SEARCH RESULTS

YOU WERE LOOKING FOR :Employee Monitoring Through Computer Software

Essays 121 - 150

Software Industry and Lotus Strategies

long the likelihood was excellent that Microsoft and Novell, another of Lotus primary competitors, would introduce competing produ...

Software Quality and Configuration Management

activities that are undertaken. In reality there are many services that configuration management may provide any project, here i...

Basic Software: A Case Study Analysis

Basic to be registered on the governments "official" list of pre-qualified suppliers. As noted in the case study, various approval...

eCommerce Application Based on Software Factories

of software development: According to the Standish Group, businesses in the United States spend about $250 billion annually on sof...

Quality of Software and the Impact of Testing

choices available to software developers. Testings Purpose Hutcheson (2003) states that todays testers face conditions that...

Computer Programmer Recruitment and Retention

he/she can add good changes to his/her job to make it more interesting and less tedious. Again, in this scenario, the employee is ...

Case Study on Computer Crime

experts, criminal activity with computers can be broken down into three classes -- first being unauthorized use of a computer, whi...

Essays on Computer Management

in it (especially on the Internet). The problem is, however, that "privacy" is one of those concepts that is difficult to ...

SEABREEZE'S VIRTUALIZATION PROPOSAL

Discusses how fictitious city Seabreeze can convince both residents and its employees about the benefits of computers virtualizati...

Espoused Values vs. Actual Behavior

This essay discusses what happens when there is a discrepancy between espoused organizational values and what is actually practice...

Employers Right of Surveillance over Employees

has been found to incorporate communication that may not yet have been opened or received, or those that have been deleted. The ...

Computer Information Systems Industry Employment

in using it, and why? Seemingly any company wishing to do intense data scanning on consumers will be able to justify to their own...

A Revised Computer System and the Problems of Audio Visual Corporation

cut down on extra time and money the company did not need to be spending. In order to eliminate these wasted resources, Audio Vis...

High Tech Companies and Human Resources

learning motto because their employees need to be on the cutting-edge. The only way to do this is through continuous training and ...

Case Issue Pertaining to Workplace Diversity

real struggle in terms of learning this technology and probably figures that he has gone this far in his career without having to ...

Blue Reserve Office Building Analysis

to take into account both land-based phones and portable phones as well. In addition, telephony systems today must support...

Installing an Information System A Case Study

This paper consisting of 5 pages involves the necessity of a Wilco Construction consultant to find a computer system that will bes...

Importance of Project Manager Retentioin

In seven pages this paper discusses the significance of retaining project managers in order to successfully meet the needs of comp...

Book Review of M. Keller's Rude Awakening

In five pages this book review considers how lack of employee training was the result of computer technology implementation at the...

Workplace Computer Training and Digital Diplomas

low cost, high speed Internet access, has made virtual reality virtually a reality. The dual office-classroom described above exe...

Office Equipment and Computer Misuses and Abuses by Employees

In six pages this research paper examines email and Internet misuses and abuses by employees in the workplace, discussing issues o...

Globalization Training at Dell Computers

employees and managers to think globally, through the realm of technology. We chose Dell because it is one of the few companies in...

Why Study Computer Crime?

damage caused by incidence of computer crime. This includes virus attacks, spam, worms, denial of service (DOS) attacks or other ...

Tolerant Software and Veritas Software

is no discredit to his ability, but rather a realistic view of just what was required to bring the company around once more. The ...

Career Development Plan

not a part of this report. The company are developing a career development programme in order to help the adjustments that the e...

Employee Development in the U.S. Army

possible. Additionally, the right people also must be in the right positions so that they want to remain where they are, growing ...

Ethical Case Study; Is It Ethical for an Employee to Use Work Time for a Personal Projects?

actions" (dictionary.com, 2007). Therefore, it needs to be considered whether or not the actions of the employees were right or wr...

Retaining Human Capital

of commitment when they know what is going in the company (Risher, 2007). Similarly, DeMarco (2007) also substantiates the importa...

The Impact of Changes in Demography, Industrial Structure and Labor Market on the Health of Workers

In this paper we will look at some of these macro environmental changes including changes in the demographics of workers, such as ...

Plans of Stock Ownership for Employees

In fifteen pages this research paper examines Employee Stock Ownership Plans or ESOP in terms of employee and corporate advantages...