StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
The Concept of E-Learning Information Technology Research Proposal
6 pages (1683 words) , Download 0 , Research Proposal
Free
The paper "The Concept of E-Learning " is an outstanding example of an information technology research proposal.  In the last few decades, there have been significant developments in terms of technology and technicalities that match their utility and operations. Humanity is increasingly looking for new and innovative ways to tackle daily life challenges.
Preview sample
Transactional Database and Data Warehouse Information Technology Literature review
6 pages (1720 words) , Download 0 , Literature review
Free
The paper "Transactional Database and Data Warehouse" is a great example of a literature review on information technology. With increased competition and technological advancements, organizations are adopting new information systems which largely provide them with the required information to achieve their desired goals.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Organization's Successful Implementation of ERP System Information Technology Term Paper
8 pages (2107 words) , Download 0 , Term Paper
Free
To ascertain successful implementation of ERP, the study engages in literature reviews and engages respondents from organizations renowned for successful implementation of ERP, purposefully to identify how ERP can successfully be implemented. The respondent feedbacks will play a pivotal role in ensuring future success in the ERP initiative.
Preview sample
Data Communication and Networks Information Technology Assignment
7 pages (1963 words) , Download 0 , Assignment
Free
The ISP in town will assign you only two public IP addresses, so you decide to assign the computer addresses in the range of 172.16.1.1/16 to 172.16.1.125/16.  Produce a report that states all the required hardware and software to implement this network.  Design the prototype of the network using Packet Tracer and describe it in the report.
Preview sample
WECHAT, RENREN, and WEIBO - Social Media in China Information Technology Essay
5 pages (1700 words) , Download 0 , Essay
Free
The paper “WECHAT, RENREN, and WEIBO - Social Media in China” is a meaty variant of an essay on information technology. Social media in China is perceived differently when compared to other countries across the globe. Most of the dominant social media platforms are not accessible in China given that they are blocked by the Ministry of Public Security, (MPS).  
Preview sample
Information Systems Failure in a Small Enterprise Information Technology Case Study
11 pages (3148 words) , Download 0 , Case Study
Free
The Enterprise Resource Planning (ERP) systems implementation gives most of the companies significant challenges because some of them fail while others substantially exceed the project costs. Notably, the ERP systems are different from the other large-scale Information Technology (IT) implementations qualitatively in three ways.
Preview sample
Closed-Circuit Television Systems Design for Gold Facility Information Technology Term Paper
11 pages (3112 words) , Download 0 , Term Paper
Free
CCTV systems are used for surveillance in different locations, whether private or public premises. They are installed for different purposes such as to monitor and control movement, prevent intrusion or prevent theft, to mention but just a few. Initially, CCTV systems were used in cities and large establishments for security purposes.
Preview sample
The Security Systems Basis for Design in Gold Storage Facility Information Technology Term Paper
10 pages (2908 words) , Download 0 , Term Paper
Free
Installing CCTV devices for the purposes of knowledge worker productivity is paramount so that an employee is paid for what he/she does. However, there is a thin line between the employer's right to collect information that is important for the general safety of the population and intrusions into the property.
Preview sample
Enhancing Enterprise Security Information Technology Assignment
12 pages (3105 words) , Download 0 , Assignment
Free
Also in the laptop were information assets such as the Social Security numbers, of the Dean, his wife, and their children and account number for the Dean’s personal bank accounts domiciled in India. Initially, the laptop also contained information such as class Social Security numbers that were used to identify students and student exam details.
Preview sample
Firewall Tools: Activity Monitor Information Technology Case Study
6 pages (1607 words) , Download 1 , Case Study
Free
The use of Activity Monitor does not affect the performance of other hosts in the network, and it provides a report of visited sites. Furthermore, the tool allows the user to have a view of multiple computers simultaneously. With that, it becomes easy to anticipate disasters such as network outages and therefore take appropriate action. The user gets control of their network using the Activity Monitor.
Preview sample
Information Technology Infrastructure to Support the Processes of Supply Chain Processes Information Technology Capstone Project
24 pages (6497 words) , Download 5 , Capstone Project
The first set of databases will be stored in the company that will entail a central computer that is linked to the rest of the computers. The process will entail a scheduled update that will occur weekly so as to sync the local server with a second back-up system. The second database will be stored externally through the support of Google.
Preview sample
Failure of the Enterprise Resource Planning Software System Information Technology Case Study
7 pages (1994 words) , Download 0 , Case Study
Free
Companies at times formulate assumptions that are broad and plan with high underestimation of the changes involved. (Besilj, 2005, pp.17) For real plans, identification of all requirements and the people to work on the plans is a necessity. The resources projected on are blundered. General understanding of external and internal resources required for the completion of the project is critical.
Preview sample
Mitigating Cyber-Attacks by Destructively Counter-Striking against Attackers Information Technology Literature review
10 pages (3230 words) , Download 0 , Literature review
Free
The mitigative counter-strikes should entail liability rules for protecting third parties in case the process of hacking back harms a different party rather than the targeted attacker. This study will also demonstrate why counter-strike is a proactive policy for helping insulate critical services from damage and mitigate harm from potential attacks.
Preview sample
Enterprise Systems of A-Coffee Ltd Information Technology Case Study
6 pages (1637 words) , Download 0 , Case Study
Free
Enterprise systems permit organizations to manage organizational data with ease when input data are fed into the system and the system automatically processes the data into a more useful output thereby facilitating data management processes and reducing redundancy. The enterprise systems integrate many business processes.
Preview sample
A Security Evaluation of Personal Information Management Information Technology Term Paper
9 pages (2336 words) , Download 2 , Term Paper
Free
In fact, more often, people lose their valuable data not because it is not secured but due to fact that they tend to be overconfident of the security methods even amidst changing technology. While passwords were initially preferred as the most effective methods of securing information and personal data, the emergency of hacking software has rendered them ineffective (Whitman, & Mattord, 2012, p. 104).
Preview sample
Information Classification Scheme 3D Media Comm. Ltd Information Technology Case Study
12 pages (3673 words) , Download 1 , Case Study
Free
Care should be taken when transporting such sensitive information between branches of the business, this includes file encryption, and a log maintained with details of the transfer including the date, the description of the information, the end receiving party, can be an individual or sublets 3D Media Comm. Ltd. 
Preview sample
Issues and Solutions Utilizing an Information Classification Schema Information Technology Term Paper
12 pages (3598 words) , Download 0 , Term Paper
Free
Conducting research to find out an appropriate outline to solve a specific problem utilizing an information scheme is challenging due to the lack of a scientific classification scheme for a security outline. An appropriate classification scheme assists in the retrieval of information and efficient storage, which is an added advantage for both outline navigators and program pattern miners.
Preview sample
Meme-Tech Network Engineering Project Information Technology Case Study
5 pages (1409 words) , Download 0 , Case Study
Free
In understanding the factors including the technologies that have influenced the success of this business, Meme.Tech will have an outline of what factors to consider for its success. The technologies that have influenced the businesses, will be used to ensuring the success of Meme.Tech. The business requires to deliver flexible networking solutions.
Preview sample
Interactive Game Playing and Network Quality Information Technology Essay
6 pages (1913 words) , Download 0 , Essay
Free
Using the uses and gratification theory, and basing their study on network externalities, Wei and Lu set out to offer extra direction on this important topic for future academic studies. The researchers collected about 207 questionnaire results concerning the topic that was completed online. The research model was then analyzed using the structural equation technique of modeling.
Preview sample
The Internship Information Technology Report
20 pages (4977 words) , Download 2 , Report
Free
Flame Computer Company L.L.C partners with companies such as AVTECH, Motorola, Dell, HP, Kaspersky Lab, Microsoft, Huawei, ACTi Corporation, Xerox, Kasda Networks Inc., Eugenius, and 24Online to deliver its services to clients. The goal of FLAME is to develop a good partnership with clients in the delivery of rapid, effective and reliable IT solutions that are robust, efficient, productive and cost saving.
Preview sample
Concept Mapping for Information Security Information Technology Term Paper
9 pages (2250 words) , Download 0 , Term Paper
Free
Owing to his current working style as well as his behavior towards securing his digital devices, it's imperative that both Jack should be made aware of the threats as well as his devices need to be secured against the impending threats. These threats, their profile, likelihood, countermeasures, impacts, and mitigation effects have been detailed below following the concept map.
Preview sample
Implementing a Security System for Jack Doe and 3D Media Company Information Technology Case Study
8 pages (2000 words) , Download 0 , Case Study
Free
The loss of data may lead to financial losses and a possible hacking system may lead to impacting the company’s reputation and with the possibility of expensive legal lawsuits from customers, (Phan, 2007). Also, interruption or attack on the system may impact confidentiality, integrity, and availability of the system.
Preview sample
Competition and Event Management System - Improved Web and Mobile Based Application for Jack Attack Information Technology Report
6 pages (1704 words) , Download 0 , Report
Free
The proposed application is an improved version that would have more features and functionalities than the original website such as scorekeeping, integration with external applications, customization of details for users, and so on. The proposal suggests building a new application using PHP connected with an MYSQL database that would contain details of three types of users.
Preview sample
The Software Development Process Information Technology Report
4 pages (1117 words) , Download 0 , Report
Free
There are several types of SDLC. However, this paper will seek to define software crisis and give three reasons that led to it, explaining how to tackle this problem using principles of Software Engineering as well as expressing the best type of software development cycle to be deployed to come up with a game application as well as a text editor.
Preview sample
The Information Security Risks of Using Mobile Apps for Individuals and Organizations Information Technology Term Paper
6 pages (1843 words) , Download 0 , Term Paper
Free
For mobile operating systems like iOS and Android, Hayikader et al. (2016) suggest that they can use the traditional access control to augment their security. This includes using more authentic and secure passwords that cannot be deduced by intruders. It also requires using screen locks whenever a mobile device is idle. 
Preview sample
Technological Change as Trauma Information Technology Assignment
4 pages (2703 words) , Download 0 , Assignment
Free
Has the web been overtyped as technologists try to enlarge the extent to which we will rely on the internet? It will answer this question by giving examples involving different works by various technologists as they try to determine whether there are other factors other than consequential shakeouts and bubbles that can affect technological changes.
Preview sample
Cyber Terrorism in International Relations Information Technology Research Paper
39 pages (10286 words) , Download 4 , Research Paper
The paper starts the discussion on the nature of terrorism in general and cyber terrorism in particular, where aggression, intimidation, and the threat of material or moral by using electronic means issued by states or individuals against human rights or religion. Cyberterrorism is the future of terrorism given the multiplicity of its forms.
Preview sample
Police Vs Thief 2 - Game Theories and Game Design Evaluation Information Technology Case Study
5 pages (1522 words) , Download 0 , Case Study
Free
The paper “Police Vs Thief 2 - Game Theories and Game Design Evaluation” is an intriguing variant of a case study on information technology. The design of a mobile phone game is mainly dependent on the expectations of the users. Adequate information has to be collected to ensure that the needs of the users are met.
Preview sample
NIKE's ERP Implementation Failure and Lessons Learned Information Technology Case Study
9 pages (2439 words) , Download 4 , Case Study
Free
Today, globalization and increased competition has made organizations seek new ways of structuring their businesses so as to be flexible and reliable. ERP systems bring numerous benefits to the company, including communication, coordination, and organizational efficiency (Frey, Fukuda, and Rock 2011).
Preview sample
The Internship with Flame Computers Company Information Technology Report
20 pages (5140 words) , Download 0 , Report
Free
To achieve this goal, the internship program was incorporated as part of the training in the course to allow students to experience the work environment related to the course and meet other professionals in the field. To enhance my knowledge and skills, I got an opportunity to join Flame Computer Information Technology and Security System Company for the internship.
Preview sample
How the Internet Has Impacted Information Privacy Information Technology Essay
10 pages (2805 words) , Download 1 , Essay
Free
Information technology has gradually become one of the most critical players in the transformation of the world, in terms of how people share information, conduct business, and surveillance. Imperatively, information technology has opened up society and, some argue, decreased privacy. The Internet offers tremendous opportunities that are exploited by individuals and groups, especially businesses.
Preview sample
Defence In-Depth And Physical Security Information Technology Essay
10 pages (3127 words) , Download 0 , Essay
Free
Physical security in IT entails controlled access, and therefore, ensuring control of security involves ensuring the control of access. The efficacy of any barrier can be determined through an assessment of a specific situation. There exist various barriers necessitating site protection mainly for the identified threats in a risk and threat analysis.
Preview sample
Security Design for Threat Detection System Employing Relevant Technologies Information Technology Case Study
10 pages (2500 words) , Download 0 , Case Study
Free
The company’s main target markets are Europe, America, and Asia. The manufacture of unique as well as high-quality integrated circuits makes the company remain a leader in the field of communication. The company has attracted the globe’s leading communication firms who flock to it to buy the products.
Preview sample
Age Restrictions on Social Networks to Avoid Cyber Bullying and Related Child Abuses Information Technology Research Paper
7 pages (2302 words) , Download 0 , Research Paper
Free
A review of the literature concerning cyberbullying and other forms of child abuses was completed. Findings showed that over the last few years, internet usage among children has been rising in steady fashion consequently resulting in cyberbullying. Cyberbullying refers to an online harassment of children through mediums such as, but not limited to, emails, text messages, Facebook, WhatsApp, Instagram among other social network platforms.
Preview sample
Investigating Saudi EFL University Students Writing Processes Using Computer-Keystroke Logging Information Technology Case Study
6 pages (2763 words) , Download 0 , Case Study
Free
We also get a chance to know the challenges that the writers face in composing as well as other stages of their work.  There are various methods used to analyze the writing process data such as think-aloud protocol, retrospective interviews, questionnaires, text analysis, observation, and the real-time computer-helped study, which is an observation-based methodology.
Preview sample
Threat Detection Systems Information Technology Case Study
13 pages (3250 words) , Download 0 , Case Study
Free
The company is the leading producer of integrated circuits worldwide. Some of the distribution areas for the company’s products are in the United States of America, Europe, and Asian countries.  In cooperation with some of the best logistics shipping companies, the company is able to effectively transport highly valuable integrated circuits to various customers worldwide with good timely delivery.
Preview sample
Physical Data Security, Defense in Depth Theory Information Technology Research Paper
10 pages (3138 words) , Download 0 , Research Paper
Free
The security industry engages in a multi-discipline and diverse knowledge base which involves the management of risk as the fundamental aspect to be mitigated. There is limited study on understanding and drawing the expert security knowledge to be used in a particular region. Physical security is necessary for assets such as people, information, and property.  
Preview sample
Deep Physical IT Security Information Technology Essay
10 pages (2724 words) , Download 0 , Essay
Free
Physical security can be described as the protection of personnel and hardware together with software from physical actions or any other events which have the potential to cause serious loss and damages to the organization. Examples of such actions and events that protection covers are fire, natural disasters, and terrorism.
Preview sample
Security Design for a Threat Detection System for the Smith-Brooks Corporation Information Technology Case Study
12 pages (3000 words) , Download 0 , Case Study
Free
The principles of the project can be determined through feasibility studies and work with the architects to develop a pre-design plan (Broder & Tucker, 2012).  The architects and principles will then carefully review the marketplace positioning of the corporation based on its naming convention and brand.
Preview sample
Meaning of Systems Approach to Physical Security Information Technology Research Paper
9 pages (2770 words) , Download 0 , Research Paper
Free
Information and associated technologies play a major role in the innovations and competitive advantage generation by organizations. Organizations today face a range of security issues, especially in the information technology sector. This exposes them to vulnerabilities that would threaten the existence of the organization.
Preview sample
Organization Assets Physical Security Information Technology Research Paper
10 pages (3015 words) , Download 1 , Research Paper
Free
Organizations recognize the aspect of security as important in assuring their best interests. Security professionals have established that risks arise from the existing threat as well as the vulnerability of an asset which can result in the destruction or loss of the assets. An asset can be defined as an item of value within the organization.
Preview sample
The Intersection of Ethics and Internet Gaming Information Technology Term Paper
10 pages (2773 words) , Download 0 , Term Paper
Free
Over the recent years, the development and use of Internet games have continued to increase. While playing such games has relaxation and cognitive benefits, there are other negative outcomes associated with it such as violence, negative stereotyping, obesity, and reduced social interaction. Internet gaming is unethical and policymakers should come up with policies to discourage its use.  
Preview sample
Security Design for the Smith-Brooks Corporation Information Technology Case Study
12 pages (3391 words) , Download 0 , Case Study
Free
Configuration, specification, or provision of dedicated modem lines and other network access ports to provide security system support without authorization from the security manager would be necessary (Ayoub, 2012). This will be realized through enforcing reliable access control measures on the system.
Preview sample
Mobile Banking Applications Security Risks Information Technology Literature review
9 pages (2373 words) , Download 0 , Literature review
Free
This paper aims at critically evaluating findings from two research papers associated with mobile application security. Authored by He, Tian, Shen, and Li (2015), the first journal is titled “Understanding Mobile Banking Applications’ Security Risks through Blog Mining and the Workflow Technology”; this paper will be referred to journal 1 in this essay.
Preview sample
Perfect Property Information Management System Information Technology Case Study
6 pages (1659 words) , Download 0 , Case Study
Free
The analysis of the company’s performance need also to be performed in detail and realize the practical and working system for the company’s management. In the preliminary task, it is required to Owner’s view chart for the aforementioned business narrative that can to be shown to stakeholders for feedback.
Preview sample
Cloud Computing Security Information Technology Term Paper
8 pages (2204 words) , Download 2 , Term Paper
Free
Cloud environments are virtual nets of various independent domains. The relationship between users and resources in cloud computing is dynamic and ad hoc. Users and resource providers are not in similar security domains. Users are often identified through their attributes or characteristics instead of predefined identities. 
Preview sample
Conceptual Framework of Network Information Technology Assignment
10 pages (2701 words) , Download 0 , Assignment
Free
All network components are connected to a device, which is located centrally. The device may be a switch, router, or hub. Consequently, all the communication passes through the central device before being routed to the right destination. The central device, which is sometimes called a hub, acts as a junction for connecting the several nodes within the topology.
Preview sample
Technology and an Important Way of Self-Expression Information Technology Essay
8 pages (2351 words) , Download 0 , Essay
Free
With the resurgence of selfies in 2010, the culture of the population has changed with many people increasingly using smartphones to enhance communication on digital platforms. The selfies have helped individuals and enterprises in communicating their products in the increasingly competitive market.
Preview sample
Software-Defined Networking Information Technology Literature review
6 pages (1810 words) , Download 1 , Literature review
Free
Apparently, SDN has brought significant changes and improvements in computer networking, which makes it imperative to understand its unique benefits through a review of literature as well as some of the security issues facing SDN. Furthermore, owing to the security issues that will be identified, it becomes crucial to propose a theoretical security framework.
Preview sample
Computers Project Management and Professional Communication Information Technology Case Study
7 pages (2109 words) , Download 1 , Case Study
Free
This paper identifies three codes of ethics applicable in the case of copyright infringement, the Australian Computer Society (ACS), the British Computer Society (BCS), and the Computer Society of India (CSI. There is the analysis of the evaluation of these codes of ethics to the current situation and the differences and similarities of the particular codes of ethics.
Preview sample
501 - 550 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us