SEARCH RESULTS

YOU WERE LOOKING FOR :Internet Trends and Web Design

Essays 361 - 390

Analysis : Advertising For iPhone

brand itself has always connoted "nonconformity, liberty and creativity." This is a subculture that has a certain mindset, traditi...

Achievement in Web-Based Courses

used This study utilized a participant group recruited from a co-educational public university located in the southeastern sectio...

Article Review, Software Development Study

when the user-participants were not allocated any developmental responsibility, the participants nevertheless felt a significant i...

Information Technology Security, Web Services and Database Management Systems

many forms cryptography complexity increasing the difficulty breaking the code is achieved with the use of prime numbers. One most...

iCIMS iRecruiter

order to create a more efficient recruitment process by increasing the level of automation, transparency and presenting a web base...

Should Public Records be Available on the Internet?

to snoop. It sounds like a bad idea, or an invasion of privacy, but the truth is that court records are public. Anyone can find ou...

Security on the Web

people "with malicious intent" (Novogrodsky, 2006). If the information is innocuous, this may not be a problem, but it can be trou...

Website Evaluation Checklist

body of the sites text. 6. Makes good use of pictures. 7. Easy to read: A site that is too gray (i.e., all text and no graphics...

Black Creek Furniture Case Study

as drilling and machine equipment, but the investments in information technology have been very limited. Until recently Martha ran...

The English Patient/Theme of Nationalism

blank slate for the imaginings of those around him, particularly Hana. Myth "crosses international boundaries and offers apparentl...

SIGGCHI (Web Site Analysis)

computers, the name of the group might be confusing. The following explanation appears as to why the group is in existence: SIGGCH...

Preventing Attacks: A Comparison of Two Approaches in Reducing Susceptibility to Becoming a Victim

The articles reviewed for the purpose of this paper parallel one another quite closely in terms of the criteria that they identify...

Beam Research Analysis

the use of focus groups and the asking of open questions, this has an advantage of giving in depth information, but there are also...

IT Security Disaster Planning

Solutions to the Problem While the problem goes more to a lack of proper communication and decision-making, the truth is that t...

Educational Impact E-Text

a valuable feature as it answers many of the questions that teachers might have about the framework. While the student researching...

Contemporary Management Style; Annotated Bibliography

at the management style of doctors in the context of working and collaborating with other professionals in the health care setting...

ANALYSIS OF O*NET

data comes up, along with the SOC code. Very simple and straightforward. 2. What did you think of the occupations O*Net suggested ...

Systems versus Enterprise Architecture

home, Aden compares the processes involved with EA to way that homeowners offer input to a contractor on what features that they d...

The Usability of Web Sites

is able to access desired information almost instantly. One can say that this site has a high usability factor. III. Transparenc...

Website Analysis - Amazon.Com

is even one for groceries. So, when someone exclaims that Amazon.com has become an everything store, they are very close to be acc...

ARCHITECTURE TUTORIAL

The metaphor exploration allows the user to put together groups and systems, determine how these can be placed on the site, and wh...

Proposal for a New WWF Marketing Campaign

The service will be promoted through a strategic alliance with a television channel that has the same target market; such as Natio...

National Museum of African Art

this series, while painted in the late nineteenth century, looks very much as if it were from the Byzantine era. The site gives th...

The Value of Social Networking Tools in a Teaching Environment with Specific Consideration of Business Students

at the way tools that are used as social networking tool are being used, adapted and are adding value to the learning processes fo...

MCBRIDE MEMO - A RESPONSE

be accessed from almost any computer. These are run through a web browser or equivalent type of program. Probably the two best-kno...

Search Engines and Google from a Commercial Perspective

Google are the dominant web search engine, but there is a dynamic environment and there are many influences present that may impac...

Analysis of Jaguar's Web Site

class autos in 1936 and in l935, the owners changed the name of their car to the SS Jaguar (Wilkinson, 2009). After the war, the n...

Implications of Shell's Supply Chain Shift

supply Shells competitors as well, with items specific to the oil industry. Other suppliers are those offering more general items...

Online Research Review

of the study, however, one purpose illustrated in the questions was the frequency with which customers used the "Wish list". There...

Research Project Proposal on Web Based Learning

Web based learning programs and the suitability of various types of personality are the focus of this proposed research project co...