SEARCH RESULTS

YOU WERE LOOKING FOR :National Security and Use of Technology

Essays 181 - 210

Architecture - Technology and Art

form of structure, function, and aesthetics. This paper will explore how the evolution of technology has influenced the evolution ...

Technologies for Learning Disabled Students

2010 study of more than twenty Turkish university students indicated that there was a direct correlation between students percepti...

Technology's Impact on Data Exchange

organizations to ensure the safety of information. Though the precise future evolution of the Internet is difficult to predict, t...

Online Trading and the Infrastructure of Technology

been successful in achieving its goals in this regard. Network Protocol Now an "old" technology, Transmission Control Proto...

The Adoption of Technology by Senior Citizens

In a paper of seven pages, the writer looks at technology use by senior citizens. Adoption of technology is examined through the d...

Online Security

confidential information, hackers have found other ways to make trouble. In February of 2000, a Michigan-based medical products f...

Protocols in 802.11 Technology

of uniform standards to ensure different systems can be integrated and the wireless devices are not incompatible. IEEE developed t...

3 Articles on IT Reviewed

In six pages this paper reviews 3 articles researching various information technology aspects such as new system development for t...

Computers in Classrooms

To raise test scores? To make children computer-literate? 2. Which software is best used for the different objectives, for English...

Discussion of Biometric Security Measures

In a paper consisting of seven pages scanning technologies of iris, finger, retina, and hand along with their applications are con...

Airline Passengers and Biometric Security Measures

since the days of Perry Mason of "The Untouchables." Biometrics are at the foundation of personal identification. They are the mea...

Overview of Security Fraud and Protection

beating the clock and waiting in long lines are becoming a thing of the past. There is no question that the concept of Electronic...

Banking Industry and Electronic Security

type of cryptography (2000). The Mississippi Secretary of States office for instance describes a digital signature as "a computer-...

Mathematics and Computer Technology

has clearly developed in the mathematics classroom. Young (2000) considered the implications of computer and technological advanc...

Cathay Pacific Airways, Strategic Management and the Uses of Information Technology

In thirty pages this paper discusses Cathay Pacific Airways' uses of IT in strategic management with technology's direct and indir...

Client Server Technology's 2 Phase Commit

In ten pages this paper discusses client server technology's 2 phase commit in an overview of how it functions, how it can be appl...

Criminal Justice System and the Effects of Technology

details. Digital enhancement of such evidence has made the retrieval and identification of even the tiniest and most illegible ev...

Can Computer Crime Be Effectively Fought?

attracting the novice-to-intermediate computer user; however, the growth rate for the Internet was no less than fifteen percent ba...

Careers in the US State Department- IT Security

It seeks an Information Technology Specialist to design and implement functional goals and protocols "for the rapid sharing and st...

Wal-Mart Design

as the emergence of globalization. Simons (2005, p. 17) said that the organizational design must insure accountability. Because of...

Managing Security Challenges

can be perceived then the same measures should deal with the lesser threats. It was a threat based approach that NATO used during ...

The Potential Influence of the Digital Revolution on Society

wave, on written there is a continuous form of data recorded. The way that human perceive information is analogue, as all visual o...

Transtheoretical Behavior Change Model

near future, e.g., six months (Velicer et al., 1998). They moved along the path because they have received information or have bec...

Commercial Aviation and Technology

The screening of carry-on baggage incorporates a variety of automated screening technologies, including improved capabilities for ...

Influences of IT on a Financial Services Company

This 4 page paper looks at information technology in financial institutions and considers influences such as the Sarbanes-Oxley, v...

Power Plants in Texas

alternative new technology plants cost 20% more to build that these models. With any form of energy production there are differi...

Wearable Technology For Crime Scene Investigations

of 2005 to determine "the most critical technology needs for law enforcement" (International Association of Chiefs of Police, 2005...

Aviation Maintenance

mobile offices" (Pryma, 2002, p. NA). The portability of the laptops allows maintenance workers to bring them on the plane, if the...

Why Passwords and Good Information Security Technologies Are Compromised by Users

cases, there are four critical factors that affect the proper usage of passwords: Multiple passwords; Password content; Perceived ...

Role Of Congress In National Security

any other official militia of the country.4 The Constitution divides the powers regarding war between the President and the Co...