SEARCH RESULTS

YOU WERE LOOKING FOR :Workplace Computer Training

Essays 61 - 90

Workplace Diversity Management

example is a social norm that - while not mandated by any written law - is an unbreakable code by which people are expected to abi...

Conflict Resolution

The most common types of workplace conflict are explained and described. A conflict management policy that could be adopted in any...

Contemporary Workplace Implications of Occupational Health and Safety Training

to worker perception of workplace safety. It can be contended, therefore, that employees will either refuse to work in an environ...

Five Articles on Various Issues Involving Computer Technology

Bosh had a contingency plan, part of which was to use their cell phones to contact partners. But, the cell phone network was also ...

Case Issue Pertaining to Workplace Diversity

real struggle in terms of learning this technology and probably figures that he has gone this far in his career without having to ...

Enabling the Disabled Through Computer Technology

In twenty pages the argument is presented that computer technology is presenting greater opportunities for people with disabilitie...

Classroom Uses of Computers

In nine pages the ways in which computer technology has been integrated into the classroom are examined in terms of the benefits i...

Workplace VDUs and Safety Issues

Using computers of course does also warrant care and attention to ergonomics. There are many complaints that stem from sitting in ...

Computer Automation in the Workplace II

In nine pages this paper discusses office automation in the form of computers in the workplace. Nine sources are cited in the bib...

Societal and Workplace Impact of Computers

COBOL, PL1, RAMIS, FORTRAN and many others. While some languages have survived the PC revolution, many languages have become obsol...

Importance of Literacy in the Workplace

more and more apart. In the 1990s, one fact that has become painfully apparent is the role of literacy in dividing society into a ...

Computers and HR Training

In about twelve pages this concept paper discusses manufacturing and the effectiveness of interactive training with the use of CDs...

Y2K, the Year 2000, and Thereafter

Twenty first century management is examined in this paper that discusses the managerial challenges presented by the Y2K computer p...

Employers Right of Surveillance over Employees

has been found to incorporate communication that may not yet have been opened or received, or those that have been deleted. The ...

Apple Computers' Struggle Against Microsoft.

A paper that addresses the problems faced by Apple Computers, Inc. The author contends that Apple computers main competition, Mic...

Saudi Arabia and the Exporting of Computers

In thirteen pages this paper considers Acme Computer's decision making process involving a cautious approach to exporting computer...

Computer Evolution from Mainframe to Distributed Systems

has been the most long-standing and still carries one of the worlds most recognizable names. Early History of the Industry...

HCI Practitioner Overview

In six pages usability testing and a practitioner of human computer interaction are discussed in this overview that includes histo...

Forensics and Computer Crime

In eight pages computer forensic specialists are considered in a discussion of computer crime investigation that includes crime ty...

The Necessity of Firewalls in the Information Age

any given companys entire computer system with the intent to destroy data is more than enough reason to augment security measures....

Workplace Civil Disputes

In eight pages workplace mini trials are discussed. Six sources are cited in the bibliography....

Saudi Arabia and the Exportation of Computers

resellers with some direct sales to individuals. Increasingly, direct sales primarily result from Internet exposure. Acme ...

Arguing in Support of Workplace Flex Time

workplace since the middle of the 20th century. Theyve come into the workplace for a variety of reasons, ranging from self-fulfill...

Digital Investigations

Stenography detection, FRCP rules, chain of custody, dumb ideas in computer security, bots, botnet attacks, computer forensic spec...

Investigating Computer Fraud

This paper discusses the field of computer forensics, what it is, what investigators do, detection tools, cyberslacking, chain of ...

Labor Strikes and the Workplace Fairness Act

(http://www.ilafl-cio.org/BKCB .HTM). The "Workplace Fairness Act," recently renamed the "Cesar Chavez Workplace Fairness Act" i...

Workplace Safety and OSHA

are several factors to consider when presenting a safety meeting in order to make sure that it is truly helpful and meaningful dur...

The First of Eight Articles on Human Resources and Workplace Issues Reviewed

to change. The author analyzes conflict theory, positivism and the development of spurious dichotomies, as well as positivism as ...

An Article Review on Human Resources and the Workplace

this study is the process of acculturation. This study, then, is analytical and considers the way in which acculturation has beco...

A Workplace and Human Resource Article Reviewed as One of a Series of Eight

author outlines the specific nature of an organization and the impacts of organizational imperialism on the interactions in this o...