SEARCH RESULTS

YOU WERE LOOKING FOR :Information Technology and Society

Essays 1501 - 1530

Database Management and Use

the past has been a repository of past events, a record of organizational history in several areas. "But these days we expect mor...

Using Incentives and Rewards Online

consumers in an effort to more effectively hone their advertising messages to their target audiences. Sites such as Coolsavings.c...

Marketing Activity - Promotion : Case Study

the themes, graphics and copy effective? No * Are the chosen media adequate? No Public Relations (which includes publicity) * Do...

Beowulf & Aeneas

past, which is now gone, and his son is the future (the founding of Rome), and he is the transitionary figure destined to bring th...

Study Critique/Coetzee (2004)

be discussed relative to both previous research and the studies that have come after it. This research tends to substantiate the s...

Shades of Anger, Rafeef Ziadah

This paper offers a summary, analysis and background information on Rafeef Ziadah's poem "Shades of Anger," which expresses the po...

AN ANALYSIS OF HARVARD BUSINESS CASE "REVERSING THE AMD FUSION LAUNCH"

This 7-page paper focuses on a marketing analysis of the Harvard Business School case study "Reversing the AMD Fusion Launch. The ...

Diagnostic and Statistical Manual 5

This is the manual mental health care professionals use for diagnostic and informational purposes. The manual lists mental health ...

Dystopian Future of Technology

This 5 page paper gives an overview of how the future may be influenced by technology. This paper includes a reflection of the nov...

Substance Abuse and Depression: Concurrent Disorders

This 3 page paper gives an outline of depression and substance abuse as concurrent disorders. This paper includes the general info...

Review: Critical Examination of Patronage

In 2009, Dominic Bearfield wrote an article that provides a history of the concept of patronage. This article is discussed relativ...

Breach of PHI Confidentiality

This paper discusses patient personal health information (PHI) in terms of a major breach in confidentiality. HIPAA regulations an...

Memory Studies

Metamemory refers to the beliefs and judgments people hold about the accuracy of their own memories. The literature mostly suggest...

Stem Cell Research and Essentials VIII

This paper reviews the important criteria of Essentials VIII professionalism and discusses how they apply to nurses working with p...

Why Don't People Want to Change

One of the constant factors in business is change; it has been this way for two decades. For example, it seems like technology cha...

WHAT HEWLETT-PACKARD SHOULD DO TO INNOVATE

Examines how Hewlett-Packard can innovate to boost its revenue and remain relevant in the technology market. Innovation theories a...

Research Proposal Cement Company

The Dangote Group is involved in several industries, one of which is cement. Three plants are being expanded to more across Africa...

CASE STUDIES BASED ON AAMF CODE OF ETHICS

Presents four cast studies concerning ethics and family/marriage therapy. Topics involve religion, culture, technology and managed...

Access to Internet for Remote Areas: Annotated Bibliography

This 4 page paper gives an overview of twelve sources related to internet technologies. This paper includes a discussion of drones...

GLOBAL COMPANY AND RISK MANAGEMENT

Provides information about risk management for a global oil and gas company. There are 5 sources listed in the bibliography of thi...

Useful Wearable Technology

Over the past several years, there have been a plethora of technological innovations focusing on health information and behavior, ...

Difficulty Proving Employee is Stealing

Unless an employee does something outlandish, it is very difficult to prove he or she is stealing from the company. In this essay,...

Crossing Boundaries in Therapy

Technology has added another issue relative to boundaries and dual relationships in therapy. This essay discuses these issues usin...

Research Issues

The paper discusses a number of topic related to research. These include information about surveys, interviews, sampling, sample s...

A Deadly Enemy to Health, Diabetes Mellitus

This paper pertains to the speaker notes for 9 slide power point presentation, khDMppt. This presentation is designed to offer inf...

OVERCOMING BARRIERS TO CLASSROOM TECHNOLOGY IMPLEMENTATION

Discusses potential barriers to classroom technology implementation, and was to overcome those issues. There are 4 sources listed ...

Problems Associated with Eating Disorders

One set of arguments, those that argue that unusual eating behaviors such as anorexia and bulimia are not in actuality eating diso...

Family Veterinary Pet Care Clinic Website Development

the wheel" in writing and documenting advice valuable to the practices clients. Assessing some of the sites already available and...

Christianity Perspectives

acceptance of the gospels giving other religious some value and points of contact. * Theology is important, but underplayed in di...

IS and KM

to an organisation, in effect become wisdom. Wenig looks at how knowledge is gained and then used (KMF, 1996). Knowledge it is arg...