SEARCH RESULTS

YOU WERE LOOKING FOR :Using Computer Networks and Security Issues

Essays 601 - 630

The NASDAQ and NYSE-Euronext Exchanges

both sides as much as possible. The NYSE-Euronext and the NASDAQ are both examples of exchanges, and are quite popular because bet...

Security Concerns and Globalization

influx of new businesses has now driven up the value of real estate much higher than can actually be sustained. Some fear a repeat...

Security in Future Airports

airports" (Bolkcom, 2006). Each type of response has its own positive and negative aspects. For instance, an infrared defense sy...

Security Models Based on Roles

limited scope (Ferraiolo et al., 2003). However, overtime, they have evolved to allow for the implementation of significantly more...

Tablets - The Benefits and Risks

In a paper of four pages, the writer looks at tablet computers. Benefits and risks inherent to the technology are explored. Paper ...

Social Security Privatization - The Debate

In a paper of seven pages, the writer looks at Social Security privatization. The paper presents arguments against privatization. ...

Security Trade-Offs and Liberty

In a paper of three pages, the writer looks at security and liberty. The relationship between the two is examined. Paper uses thre...

Security Topics

In a paper of four pages, the writer looks at discussion questions related to security. Terrorism is also considered, as well as t...

Department of Homeland Security - Ethical Violations

In a paper of three pages, the writer looks at the Department of Homeland Security. Instances of ethical breaches are explored. Pa...

Discussion Questions on Cyber Security

In a paper of four pages, the writer looks at cyber security discussion questions. Topics such as spyware and adware are addressed...

Security Measures in Operating Systems

In a paper of twelve pages, the writer looks at security measures for operating systems. A variety of such measures are compared a...

Cyber Security and the Human Element

In a paper of four pages, the writer looks at the human element in cyber security. Steps for drafting an effective approach to pol...

HRM at Acer

The writer looks at the way human resource management takes place at the computer firm Acer. Three different HR policies are used ...

IWB-Latest technology for Schools

of programs and resources but there is still evidence that teachers are not using them to their full potential. One of the reasons...

Organizational Issues and Computer Programming

Greco (1998), in discussing this topic, explains that the new loyalty is one where the individual is loyal to himself as opposed t...

Four E-Commerce Business Models

Thus "members" of Coolsavings.com receive regular email messages about offers available at the Web site at worthwhile savings over...

Computer Based Training and Airline Pilots

action-oriented learning, in other words, hands-on learning (Karp et al, 1999). Given this aspect, CBT would almost be a natural e...

Overview of the SIGI-PLUS Computer Career Guidance System

looks at the pre-requisites, detailing the educational or training requirements for the occupations (Kivlighan et al, 1994). The ...

Education and Computers

the all-time low of 5:1 (Poindexter, 2003). Critics continue to contend, however, that there is no credible large-scale research ...

External Factors Impacting Computer Sciences Corporation

competition has been around almost as long as CSC has. CSC has, in fact, spent much of its time in acquiring other smaller compani...

Overview of Interactive Data Visualization

in decision making (Sullivan, 2002). Data visualization can be used to "analyze information in a data warehouse or it can be used...

Multimedia Features in Programming Languages

this is with the use of a WebQuest that had been created by Bernie Dodge (2003). WebQuests have a structured, inquiry-based method...

Corporate America and Computer Ethics

to create a program called DOCTOR, something that had been taken seriously as a tool for psychotherapy (1996). He was very surpri...

Computer Age and Privacy Issues

modern technology in general. The ease with which personal information can be unscrupulously gleaned from the multitude of comput...

Ethics and Copyright Infringement

In five pages the ethical implications of reproducing computer software without authorization are discussed with morality and ethi...

European Security Issues

In twelve pages this paper examines the regional change impact upon European security with NATO's and the EU's roles also consider...

Hypothetical Case Assessment on Massage Therapy

In five pages this paper presents a hypothetical assessment of massage therapy as it can be used to treat a computer programmer an...

Twenty First Century Computer Counseling

In nine pages this research paper discusses therapy, counseling, and how computers are being used with a consideration of such pra...

Elementary Education, Computers, and Test Scores

In eight pages this paper considers how using computers in elementary school classrooms produce benefits including assisting stude...

The Significance of Computer-Aided System Engineering Tools

The writer describes the use of computer-aided system engineering (CASE) tools and their significance for business. The writer arg...