StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Combating Cyber Victimisation: A Comparative Investigation of the UAE and the UK Information Technology Literature review
38 pages (11230 words) , Literature review
Nobody downloaded yet
Before examining what constitutes cyber victimization and the related theories, it is essential to have a deeper understanding of cyber victimization from different perspectives and further connect such understanding with relevant legislations that have been passed in both the United Kingdom and Saudi Arabia with aim of combating cases of cyber victimizations.
Preview sample
Hospitality Information Technology in InterContinental Hotels Group Information Technology Case Study
11 pages (3635 words) , Download 0 , Case Study
Free
The increased usage of the internet in e-commerce has greatly impacted the hospitality industry. Today, the internet has become a platform for brand imaging and reputation enhancement (Ozdipciner et al 2016). This report takes InterContinental Hotels Group (IHG) as a case study to evaluate the strength and weaknesses of a website in the hospitality industry.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
How Technology Impacts Our Everyday Life Information Technology Term Paper
27 pages (7163 words) , Download 2 , Term Paper
Technology is around all the time; the recent rampant use of cell phones, computers, and television can tell it all. The use of technology per se is not of recent origin; it is as old as mankind and has undergone transition many years down the line, from the early days of using the printing press and the first cellular phones to the use of more sophisticated information systems in the present.
Preview sample
Bens Online Fashion Shop Information Technology Case Study
10 pages (2824 words) , Download 1 , Case Study
Free
This paper tells that traditional business communication used to be face-to-face and later telephones but with technological advancement, there are new forms of communication in business. Software developers are coming up with different communication applications that are significant in business transactions. 
Preview sample
Web Analysis of Argos Retailers Information Technology Case Study
10 pages (2903 words) , Download 1 , Case Study
Free
The review of Argos will entail an overview of the company website, by highlighting where and what web analytics techniques and tools can be used to improve the site use. Some of the techniques or tools that will be used comprise browser type, page views, hits, clickstreams, and traffic patterns. The tools support the correct usage and operation of the websites.
Preview sample
ICT Outsourcing vs Cloud Computing Information Technology Report
14 pages (4240 words) , Download 0 , Report
Free
Presently, there is an augmented recognition that worldwide markets have experienced regulatory transitions. In the information communication technology sector, in the perspective of bigger service suppliers as well as providers, there is noteworthy stress rooted in decreasing the project's business outlay particularly with additional antagonistic opposition from less significant firms.
Preview sample
Usability Testing and Heuristic Evaluation - Website Interface Design Information Technology Literature review
11 pages (2996 words) , Download 0 , Literature review
Free
Designers are concerned with user interface and overall system usability (Frankilne and Coustan 2013).  The user interface, in this case, is the machine’s industrial design that is supposed to facilitate quick interaction between humans and itself. The goal of this interaction is to enhance the effective control and operation of the machine and end-users.
Preview sample
Information System in Information Technology Information Technology Assignment
9 pages (2559 words) , Download 0 , Assignment
Free
Attaining operational efficiency of the registration system suffices to be the main objective of the CIT system (Fahmy 2007). One of the benefits of the system is to eliminate the need for students to form long queues in halls during the registration process. The system uses few menus thereby guaranteeing its simplicity and flexibility.
Preview sample
Global Connection through Technology in Etihad Airline Information Technology Case Study
6 pages (1787 words) , Download 0 , Case Study
Free
The Etihad Airline commenced its operation in November 2003.  Currently, the Etihad Airline operates more than 1000 flights every week with over 120 destinations for both passengers and cargo. These destinations include Middle East, Africa, Australia, and America among other regions. The Airline has a fleet of 122 both Airbus and Boeing aircraft as of July year 2016.
Preview sample
The Societys Response on Internet Hackers Information Technology Term Paper
12 pages (3279 words) , Download 0 , Term Paper
Free
All over the world, people have continued to live in societies where obeying the laid down rules and laws has become part and parcel of their culture. As a result, there will always be other individuals who are keen on attempting to break the laid down rules, regulations, and laws in order to disrupt society.
Preview sample
The Implementation of Enterprise Resource Planning at DUBAL Information Technology Assignment
10 pages (2749 words) , Download 0 , Assignment
Free
This paper tells that the implementation of the ERP was in consideration of the fact that the changing technology has immensely impacted the company’s workforce, Bruch and Vinnichenko, (2007).  This was fostered by the fact that the company has been dedicated to continuous innovation in the aluminum smelting process.
Preview sample
The Skills in Computer Engineering Information Technology Assignment
13 pages (3460 words) , Download 0 , Assignment
Free
Rijndael is one of the most secure encryption software that used by organizations to protect their data. This software has been voted as the best by most of the users who have found it efficient in terms of safeguarding the systems. It is thus evident that the encryption process is beneficial in terms of safeguarding confidential information.  
Preview sample
Oracle Database Tuning Plan Information Technology Report
7 pages (1958 words) , Download 0 , Report
Free
Performance tuning is aimed at identifying and reacting to performance problems, preventing this problem from occurring in the future, meeting service levels and requirements, optimizing usage of available and avoiding upgrades, and ensuring the application meets organizational and customer needs (Powell, 2007, p.27).
Preview sample
Data Communications and Network Information Technology Report
8 pages (2290 words) , Download 0 , Report
Free
Distributed systems, as well as network systems, only function if the interconnection between the networked devices is reliable. This means the network must be fault-tolerant and resilient. Therefore, the power or strength of a reliable network includes resiliency, and the backbone being the availability of the cost-effective redundancy of good design.
Preview sample
Improving Security in Web Services-Based Services Oriented Architectures Information Technology Report
9 pages (2770 words) , Download 0 , Report
Free
The technologies of the present day’s web services like UDDI, WSDL, SOAP, and XML  are all vulnerable to various types of attacks. Since these technologies are highly interoperable, they are more exposed to attacks of all types.  This paper proposes a new architecture for securing a web service from attacks of all kinds.
Preview sample
Hospital or Medical Information System Information Technology Research Proposal
16 pages (4743 words) , Download 2 , Research Proposal
Free
The new Hospital/Medical information system will be developed for the governmental hospitals in Saudi Arabia. The main objective of the system is to allow citizens to use their civil ID in the emergency room and the system will tell the doctor if the patient has any allergies, heart conditions, major medical information that needs to arise.
Preview sample
Improving the Education in University by Using Information and Communications Technology System Information Technology Research Paper
12 pages (3892 words) , Download 0 , Research Paper
Free
Every lecturer at Al-BahaUniversity should have adequate ICT infrastructure that will enhance the quality of teaching. Lecturers should embrace the use of ICT in teaching in order to improve the quality of results. They should use ICT for the purpose of demonstration and assimilation. The Al-BahaUniversity should Organize ICT in-service training programs for all lecturers.
Preview sample
Parental Perspectives on Internet Technology Use by Emirati Children Information Technology Research Proposal
10 pages (2766 words) , Download 1 , Research Proposal
Free
The region of UAE has been hailed by many as a hub of technology in the Islamic world. So, by studying Internet adoption and use beginning with children aged 0-10 years, the researcher was sure about getting the entire picture and spectrum of parents' and adults' perception of the Internet and technology devices as well.
Preview sample
Data Warehousing Information Technology Report
7 pages (2014 words) , Download 0 , Report
Free
The size of a data warehouse is generally enormous and the data warehouse normally stores a wide range of information that has been generated over long periods of time. Data related to business subjects such as products, markets, and customers are all collected, integrated, and housed under the data warehouse umbrella.
Preview sample
Analysis of The National Program for IT in the NHS Information Technology Report
14 pages (3675 words) , Download 1 , Report
Free
Any program of the size of the National Health Service depends on efficient handling of large quantities of information. The handling should be safe and successful. A ten-year program in the name of the national program for information technology in NHS is made for its efficient handling of activities. This gives NHS activities and programs to use IT.
Preview sample
Internet Protocol Television Information Technology Case Study
8 pages (2346 words) , Download 0 , Case Study
Free
The advent of IPTV opens up the television market to telephone companies and other service providers with lower barriers to entry than existing digital platforms. IPTV is the delivery of digital television over broadband networks with faster access and improved digital video compression. However, there are many commercial and technical issues involve with IPTV and this paper will discuss some of them.
Preview sample
Applying Information Technology Systems in Manging a Sports Club Information Technology Case Study
14 pages (3899 words) , Download 0 , Case Study
Free
The development of different operating systems that actually perform the tasks needed in business, from the most basic calculating procedures toward the complicated procedures of accounting and systematic planning of business transactions, the computer technology or Information technology have actually been the main source of successful trade and exchange transactions in the business industry.
Preview sample
The Impact of ICT on Learning: Can ICT Improve Learning Information Technology Report
10 pages (2982 words) , Download 0 , Report
Free
Most of the introduced initiatives aim at equipping schools with ICT hardware such as computers, internet connections, and local networks. ICT is a powerful tool that can be used to extend educational opportunities to populations that are traditionally marginalized from education due to social and cultural reasons. The incorporation of ICT in learning enables access to remote learning resources.
Preview sample
The Issues of Cyberethics Information Technology Term Paper
7 pages (2061 words) , Download 0 , Term Paper
Free
In the world where information technology defines how people live, work, and integrate, ethical issues, as well as social responsibility, have emerged. Issues arising from the use of ICT are spread across the spectrum. The main component of ICT is information which is represented in form of data and knowledge. 
Preview sample
Usability Test of the Communication - ZOTERO Project Information Technology Case Study
6 pages (1814 words) , Download 0 , Case Study
Free
Time taken to perform the allocated task was recorded as well as careful observation of the participant's attitudes and reactions. This information on data and observable expression collected from the participants were used to derive obstacles and recommendation on ways through they can be in the future. 
Preview sample
Embracing Innovative Technology in the Construction Industry Information Technology Research Proposal
6 pages (1643 words) , Download 0 , Research Proposal
Free
Literature review in any paper considers all the relevant literature accessed that can indicate how else the same topic under study was addressed. The paper successfully fulfilled the requirements of a good literature review by presenting a comprehensive literature search divided into relevant sub-headings explaining certain aspects of BIM. 
Preview sample
Interface Evaluation Hardware Printers Information Technology Literature review
7 pages (2103 words) , Download 0 , Literature review
Free
The graphical user interface is a program that enables interaction between human and the computer using symbols, visual displays, and pointing devices(GUI, 2012).  The user interface is a concept in computer science is under Human-Computer Interaction (HCI). Usability is very important developers have realized that it needs more time because it matters how effectively the interactive system is.
Preview sample
Clifford Stoll: Cyber Life and Achievements Information Technology Report
6 pages (1718 words) , Download 0 , Report
Free
Many critics have condemned the way Stoll approached the issue in his second book without researching the application of technology in education. Stoll has also illustrated the challenges that technology has brought into the world and how it may be detrimental to society. Some of the predictions made by Stoll have been proved wrong but some of his points are still important in this age.
Preview sample
What Are the Requirements for an Effective Adaptive Learning System Information Technology Research Proposal
6 pages (1969 words) , Download 0 , Research Proposal
Free
The paper details how an effective adaptive learning system for Al-Baha University should look like in terms of addressing the technological needs of the university’s learning process. The identified requirements for an effective adaptive learning system can be used in future activities of developing appropriate and productive adaptive learning systems in other educational institutions.
Preview sample
The Adoption of the SCCM System to Upgrade the Current Management System Used by the Supreme Council Information Technology Case Study
20 pages (5244 words) , Download 0 , Case Study
Free
The project report is all about the development of the SCCM (system center configuration manager) system with reference to supreme council management operational frameworks. Development and installment of the new system will be of benefit because it will help in setting up a more robust and effective management system. 
Preview sample
Usage of Unauthorized Software in Taiwan by Jane Lu Hsu and Ya-Lan Su Information Technology Article
6 pages (1720 words) , Download 0 , Article
Free
The purpose of this review is to provide an objective analysis, critique, and review of the article “Usage of unauthorized software in Taiwan” by Jane Lu Hsu And Ya-Lan Su which was published in social behavior and personality journal in the year 2008. The review provides a recap of the article within the context, and it’s purposed to offer an impartial critique of the contents of the article.
Preview sample
Main Aspects and Areas of the New IT and IS Technology Establishment Information Technology Report
8 pages (2273 words) , Download 0 , Report
Free
Here this report is about the deep and detailed analysis of some of the main aspects and areas of the National Medical IT support structure and overall operational arrangement. This report will discuss some of the main aspects and areas of the new IT and IS technology establishment and present technology examination.
Preview sample
Emerging Technology - The Development of Technology and Information Infrastructure Information Technology Essay
8 pages (2144 words) , Download 0 , Essay
Free
Currency was introduced as a form of exchange of goods and services; there were business setups after the advent of money, the perceptions of many businesses started to change towards how business was conducted, but more so since in the last 30 years with the emergence of technology, most businesses have turned around.
Preview sample
Building a Secure Computing System Information Technology Assignment
8 pages (2340 words) , Download 0 , Assignment
Free
The confidentiality of information makes certain that the access of certain information is only available to those who have sufficient privileges. The protection of confidentiality is facilitated by the execution of the following measures; secure document storage, end users education, the classification of information, and the use of general security policies.
Preview sample
User Interface Design in Filmmaking Information Technology Term Paper
8 pages (2323 words) , Download 0 , Term Paper
Free
Studies have suggested a great influence of cartoons on children's creativity and psychological development.  The cartoons can evoke imagination, advance good conduct when utilized in various parts of the school curriculum (Mayesky, 2014). This application utilizes cartoons to build children in their communication skills.
Preview sample
Access to Technology and Economic Development Information Technology Literature review
6 pages (1713 words) , Download 0 , Literature review
Free
Technological growth and advancement play a great role in economic development in Australia and other parts of the world. It is clear that the Internet and world-wide-web technologies are key drivers for economic growth and prosperity. Enhanced communication and connectivity is a positive aspect of technology.
Preview sample
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers by Carrier Information Technology Literature review
8 pages (2169 words) , Download 0 , Literature review
Free
The objective of this paper is to examine the research conducted by Carrier (2003). The author's central purpose and methods utilized to achieve this purpose will be examined. This will be achieved by systematically reviewing the observations and assessing the theories used. Besides that, the techniques used will be reviewed and how they were performed.
Preview sample
Information Systems and Process of Making Decision Information Technology Essay
8 pages (2322 words) , Download 0 , Essay
Free
Ultimately, Big Data, BI, Database, and DSS can be very valuable if well applied in information systems management. Additionally, the research has found out that, the process of coming up with a decision is usually governed by two distinct entities. This includes the technical approach as well as the mechanism of the organizational structure of the entire system.
Preview sample
Privacy in Mobile Social Networking Information Technology Essay
6 pages (1803 words) , Download 0 , Essay
Free
There has been increasing in the use of smartphones which are much modernized in the sense that they are very well able to assess some very important social networking information which helps the users to be able to use some of the applications according to their own preferences. The mobile users have to put some security settings on some of the most private as well as specific applications.
Preview sample
Internet Content Regulation Information Technology Essay
7 pages (1921 words) , Download 0 , Essay
Free
Over the last ten years or more, debate on net neutrality has gotten very intense. With some regulations banning practices such as gambling or child pornography, there has been pressure for more severe regulations which would be expected to completely rid out practices that are unethical concerning internet access and data transmission over the internet.
Preview sample
Ethical Dilemmas in Project Software Development Information Technology Case Study
6 pages (1683 words) , Download 1 , Case Study
Free
The modern world has registered tremendous growth in information technology whose wide use has brought to the fore the issue of ethical and moral principles. Software project developers and managers have the responsibility of observing and incorporating moral and ethical principles in software development.
Preview sample
Management and Information Security - Project Management Body of Knowledge Information Technology Assignment
8 pages (2258 words) , Download 0 , Assignment
Free
The Project Management Body of Knowledge is an internationally recognized standard that provides fundamentals of project management in areas that include construction, engineering, automobile, etc. Duncan (2010) describes that PMBoK involves five process groups and nine knowledge areas. The concepts are applied to projects, programs, and operations.
Preview sample
Information and Communication Technology Management and Information Security Information Technology Assignment
6 pages (1834 words) , Download 0 , Assignment
Free
As a globally recognized standard (IEEE Std 1490-2003) PMBOK offers the basics of project management, irrespective of the kind of project such as how it is structured, engineering, software, automotive, etc. In this scenario, PMBOK offers 5 fundamental procedures along with 9 knowledge different knowledge areas usually for almost all kinds of projects.
Preview sample
Mobility Express Edition Software and Health Information Technology Information Technology Case Study
10 pages (2623 words) , Download 0 , Case Study
Free
The hospital observed is a nonprofit system of hospitals, clinics, and other health care services. It is reported that Allina owns and operates at least 11 hospitals and more than 90 clinics. Some of the other health care services provided by the group of hospitals include home care, hospice and palliative care, oxygen, and medical equipment.
Preview sample
Financial Frauds on Web Information Technology Coursework
6 pages (1617 words) , Download 1 , Coursework
Free
This was before the internet was very entrenched in people’s lives and many people did not really understand the way it works. The Nigerian email scams are some of the oldest forms of online scams and they came to be known as the 419 scans, which refers to the code by which they are referred to in the Nigerian online fraud laws. 
Preview sample
Computer Architecture in the 1970s Information Technology Coursework
9 pages (2540 words) , Download 1 , Coursework
Free
Computer architecture is a comprehensive subject that comprises everything from the affiliation between manifold computers to precise constituents inside a computer. The most vital sort of hardware scheme is a computer's processor architecture. The plan of the processor regulates what software might run on the processor.
Preview sample
Information Security: Principles and Practice Information Technology Assignment
6 pages (1648 words) , Download 0 , Assignment
Free
Project scope management encompasses the task of ensuring that the process required in completing one and only a particular task is completely done. In the management of project scope, there are several vital activities that must be observed and executed. This is intended to have a successful project as per the standards with the aim of achieving the required deliverables at the end of the task.
Preview sample
Information and Communication Technology Management and Information Security Information Technology Assignment
7 pages (1924 words) , Download 0 , Assignment
Free
The specific scheme that is used for the purpose of security specification, as well as enforcement of policies for a computer, is what is referred to as the security model. This is dependent on the computation models, right to access; distributed computing but also it can be based on no particular theoretical ground.
Preview sample
Web Services Technology Information Technology Essay
9 pages (2505 words) , Download 0 , Essay
Free
With the emergence and increase in online businesses and e-commerce, web sites become the major tool used in the facilitation of tasks and other businesses. Roughly speaking, web services can be considered to be applications that run online and can be published, located, and invoked across the internet.
Preview sample
Principles of Cyber Forensic Information Technology Literature review
14 pages (4319 words) , Download 1 , Literature review
Free
This paper discusses cyber forensics which is a process of investigating the cyber or digital crime, collecting the data, as well as analyzing them to come up with enough tangible digital or physical evidence that can be presented into a court of law to and ensure that the suspect is justifiably judged.
Preview sample
2251 - 2300 results of 10273 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us