SEARCH RESULTS

YOU WERE LOOKING FOR :The use of Data by Human Resources

Essays 1651 - 1680

Equal Treatment of Groups Policy Proposal for Corporate Network Groups

In five pages background data on network groups along with a definition is provided in an examination that considers the influence...

Wal-Mart's Use of Information Technology

This 10 page paper discusses the way in which Wal-Mart uses information technology. The retailer has the world's largest IT system...

Internet Connections in Australia

In a paper consisting of seven pages Australian telecommunications are examined in terms of both rural as well as international pe...

Males vs. Females and Anorexia Nervosa

In a paper consisting of five pages males and females are compared in terms of the implications and manifestations of anorexia ner...

Student Case Study on the Seventh Week of a New Product Launch

To break even in period seven we need to divide the amount outstanding at the end of that period by the contributions to get the n...

'Old South' Data

of urbanization, economic development, and levels of nationalism in these Southern states. Urbanization Revenue: Towns survive by...

Security Risks of Data Warehousing

In eight pages a possible security risk posed by a company's external data warehouse is examined in terms of the business's altern...

Considerations Involving Medical Data

In five pages this paper examines the problems posed by electronic medical information and the assistance offered by SISTeM in ter...

Book Review of Curriculum and Aims by Decker F. Walker and Jonas F. Soltis

This well written and thought provoking book that is supported by factual data and statistics is reviewed in five pages. Two sour...

EEOC Reporting System Designed for Wilco Construction

on file in any good sized business, or may be accessed through any local Job Service or State Employment Division. But there are ...

Consumer Privacy, Data Protection, and the Digital Age

In ten pages this paper discusses the compromising of consumer privacy that can occur as a result of the Internet in a considerati...

Operations of the Central Intelligency Agency

In seven pages the Cold War arms race between the U.S. and the Soviet Union is discussed in terms of CIA experiences and the roles...

WWW's Future in Terms of Security and Electronic Commerce

In five pages this paper discusses the future of the Internet as it pertains to ecommerce security and privacy issues with the enc...

'The NY-911 Demonstration Project' and NYPD Data Collection

In twenty six pages this report discusses the 911 emergency services of the New York City Police Department in terms of its implem...

Women and Whether They Are Better Off Today Than They Were in the Last Few Decades

In five pages this research paper evaluates if women are better today than they were in previous decades and based upon literature...

'Can Ethernet Span LAN, MAN and WAN?' Review

In five pages this article in which DPT, DTM, ATM, and SONET are compared with Gigabit Ethernet regarding long distance data commu...

B2B and B2C Electronic Commerce

In six pages business to commerce and business to business types of electronic commerce are discussed with sales data and manageme...

Server Data Back Ups

In a paper consisting of five pages an online magazine's three options for backup and storage are examined. Seven sources are cit...

Financial Future of Nike

In five pages this paper analyzes Nike's financial future in an examination of data and industry assessments. Six sources are cit...

Psychodynamic Theories in Workplace

We know personality theories are used but psychodynamic theories have also been adopted in one way or another in organizations of ...

Digital Information Security

This paper considers the recent data breaches that have compromised our personal security and made identity theft a real threat. ...

Criminal Sexual-type Conduct Data

There have been a number of laws passed and numerous court cases regarding sexual harassment in the workplace. These span more tha...

Outline for Research Utilizing Existing Data

This paper presents a research outline for a research proposal provided by the student. The research proposal is for an ex post f...

Challenges Organizations Face

This essay identifies some of the many risks and challenges organizations and businesses face. This includes things like being hac...

EMAIL MARKETING TESTS -- A PROCESS

Analyzes the results of an email campaign, and suggests methods to interpret data. There are 3 sources in the bibliography of this...

Public Leaders

This essay describes and discusses four leadership styles that could be used in private or public settings. The behaviors of leade...

Difficulty Proving Employee is Stealing

Unless an employee does something outlandish, it is very difficult to prove he or she is stealing from the company. In this essay,...

MMPI an Overview

The MMPI is the most commonly used assessment for its purpose, which is to assess personality traits. The design of the instrument...

Data Collection Tools/Patient Safety

This research paper addresses selection of data collection and other relevant tools for use in a quality improvement project that...

4 Ps and New Product

This paper presents a case study about a brewery that wants to introduce a non-alcoholic beer to the market and uses the 4Ps metho...