SEARCH RESULTS

YOU WERE LOOKING FOR :Personal Privacy and Data Processing

Essays 61 - 90

E-mail Privacy, Business Ethics, Perceptions, and Standards

This paper addresses various issues relating to e-mail in the workplace and perceptions of privacy by employees. The author prese...

Privacy and the Internet

press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances" (The Declara...

Workers Rights and Personal Privacy

or bus drivers, the lives of others are at stake. How does one weigh the privacy rights of employees regarding their behavior and ...

The Protection of Personal Data (A First Person Essay)

seems as if the bank has a good system of protection. Mullins (2002) explains that some programmers implement a system so that aft...

Data Presentation and Methods of Statistical Evaluation

changes resulting from the training program (Kirkpatrick, 1998). Measuring results, which helps researchers actually deter...

Overview of Interactive Data Visualization

in decision making (Sullivan, 2002). Data visualization can be used to "analyze information in a data warehouse or it can be used...

Mission Critical Data Personal Computer Environment Storage

control still (and will continue to) include management of security, maintenance and backup of data. These can all be summarized w...

The use of Data by Human Resources

within the employee base 3. To manage labour costs (management accounting), with the level of labor needed for different tasks, ty...

Selected Data from Honduras

are able to attract investment and trade is reflective of the intervention conditions within the country. One of the major conside...

The Selection and Use Secondary and Gathering of Primary Data - A Practical Demonstration

range of sources. The most influential article should be those from peer-reviewed journals, where previous research is reported. P...

Assessing An Intervention - A Statistical Analysis

BarOn EQ test control group 21 Table 21 Chi squares test to assess link between improvement in scores and the intervention 22 3.4 ...

Revenue For Education

regions, with the greatest decrease in the West. The amount of funding derived from property taxes in states has fluctuated dram...

Protecting Personal Data

use computers for their own gain. These are the thieves who steal others identities; who snoop through medical records for persona...

Human Sexual Inadequacy by Masters and Johnson

In four pages this text is reviewed positively in terms of the authors' understandable presentation of data and clear statement of...

IT Professionals and Data Collection

may be asked. A tool that has become increasingly popular is that of the pop up survey. The pop up survey will...

High Blood Pressure/Hypertension Awareness

This would normally suggest that fewer people in California would suffer from conditions brought about by hypertension, such as he...

Universal Prescription Drug Coverage

Foundation, 2006). In 2003, at least US$700 million was spent by Americans purchasing drugs from Canadian pharmacies (Kaiser Famil...

Albertsons and Excel Case Study

the opportunity for impose purchases that can be used to increase sales levels. The technology may also be sued to allow these to ...

Overweight Youth

The percentages of overweight and obese children and youth is alarming. About 17 percent of American children and adolescents are ...

Applying Psychological Code of Ethics

This report is based on a hypothetical case where a post-graduate student falsified data in an article for a journal. This student...

Type and Incidence of Falls in Patients of a Home Care Nursing Agency

only injuries in 53% of the falls recorded. It should be noted that for other types of injury there were some cross overs, for exa...

Walker, et al (2004) Article Summary,

This article review pertains to the meta-analysis conducted by Walker, Gorsuch and Tan (2004), who examined how therapists integra...

Digital Information Security

This paper considers the recent data breaches that have compromised our personal security and made identity theft a real threat. ...

Computer Forensics: A Rapidly Growing Discipline

of computer forensics technology). Whereas "computer evidence" used to refer to ordinary print-outs, now it includes not only the ...

Pros and Cons of Three Data Collection Methodologies

list, with the use of many closed questions (Adams and Brace, 2006). So the quantity of the information is high but there is not d...

IT Auditing and Internal Controls: Personal Experiences

it is secure, and companies that fail to secure vital information are at risk for a data breach. Studies show that data breaches a...

Article on Allocation of Costs

by the project, use of department that are using those resources. In the case of all costs being allocated to a single project or ...

Assessment and Recommendation for TDG Ltd

assess the way it should continue to compete in the future. 2. Internal Analysis In order to assess the company and determine t...

Planning and the External Environment

met. To consider the way planning takes place at all levels the process itself and the approaches can be examined. Mintzberg (et...

Literature Review for Use in a Project on Leadership in Kuwait

or values. It is by understanding leadership and its influences that the way leadership may be encouraged and developed in the con...