SEARCH RESULTS

YOU WERE LOOKING FOR :Use of Information Technologies in University Libraries

Essays 991 - 1020

The Constraints of Conventional Wisdom and Sources of Data for Marketing Assessments

The writer presents a paper in two parts, the first looks at the potential restraints for strategizing which uses only conventiona...

Case Study Diagnosis

2010). In addition, Moniques behaviors, including drinking to the point where she blacks out and being unable to participate in w...

Psychological Testing - How to Acquire Information

Additionally, within the realm of books written on the topic of psychological tests, it is considered particularly rich, and to ha...

Huffman Trucking - Integrated Information Systems

of the business in one package, drawing upon the centrally stored data to drive its processes. This sounds like quite the achievem...

HMOs and the Adoption of Information Systems

database administrator fulfills a role on the operational side of information systems integration. In order to effectively integra...

Assessing Individual Employee Motivation

This paper is based on information provided by the student. The motivational assessment has taken place on three employees, the w...

Ethics of Information Systems

In a paper of three pages, the writer looks at information systems. Ethical and unethical companies are explored. Paper uses three...

Corruption - A Nigerian Problem

In Nigeria corruption is widespread. The writer examines the problem and the cases as well as the costs that have been suffered by...

Using a Consequence Table to Aid with Decision Making

The writer using a consequence table and a weighted score process to assess three potential conference venues. This assessment is ...

A Qualitative and Quantitative View of Information Systems

In a paper of four pages, the writer looks at information systems. Strategies for successful implementation are taken from both qu...

Architectures of Data Storage and Access

In a paper of eleven pages, the writer looks at information systems. The virtues of different types of systems such as storage are...

IT and Effective Valuation

In a paper of four pages, the writer looks at valuation of information systems. The metrics utilized for assessing efficiency and ...

Affirmative Action and Minority Enrollment

This research paper considers the effect that anti-affirmative action policies have had on minority enrollment and then proposes a...

How Can The Police Improve Knowledge Management - A Research Proposal

The writer presents a proposal for research with the aim of identifying improvement to knowledge management which will aid police ...

Analysis and Recommendation for a Growth Strategy at Costco

The writer looks at Costco, starting with the history and the considering the current position and performance of the firm. The i...

APA Style Referencing

This essay pertains to APA style referencing and how it is used in order to utilize information from sources while avoiding plagi...

Resolving Conflicts-A Process

This paper discusses conflict, especially in health care organizations. The paper uses an example of a conflict between two nurses...

Are IQ Tests Useful

The most controversial construct in psychology is intelligence and is complementary practice, intelligence testing. This essay pro...

Advantages and Limits of Simulation Training

Simulation training is often used in the healthcare environment. Three questions set by the student are answered. The first answe...

Past Research Methods for Examining Internet Purchases

Research methodologies used in research to identify influences in internet purchasing are reviewed. The research is examined in t...

Interventions for Patients

This essay provides information and insight on different psychotherapeutic interventions for different mental illnesses. Psychodyn...

Analysis of Conference Hotel

This paper reports a specific case of a hotel that wants to increase their Thursday night corporate guests. Research revealed the ...

Biggest Hacking in U.S. History

Just before Thanksgiving 2013, malware was installed on Target's security and payments system that was designed to capture all the...

Ineffective Communication

Effective public health agencies are essential for the health of the general public. They have many diverse responsibilities, one ...

Web Site Analysis

Churches need to have attractive, effective Web sites just as any other business or organization. They need to provide information...

Early Language Acquisition

Cognitive development is about information processing, reasoning, intelligence, memory, and language development. It is about the ...

Comparing Two-Year Colleges

Two-year public colleges are more often referred to as community colleges. In recent years, their funding has been cut just as it ...

Comparing Two Tech Giants

This paper is part of a large project for a student that analyzes and compares two companies, Apple Inc. and Google Inc. The bibli...

Hackers Against Retail Stores

This essay focuses on the hackers that were able to access credit card data and information from Target's network. The paper repor...

How Hospitals Are Analyzing Data

Big Data Analytics is the most recent innovation to work with huge amounts of data. Hospitals not only have a massive amount of da...