SEARCH RESULTS

YOU WERE LOOKING FOR :Standards For End Users

Essays 181 - 210

User-Centered Design and Alleviation of IT/IS Developments

The ability to do this -- to design IT/IS that does not intimidate staff and then gets the job done is known as user-centered desi...

Airline Company's Information Technology System Security Issues

time will obviously be severely undermined if security issues mean that customers do not have confidence that their transactions w...

Examination of 'The Wife of Bath and the Mediation of Privitee' and Essay Response

In the end of the essay the author notes, "She expropriates herself: she makes of herself a sign, she publishes herself, as if she...

American Universities, Colleges, Drug Abuse and Effects

their responsibilities. For example, the marriage between alcohol consumption and college life have long been accepted as the nor...

Student Case Study on Systems Development

requires a different access level, with the ability to process data to produce the final results, bringing the different results t...

Overview of Direct Manipulation Interfaces

the user (Smith, 1997). As a term "direct manipulation" (DM) refers to a style of human-computer interactive design that features...

The Growth and Evolution of Blogs and E-Learning Resources

Both blogs and e-learning resources have increased on Internet over the past few years. The writer looks at these two trends seen...

Job Analysis in Electronic Equipment

This essay offers a job analysis. The job description was obtained through a Dept. of Labor publication and compared to what an em...

Deterring Young People from Committing Crime

This 3 page paper gives an overview of general deterrence theory and how is it not useful in preventing young drug users from comm...

Impact on Those Who Play Computer Games

There has been a debate about the impact of action and violent video and computer games on those who play them. This especially pe...

Illicit Drug Users and Reality Therapy

Our society is facing a very formidable enemy when it comes to substance abuse. Individuals can be addicted to alcohol, illicit...

Social Work and Service User Rights

experience, in such a way as to determine the rules that ought to govern human conduct, the values worth pursuing and the characte...

XBox Users and Buyers

event organiser set up promotion for the X-box with games such as Crash Nitrocart as well as the Simpsons Hit and Miss, These were...

Computer Network Design and Analysis of Performance During Peak Usage and Increased User Numbers

design. The most common element affecting system performance in a network environment during both times of disaster and tim...

'Collegue' by Datatel and User Acceptance

The results, according to Stoik (2001), were that the "ability to systematically track student progress and intervene appropriatel...

Literature Review of Overdose Effects of Safe Injection Houses for Street Drug Users

not many studies have really dealt in such a singular issue, but rather, lump potential drug overdose as one of the many problems ...

Users and Multiple Domains

In two pages this paper examines multiple domain utilization and the importance of providing easy employee access so that informat...

Information Superhighways Multimedia Users and Futures by Stephen J. Emmott

This book report consists of five pages and considers various types of multimedia applications available in computer technology. ...

Adaptable Intellegence User Interfaces and Human Computer Communications

entertainment gained tremendous momentum over the next five years and the number of users increased dramatically. By the late 199...

Towards Universal Happiness: Issues, Insights/Perspectives, Prospects and Challenges in Business Ethics

and respect diversity within the corporate environment, but not leveraging it in order to gain commercially at the cost of others....

Users of Drugs and Alcohol and Quitting Smoking

et al, 2005). However, smokers are not limited in their addition, those who are addicted to other substances, such as alcohol. For...

Why Passwords and Good Information Security Technologies Are Compromised by Users

cases, there are four critical factors that affect the proper usage of passwords: Multiple passwords; Password content; Perceived ...

The Unsolved Mystery Of D.B. Cooper

feet, with winds gusting at 80 knots and a freezing rain pounding the airplane, Dan Cooper-mistakenly identified as D.B. Cooper by...

Deviance: Mental Illness And Homelessness

crime was chemical or emotional disparity. From colonial times where people were chained to block walls in dark, dank dungeons an...

Delivering Culturally Competent Service in a Healthcare Environment

nursing services, look at what it is and consider the way in which a particular organization may be compliant with a general frame...

Freud's "Dora: An Analysis of a Case of Hysteria"

(1963) is Freuds account of the case of Ida Bauer, whose father brought to Freud seeking "cure" for her willful refusal to assist ...

Culturally Competent Care/Duke University Health System

could be applied towards unmet standards. Culturally competent care at Duke University Health System It has been determined by ...

Robert W. Howard's "The Shrinking Of Social Studies" - Reaction

learning through more evenhanded methods. Howard (2003) duly points out how standardization benefits no one but the bureaucrats w...

Nursing Philosophy for Professional Practice

nurses should understand these patients thoroughly, "who they are, where they live and with whom, their current health status and ...

Wound Care/Wet-to-Dry v. Advanced Dressings

the same manner, however, this dressing is intended to stay moist until removal; however, this may become a wet-to-dry dressing in...