SEARCH RESULTS

YOU WERE LOOKING FOR :Topics on Computer Security

Essays 121 - 150

Global Market Entry

market is no longer a discretionary decision, any medium to large-size company who wants to retain market share and profit must en...

Five Articles on Various Issues Involving Computer Technology

Bosh had a contingency plan, part of which was to use their cell phones to contact partners. But, the cell phone network was also ...

Banking Industry and Electronic Security

type of cryptography (2000). The Mississippi Secretary of States office for instance describes a digital signature as "a computer-...

Computer Networking and How It Evolved

was to become the Internet, or World Wide Web, progressed during the late 1970s, the need arose to establish a standardized protoc...

PROCESSES IN COMPUTER PROGRAMMING

shrank in size), different programs were needed to keep up with the demand. These days, computers are still asked to calculate. Th...

Security Concerns and Globalization

influx of new businesses has now driven up the value of real estate much higher than can actually be sustained. Some fear a repeat...

Computer Tools and Inappropriate Prescribing for the Elderly

The incidence of inappropriate medication prescriptions issued to elderly individuals is estimated to be between 12 and 40 percent...

Hong Kong Presence of Dell Computers

In twenty pages this paper considers how Dell Computers can develop a strong market presence in Hong Kong, where the economy is ai...

Crime of Computer 'Hacking'

The topic of this argumentative essay consisting of seven pages is computer hacking, which is presented as a serious crime that re...

Copyright Violations and Business Ethics with Issues of Computer Software and NAPSTER

In five pages reproducing unauthorized computer software and digital music are featured in this examination of business ethics wit...

WWW's Future in Terms of Security and Electronic Commerce

In five pages this paper discusses the future of the Internet as it pertains to ecommerce security and privacy issues with the enc...

Enforceability and Binding 'Clickthrough' Ecommerce Agreements

In thirty pages this paper discusses electronic commerce transactions in an overview of such topics as electronic signatures, clic...

Examination of Computer Viruses

In eleven pages this research paper considers computer viruses and their consequences in terms of societal effects, costs, future ...

Strategic Procurement and Supply Chain Management

In ten pages this paper examines Dell Computer Corp. in a consideration of supply chain management and strategic procurement with ...

Future Demands on National Security

It also presents a valuable model for the most effective aspects of integration at all levels of a combined operation. Background...

4 Articles on Employment Security Reviewed

growing presence of downsizing due to any number of reasons not the least of which includes outsourcing and acquisitions, results ...

Indian International IT Company Satyam Computer Services, Ltd.

Additionally, Satyam has forged numerous alliances over the years, including with IBM, Siebel and Microsoft. Satyams U.S. subsidia...

Legal, Ethical and Regulatory Considerations for B2B and B2C Sites

Network security. By 2002, there had been few lawsuits in this area, but even then it was recognized as one "where the potential ...

Memory, Cognition & Media Questions

it seems reasonable to predict that scientists will soon understand much more about the causes of these diseases and also how to p...

Security Analysis Questions

any qualitative facts about the organization at all. Some of the metrics can be moving average, "support and resistance, advance/...

4 Brief Army/Security Essays

government (TPG). The processes of transformation essentially streamline military operations, which allows U.S. forces to initiate...

Computers in the Twenty-First Century

it is the advent of the Internet that really changed things and rendered the computer a necessity. What might the typical computer...

Use of Information Technologies in University Libraries

automation is also responsible for the creation and maintenance of digital technologies, which now make it possible to generate in...

MANAGERS AND FUTURE SCENARIOS

- and what -- are these folks? In its most basic form, a stakeholder is an entity (an individual, group or business) that has a ve...

Global Security Environmental Changes

States power and security position? Many questions linger. Since the cold war has ended, many thought that it was the end of secu...

The Coco Store and HCI Theory

includes the perceptions and reactions of the reviewer. Biological and cognitive basis for perception According to Greenberg (19...

Legal Challenges Brought About by E-Commerce

hours a day regardless of weather conditions or customers state of dress (i.e., the customer can shop at midnight in his pajamas)....

Globalization and Security of the United States

Gulf. In contrast, the countries of Western Europe account for 23 percent of the demand for Mideast oil, Japan for 73 percent (Pe...

Analysis of America's Airlines

is a huge factor in terms of how well airlines will do on a profit (or lack thereof) basis. The problem here is that rising fuel c...

2004 Articles on Personal Computing

the world even more than the Internet alone, were looking at huge storage and filing and tracking problems. That means were also g...