SEARCH RESULTS

YOU WERE LOOKING FOR :Human Resource Management and New Technologies

Essays 1471 - 1500

Introducing Technology and Defining Positive Change

also a paradox in itself as for every $1 spent on IT we can see that there will be an associated increase in market value of the c...

Economic Policy Management

In effect this gives the average business or family more money that they can spend (disposable income) as they are paying less...

What is Bluetooth Technology

Interestingly enough, the Bluetooth technology was named after Harald Bluetooth, who was King of Denmark during the 10th century ...

An Article on Diversity Management Critiqued

zero-tolerance attitude as is expected from everyone else. Referring to such existing literature as Riccuccis "Cultural Diversity...

Business, Internet, and IS

the Internet, trading partners can bypass intermediaries and inefficient multi-layered procedures. Furthermore, Web-sites are avai...

Student Posed Questions About United Parcel Service

solutions," which is reinforced with principles of "First in Coverage, First in Confidence, First Thing in the Morning." The overv...

Factors That Influence Strategic Implementation

that value is added to the customer and more custom gained. If a weakness is location then this may be the opportunity for change....

SAS 99 Compliance and Lucent

financial information and balance sheet, its first a good idea to examine what, exactly, compliance means under Sarbanes-Oxley and...

Risk Management Plan

low. Given that, more resources should be dedicated to management of risk in the event of a hurricane, rather than in an earthquak...

Current Status of Internet Telephony and Its Future Potential

the telephone communication infrastructure. IP Telephone can be defined in the following way; "Internet telephony (IPT) is tra...

U.S. Bancorp, Goldman Sachs, and Uses of Technology

also building for the future. Current Issues and Trends Today, office automation and the use of Internet and Intranet appli...

Security and Wireless Technologies

issues of concern include: authentication, authorization, encryption, misuse and abuse in addition to hackers (Posluns, 2002). One...

Essays on Computer Management

in it (especially on the Internet). The problem is, however, that "privacy" is one of those concepts that is difficult to ...

Book Review of Management Accounting

But what, exactly, is management accounting information? The authors point out that, according to the Institute of Management Acco...

Electronic Monitoring Devices/Parolees and Prisoners

in prison (Biniok, 2004). They contend that the costs of electronic supervision are unacceptable, even that such supervision viol...

The Influence of Cultural Developments on Visual Art, from the Mid-19th to the Mid-20th Century

early twentieth centuries established themselves. What this means in terms of how those great philosophers looked at the broader ...

Similarities and Differences Between Private and Public Management

there are definitely similarities between public sector and private sector management on a basic level, on other levels, the diffe...

Society and Technology

of political life" (1969, 55). Mesthene sees technology as detrimental and provides examples. For instance, cities have mass trans...

Memory Management and Functionality of Windows XP

the stickiest problems with Microsoft operating systems. Perhaps the most fascinating new XP feature is that read-only and...

Digital Technology's Pros and Cons

fact play a significant role in terms of the emerging 3G wireless appliances. It could in fact be that telephones could double as ...

IT and MIS Strategic Uses

enabled, he noted, by advances in chips, connectivity and computing devices" (Trembly, 2002; p. 18). Yoran (2002) sees a la...

Practices And Trends In Crisis Intervention

This followed along with the theories that crises can lead to more serious disorders and can have long-term effects (Myer and Moo...

Epidemiology & STDs

associations, testing hypotheses, and identifying the causes of health-related states or events" (Merrill and Timmreck, 2006, p. 2...

Ethics In Information Technology

16). Monitoring and surveillance have come to represent just two of the villainous components of computer use in the late twentie...

The Ethical, Legal and Social Implications of Developing Smart Home Living

at al, 2010). The potential benefits has resulted in a large investment, for example the i2home project which was funded by the E...

Information Management

was not the responsibility of a single person. At most there would be network with an IT manager. With increasing levels of inform...

Technology's Effect on Society

astronomers have figured out whats going to happen and are hoping to leave records so the next generation will understand, and be ...

Girl Scout Management

meshes with organizational strategy. Planning sets the course for all of the other three functions of management. Not only...

Kant/Speculative Beginning of Human History

A 3 page reaction paper to Immanuel Kant’s 1786 text “Speculative Beginning of Human History,” which draws on the Judeo/Christian ...

Health And Safety In The Workplace: Technology's Impact

the vast array of Internet sites that readily provide ways in which companies can remain compliant with all the ever-changing rule...