SEARCH RESULTS

YOU WERE LOOKING FOR :Use of Information Technologies in University Libraries

Essays 511 - 540

Nursing College Faculty Roles

In a paper of three pages, the writer looks at differences in nursing faculty roles. The community college and university levels a...

Commercial Agreements and Academia

The commercial sponsorship of academic research may increase the level of research that takes place, but the practice remains cont...

HBCU Retention Strategies

In a paper of three pages, the writer looks at how to improve retention at black colleges and universities. Research suggests stra...

The Financial Position of Notre Dame University

This paper uses the annual report for 2013 for the university to perform a financial assessment for the years 2012 and 2013. The b...

Chief Security Officers - Role and Responsibilities

stage of the plan necessarily involves developing an understanding of recent security breach events at similar institutions, ident...

Impact on Society, Innovation in Communications Technology, Impact on Society

several decades have witnessed the emergence of revolutionary technological innovations in communications, which have greatly affe...

University Admissions and the Law

extent, as discussed below), which many feel should be of lesser consideration (or no consideration at all) in comparison to objec...

Institutions of Higher Learning and the Supreme Court

or activity receiving federal financial assistance" (Kaplin & Lee, 2007). In particular, the case examines how this relates to gen...

Duke Urgent Care South and Competitive Advantage

This research paper assesses the nature of Duke Urgent Care South's competitive advantage using the a criteria developed by Profes...

Higher Education and the Need for Assessment Programs

In a paper of six pages, the writer looks at curriculum mapping as a change strategy for universities. The assessment of such chan...

IA AND IS IN A HEALTHCARE INFORMATION SYSTM

not be enough to ensure protection of electronic patient information (Cannoy and Salam, 2010). Simply adding security tools and in...

Social Media and Profit from Personal Information

Digitized information has generated a new economic era, the era of a personal information economy. Privacy has been sabotaged by ...

Parts of Logistics

Logistics is a big topic because it is comprised of so many parts. This paper emphasizes two of those parts, inventory management ...

How to Write an Effective Essay

This essay offers a summary of the information provided by scholars sources on effective essay structure. Then, the writer provide...

Outlines for Four IT Paper

that have been discussed in the paper at commercial as well as social levels; negative as well as positive impacts. Topic 2...

Management of Technology

recognize is that technology management is an enterprise-wide concern, and that an effective approach to facilitating superior ado...

Crossing Boundaries in Therapy

Technology has added another issue relative to boundaries and dual relationships in therapy. This essay discuses these issues usin...

Careers in Health Information

produce accurate medical records and health information will be in increasing demand for some time, according to the Bureau of Lab...

KODAK - CASE STUDY QUESTIONS

an emphasis on digital technology. But on the not-so-good side, its not doing a very good job of getting from point A to point B. ...

Callaway Golf; Strategic Case Study

all sources of cost advantage... [and] ... sell a standards no frills product" (Porter, 1985; 13). The alternate strategy is that ...

How Technology Can Help Organizations Fulfill Ethics Goals

This is just one example. The point is that computers can be used to make the hiring and promotion process fair. In this way, ethi...

Information: Determining Value And Accuracy

for known facts. However, it is important to realize that bias can - and does - exist even when an author is both qualified and r...

Internet Applications used by Amazon.com

utilises can be examined in terms of the way it helps the company compete. This paper will look at for different applications that...

Resource Dependency Theory, Contingency Theory and Core Technology

over a great deal with social exchange theory and the study of politics in the workplace (Huczyniski and Buchanan, 2003). The use ...

The Marketing Information System

customers are buying, and what they are buying together, at the same time. Associates speak freely with customers, and the inform...

Process Digitalization Through Computers as Employed by Kirwin Brewery Company

practical, but when firms use inventory, it is quite practical. The toy industry comes to mind because there is such a great deal ...

Domestic and International Marketing

"two nationalist and one globalist approach" (Ravenhill, 2001). The first approach was for the government to bail out the compani...

Technology as a Societal Addiction

weapons of mass destruction that are the center of world controversy today reflect that fact. These weapons do exist and they exi...

6 Cases and Technology

that companies that imitate the original and enter the market later (de Haviland had a passenger jet before Boeing, but who today ...

6 Articles on Technology

second problem that arises is when one design begins to dominate the market. For instance, what aircraft designer today wants to ...