SEARCH RESULTS

YOU WERE LOOKING FOR :Information Access and Computer Science

Essays 61 - 90

A Case Study in Requirements of Functional Human/Computer Interactions

This paper examines functionality issues required by a video shop to set up a database information system to allow customers easie...

Internet Terrorism and Freedom

In twenty pages this paper examines the Internet's anonymous servers in terms of advantages and disadvantages and discusses releva...

Information and Globalization

well. Because of cultural and communication differences, there is much that can be lost between the language barriers which can m...

Rural America's Information Needs

In eight pages this paper discusses the impact of restricted information access on rural America in a consideration of social excl...

Global Work Groups vs. Local Work Groups

In two pages these types of work groups are contrasted based upon such issues as access and sharing information, consistency, and ...

Overview of Trust Relationships

In two pages this paper discusses information exchanges and domain acceptance access in this trust relationship overview. Two sou...

Users and Multiple Domains

In two pages this paper examines multiple domain utilization and the importance of providing easy employee access so that informat...

Internet, Public Documents, and Government Control

In fifteen pages this paper discusses the Internet and how the government has endeavored to control public document assess in the ...

Consumer Behavior

they have always purchased (Postrel, 2009). Consumers can no longer purchase a simple chocolate bar or a package of laundry deterg...

Accessibility for Elderly to Rural Healthcare

been great debate over how to manage health care in the US, it has been relatively recently that the question has been raised that...

Cyer Law Privacy v. Security

Businesses have an interest in free information flows. Businesses are also under a threat from cyber criminals and terrorists. Whi...

An Overview of Medicaid Eligibility

state to state and from group to group. There are special rules for those who live in nursing homes and for disabled children livi...

Technology and Globalization

that the world was round, following the voyage of Christopher Columbus to America, when seeking to find a route to India, a journe...

eCommerce Remedies and Security Risks

little legal protection in terms of privacy on the Internet, many companies do their best to utilize technology so that a consumer...

Privacy Bill and Sen. Jackie Speier

bill would enact the Financial Information Privacy Act of 2002, which would require a financial institution , as defined, to provi...

Nursing Liability and Access to Health Care by the Poor in Texas

goes way beyond the paradigm of nursing as simply a "handmaiden" to physicians. The nursing professional is required to know virtu...

European Union and Democracy

In 5 pages democratizing the EU is examined in terms of its progress pertaining to public participation in the process, informatio...

Democratization of Europe

much in progress. For example, it can be seen that there are discrepancies in the levels of affluence between different countries,...

Services Access, Culture and Language

In this context, both approaches have relevance to social psychology within social work. The most commonly used is cognitiv...

Cognitive Science And Information Technology

ability to outreason and outlearn their human counterparts, leaving humanity open to an entirely unknown reality if that is ever t...

Issues of Concern to Prison Inmates

a company rather than career corrections officers, they are underpaid, demoralized, and the turnover is high (Friedmann, 1999). Pr...

Choosing a Computer

programs at later stages in the course, such as for analysis of results from primary research. There is also the need to be able ...

Injuries Related to Computer Work

How might one tell if a condition is work-related? In determining whether or not an MSD is related to work, it is important to exa...

An Overview of Tablet Computers

Tablet computers are becoming increasingly popular. The writer gives a broad overview of the technology, starting by defining the...

Computers in Classrooms

To raise test scores? To make children computer-literate? 2. Which software is best used for the different objectives, for English...

Digital Investigations

Stenography detection, FRCP rules, chain of custody, dumb ideas in computer security, bots, botnet attacks, computer forensic spec...

Investigating Computer Fraud

This paper discusses the field of computer forensics, what it is, what investigators do, detection tools, cyberslacking, chain of ...

Disparities in Health Care Access

Not every American has the same opportunity to access and receive quality health care services. There are a number of social, econ...

Saudi Arabia and the Exporting of Computers

In thirteen pages this paper considers Acme Computer's decision making process involving a cautious approach to exporting computer...

Apple Computers' Struggle Against Microsoft.

A paper that addresses the problems faced by Apple Computers, Inc. The author contends that Apple computers main competition, Mic...