SEARCH RESULTS

YOU WERE LOOKING FOR :SECURITY OF INFORMATION

Essays 301 - 330

Proposal for a New Assessment Model Aimed at Analysis of Information Technology Use within a Firm

which an organisation competes. Porter (1985, p13) has designed two differing categories of competitive advantage; cost advantage ...

Substance Abuse in Older Populations

processes, and appropriate diagnosing, as well as proposing specific interventions that can be used and preventative strategies fo...

Law Regarding Protecting Information

Online (Legal Information Institute, 2011). Websites that target children as their audience and deliberately collect unauthorized ...

A Park Slope in Brooklyn Overview

have a particular profile that includes a median age of 37.3 years, half of which are single person households ("Brooklyn," 2004)....

Issues of Organizational Information Management

school of thought there is support for recognition as a motivator. Work of Maslow indicated a hierarchy of needs (NetMBA, 2005). T...

Crime Investigations and the Media's Role

has also led to accusations of copycat crimes. Overall, it has been determined that the best balance of this relationship is too m...

Comparing Republicans and Democrats Official Web Sites

Watch", "Democrats in Depth", "Democrats Missed Vote Watch", "2003 Winter Meeting Photos". The last item in this right si...

Two Studies of Information Technology

gratification and for some purchases the inability to see and feel what they are. These different elements are seen as reassuring ...

Computer Age and Information Ethics

technology in general. The ease with which personal information can be unscrupulously gleaned from the multitude of computerized ...

Human Resource Project for Duke Energy Corporation

2003). Duke also identifies the companys values that include: integrity; stewardship; inclusion; initiative; teamwork; and accou...

Types of Information Systems

it had to do something about its customers (Levinson, 2002). They simply werent being serviced well (Levinson, 2002). When America...

Organizational Information Systems

Originally seeking to be a virtual company carrying no inventory of its own (Gruppo, 2000), Amazon abandoned that plan shortly aft...

Taking Video Games to China

two or three weeks, so that they will get hooked" (Srinivasan, 2005). Indian programmers are indeed being "hooked" and the compan...

Assumptions About The Male Gender And Eating Disorders

eating disorder can affect those who are average-sized, as well. It is estimated that one to two percent of American adults are b...

Information Systems Technology Projects Fail

all projects falls between 66 percent and 90 percent depending on which survey data one relies on. Engle (2007) reported that 90 ...

Coordination for National Security

America was attacked on September 11, 2001. The many American agencies that gather and analyze intelligence had missed the cues. W...

The Patriot Act: A Political Issue

against Americans on their own soil. The extent to which the Act serves to intercept terrorist activity, protect national freedom...

Tenure Laws In Georgia And Tennessee: Opinion

these teachers not been locked into job security under the precept of permanent tenure and been expected - as with virtually every...

The Patriot Act

vital to national security (Pike 1). The 9/11 Commission even pinpointed several failure of communication that occurred within th...

Computer Security

a large group of Milwaukee hackers known as 414s, whose infiltration impacted such organizations as the Los Alamos National Labora...

National Security Threat Levels

needs to prepare. The standard protocol for a green national threat conditions includes taking this otherwise down time to re-eva...

Improving Security Performance in an Organization with the Use of RFID Smart Cards and Biometric Data

of security measures that make up a security policy. Traditionally, there have been the use of ID cards; ID cards would be issued ...

Should the President Be Able to Wiretap Without a Warrant?

as long as the country faced terrorist threats" (NPR, 2007). It appears that the Bush Administration has been involved in such a...

The Proliferation Of Nuclear Weapons In Developing Countries Is A Reality

same time officials felt compelled to somewhat shield the public from its alarming aspects in order to maintain civic composure. ...

Security Analysis Questions

any qualitative facts about the organization at all. Some of the metrics can be moving average, "support and resistance, advance/...

Insuring Data Security: Lessons from the Department of Veterans Affairs

even phone numbers and addresses, all information that put the individuals whose data was stolen in a precarious situation in term...

Safety and Security

This 8 page paper looks at the issues of security and safety in an organization considering the ways in which the management of bo...

The Sacramento Police Department's Response to Terrorism

and to which agency or which individuals (Poland, 2005). Once again, while at the federal level, a variety of information is consi...

Legal, Ethical and Regulatory Considerations for B2B and B2C Sites

Network security. By 2002, there had been few lawsuits in this area, but even then it was recognized as one "where the potential ...

2002's Maritime Transportation Security Act

This research paper pertains to the Maritime Transportation Security Act, which was passed in 2002. Analysis is provided. Ten page...