SEARCH RESULTS

YOU WERE LOOKING FOR :Using Technology to Manage Ethics

Essays 511 - 540

William Gibson's Cyberfiction Novel Johnny Mnemonic

The new literary genre dubbed 'cyberfiction' is considered in a five page research paper that discusses how technology's complicat...

Low Income Schools and Technological Restraints

most aspects of our lives technology has made its way into the very fabric of the way we teach our children. The majority of clas...

Security in Schools and Technology

in schools can solve all problems, but that it can be used to benefit schools if used properly: "National School Safety and Securi...

Culture and Technology of Price Waterhouse Coopers

company places emphasis on human capital and considers employees the companys assets. The many items included in the Code go abov...

Web Based Application Tool and Cross Platform Programming Language Known as Java

to view pages which contain applets and the applets code is transferred to their systems and executed by the browsers Java virtual...

Case Study on Dubai Ports Authority

the Bill of Lading, the delivery order, and the bill of entry. Another major player in the situation was the Dubai Customers Depa...

Human Resource Case Study on Micronics Technology

dependent upon Carol having dinner with Buddy, the supervisor. It is also a hostile environment case because Buddy touches her, re...

Technology and Price Waterhouse Coopers

this set-up is that the SAP system stays Online while employees make the copy of what they need, which is a major time-saver (Stor...

Success Factors, Technology, and Knowledge Management at Price Waterhouse Coopers

able to communicate with one another -- and that transparency of information between the communities was important (Anonymous, 199...

Technological Change and Diversity Q and A

with various religions and to some extent, one might say that it has affected normative behavior, values and attitudes within the ...

Business, Internet, and IS

the Internet, trading partners can bypass intermediaries and inefficient multi-layered procedures. Furthermore, Web-sites are avai...

How Employees View Technology/A Research Proposal

jobs in the country continue to be filled by citizens of other nations. Though technological advances have made many of Saudi Ara...

Education and Computers

the all-time low of 5:1 (Poindexter, 2003). Critics continue to contend, however, that there is no credible large-scale research ...

Proposal for a New Security Model Using Integrated Circuit Card Embedded with User’s Biometrics

to the appearance of the person standing in from of them. Over time the change in what is and is not accepted as identifying and t...

Technology

find a local class that would ultimately fit the criteria that Obama is talking about in terms of becoming more educated. ...

TELEVISION: 1989-2001

are even changing the way we communicate with one another (through e-mail and instant messaging) as well as doing business (via e-...

HACKERS AS SECURITY GUARDIANS

and once inside, decide to be destructive (Germain, 2004). Then there are the white hat hackers - those who deliberately break int...

EuroDisney Analysis

had begun to explore locations in Europe. Not only did the government sell Disney the land at a ridiculous price, it promised to e...

Technology In The Doctor's Office

checks appointments and other information on the computer. One works with patients who have just been seen, setting up the next ap...

IT and Systems Management

in mind when it comes to designing and implementing a system, as opposed to not doing so. While this might be a simplistic stateme...

IT Project Assessments

of scoring with the scores weighted to reflect the needs of the business. We will assess each individual and then compare the scor...

NCLB and AR Program

determining comparative success in educational. The NCLB has not only redirected educators to a "teach to the test" method for in...

Vulnerabilities of Windows and Possible Solutions to These Problems

a GUI or Graphical User Interface. While Windows had become increasingly popular for mainstream purposes, it was something that wo...

What is Bluetooth Technology

Interestingly enough, the Bluetooth technology was named after Harald Bluetooth, who was King of Denmark during the 10th century ...

Making Management Decisions and IS Technology

a component of DSS has led to the development of a general framework for the integration of both DSS and software agents. These r...

Business and the Use of Technology

learn lessons from the construction trade where building can either develop or may be designed especially with the users in mind. ...

Organizations and IT

to be filled in the office setting. Growing past this stage in other industries can be challenging; in home health and hospice it...

Distance Learning Program Initiation

to the Online courses. There are also intangible resources that must be considered, such as faculty time. One expert commented: "...

Manufacturing and Technology

overcome this. RFID is short for Radio Frequency Identification which is a new technology that makes use of radio technolo...

ICT and its Contemporary Life Impacts

two areas that have seen a high input form ICT. The subject area is so broad we cannot look at the entire are in only a few page...