SEARCH RESULTS

YOU WERE LOOKING FOR :Hard Systems Change Model

Treating Substance Abuse

In twelve pages this paper considers various substance abuse programs including group, family system, and individual therapies as ...

An Analysis of Rose's Book, Lives on the Boundary

This paper focuses on the information found in Mike Rose's work, Lives on the Boundary to discuss the current American educational...

Ancient Greece and Education

In five pages this research paper discusses education in ancient Greece with a consideration of the systems in Sparta and Athens a...

Elementary School and DISTAR Reading Program

DISTAR reading program is being used more widely all the time" (Hone, 1994, p. PG). First introduced in the 1960s, DISTAR -- whic...

Educational Philosophy of John Dewey

This paper consisting of six pages considers the influence John Dewey continues to exert on the system of public schools and on th...

A Review of the Film, Murder in the First

This paper analyzes the film, Murder in the First. The author comments on the various shortcomings in the US criminal justice sys...

'Characteristics of Total Institutions' by Erving Goffman

This paper consists of four pages and considers Goffman's article in a micro and macro comparison of cultural themes, adaptation a...

Youthful Computer Hackers

In five pages this paper examines the growing practice of young people hacking into computer systems in a consideration of whether...

Case Study on Video Vision's IT

the scheduling issues for high quality titles. Second, the hotel has been able to provide the necessary information to distributo...

Information Systems and Ben and Jerry's Ice Cream Inc.

In a paper that consists of five pages an overview of Ben and Jerry's is presented with information systems examined by way of a S...

The Netherlands' Economy

In twenty three pages the Netherlands' economy is examined in an overview that includes its system of health care, unemployment ra...

Computers in the Future and the Internet

In seven pages this paper considers Ralph M. Stair and George Walter Reynolds' text Principles of Information Systems - A Manageri...

Company and Product Review of PowerLeap

In five pages this paper discusses the PowerLeap company and its online computer systems upgrading products as featured on its web...

Analysis of an Article on Branding

The writer critiques the article Brands, Brand Management & The Brand Manager System by Low and Fullerton. The paper is four p...

Manufacturing and Activity Based Costing

In this paper consisting of nine pages the effects of activity based costing in terms of a distribution system are observed from t...

HRM and IS

In thirteen pages this paper discusses the value of information systems in human resources management. Twenty sources are cited i...

Benefiting All with Canadian Immigration

existing immigrants (Cosh). In 1994 forty-three percent of Canadian immigrants were grouped into the economic class (Cosh). This...

L.L. Bean and Call Center Issues

L.L. Bean has been known for nearly a century for its high-quality and long-lasting outdoor wear that falls more easily into the c...

Rewarding Employees and Motivation

In seven pages this paper discusses the organizational importance of rewards in terms of employee motivation with Federal Express'...

Cable Broadcasting Technology

In approximately three pages broadcast cable technology is discussed in a technical system information overview. There is no bibl...

Technological Innovations and Video On Demand

that no one can predict in detail how the information highway will ultimately play out (Antonoff). Just exactly what is the i...

Digital Communication Evolution

In five pages the ways in which digital communications have evolved since the Morse code invention to complex digital voice and te...

Future Education and Computers

In ten pages future education is contemplated with a discussion of case studies and consideration of such topics as interactive me...

Television's On Demand Video

for small audiences (OBrien). Transport Standards Video on Demand is supported by two major systems...

Security Issues and Computer Viruses

executable files that are then shared and executed on other PCs and so on. Virtually every computer installation is susceptible to...

Microsoft NT 4.0 and Hackers

In seven pages this paper offers a technical consideration of how Microsoft Proxy 2.0 and Microsoft NT 4.0 can be attributed to th...

Criminal Justice and Computers

In five pages the criminal justice system is examined in terms of the significant impact of computers with FBI investigations of o...

Discussion of Data Warehousing

computer has expanded our ability to access information to a global level from the comfort of our own home. The quantity and velo...

Halting the Practice of Computer Hacking

In five pages this paper discusses how to stop hackers from gaining access into computer systems. Five sources are cited in the b...

Tactics to Minimize Computer Crimes

'Cracking' and 'hacking' are among the topics discussed in this examination of computer systems and unauthorized access consisting...