StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Personally Identifiable Information (PII) : Ethical Implications Information Technology Research Paper
3 pages (750 words) , Download 3 , Research Paper
On the other hand, ethics refers to the standards put in place to tear the line between right and wrong. In as much as Personal Identifiable Information is important in the modern information technology world, it has its advantages, disadvantages, as well as ethical issues (Schwartz & Solove, 2011).
Preview sample
Developing a Partial Risk and Mitigation Plan Information Technology Assignment
3 pages (1100 words) , Download 3 , Assignment
Free
Malware finds its way into computers and other memory storage devices. Viruses and worms have been declared a big threat to businesses’ and institutions’ security. The last survey that was done for the 1000 fortune companies indicated that cyber crime is the most dangerous crime in businesses and institutions and that can drive an organization into a lot of losses.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
RFID Tracking Advantages Information Technology Dissertation
5 pages (1762 words) , Download 4 , Dissertation
Free
It started in the 1800s with many of our new technologies having begun then, such as the earliest motorbikes, cars, and phones. Much of this development takes many years to come to fruition; one such technology is the Radio Frequency Identification (RFID) tag tracking system. Originally developed in 1969, it was patented in 1973.
Preview sample
System as Designed to Meet the Special Accommodation Needs of Individual Students Information Technology Coursework
6 pages (1731 words) , Download 2 , Coursework
Free
A work plan would be necessary for scheduling purposes giving the activity, start time, end time and by whom among the project members. After identifying the main activities to be carried out in developing a website, these activities will be allocated among the three members of the project and the timeframe for the start and end of activities outlined.
Preview sample
Toward Delivery of Effective Mobile Government Information Technology Literature review
7 pages (2007 words) , Download 2 , Literature review
Free
This is due to the fact that the governments intend to enhance their interaction with the public along with enhancing the delivery and the quality of their services by following the strategic idea of mobile government. The perception of mobile government can be described as a policy that engages the use of mobile as well as wireless technologies, devices, services and applications for the purpose of improving the services to the associated parties who are engaged with an e-government structure.
Preview sample
Build and the Release and Maintenance Procedures for the Hard Disk Drive Project Information Technology Report
7 pages (1980 words) , Download 3 , Report
Free
Though the creation of an effective and more comprehensive maintenance plan is a bit difficult and more challenging, it is necessary for any project release plan development. For an effective release and maintenance plan for the hard disk drive project, a clear understanding of the project plan and the maintenance of the environment is essential.
Preview sample
Database Design and Implementation Information Technology Coursework
13 pages (3250 words) , Download 5 , Coursework
Free
The report starts with the detailed analysis of the requirement, suitable solution for the design and all the assumptions made while designing the model. The ER diagram which visualises the overall operation of ARO is also presented along with a detailed Data dictionary for all the entities defined in the model.
Preview sample
Network Security Policy Information Technology Case Study
9 pages (2401 words) , Download 4 , Case Study
Free
The information security policy will provide a potent shield against threats, mitigation of vulnerabilities, and resolution of the weaknesses while providing the framework for the build-up of its information technology infrastructure (Andress). The information security policy will also provide the strategic parameters and guiding principles of the operation of CMS that is geared towards securing information assets (Whitman and Mattord).
Preview sample
Delivery of Effective E-Government Systems: The Case of Oman Information Technology Literature review
14 pages (3883 words) , Download 2 , Literature review
Free
Governments from around the world have sought to establish e-government systems for various reasons such as efficiency and accountability. Whereas the industrialized nations have achieved much in implementing e-government systems, countries such as Omani have faced challenges despite making significant efforts.
Preview sample
Developing Service-Oriented Solutions Information Technology Annotated Bibliography
10 pages (2565 words) , Download 2 , Annotated Bibliography
Free
In this article, the authors report on the structure and use of a method that can be used to examine, plan, and deploy service-oriented architecture projects in the context of a fractal software development model. The article relates to the research in the sense that it talks about the key domains of service-oriented architecture within the context of software engineering practice.
Preview sample
The Affects of Technology on the U.S. Economy Information Technology Essay
3 pages (750 words) , Download 3 , Essay
Free
There is wide recognition that science and technology are fundamental to the economic growth, and the U.S. economy is turning in an excellent performance at the macro level – solid growth and low inflation. However, the introduction of technology has played a major role in the widening the income gaps as technological advances leads to higher returns to education and experienced.
Preview sample
Remote Sensing Digital Image Analysis Information Technology Research Proposal
8 pages (2233 words) , Download 2 , Research Proposal
Free
The representation is calculated using many spectral bands that are responsive to plant biomass and dynamism. The most ordinary vegetation index is the normalized distinction vegetation index (NDVI) which equates the reflectance values of the red and near-infrared areas of the electromagnetic spectrum.
Preview sample
Website Usability of Coventry University Students Union Information Technology Assignment
8 pages (1500 words) , Download 2 , Assignment
Free
The author states that in the case of testing for the usability of a web site, it is not only enough to criticize the web site. There is more to the usability of a web site than simply criticism. Apart from the efficiency of the software product or web site, the web site should also aim to maximize learnability to the users.
Preview sample
EISA: Software Components Information Technology Essay
3 pages (750 words) , Download 3 , Essay
Free
This paper tries to analyze the various hardware, software, and network components of enterprise information system architecture. Hardware components are those components that provide physical interfaces to the computer systems. However, in many cases, these components cannot work well without programmed instructions.
Preview sample
Dissemination of Health Data among Hospitals Information Technology Research Paper
4 pages (1055 words) , Download 3 , Research Paper
Free
The objective of the agency for healthcare research and quality is to obtain information that is evidence-based. This information must be of high quality at a reasonable cost while at the same time being readily available to the users. Based on the EISA requirement, there are four major issues that need to be addressed.
Preview sample
Information Technology: Helpdesk Concepts Information Technology Essay
4 pages (1093 words) , Download 3 , Essay
Free
Interaction with the help desk can determine whether the customer will leave satisfied or they will be frustrated. The sequence of prompts and the amount of wait time allocated between prompts is also big factor in the user experience. Most users will easily discontinue a service if they have a bad experience with the help desk.
Preview sample
Adopting Linear Wireless Sensor Networks for Border Monitoring Information Technology Literature review
8 pages (2000 words) , Download 3 , Literature review
Free
The monitoring of international borders is very important for countries to protect their citizen and to stop any potential threat to homeland security, especially due to the steady increase in organized crime, terrorist threats, smuggling activities, etc. Governments are investing a fortune every year in monitoring and securing borders that are must be totally controlled and managed round the clock.
Preview sample
Dental Office Network Systems Information Technology Case Study
6 pages (1712 words) , Download 2 , Case Study
Free
The author of the paper will begin with the statement that the dramatic changes occurring in the technological environment pose substantial challenges to business entities. Business entities continue to encounter the problem of finding the right network solution to cater to several business locations, whether stationary or mobile. 
Preview sample
Education by Computer Information Technology Research Paper
4 pages (1272 words) , Download 2 , Research Paper
Free
Education using computers is not a new issue in today’s world where most activities are carried out using computers. As a result, it is crucial to understand the ideas and concepts behind computers and education, thus, it is essential to find out if education by computers is the way to go by weighing the benefits and losses that education faces. 
Preview sample
Criminal Profiling And Remote Monitoring Of A Computer Information Technology Essay
4 pages (1000 words) , Download 2 , Essay
Free
Criminal profiling and remote monitoring of a computer. Nowadays, the lives of people have become so busy and hectic that they have come to rely heavily on technology. From simple to the most complex of tasks can now be performed using the technology of today; this way is quicker and more efficient.
Preview sample
A Career in a Computer Science Field Information Technology Research Paper
5 pages (1250 words) , Download 2 , Research Paper
Free
A visit to my uncle’s place of work was the beginning of a lengthy journey of career in computer science. My uncle worked for an outsourcing company and he was in charge of information technology. Incidentally, my uncle was among the first people to study information technology when it was introduced.
Preview sample
The Role of Adopting Cloud Computing to Lower Energy Consumption in Data Centers Information Technology Research Proposal
6 pages (1797 words) , Download 6 , Research Proposal
Free
Generally, the research will use an interview guide which is primarily designed to investigate the ICT background of the selected respondents, their experiences as well as their knowledge and use of various new data management technologies such as cloud computing in their respective places of work. 
Preview sample
System integration Information Technology Essay
3 pages (750 words) , Download 15 , Essay
Free
System integration There are challenges that are experienced while converting from legacy systems to client-server architectures. With legacy systems, most of the computers are stand alone. In this regard, there is a lot of effort that will be met when integrating the whole process.
Preview sample
Internet Users as a Percentage of the Population Information Technology Literature review
7 pages (1885 words) , Download 2 , Literature review
Free
Consumer trust will need to be established with people before companies can go down the path of actively using social media marketing. Individual corporate bodies will also need to be established in order to create, track, and consistently monitor any consumer complaints made in relation to marketing through social media.
Preview sample
The Engineering Economics of RFID in Specialized Manufacturing Information Technology Essay
5 pages (1440 words) , Download 3 , Essay
Free
If an organization fails to produce the required product within the allocated manufacturing cost, they may lose the customer as well as suffer from high audit cost, high labor cost, and consequently lost sales. A study from (Jones et al. 285-303; Jones et al. 285-303) highlighted cost reduction in non-calibrated tools by implementing RFID solutions. 
Preview sample
Paraphasing of Five Abstracts Information Technology Essay
3 pages (1073 words) , Download 2 , Essay
One of the major reasons for the rigidity in the expansion of the mode of transport is the monopolistic ownership in which either the government or specific companies have a high stake in the rail transport. This has however led to overcrowding in the rail transport system and planning and utility maximization are necessary. 
Preview sample
Freight Train Optimization and Simulation Information Technology Research Proposal
6 pages (1671 words) , Download 2 , Research Proposal
Free
In freight train optimization, it is crucial that the departure and arrival time of the trains at the exact station is determined. A set of linear inequalities are used to determine the arrival and departure times which are defined by corresponding decision variables. The solution thereafter is chosen from a set of possible solutions arrived at based on a given objective or selected criterion.
Preview sample
Routing Protocol Security OSPFv2 Information Technology Dissertation
3 pages (750 words) , Download 3 , Dissertation
Recognizing the OSPF as one of the most widely applicable Interior gateway protocol in most large enterprise network, the current work, delved into investigating the security measures often associated with the application of the use of OSPF v2 Routing protocol.
Preview sample
Quantitative Data Information Technology Admission/Application Essay
3 pages (750 words) , Download 3 , Admission/Application Essay
This essay discusses that quantitative data structures represent how data is being seen and thus analyzed in accordance with an understanding which surrounds figures, statistics, and data in combination with one another. There is a need to find out how quantitative data is collected and later on used in order to boost the basis of research.
Preview sample
Positive Impact of Technology on Students Success Information Technology Research Paper
4 pages (1136 words) , Download 3 , Research Paper
Free
Technology makes learning materials available to students, thus greater access, which increases the body of knowledge from which students learn. Web browsers provide students with opportunities to find information on whatever subject. In fact, they provide more current materials than most school libraries do.
Preview sample
Internet of things and sun spot Information Technology Essay
17 pages (4250 words) , Download 3 , Essay
Free
The report will cover the following: potential problems that could arise from using the internet of things; aspects of the internet of things e.g. legal and privacy issues; need for adequate technology; importance of energy efficiency; smart devices and smart systems; smart grid; smart lighting systems; sensors and devices; java sun spot; building a remote light control.
Preview sample
The Impact of Image Informatics on Medical Imaging Systems Information Technology Essay
14 pages (3690 words) , Download 4 , Essay
Free
Imaging informatics, also referred to as medical imaging informatics is a branch of biomedical informatics. The main aim of imaging informatics is to improve on the efficiency, reliability, accuracy, and dependency of medical imaging services within the general hospital or medical setup. Biomedical informatics is a field of various disciplines.
Preview sample
Side-Channel Attacks Information Technology Literature review
15 pages (4253 words) , Download 3 , Literature review
Free
Research has proved there are two surest approaches to preventing timing attacks. In this regard, the addition of delays has been proved to be one of the surest approaches of [preventing timing delays. This is normally done by ensuring that all operations consume the same amount of time. However, it is worth pointing out that this procedure is normally not easy to execute.
Preview sample
Data Mining Theory Information Technology Article
11 pages (3299 words) , Download 4 , Article
Free
The moment the initial test is estimated to be acceptable; the classifier (planning from ordinary examples to classes) is obtainable intended for routine exploitation. Additionally, the classifier’s assessment is the majority regularly initiated on corrections of prediction (the proportion of precise prediction divided by the entire number of estimates).
Preview sample
Development of a Multimedia Application Information Technology Literature review
9 pages (2250 words) , Download 2 , Literature review
Free
According to the paper the computer games are another significant instance of this technology usage. Usually, the development of multimedia systems and applications requires utilizing specific authoring systems/tools or programming languages. It is necessary for the web designers that they always take care of their customers because a pleased customer will come back to the web designer for another assignment; on the other hand one who is unhappy with the final product is probable to shop elsewhere.
Preview sample
IT System Analysis & Design Information Technology Report
10 pages (2746 words) , Download 3 , Report
Free
UltraCoat Inc. is a printing press operating in the whereabouts of Manhattan, New York. UltraCoat Inc. is a fast-growing printing press, which is rapidly expanding due to the increase in the number of orders it gets from its regular customers as well as newly acquired customers. The company is also serving the printing needs of some big companies that form the major chunk of its customers.
Preview sample
Business Intelligence Technology Issues Information Technology Assignment
3 pages (992 words) , Download 5 , Assignment
Free
Data is a mere collection of raw figures and facts, e.g., a company’s daily inventory records, etc. Information: The data is made meaningful by the performance of the organization and its analysis of it. Knowledge: Experience, Analysis, Context, and reflections combined together with information produce a result that is termed knowledge. This resultant form of information is termed knowledge.
Preview sample
Technology in U.S. Air Force Maintenance Information Technology Essay
3 pages (750 words) , Download 3 , Essay
Free
The management systems used is integrated with maintenance information system (IMIS) and integrated management development system (IMDS). Integrated maintenance information system (IMIS) IMIS is a technology that combines various strategies to ensure easy and fast flow of events.
Preview sample
EbXML - History and Features Information Technology Research Paper
4 pages (1158 words) , Download 2 , Research Paper
Free
The full form of ebXML or e-business XML is Electronic Business using eXtensible Markup Language. It is a member of the XML-based specifications family. The mission behind this technology is to institute an XML-based architecture that would enable the global utilization of electronic business data through a consistent, secure, interoperable, and most importantly, open-source framework.
Preview sample
How Should Organizational Information Systems Be Audited for Security Information Technology Essay
4 pages (1344 words) , Download 2 , Essay
Free
COBIT is an information technology governance structure and toolset that facilitates managers to bridge the gap between control needs, technical issues, and company risks. In addition, COBIT allows organizations to build and implement an apparent policy and high-quality practice for IT control all through business.
Preview sample
SMART Criteria and Installing the Switching System Information Technology Essay
3 pages (1003 words) , Download 2 , Essay
Free
The goal of this project is to install a project for automatically switching on and off house lights. The proposed switching system shall employ modern technology gained from class work. The switching system shall be controlling the lights by automatically switching the house lights when the environment starts getting dark.
Preview sample
Enterprise Architecture: The Strategic Basis Information Technology Essay
3 pages (750 words) , Download 3 , Essay
To overcome this problem, some companies are trying to change to the enterprise architecture. This merges the business side of the organization to the information systems, leading to an increase in productivity and significantly reducing the costs of operation.
Preview sample
Operating System Simulator Information Technology Essay
15 pages (2372 words) , Download 4 , Essay
Free
This simulator can be run in any operating system environment including UNIX systems such as Linux, so long as the Java Runtime Environment is installed. However, the JRE, Java Runtime environment installed should be the latest, such as the Java Runtime Environment Version 1.6 (JRE 1.6). It also supports JRE version 1.2. Java as a language offers various capabilities including running the application as a Java applet or as a java application.
Preview sample
Information Technology for Business Innovation: Analysis of Sonys Strategies Information Technology Case Study
8 pages (2297 words) , Download 2 , Case Study
Free
In the past few years, the internet technologies have become the main driver of financial growth, in view of the fact that the innovation offered by the internet tools and technologies has not only the changed but as well modernized the formation of every kind of business corporation (regardless of their nature and size i.e. small, medium and large).
Preview sample
Profits and Growth in Dell Computer Corporation Information Technology Report
8 pages (2115 words) , Download 3 , Report
Free
Because of the development of information technology, the world has been reduced to a village. Most importantly, computing technology has become an essential factor that offers many opportunities that can lead to technological advancement. Technology has ensured that various manufacturers get low-cost advantage goods with better quality.
Preview sample
Molestation of Children Information Technology Essay
3 pages (912 words) , Download 5 , Essay
Free
The author examines moral and ethical problems that arise when someone shares other people’s personal information or intellectual property, without their authorization. On a personal level, he believes every individual must have the freedom to live their life the way they want within the broadly accepted legal and social parameters.
Preview sample
Technological Innovation Approaches Information Technology Report
7 pages (1854 words) , Download 2 , Report
Free
Information systems, therefore, are economical and uneconomical. However, the economic benefits exceed the costs accrued to them. Though the cost, of managing, is relevantly higher, the benefits obtained from them are significant as the speed of operations in the organization increases. There is efficiency in terms of reduced cost in running the business as the number of workers reduces.
Preview sample
Examining the Movements of Employees at Work Information Technology Literature review
5 pages (1601 words) , Download 2 , Literature review
Free
It is this monitoring that has raised ethical issues causing detrimental effects to both employer and employee. Whereas employers justify their actions with the right to get value from their employees and resources, employees’ have objected to the reasoning that their personal privacy is being unlawfully breached.
Preview sample
Types of Network Attacks Information Technology Research Paper
4 pages (1000 words) , Download 4 , Research Paper
Free
There exists no sound or authorized way to accurately monitor or track the network based attacks which are so high profile that to keep a definite record of them is not possible (Anderson, 2008, p. 367) and which is why the information assurance professionals associated with the US-CERT (Computer Emergence Readiness Team) resolved to stop monitoring the quantity of network attacks as there was really no way to decide on a definite number nor the cost of a cyber attack over long term is reportable.
Preview sample
Computer Forensics and Criminal Justice Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
Free
CSIRT is usually incorporated within corporate organizations maintaining large customer databases or federal security systems. Whenever an incident or a security breach occurs, the team is capable of identifying threats for containing them in a boundary and then initiates a response for recovery (Bhaskar, 2005).
Preview sample
7601 - 7650 results of 10276 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us