SEARCH RESULTS

YOU WERE LOOKING FOR :Topics on Computer Security

Essays 481 - 510

Business Ethics and Citizen Responsibility

This paper addresses big business and the topic of citizenship. The author includes an interview with the owner of a modeling age...

A Content Analysis of the Evening News in 1995

This four page report presents the results of a study conducted in 1995 that analyzed the evening news for inclusion of sexual and...

The Impact of Global Positioning Systems

by which to determine the satellites position. Calculating latitude, longitude and elevation requires the simultaneous signals fr...

The concept of Global Supply Chain Management

This thoroughly researched paper looks at this topic using various perspectives. A brief investigation is ignited to further explo...

Jingling Bracelets by Maximilliam Schlaks

it for free. "Let me show you the souk, at least. Ill be your interpreter" he said. "How much?" "Free", he said. "My pleasure...

Globalization and the Workplace

For example, the decline...

Statistics and Research Methods

In thirty two pages and 8 sections various types of research topics, methods, and hypotheses are discussed with questionnaires, da...

Courtesy in Gawain, the Green Knight & Chaucer's Tales

issues of courtesy will be evaluated in order to determine whether or not invoking its precepts is a help or hindrance in civilize...

Economics Issues

This research paper examines five questions, offering answers that pertain to the topic of economics. Topcis include the role play...

Gender and Physiology

exercise (mild, moderate and intense) that women have a significantly lower respiratory exchange ratio (RER) than men, indicating ...

Racism and Globalization

to manage and motivate employees is far more important than knowing the technological aspects of the systems; there are employees ...

Education and Gender Inequality

al, 1988). Obviously, these are old-time descriptions of the roles men and women were expected to assume in decades past. These ro...

Trust Within Business Negotiation

best while the manager is there to do what he should be doing: leading the organization through effective communication and negoti...

Bicycles and the Concept of Globalization

the last century. Singer had presence in nearly every corner of the world, including some highly remote regions of Africa. ...

Project Manager's role in Acquisitions and Mergers

managers need to be committed to their missions, while having a long-term and big-picture perspective when it comes to such merger...

Strategy Plan and Marketing Mix for Slip on Soccer Cleats

do quite well, forcing other competitors to keep up with it. One major component of the marketing mix is, of course, the...

Pay Disparity and Gender in both Private and Public Sector Jobs

existence and persistence of salary disparities in both the private and public sectors" (2001). Even when controlling for "human c...

Violence at Schools/Research Issues

color as well as students with emotional and behavioral disorders" (Austin, 2003; p. 17)? Can educators achieve better results by...

Internet Usage by Two Companies - Gateway 2000 and DLJ Direct

taking itself too seriously and has collectively remembered to have fun in business as well as build profitability. All com...

Improving Security Performance in an Organization with the Use of RFID Smart Cards and Biometric Data

of security measures that make up a security policy. Traditionally, there have been the use of ID cards; ID cards would be issued ...

The Patriot Act: A Political Issue

against Americans on their own soil. The extent to which the Act serves to intercept terrorist activity, protect national freedom...

IT Forensics: Digital Evidence

reason than the tangible factor inherent to typical sites. The extent to which tangible investigations are inherently valuable to...

National Security Threat Levels

needs to prepare. The standard protocol for a green national threat conditions includes taking this otherwise down time to re-eva...

High-Tech Crime: How The Criminal Justice System Has Had To Change Its Approach

equipped to penetrate any computer system with the intent to take, destroy or manipulate the information found upon that system; i...

Tenure Laws In Georgia And Tennessee: Opinion

these teachers not been locked into job security under the precept of permanent tenure and been expected - as with virtually every...

System Development Life Cycle: Compare/Contrast

a specific definition and set of goals for the project" (Ntuen, 1991, p. 33). II. SYSTEM DEVELOPMENT LIFE CYCLE MODELS Ever sinc...

The Patriot Act

vital to national security (Pike 1). The 9/11 Commission even pinpointed several failure of communication that occurred within th...

Changes in the Personal Computer Industry

radical growth was between 1995 and 2000 (Canter, 2005). The surge in entry occurred much earlier between 1974 and 1984 (Canter, 2...

The Employee Retirement Income Security Act of 1974

act does is require all pension plans to possess the vesting of pension rights of the employees after a particular number of years...

Production of a Single Commodity

catches on, can make or break a technology company in a short amount of time" (Value chains, 2006). Companies that are going to ke...