications of DNA...

Effective Educator Computer Technology Communications Annotated Bibliography

technology" (Ebersole and Vorndam, 2002). The researchers found "time, resources, and lack of confidence in the benefit of educat...

Information Technology and Current Issues

meaning is larger than this Henderson (2002), describes this as the difference between the information literate and the informatio...

Thailand Marketing and Business

may be seen as similar in complexity to the average OECD with a total of 19 stages being required, against an OECD average of 18, ...

Cultures, Communications, and Comparisons Between Do the Right Thing and Guess Who's Coming to Dinner

to give them their blessing before the evening is over. What is interesting to see is that Joanna has turned out just as the Dr...

Who Is To Blame in the Triangle Strike and Fire Case?

understand the customs of the US. As such, then, the company took advantage of their youth and their impoverished conditions to ex...

A Case Study of Autonomy, Price Transfer, and Decentralization

if the organization is really going to maximize its performance and coordinate the efforts of the different divisions, there needs...

Article on Mothers' Depression and Infants Critiqued

American Psychiatric Association. The authors indicate that postpartum depression has received a great deal of research att...

The Coco Store and HCI Theory

includes the perceptions and reactions of the reviewer. Biological and cognitive basis for perception According to Greenberg (19...

The Coco Store Website's Interface Design

taking advantage of users intuition and prior experience. Background information What is a human-computer interface? In regards ...

Application of Auditing Techniques of Information Systems

of the details of transactions as well as balances ("Is Auditing," 2004). CAATs may also produce a large range of audit evidence ...

U.S. Navy Admiral Grace Brewster Murray Hopper

technology that would be more accessible to everyone through a common language" (OHanlon, 2001)....

Newman's Concept of University Education

that must fit before the perplexing puzzle of human intellect could be completed. Universities should be communities of learning ...

Cultural Differences Examined

this concept. In exploring family and cultural issues and belief systems that emanate, how has that affected Maries personal belie...

Case Study on Computer Crime

experts, criminal activity with computers can be broken down into three classes -- first being unauthorized use of a computer, whi...

Are Computers a Friend or Enemy of Education?

Wilson (2001) notes, however, that: "To take a meaningful role, online educational resources must become...

Computer Recycling

"up to 25% recycled ABS plastic" (Recycled plastic helps build a better printer - and environment, 1995; p. 24). Though enc...

The Influence of Border Films

drugging and kidnapping his wife, whom he subsequently frames on drug charges (Touch of Evil, 1995). Vargas, and justice, prevail ...

Poverty and Social Work

The Charity Organization Society quickly became a model by which many other charitable organizations were modeled and developed (T...

2004 Articles on Personal Computing

the world even more than the Internet alone, were looking at huge storage and filing and tracking problems. That means were also g...

Controlling Workplace Internet Usage Through Planning

and fundamentals go to balancing conflicting ideas about the use of information. Many employees feel that they should have the rig...

Computer Viruses and Critical Thinking

do in order to combat this horrendous situation? First, in order to resolve the difficulty, the critical thinking model should be ...

Book Review of M. Keller's Rude Awakening

In five pages this book review considers how lack of employee training was the result of computer technology implementation at the...

Book Review of Intellectual Property by Adam Moore

In four pages this book is reviewed within the context of computer crime and considers its international and domestic consequences...

Audit Planning and Evaluation of Internal Controls

In twenty five pages this paper examines various accounting issues related to auditing functions and internal control in a conside...

Three Views of the Slave Trade in Africa

and time period under discussion. Eric Williams Williams begins his argument by pointing out that "unfree labor" in the New Worl...

GPS and the Air Cargo Industry

Global Positioning Systems are discussed in this comprehensive paper that includes a great deal of information. The information is...

Development and Marketing of Exterminator Software

A developmental and marketing plan for the software product Exterminator which protects computers against Y2K problems are discuss...

Automotive Manufacturing and Computer Technology

of automobile that are more skillfully designed, better built and most importantly safer, all as a result of the vast applications...