SEARCH RESULTS

YOU WERE LOOKING FOR :Management of Technology

Essays 901 - 930

Bioethics: Space And Military Technology

its dying masses. Even after realizing the mess made from human conspicuous consumption, there has been a lukewarm rally to take ...

The Ethical, Legal and Social Implications of Developing Smart Home Living

at al, 2010). The potential benefits has resulted in a large investment, for example the i2home project which was funded by the E...

Improving Security Performance in an Organization with the Use of RFID Smart Cards and Biometric Data

of security measures that make up a security policy. Traditionally, there have been the use of ID cards; ID cards would be issued ...

FedEx and the Use of Technology

can Fedex do to even further improve on its already technology oriented facilities? FedEx would introduce various products to enh...

Ethics and Technology

software to weed out spam, and rules to assure that company employees are not engaging in unsavory practices, but many firms are u...

The Importance of Technology for the Fedex Corporation

quickly, there are always new ideas on the horizon. It is not as if Fedex is just waiting for something new to arise from the hea...

Technology and the Criminal Justice System

and foremost, its reliability for identification purposes (Technology and Human Values, 1997). In addition, it is widely used and...

Using Technology To Support Learning

The research would involve students in science, math, visual arts and language arts. Small groups would also be working together t...

Child Tracking Technology: Protecting Those With Cognitive Disorders

with some type of cognitive deficit disorder such as dementia or Alzheimers. In order to anticipate the percentage of those who w...

Revolutions in Science and Technology

While it is true that Fleming noted the effect of this substance on bacterial growth, the discovery entirely by chance, as Fleming...

Ethics and medical technologies

are a number of research initiatives which deal with genetic mapping, therapy, and modification. Gene mapping, which is fundamenta...

TECHNOLOGY AND BUSINESS

one letter. Looking at that same workflow today, we likely have the boss distributing some notes to his or her administrative assi...

Technology and offender motivations in relation to fraud and theft

In addition, these security measures are not particularly effective against fraud which makes use of social engineering: the scams...

LAW ENFORCEMENT AND TECHNOLOGY

on the predators, with information transferred, through GPS, to appropriate pagers, mobile phones and e-mail (High-Tech Help in Tr...

Negotiation and the Wellington Institute of Technology

means that there are two goals, a short term goals as well as a longer term goals that will help to mitigate the situation so that...

The Impact of Technology in Preschool

(Schmid, Miodrag and Di Francesco, 2008; Chatel, 2005; Macpherson, 2005; Weikle and Hadadian, 2003). Does this media help or hinde...

Analysis of Creative Technology Ltd.

developed a strategy of meeting market needs by customising and adapting technology starting out by the creations of PCs that were...

INFORMATION TECHNOLOGY: SECURITY BY ADMONITION

is to allow a networking system to cooperate with its user and what the user wants, while keeping the "bad things" out. He points ...

Cell Phone Technology

to represent the "geographical area covered by cellular radio antennas" (Farley and van der Hoek, 2006). Such an area is called a ...

Adoption of Technology in Classrooms

so frequently that it is simply accepted as a maxim. However, data from the third annual "Teachers Talk Tech" survey, which was ta...

Considering the Implementation of an Information Technology Strategy for Local Government

the research to develop which takes all of the potential factors into account; dependant and interdependent influences as well as...

Why Passwords and Good Information Security Technologies Are Compromised by Users

cases, there are four critical factors that affect the proper usage of passwords: Multiple passwords; Password content; Perceived ...

Aspen Technology Inc Case Study

fees over the period of the license which complies with the matching concept in accounting. It may be argued that there was an imp...

Technology and Changes in American Culture

were large multi-branched entities and several generations typically lived under one roof. This was, in fact, a necessity in thes...

COMMUNICATION PROCESS, ORGANIZATIONAL STRUCTURE AND TECHNOLOGIES

allow electronic storage, all of that paper can now go into a particular box on the hard drive, which saves space and time (as its...

IMPLEMENTING A TECHNOLOGY SYSTEM IN A COMPANY

and installation guys, on the other hand, probably wouldnt care about a training schedule or support strategy. A companys receptio...

TECHNOLOGY AND ORGANIZATIONAL CHANGE

The situation isnt much different when it comes from technological change and integration on the customer side. Though the custome...

DHL and RFID Technology

money. Customs officials could then link directly to the information databases of the manufacturers of the products that have been...

Blu-ray Technology

standard-definition video (Watson, n.d.). As high-definition becomes more common and more widespread, the standard DVD has no cho...

GLOBAL NEGOTIATION AND TECHNOLOGY

This 4-page pape discusses the importance of technology as it pertains to negotation on an international basis. Bibliography lists...