SEARCH RESULTS

YOU WERE LOOKING FOR :Research Issues and Actor Network Theory

Essays 841 - 870

Managing Risk for a new IT/IS Installation

it is entered, unless it requires some alteration for legitimate purposes. General training of the system use will incorporate t...

Network Administration and Age Discrimination

believe that social ills such as discrimination are a thing of the past. The fact is that injustices such as age discrimination ar...

Social Networking and Transformational Leadership in Learning Organizations

of information among employees at all levels of the organization, to develop organizational knowledge in the most broadly effectiv...

Evolution of Technology and Communication

the last several decades. Some of the major communication tools were invented in the 1400s, such as the newspaper which first appe...

A Cost Benefit Analysis of Cloud Computing in Developing Nations

that utilized information technology heavily grew at a rate three times faster than others (Atkinson & McKay, 2007). Therefore, ju...

Tourism and the Internet

the internet as a distribution channel. 2. Patterns and Influances on in Tourism Tourism is one of the few areas of continued ...

HP Open View and IBM Tivoli Systems Management and Network Products

In four pages this paper discusses the configuration and performance of the latest cutting edge systems management and networking ...

Juvenile Delinquency and Conflict Theory

The social class individuals want to become upper class, while the upper class want better. Conflict theory is oftentimes related...

Sample Executive Summary

and installation 12 days for testing and a three day roll out. The plan presented included a full response matrix, a work breakdow...

The Value of Social Networking Tools in a Teaching Environment with Specific Consideration of Business Students

at the way tools that are used as social networking tool are being used, adapted and are adding value to the learning processes fo...

The Problem With Spam

they choose this method is due to the low cost ("What is spam?"). There are actually two types of spam, one of which is cancelable...

Wireless Network Security Article Analysis

wireless networks. Retrieved April 14, 2010 from http://www.cs.wright.edu/~pmateti/InternetSecurity/Lectures/WirelessHacks/Mateti-...

SOCIAL MEDIA AND THE WORKPLACE

government of Ontario banned its employees from access to Facebook (Minken, 2007). Why? Two reasons: Derogatory comments about the...

Medicare and Medicaid Options' Evaluation

In ten pages Medicaid and Medicare options are evaluated with several policy issues discussed and an examination of Kingston's the...

Gas and Electric Utility Industries Automatic Systems of Meter Reading

In fifteen pages the increasing trends of employing the technology of automated meter readings in the gas and electric utility ind...

Contemporary Society and the Theories of Emile Durkheim and Karl Marx

In eight pages this essay compares the theories of Durkheim and Marx in a conceptual consideration that includes modern issues suc...

Modernization and Its Detrimental Impact

In six pages modernization and its impact are examined in terms of theory with countries of the third world discussed as they pert...

Karl Marx, Max Weber, and Class Consciousness

In a personal essay consisting of six pages issues of social stratification and class consciousness are theoretically considered u...

Medical Ethics Issues and Catholic Hospitals

In eight pages the moral dilemmas several Catholic hospitals struggle with in terms of such medical issues as euthanasia and abort...

Economic Justice, the Church, and Theories of Poverty

In four pages this paper discusses the role of the Church regarding issues of poverty, economic justice, and government accountabi...

Philosophical Comparison of Hempel v. Pierce and Blatchford v. Stace

In four pages theories of Hempel and Pierce are compared and contrasted as are those between Blatchford and Stace on such philosop...

Overview of Deviance

In eight pages the deviance concept is examined in an overview that discusses various factors such as the labeling theory with an ...

LANs and Fast Ethernet

In four pages the correlation between LANs and Fast Ethernet are examined in a consideration of local area network protocol change...

Legalized Slavery in Colonial Times

Slavery in America was held in place by a complicated network of legal precedents. This paper analyzes the history of the practice...

Privacy and Surveillance

In six pages this paper examines such theories as social control, technological and scientific controversies as they relate to pri...

Two Party Political System in the United States

as societal and issue-related factors. They are both structural and historical and they exist both internally and externally. Ou...

Relevance of the Asian Business Model

In three pages this paper examines the advantages of the Japanese business model known as keiretsu in a consideration of whether o...

Joan Atwood's Family Therapy A Systemic-Behavioral Approach

In five pages Atwood's text is presented in an overview of major issues presented and then discusses how systemic behavioral metho...

Divorce and Contemporary Social Theory

In ten pages this paper examines divorce and the implications of several important social theories relevant to this issue. Seven ...

Overview of Important Sociological Theories

In eight pages sociological theories by Becker, Marx, and Weber are discussed in terms of how they relate to issues including soci...