SEARCH RESULTS

YOU WERE LOOKING FOR :National Security and Use of Technology

Essays 331 - 360

Security Survey

well. Parking is at a premium as is the case on the fringes of most large universities, and there is a great deal of foot traffic...

Security for a Men's Retail Clothing Department

the objective of the guard to apprehend those who they discover shoplifting. Security cameras can be used to watch activities in ...

Recruitment in the IT Sector

This 5 page paper looks at the challenges facing human resource managers when recruiting for information technology (IT) jobs. The...

Internet Applications used by Amazon.com

utilises can be examined in terms of the way it helps the company compete. This paper will look at for different applications that...

Kudler's Checkout IT

to any electronic information system. Kudler will need to identify all potential risks and take steps to mitigate those risks. T...

The Practice of Security Analysts

by a company reflects not only the size of funds, but also the start of investment and the level of activity that is undertaken. F...

Market Regulation under the Saudi Arabia Capital Market Authority and the US Securities and Exchange Commission

singular financial sector regulator in the country. It includes regulation of securities on the Saudi Arabia stock exchange, which...

Characteristics of Different Securities

New Zealand (Bank of Queensland, 2010). Convertible Notes Dragon Mining Ltd is listed on the ASX with convertible notes traded,...

Is the Social Constructivism Paradigm the Most Appropriate Security Models for the 21st Century?

The writer considers whether or not the adoption of a social constructivism approach to security is the best model for the modern ...

Management of Technology

recognize is that technology management is an enterprise-wide concern, and that an effective approach to facilitating superior ado...

Callaway Golf; Strategic Case Study

all sources of cost advantage... [and] ... sell a standards no frills product" (Porter, 1985; 13). The alternate strategy is that ...

Computer Security Issues

types, event-oriented logs and keystroke logs (Audit trails). Event logs, as the name implies, record system events, while keystro...

Safeguards and Penalties for Improper Use of Data and U.S. Law

to criminal issues were not sufficient to address computer fraud. To an extent, wire and mail fraud issues were addressed in the p...

Technology and offender motivations in relation to fraud and theft

In addition, these security measures are not particularly effective against fraud which makes use of social engineering: the scams...

INTERNET SECURITY TECHNOLOGIES - AND PREVENTING THEM FROM BEING COMPROMISED

hindrance to productivity. Any employee who has trouble remembering an alpha-numeric password to get onto a system, then has to wa...

MANAGEMENT, SECURITY AND INFORMATION TECHNOLOGY

man-in-the-middle attacks, wireless attacks, hackers doing their homework, monitoring vulnerability research, being persistent/pat...

Using Technology in Education

In a paper of ten pages, the author reflects on the use of technology as a tool for instruction. The author considers the use of ...

Using Technology to Manage Ethics

point is valid. He asks his listeners to consider a situation in which the government "eliminates" someone; if a person were to ac...

Technology and Is Used for Operations Management in Healthcare Practice

also changing. In the past the systems were being used in a more limited manner, with more emphasis placed on aspects such as busi...

Using Technology In The Elementary School

scores on the states Comprehensive Assessment Report were strongly related to increases in technological use (Page, 2002, p. 389)....

Uses of Technologies in the 2008 Presidential Campaigns of Barack Obama and John McCain

encourage the sharing of videos on YouTube and Brightcove (Yadav). Early in his campaign, Barack Obama acknowledged the importanc...

Using Technology To Support Learning

The research would involve students in science, math, visual arts and language arts. Small groups would also be working together t...

Business, Technology Uses, and the Internet

In three pages this paper discusses the impact of the Internet on businesses in this overview of how new technology is being used....

Student Case Study on Mobil's Technology Uses

In five pages this student submitted case study considers how Mobil applied technology to its systems of order processing in an as...

Classroom Technology Uses

Questions regarding how classrooms can apply Internet technology are answered in five pages. Four sources are cited in the biblio...

Using Technology in Business

its online procurement service, something that began for internal use but has since been marketed (Chronister, 1997). TPN is a por...

Information Technology Uses by Managers

predictability (Lamude and Scudder, 1995). There is a fifth concept which is directly related to the previous four: the Competing...

Using Technology to Help Teach World History

This 5 page paper discusses ways to use the computer, Internet and other technology to teach world history. The writer argues that...

Language Arts and the Uses of Technology

This paper analyzes 4 articles in five pages that explore how technology classroom implementation has impacted upon the teaching o...

1998 Film Pleasantville and Uses of Latest Special Effects Technology

In five pages this paper examines the impressive special effects featured in Pleasantville, a film released in 1998. Five sources...