SEARCH RESULTS

YOU WERE LOOKING FOR :How Employees View Technology A Research Proposal

Essays 151 - 180

BMW; A Research Proposal

the different strategies that BMW has adopted the question remains, why have they been unable to break their market constraints an...

Automated Telephone Call Response Systems

all research studies, it can also be used as the research method, which examines "data from a variety of sources that ultimately r...

Does Activity-Based Costing method give companies a competitive edge?

the quality of the input decision, and when assessing options it may also be a tool to help with analysis. Many studies have tak...

Nursing Graduate Study

leader. Finally, my educational objectives include demonstrating an awareness of and a skill for nursing research, which requires...

New Medications for Bipolar Disorder/A Research Proposal

bipolar disorder will participate in this study. Diagnostic procedures will include DSM-IV multiaxial evaluation, physical examina...

Medical/Surgical Nursing and Documentation

(Fawcett, 1995). Application of either model rests in large part on the appropriateness and completeness of nurse documentation (...

Example of a Scholarship Proposal

day enter medical school. I realized after some time, though, that I had no lasting interest in pursing a career in medicine, and...

Understanding How Crime is Experienced by Senior Citizens Research Proposal

The National Crime Victimization Survey reports that the rate of violent crime victimization of persons ages 65 or older was about...

Proposal for Cloning Humans

it will naturally not be long before we actively clone people as complete entities. Knowledge The practice of human cloning i...

Stem Cell Research: An Ethical Dilemma

effectiveness is directly impacted by provisions for quality assurance. For the most optimum outcome stem cell research must yiel...

Biometric Technology & Identity Theft

Also, identity thieves have found that the resources of law enforcement are totally inadequate in regards to this type of lawbreak...

University Healthcare Call Center Construction and Implementation

nurse desk or to another location for prescription refill. Messages are recorded on paper message pads, after which the message i...

Web 2.0/Wave of Corp. Future

have been posted by a university, an institution or a business firm and consist of a series of inter-linked pages (Belcher 34). We...

The Benefits of New Technologies on E-Commerce

1995 world wide only 1 financial institution had web banking, by 2002 this increased to 6,000 had this. In 1995 only 50 financial ...

Managing the Information Technology Resource by Jerry N. Luftman Chapter Summaries

adopted, while the right-hand end of the curve depicts the period in which laggards adopt ET (Luftman 186). The next section of th...

William Gibson's Cyberfiction Novel Johnny Mnemonic

The new literary genre dubbed 'cyberfiction' is considered in a five page research paper that discusses how technology's complicat...

Security and Wireless Technologies

issues of concern include: authentication, authorization, encryption, misuse and abuse in addition to hackers (Posluns, 2002). One...

Business, Internet, and IS

the Internet, trading partners can bypass intermediaries and inefficient multi-layered procedures. Furthermore, Web-sites are avai...

Electronic Monitoring Devices/Parolees and Prisoners

in prison (Biniok, 2004). They contend that the costs of electronic supervision are unacceptable, even that such supervision viol...

Dissertation Proposal on the Commercial Value of IT

measure this value rather than the use of the traditional productivity measures. This can then be expanded into the way value meas...

Technology That is Environmentally Friendly

In twenty pages this research paper discusses how technology can actually have a positive impact upon the environment through the ...

3 Articles on IT Reviewed

In six pages this paper reviews 3 articles researching various information technology aspects such as new system development for t...

Proposal of Automobile Black Boxes

and the force of impact. While airbag sensors record a vehicles motion just prior to a crash, thus far, this information has not b...

ITM Application of Company Manufacturers

within the same system. A typical example would be a company which has businesses spread over many manufacturing environments. I...

Reducing the Problem of Absenteeism

motivation, low levels of trust and the perception of unfairness. These results are highly aligned with relevant theory. The res...

Research and the Value of Educational Technology

In a paper of nine pages, the writer looks at educational technology. The importance of planning and evaluation in the use of tech...

The Adoption of Technology by Senior Citizens

In a paper of seven pages, the writer looks at technology use by senior citizens. Adoption of technology is examined through the d...

Benefits of Technology Outweigh the Problems

This 10 page paper gives an overview of the positive and negative elements of technology. This paper includes research and studies...

Muslim Women - Oppressed

injustice" (Cudd, 2006, p. 23). This means that oppression is perpetuated through some sort of social institution or through the p...

How Does Organisational Culture Affect A Managers Ability To Motivate Staff Through Non-Financial Rewards And Incentives?

praise as well as the employment relationship is able to provide for needs that will motivate employees. However, when loo...