SEARCH RESULTS

YOU WERE LOOKING FOR :Technologies of eBusiness

Essays 1321 - 1350

Management Information Systems and the Credit Card Industry

style of credit cards, all the way to redeeming award points summary online, a service offered by Citibank both in Malaysia and in...

2 Industries and Ethical Standards

is Gatifloxacin." Before the doctor can order the medication, yet another screen pops up and tells the doctor that he needs to tak...

WLAN Weaknesses in Security

A wireless LAN uses radio technology in order to transfer the data between the different terminals (Cisco, 2003). Institutions suc...

Accounting Profession and the Effects of Information Systems

however, technological accounting functions were mainly stand-alones - they werent a whole lot different from the old by hand ledg...

Brief Company Analysis of Vermont Teddy Bear Co.

sees the companys competitors not as other toy or plush doll/animal companies but as companies who sell greeting cards, chocolates...

Information Age and Social 'Technophobia'

who created the buggy whip? Many believe that technophobia is a modern syndrome, but in fact, it is not. During the Indust...

Online Security

confidential information, hackers have found other ways to make trouble. In February of 2000, a Michigan-based medical products f...

Bear Gram and the Vermont Teddy Bear Co.

to protect against the fall in sales due to economic factors. The company started in 1981, and have grown by using differentiati...

Global Mobile Phone Industry Overview

Jolly (2002) also reports that there were an estimated 150 million cellular telephone subscribers in China. There is some disagre...

Virtual World and Electronic Commerce

quite sophisticated and "a large number of potential users may interact with each other" (Shen, Radakrishnan and Georganas, 2002; ...

IT Outsourcing

emerging service companies to deliver accounting, human resources, data processing, internal mail distribution, security, plant m...

Overview of Knowledge Management

in such a way as to be accessible and available to those who need it. Knowledge management is, like the term suggests, a necessary...

Technological Connections and 'Cyberfeminism'

this Cyberfeminism, 2002). Cyberfeminism got its start in Australia during the early 1990s, when a group of artists and ac...

IT Abuse Prevention

In the case of computers and Internet access, loss of privacy represents one of the biggest concerns. Empowering the individual w...

Appendicitis and CT Scans

of Computerized Tomography Scans (CT) in diagnosing abdominal conditions is highly debated. Baker emphasizes that the procedure p...

Motivation and the Building of Teams

those skilled have become more specialised. In effect the ultimate team maybe compared to the single craftsman, and the modern tea...

Comparative Analysis of Japan's Matsushita Group and the Netherlands Philips Electronics

the Netherlands and Matsushita Electronic in Japan, and to determine if their longevity and staying power can help get them back t...

The Changing Nature of Health Care in the U.S.

expected only to continue for several years to come. Then, growth will begin to decline in response to fewer numbers of people re...

Hotel Industry and IT

a joint venture called The Hotel Industry Switch Co (THISCO). THISCO linked airline computer reservation systems and a majority of...

Istanbul and Megacities

on the European shore. It is on both the land and sea routes of Asia and Europe. Istanbul has the advantage of being on the Blac...

Postmodernism Defined

of another direction, only to be broken apart and redeveloped by way of postmodernistic composition. Technology, as such, represe...

National Health Service Information System Implementation Methodology

this thesis makes use of the Actor Network Theory it is appropriate to use a research paradigm that may be seen as able to cope wi...

Post Second World War and Global History

that the Russians "made very serious mistakes" (Booth 37). In an attempt to avert a secret attack, President Kennedy ordered Prem...

Can Computer Crime Be Effectively Fought?

attracting the novice-to-intermediate computer user; however, the growth rate for the Internet was no less than fifteen percent ba...

War Generation, Depression, and Infochild

with little respect for or understanding of any other generation that did not share in the same advancements. Harv just thinks Ma...

Functionality and Format of DVD and Sales Presentation Opportunities

acceptable and commonplace. The introduction or more channels that was made possible as a result of the digital age made these pra...

Hewlett Packard (HP) During the 1980s

the basic software applications. As the technology changed, however, and became less expensive to produce, personal-comput...

Howard Schultz and Starbucks Leadership Strategy

By 1985 he has managed to convince the founders of the coffee company that it is worth trying out the new format of a coffee bar. ...

Radar's Role in World War II

the war" (Heywood, 1998; history.html). This lab was only one division of National Defense Research Committee (NDRC), for "in Jun...

Mammalian Hepatic Estrogen Receptor Function and Expression

up of hormone levels in the liver can lead to serious side effects, it can be stated. In fact, there is some evidence to show that...