SEARCH RESULTS

YOU WERE LOOKING FOR :National Security and Use of Technology

Essays 331 - 360

College Campuses and Date Rape

In ten pages college campuses and the incidences of acquaintance or date rape are examined in terms of information, statistics, se...

E-Commerce and Security Issues

A paper examining common security problems faced in e-commerce. Specifically, the author addresses high-security measures such as...

Hobart and William Smith Colleges Campus Security Research Proposal

In eleven pages this paper presents a research proposal to study attitudes of students and security officers regarding campus secu...

Internet Applications used by Amazon.com

utilises can be examined in terms of the way it helps the company compete. This paper will look at for different applications that...

HSO and the Changes in Management Information System

This 8 page paper gives an overview of security issues for organizations. This paper includes discussions of sensitive materials a...

Recruitment in the IT Sector

This 5 page paper looks at the challenges facing human resource managers when recruiting for information technology (IT) jobs. The...

Kudler's Checkout IT

to any electronic information system. Kudler will need to identify all potential risks and take steps to mitigate those risks. T...

Porter's 5 Forces Analysis & Value Chain - Retail Industry

companies. 3. Substitutes Products. Is it possible for a substitute product to capture the market? While it is always possible tha...

Wal-Mart Porter Analysis & Value Chain

two-thirds of which are in the U.S. (Biesada 2006). Besides its own stores, Wal-Mart holds a majority position in Seiyu, Co., Ltd,...

Security Survey

well. Parking is at a premium as is the case on the fringes of most large universities, and there is a great deal of foot traffic...

Security for a Men's Retail Clothing Department

the objective of the guard to apprehend those who they discover shoplifting. Security cameras can be used to watch activities in ...

ING Security

customer provides the opportunity for a breach. However, this is mainly out of the control of the bank, and giving advice and maki...

Employees and Corporate Cyber Security

consider cyber security is "social engineering." Social engineering "is the manipulation of people rather than electronic systems ...

Prejudice and Security Management

aware of the types of risk faced by the organization or government entity and then control for contributing factors. Danie...

Recent Changes in Aviation Security

over the past several years things have changed, concerns linger. In a recent report it is learned that airports are overwhelmed b...

Resource Dependency Theory, Contingency Theory and Core Technology

over a great deal with social exchange theory and the study of politics in the workplace (Huczyniski and Buchanan, 2003). The use ...

China, Singapore, and New Media and Internet Technology Uses

control the people by controlling the Internet. Yet, it likely realizes, it can only do so much to control something that is rathe...

Classroom Technology Uses

Questions regarding how classrooms can apply Internet technology are answered in five pages. Four sources are cited in the biblio...

Using Technology In The Elementary School

scores on the states Comprehensive Assessment Report were strongly related to increases in technological use (Page, 2002, p. 389)....

Technology and Is Used for Operations Management in Healthcare Practice

also changing. In the past the systems were being used in a more limited manner, with more emphasis placed on aspects such as busi...

Using Technology to Manage Ethics

point is valid. He asks his listeners to consider a situation in which the government "eliminates" someone; if a person were to ac...

Using Technology to Help Teach World History

This 5 page paper discusses ways to use the computer, Internet and other technology to teach world history. The writer argues that...

Language Arts and the Uses of Technology

This paper analyzes 4 articles in five pages that explore how technology classroom implementation has impacted upon the teaching o...

1998 Film Pleasantville and Uses of Latest Special Effects Technology

In five pages this paper examines the impressive special effects featured in Pleasantville, a film released in 1998. Five sources...

Adult Education and Uses of Technology

possibility of low enrollment can now be offered simultaneously to learners at several distant site locations (Niemi, et al 66). ...

Technology Uses, Linguistics, and TESOL

In one hundred pages second language instruction is examined in a comprehensive overview that includes technological techniques, l...

Business, Technology Uses, and the Internet

In three pages this paper discusses the impact of the Internet on businesses in this overview of how new technology is being used....

Using Technology in Business

its online procurement service, something that began for internal use but has since been marketed (Chronister, 1997). TPN is a por...

Student Case Study on Mobil's Technology Uses

In five pages this student submitted case study considers how Mobil applied technology to its systems of order processing in an as...

Information Technology Uses by Managers

predictability (Lamude and Scudder, 1995). There is a fifth concept which is directly related to the previous four: the Competing...