SEARCH RESULTS

YOU WERE LOOKING FOR :Injuries Related to Computer Work

Essays 61 - 90

Work Related Violence

ones privacy, telephone harassment, as well as other acts. Violence in the workplace is a very serious issue and it is one that ...

Hearing Loss That is Work Related

Work Related, 2002, See also Campaign to Prevent Noise-Induced Hearing Loss, 2002). Additionally, there are about 9 million worker...

Stress Related to Work

subconscious finds either threatening or challenging (Varhol, 2000). The bodys reaction to stress is a protective mechanism that...

Oedipus Rex, The Iliad and The Odyssey and how these works relate to Gender

Oedipus. He learned that his predecessor and his wifes late husband, King Laius, had been murdered, Oedipus contends that it shou...

Conflict and Work Related Violence

to face threats and threats delivered by e-mail (twenty-four percent) to acts such as the downloading of computer viruses (sevente...

Comparisons of 16th and 19th Century Art El Greco vs. Caillebotte

Reformation, as well as Romes response to the Reformation, the Counter-Reformation (Fleming, 1974, p. 324). During this period, ev...

The Relationship Between Happiness And Work

a significant element of their philosophies, with each man sharing many aspects with the other, while at the same time upholding t...

The Functionalist Views of Durkheim and Parsons

Religious Life, Durkheim relates one of the many ways that he applied his version of functionalism. This text relates the results ...

Issues in HRM - The Work Life Balance and Issues of Fairness

employers are obliged to comply for all of their employees and protect employees rights; reducing pressure from employers for empl...

Rousseau's A Discourse on Inequality

was beginning to find his way out of his despair. He would go on to take a mistress, attempt a musical career, and have five chil...

Religion and John Updike

This essay focuses on three works of John Updike, which are his novel A Month of Sundays and his short stories "Wildlife" and "Far...

3 Aspects of Project Management

is user involvement (Johnson et al, 2001). The third main key for success is to have an experienced project manager, it has bee...

The Effects of Society on Human Behavior

This paper addresses various literary works relating to human behavior and society. The author discusses George Orwell's work Sho...

Internet, Computers, and Global Issues

to create problems, while others are out to do damage (Adams, 2000). There is in fact a debate on the ethics of hacking as there a...

Computer Technology and Art

the diversity and liveliness of the culture of the time. One could...

Corporate America and Computer Ethics

to create a program called DOCTOR, something that had been taken seriously as a tool for psychotherapy (1996). He was very surpri...

Computers and Children

In six pages the issues relating to computers and children are considered in a review of eight pertinent journal articles. There ...

Turkey and the Marketing of Computer Hardware

that a number of other entities will also recognize the opportunity, as well. II. TRANSPORT BARRIERS FOR PRODUCT Computer hardwa...

Security Issues and Computer Network Management

In thirty pages this research study examines corporate computer network management and issues related to security and information ...

Issues of Computer Security

Carroll (1995) makes the point that whilst it is possible to establish a reasonable amount of security on the Internet, the way in...

Interdisciplinary Perspective on Philosophy

In five pages this research essay examines how the disciplines of computer science, scientific method, psychology, sociology, art,...

Overview of Network Security

included. Other important considerations are Internet connections. They need an end-to-end policy of network security. The IS d...

NonProfessionals, Health Education, and Computers

In five pages the applications of computers in community and academic settings are evaluated as they relate to the health educatio...

Five Articles on Various Issues Involving Computer Technology

Bosh had a contingency plan, part of which was to use their cell phones to contact partners. But, the cell phone network was also ...

Ethics and Copyright Infringement

In five pages the ethical implications of reproducing computer software without authorization are discussed with morality and ethi...

Audit Planning and Evaluation of Internal Controls

In twenty five pages this paper examines various accounting issues related to auditing functions and internal control in a conside...

Modern Technology and Gender

In five pages computer technology as it is related to gender is examined. Five sources are cited in the bibliography....

Credit Card Fraud

nearly $70,000 using stolen credit card information (Brunker, 2004). Clearly, this is not a small-stakes game, but a potentially ...

The Ethics of Hacking

be quite costly and we have endured this cost for several decades. Roush (1995), for example, provides insight on the historical ...

The Deregulation of the Air Cargo Industry

15 pages and 22 sources. This paper relates the process of airline deregulation, especially as it relates to the air cargo indust...