SEARCH RESULTS

YOU WERE LOOKING FOR :Ethical Issues and Computers

Essays 271 - 300

Global Marketing and Ethical Issues

This research paper consists of seven pages and considers global product marketing and the ethical considerations involved in such...

Ethical Issues and Illegal Alien Hiring

In ten pages this paper discusses illegal alien employees in predominantly the Southwest United States in a consideration of probl...

Concepts in Password Security

In a paper of four pages, the writer looks at computer security issues. Strong password development is emphasized. Paper uses six ...

Topics on Computer Security

In a paper of five pages, the writer looks at computer security issues. A number of important topics are examined. Paper uses six ...

Assessing Usability

for example is something that refers to the use of technology to help the group, something that is done with the use of network or...

Use of Information Technologies in University Libraries

automation is also responsible for the creation and maintenance of digital technologies, which now make it possible to generate in...

Computer Network Economy and Antitrust Issues

of the people to have competition. No one really likes to have to pay close to a hundred dollars for cable television, but many pe...

Apple Computer Supply Chain Issues

one or more software packages for purchasers. Apple offers online sales, but most of Apples products are sold through retailers. ...

Computer Security Issues

types, event-oriented logs and keystroke logs (Audit trails). Event logs, as the name implies, record system events, while keystro...

Information Systems and Computer Management Planning Issues

This paper consists of five pages and examines management of computer or information systems management and the management issues ...

LAN Computer Network Construction

In nine pages a Layered Approach Network for business is examined in a consideration of various standards, procedures, and techniq...

Security Issues and Computer Network Management

In thirty pages this research study examines corporate computer network management and issues related to security and information ...

Corporate Management and Information System Security

In seventy five pages this paper discusses IS security training and computer crime issues. Fifty five sources are cited in the bi...

Overview of Dell Computer Company

In eighteen pages the rise of Dell to the leading personal computer manufacturer is documented with an examination of the current ...

Proctor and Gamble Communication and Management Issues

its category in Europe for all of 1997, and the company achieved that record in the face of intense competition for the market (Mi...

Turkey and the Marketing of Computer Hardware

that a number of other entities will also recognize the opportunity, as well. II. TRANSPORT BARRIERS FOR PRODUCT Computer hardwa...

Issues Involving Computer Viruses

In a paper consisting of twenty one pages compromised computer security and Internet privacy are just two of the issues considered...

Computers and Children

In six pages the issues relating to computers and children are considered in a review of eight pertinent journal articles. There ...

Contemporary Educational Profession Issues

In twenty five pages this research paper discusses various teaching issues such as liability for educators, technology, computers,...

Comparison of UNIX, OS2, and Windows Computer Operating Systems

In fifteen pages these various computer operating systems are presented in an overview with pertinent information provided and a c...

Choices in Computer Software

In six pages Oracle's Oracle 8 and Access 97 by Microsoft are the focus of this paper that considers computer software choices wit...

Case Study on Computer Consulting

In nine pages a case study of CompuGear Inc. is considered in terms of current issues facing a professional computer consulting fi...

Security Issues and Computer Viruses

executable files that are then shared and executed on other PCs and so on. Virtually every computer installation is susceptible to...

Computer Hacking and How It Has Evolved

In twelve pages this paper discusses computer hacking in a consideration of its history and evolution with legal issues and preven...

Analysis of an Advertisement Featured in Time Magazine II

In two pages this paper discusses an IBM notebook computer advertisement featured in a Time Magazine issue in an analysis of the p...

Audit Planning and Evaluation of Internal Controls

In twenty five pages this paper examines various accounting issues related to auditing functions and internal control in a conside...

Issues of Computer Security

Carroll (1995) makes the point that whilst it is possible to establish a reasonable amount of security on the Internet, the way in...

UK's Policy on Technology

as well as medical miracles. Technology affects everyone and many industries. In honing in on a few major ones, Britains policy ma...

Replication of Data

is stored on computers within an organization would be a total nightmare; the business would be virtually unsalvageable in some ca...

Small and Medium Business Accounting Information Systems

In this five page paper the impact of accounting systems on small and medium sized businesses are assessed with such issues as the...