SEARCH RESULTS

YOU WERE LOOKING FOR :Obtaining Information From Theses

Essays 211 - 240

4 Methodologies for Information Systems Development

In nine pages information systems development is examined in a consideration of four methodologies including Information Systems w...

Information Access and Computer Science

In seven pages the technology of computer information retrieval systems is examined and discusses how it can be incorporated into ...

Federal Government Sharing of Strategic Information

In seven pages this paper discusses the problems associated with capital planning and budget computer information storage in a con...

A History of Bausch & Lomb

Historic information about this well known company is relayed and current information is also provided. An analysis of this firm t...

Machiavelli and Modern Writers on the Athenian Thesis

In six pages this paper examines how Machiavelli and contemporary writers would regard the Athenian Doctrine or Thesis. Four sour...

Possible Korean Connector Manufacturer Purchase Discussed

In seven pages this case study involves the possible purchase of a Korean company that manufactures electronics connectors with in...

The Economics of the State of California

Nine pages and 4 sources used. This paper provides an overview of existing events in California that impact the economic picture....

Methodology Development of IS

In seventeen pages with the inclusion of an outline this paper discusses various methodologies that can be utilized in the develop...

Thesis of Divisibility

In five pages political and scientific philosophies are both considered in an examination of divinity with the perspectives of Tho...

IT Changing, Value, and Performance

In seven pages this paper discusses information technology development and integration over the past two decades in an evaluation ...

Strategic Planning - Three Perspectives

This 5 page paper uses information from three different publications about information systems to discuss strategic planning. The ...

Thesis of Technopoly by Neil Postman

In three pages this research paper examines the 'thought world' thesis presented in Technopoly by Neil Postman. Three sources are...

The Application of Physical Therapy to Support Transcutaneous Electrical Nerve Stimulation

The Application of Physical Therapy to Support Transcutaneous Electrical Nerve Stimulation. 5 pages. 4 sources cited. This pape...

An Information Technology Presentation Example

A paper consisting of 7 pages demonstrates how to organize an information technology presentation in a way that can inspire studen...

Overview of the Target Corporation

In twenty pages Target is examined in an overview that includes company background, mission statement, structure of the organizati...

Content and Impact of Martin Luther's 95 Thesis

that while the 95 Theses have been regarded as a bold declaration of independence for the Protestant church" (Anonymous 21), some ...

Madame Bovary by Gustave Flaubert in a Thesis of 2 Parts

In five pages this 2 part thesis on this novel first considers Charles Bovary's role in his wife's adultery and depression and the...

The Use of Breathalyzers

a few different models that are used by law enforcement officials today. One device utilized infrared rays, another uses fuel cell...

The Field of Forensic Entomology

the skin. The field of urban entomology can be of importance because the forensic entomologist can be a crucial part of civil jud...

IT Abuse Prevention

In the case of computers and Internet access, loss of privacy represents one of the biggest concerns. Empowering the individual w...

E-Business Security, Firewalls, and Routers

multiple firewalls for the many different components of the organizations e-infrastructure Why are Firewalls and Routers Needed? ...

Daily Mail and General Trust

2. Introduction The Daily Mail is a well known UK newspaper, with a long history. The group which publish the Daily Mail; the Da...

Information Technology and Competitive Advantage

is possible to access at all today. In order to assess the management of technology the way competitive advantages are gained it...

Why Passwords and Good Information Security Technologies Are Compromised by Users

cases, there are four critical factors that affect the proper usage of passwords: Multiple passwords; Password content; Perceived ...

Types of Information Systems

it had to do something about its customers (Levinson, 2002). They simply werent being serviced well (Levinson, 2002). When America...

Comparing Republicans and Democrats Official Web Sites

Watch", "Democrats in Depth", "Democrats Missed Vote Watch", "2003 Winter Meeting Photos". The last item in this right si...

Thesis Proposal for CRM and eCommerce

This is not always the case however - many CRM systems implemented today are failing (Sviokla and Wong, 2003). For one thing, no a...

Human Resource Project for Duke Energy Corporation

2003). Duke also identifies the companys values that include: integrity; stewardship; inclusion; initiative; teamwork; and accou...

Electronic Age and the Gutenberg Galaxy Thesis of Marshall McLuhan

to change when moveable type was developed, the culture became one that saw more and read more than ever before. The change was gr...

Literature Review on Management of Electronic Commerce Customer Relationships

personal computer was gaining popularity, but was nowhere near what it is today. In discussing anything related to e-commerce, one...