SEARCH RESULTS

YOU WERE LOOKING FOR :National Security and Use of Technology

Essays 181 - 210

Careers in the US State Department- IT Security

It seeks an Information Technology Specialist to design and implement functional goals and protocols "for the rapid sharing and st...

21st Century Database Management

in large companies this is a monumental task. In older times, when companies were reliant on a paper trail, the work was not as da...

Student Posed Questions About United Parcel Service

solutions," which is reinforced with principles of "First in Coverage, First in Confidence, First Thing in the Morning." The overv...

Risk Management, Security, and Communication

to inappropriate individuals or departments. This can perhaps best be illustrated by looking at the use of IT within a corporate s...

U.S. Bancorp, Goldman Sachs, and Uses of Technology

also building for the future. Current Issues and Trends Today, office automation and the use of Internet and Intranet appli...

Introducing Technology and Defining Positive Change

also a paradox in itself as for every $1 spent on IT we can see that there will be an associated increase in market value of the c...

Analysis of the Internet's Past, Present, and Future

was no such thing as an Internet. In fact, the term "Internet" wasnt widely used until 1982 (PBS Online, 1997). The term itself, ...

Online Security

confidential information, hackers have found other ways to make trouble. In February of 2000, a Michigan-based medical products f...

Online Trading and the Infrastructure of Technology

been successful in achieving its goals in this regard. Network Protocol Now an "old" technology, Transmission Control Proto...

Protocols in 802.11 Technology

of uniform standards to ensure different systems can be integrated and the wireless devices are not incompatible. IEEE developed t...

Changes and the Responses of the Vermont Teddy Bear Co.

Partners, 2003). Traffic World wrote that it is the delivery strategy that drives growth for this company (ebusinessforun.com, 20...

Questions on Information Technology Examined

objects will interact (JavaBeans, 2003). Unlike the ActiveX control that can be written in any language, the Java applet can be w...

The Model of the Canadian Health Care System and its Application in Other Regions of the World

health insurance through the government, "when we go to access it, its just not there" (Duff-Brown, 2005). But what about th...

Information Technology Knowledge Needed by a Risk or Security Manager

nuts and bolts of I.T., or is a cursory knowledge sufficient? In part, the answer lies in management ideology. Do managers need to...

Internet Technology and Security Issues

clock and waiting in long lines are becoming a thing of the past. There is no question that the concept of Electronic Funds Trans...

Managing Security Challenges

can be perceived then the same measures should deal with the lesser threats. It was a threat based approach that NATO used during ...

Transtheoretical Behavior Change Model

near future, e.g., six months (Velicer et al., 1998). They moved along the path because they have received information or have bec...

Commercial Aviation and Technology

The screening of carry-on baggage incorporates a variety of automated screening technologies, including improved capabilities for ...

Wal-Mart Design

as the emergence of globalization. Simons (2005, p. 17) said that the organizational design must insure accountability. Because of...

The Potential Influence of the Digital Revolution on Society

wave, on written there is a continuous form of data recorded. The way that human perceive information is analogue, as all visual o...

The Intersection of Language and Culture

it seems that with the increased number of brands and corporate identities that have arisen because of the internet, its happening...

Communication Mode Decisions for Education Deaf Students

an entirely different framework by which progress is judged. As it can be difficult to regulate such matters, South Australia has ...

The Health Care Industry and Information Technologies

field and industry out there it is important for organizations and businesses to keep up to date. It is surprising that the health...

SECURITY AT ST. JOHN’S HOSPITAL

isnt being seen - and read - by unauthorized personnel (such as the cleaning crew or perhaps the cleaning crews friends). The like...

Influences of IT on a Financial Services Company

This 4 page paper looks at information technology in financial institutions and considers influences such as the Sarbanes-Oxley, v...

Power Plants in Texas

alternative new technology plants cost 20% more to build that these models. With any form of energy production there are differi...

Wearable Technology For Crime Scene Investigations

of 2005 to determine "the most critical technology needs for law enforcement" (International Association of Chiefs of Police, 2005...

Aviation Maintenance

mobile offices" (Pryma, 2002, p. NA). The portability of the laptops allows maintenance workers to bring them on the plane, if the...

Why Passwords and Good Information Security Technologies Are Compromised by Users

cases, there are four critical factors that affect the proper usage of passwords: Multiple passwords; Password content; Perceived ...

Proposal for a New Assessment Model Aimed at Analysis of Information Technology Use within a Firm

which an organisation competes. Porter (1985, p13) has designed two differing categories of competitive advantage; cost advantage ...