StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Law Enforcement and E-Government Transnational Issues Information Technology Coursework
7 pages (1971 words) , Download 0 , Coursework
Free
Sensitive government information leaked from the WikiLeaks cables, an illustration of cybersecurity issues. This prompted the White House Office of Management and Budget to send a memorandum prohibiting access to the website’s classified documents by unauthorized employees of the federal government. 
Preview sample
How Will Advances in Big Data, IT, Cloud Computing and Analytics Impact Healthcare Information Technology Essay
11 pages (3451 words) , Download 2 , Essay
Free
It is important to state that the paper "How Will Advances in Big Data, IT, Cloud Computing and Analytics Impact Healthcare" is an outstanding example of an information technology essay. The healthcare industry has a significant impact on the quality of our lives as well as how we live within the world.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Data Migration Between Clouds Information Technology Thesis
18 pages (5185 words) , Download 3 , Thesis
Free
The study has described the Windows Azure platform that may be effective in transferring data among clouds. The study’s statement of the problem argues that the banking sector has not realized the full benefits for cloud computing technology because of the inefficiency of the Amazon cloud models that have faced frequent failures.
Preview sample
Digital Certificates and Certification Authorities Information Technology Report
16 pages (5484 words) , Download 1 , Report
Free
A digital certificate, which is a component of public key infrastructure, is a digital credential that ensures the security and privacy of communication. The digital certificates basically achieve this purpose by giving a unique identity to the companies, businesses, and individuals over the Internet. It correlates the owner of the certificate with a public key which he further brings into play.
Preview sample
Information Security Challenges and Technologies Information Technology Coursework
6 pages (1671 words) , Download 0 , Coursework
Free
In the past few years, information security has turned out to be a serious challenge for individuals and business organizations. This paper is the first assignment that is given to me by Secretary Napolitano to provide her with a briefing regarding the challenges of securing information, identifies the next-generation techniques and tools for avoidance.
Preview sample
Cryptography Attacks Information Technology Research Paper
5 pages (1443 words) , Download 3 , Research Paper
Free
The government is autocratic over its operations and in most cases is never influenced by ethics and morality. It believes in safeguarding the security of the nation and will do all it takes without caring for the thoughts and opinions of the people. The only disadvantage of such a policy is that it gives more authority to the people.
Preview sample
Energy Management and Efficiency in Audit and Investigation Information Technology Assignment
6 pages (1903 words) , Download 1 , Assignment
Free
The ethical issue arise both relating to the environment and society (Pehnt 2006). The ethical issues discuss the loss of biodiversity, loss of planet vital viable resources, alteration in the natural processes like a hydrological cycle, the formation of cyclones and heavy winds, earthquakes, etc (Satterthwaite 2008).
Preview sample
A Threat Analysis to Enterprise Computer Networks and How to Mitigate Them Information Technology Research Proposal
5 pages (1401 words) , Download 0 , Research Proposal
Free
The problem of IT security can be compared to a building that needs fast and effective service to serve its inhabitants. If security is not well in place, service cannot be dispensed effectively. Managers, employees and individuals working for and in organizations should be involved with information systems and the required security because they tend to be less functional without this knowledge.
Preview sample
Cyber Security Issues Information Technology Report
38 pages (9537 words) , Download 2 , Report
Mitigating the relationship between threats and ISS effectiveness are “modifying factors” (Loch et al., 1992) which represent internal and external forces that can influence whether or not a threat is able to be realized and/or affect the severity of such a threat if it were to occur. Much of the literature refers to these as “counter-measures” (Schultz, 2004; Whitman, 2004).
Preview sample
Information Management Systems - Google Plus Information Technology Case Study
9 pages (2598 words) , Download 1 , Case Study
Free
The paper "Information Management Systems - Google Plus" is an outstanding example of an information technology case study. The advancements that have been made in technology over the years have led to a change in the ways that organizations conduct their business activities, with new methods and practices having been introduced in this neo-modern era as a result.
Preview sample
Data Collection Procedures Information Technology Essay
4 pages (1091 words) , Download 0 , Essay
Free
The study will use phenomenology, a methodology that explores people’s experiences to develop meanings from the consequences of phenomena. Its scope matches the research’s objective of exploring participants’ experiences to understand whether drug abuse is the primary cause of domestic violence or not (Rubin and Babbie, 2012).
Preview sample
Professional and Ethical Issues in Information Systems Information Technology Coursework
8 pages (2408 words) , Download 1 , Coursework
Free
 Though, many researchers have presented a wide variety of ethical theories to deal with these emerging ethical trends. But still, there is not considerable progress in this regard. In fact, literature and researches carried out on information systems reveal comparatively small discussion of ethics in the information systems.
Preview sample
Email Classification Data Set Intelligent System Information Technology Assignment
7 pages (2126 words) , Download 1 , Assignment
Free
It is important to note in a summary that for this case study, a Deep Artificial Neural Network classification technique was the center of analysis for electronic mail and folder classification with the major training algorithms being DBN and RBM. Consequently, Enron Corpus was the most preferred application because of its unique features that had profound advantages to the case study.
Preview sample
Network and Communication Security Protocols Information Technology Research Paper
31 pages (8173 words) , Research Paper
Nobody downloaded yet
Cyber-attacks are intelligent as well as organized. Once the network is hacked, they install small loop holes or software intruders for giving hackers access whenever they want to access the network again. In simple words, one can say that it is a computer to computer attack to steal the confidential information, integrity or the data presently available on the network.
Preview sample
We Should Decrease the Use of Facebook Information Technology Assignment
4 pages (1140 words) , Download 0 , Assignment
Free
Teenagers have the habit of revealing secrets and personal data through Facebook.  Such information may often end up in the hands of antisocial elements and they can misuse it. Kelleher (2009) has pointed out that “hackers are attracted to social networking sites because they see the potential to commit fraud and launch spam and malware attacks”
Preview sample
Business Information Technology Information Technology Coursework
5 pages (1250 words) , Download 1 , Coursework
Free
Therefore it is important for businesses to design suitable and appropriate database applications using access. The application ensures that all the users notably business employees can access data using the embedded reporting tools using this application (Krishnaswamy 2010).
Preview sample
The Effects of the Internet on Children Information Technology Report
5 pages (1716 words) , Download 1 , Report
Free
Despite all the measures, that have been discussed, being set up by parents, the main idea here is the communication process being upheld between the parent and child. Therefore, all these interventions can seem meaningless unless the parent takes an active role and teaches the child as they grow on internet use.
Preview sample
The Use of Information Security Standards in Tackling Card Fraud in Nigeria Information Technology Research Paper
15 pages (4427 words) , Download 0 , Research Paper
Free
The paper "The Use of Information Security Standards in Tackling Card Fraud in Nigeria" is an outstanding example of an information technology research paper. A syndicate trained to defraud debit and credit card owners had been improving their strategies for over 20 years in the USA. Nigerians were identified as new entrants to America earlier than 1993 when they were discovered to be under training in various parts of the USA.
Preview sample
4G Wireless Networks Information Technology Report
4 pages (1382 words) , Download 0 , Report
Free
Conversely, the Fourth Generation (4G) wireless network's benefits and application focus upon the seamless incorporation of existing wireless technologies to develop new technological standards by a significant level (Kumaravel, 2011).
Preview sample
Twitters Role within Society Information Technology Essay
4 pages (1365 words) , Download 0 , Essay
Free
Says Hussein Amin, professor of mass communications at the American University of Cairo, “Social networks have broken the psychological barrier of fear by helping many to connect and share information. It has given most people in the Arab world the knowledge that they are not alone, that there are others experiencing just as much brutality, just as many hardships.
Preview sample
State of Software Development Information Technology Research Paper
13 pages (4460 words) , Download 1 , Research Paper
Free
The analytical research involved the collection of data from ninety-eight software developers. The statistical analysis resulted in the findings that there was no significant relationship among agility and the job satisfaction of the software developers. The overall well being and job satisfaction of the software developers were interrelated.
Preview sample
IT Legistilation and Ethics Information Technology Assignment
8 pages (2167 words) , Download 1 , Assignment
Free
Privacy of data can be a concern for companies that use Cloud-based MIS. The issue is that expert network hackers may find some way to download the private information of companies from the Cloud MIS. Therefore, it is an ethical obligation of the cloud services providing companies to implement preventive measures to decrease or reduce the risk of data loss for their customers.
Preview sample
The Cloud Computing in Business Security Information Technology Report
20 pages (5427 words) , Download 1 , Report
Free
Generally, one needs to specify whether to use one machine per service or whether to deploy one big machine and several virtual servers. The second concern arises regarding acquiring the cloud service; the customers might buy it and own it or might rent it from a service provider from a public cloud.
Preview sample
Technology and Its Impact on Productivity Information Technology Assignment
23 pages (5738 words) , Assignment
Nobody downloaded yet
The paper "Technology and Its Impact on Productivity" is an outstanding example of an information technology assignment. Among a large number of developments that have characterized human and organizational development; the transformational impact of information technology on organizational productivity is non-comparable.
Preview sample
Strengths and Weaknesses of Internet Censorship Information Technology Term Paper
9 pages (2561 words) , Download 0 , Term Paper
Free
Internet censorship can be done to maintain the country’s political stability and prevent moral decay. With technological advancement, the internet is overtaking other information media as the main source of information dissemination. Most people now rely on the internet to provide them with the necessary information because it is relatively cheap and easy to access.
Preview sample
Information Assurance and Secure Online Payments Information Technology Coursework
5 pages (1304 words) , Download 1 , Coursework
Free
One of the vital and critical features of e-commerce enabled websites is to make sure that the customers are confident and satisfied while making financial transactions over the website. The different forms of online payments made by the customers have already been discussed earlier in the paper.
Preview sample
Aspects of Hardware and Software Systems Information Technology Coursework
23 pages (6581 words) , Download 1 , Coursework
The company is familiar with the Microsoft environment having had Exchange Server 2003 and Office 2000. Microsoft has a number of applications that are useful and that will allow for a more problem-free integration. Microsoft Exchange Server has upgraded its service Exchange 2012 and Microsoft Office has also been upgraded to Office 2012.
Preview sample
The Ontology-based Software Co-Evolution of Cloud and Mobile Computing Information Technology Literature review
11 pages (3458 words) , Download 1 , Literature review
Free
Now when different systems and software applications are required to inter-network and communicate, problems arise due to the cross-platform differences, technical clashes and theoretical ambiguities.
Preview sample
Role of Internet in Modern Era Information Technology Research Paper
9 pages (2744 words) , Download 1 , Research Paper
Free
Internet is fundamentally viewed as a strong network of different interlinked computer networking, which is broadly available to the users or the general public. Moreover, it is also regarded as a global network that connects a large number of computers and plays a decisive role in exchanging valuable opinions and facts.
Preview sample
The PTTLS Program Information Technology Essay
5 pages (1451 words) , Download 0 , Essay
Free
For making the session of preposition interesting and lively, multimedia aid and physical activities were included in the session. The session was started with a video presentation which has several pictures, each depicting a message or story. For example, books placed on the table, two girls standing in a row, and a man swimming in a pool.  Students were asked to do or act as it was been shown in the picture.
Preview sample
Predictive Policing Information Technology Report
5 pages (1416 words) , Download 2 , Report
Free
Undoubtedly, in the context of the increasing threats of terrorism and organized crimes, predictive policing is an excellent approach to address law and order. This paper will discuss various aspects of predictive policing and how tools like COMPSTAT increased police departments' efficiency.    
Preview sample
Project Management Using PMBOK Categories Information Technology Assignment
10 pages (2500 words) , Download 4 , Assignment
Free
Preview sample
Health Level Seven International Letter Information Technology Article
5 pages (1335 words) , Download 1 , Article
Free
Since my hiring, I have quietly observed the various departments (admitting, laboratory, pharmacy, and clinical) and concluded that all seem to operate efficiently based upon current standards.  However, they all also function as separate entities with their systems.  Various mandated changes looming on the horizon will not allow this practice to continue, for communication and cooperation between departments is essential.
Preview sample
Current and Future Trends of Cloud Computing Information Technology Essay
10 pages (2677 words) , Download 1 , Essay
Free
The paper "Current and Future Trends of Cloud Computing " is an outstanding example of an information technology essay. Cloud computing is considered to be a value-driven technology, as it saves cost along with advanced Virtualization of business functions that are globally accessible. Organizations consider it a cost-effective tool, as the requirement of maintaining a complex technology infrastructure along with resources is not essential.
Preview sample
International Standards and Information Systems Quality Management Information Technology Report
9 pages (2633 words) , Download 1 , Report
Free
One key is the implementation of the international standards that allow assurance of quality management of information systems in the organization. The review of the international standards on quality management and information systems suggests that these standards complement each other. ISO 9000 QMS mainly focuses on establishing a quality management system in any given context.
Preview sample
End User System for Clean Services MS Excel and VBA Information Technology Assignment
5 pages (1385 words) , Download 1 , Assignment
Free
After the form has been completely filled, cross-check to eliminate any errors. If there exists any errors, you can clear the form to start again, or click on submit to write the data into the spreadsheet. After submitting the data, there is an option to close the application or if you want a hardcopy of the data, you can directly click on the print button.
Preview sample
Network Security Information Technology Essay
5 pages (1452 words) , Download 1 , Essay
Free
This firm is emerging a huge business set up with a head office located in New York. In the past few years, TAS has got imaginative popular ty, and now it has ten stores in the area. The staff of TAS comprises more than 500 people. To connect its different stores, the business has implemented a vast area network (WAN).
Preview sample
Database Application Information Technology Coursework
8 pages (2000 words) , Download 2 , Coursework
Free
The database application is designed using Microsoft access environment and its scope is limited to a small selling shop or stall. It is designed to help maintain the inventory for such a business that does not have a big budget. The database application can only operate in the Microsoft environment 
Preview sample
DNS and XenApp Deployment Information Technology Case Study
8 pages (2320 words) , Download 1 , Case Study
Free
One central park is facing the problem of unreliable DNS service due to security and management concerns. This has crippled the company's performance in terms of communication and business. As a result director of the company has tasked me with accessing and recommending the potential benefits of implementing a DNS based infrastructure.
Preview sample
The Benefits of Implementing EUC Environment Information Technology Term Paper
6 pages (1500 words) , Download 1 , Term Paper
Free
This is a simplified process of undertaking the process of assigning prices of the IT clean services. With the use of the system, the whole process will be simplified. Initially, there had been a manual process of posting the invoices for the services that are offered by the users (Sauter, 2010).
Preview sample
The ISMS for Mr. Manos Llewellyn Information Technology Case Study
10 pages (2831 words) , Download 1 , Case Study
Free
The computer network for Mr. Manos Llewellyn is not dispersed on a large scale, however, the company wishes to provide web development and web services, enable and configure Secure Socket Layer, Domain hosting, Web Applications, develop E-Shops, develop Web Designs, incorporation of a software house, graphic designing, and digital viral marketing strategy.
Preview sample
Aspects of Holiday Website Information Technology Report
5 pages (1284 words) , Download 1 , Report
Free
A list of the notable places of Bangladesh that can be visited for recreation purposes. Each place would have a small picture next to it. Furthermore, places in each category would be shown or hidden through a button (JavaScript-based). A section that displays all the pictures of places recommended by the visitors and stored on the server (PHP, MySQL). 
Preview sample
Dynamic Host Configuration Protocol Information Technology Essay
11 pages (3305 words) , Download 1 , Essay
Free
There has been so much scientific and technological advances in the last few decades as compared to the progress achieved by humans in the last few centuries and millennia. This great leap in knowledge started more or less during the Industrial Revolution and has been accelerated ever since, resulting in an explosion of data, information, knowledge and wisdom.
Preview sample
How Students Use Social Media Information Technology Essay
6 pages (1908 words) , Download 1 , Essay
Free
Students use Facebook to maintain the connection with the people that they are acquainted with whether they are near to them or distant. LinkedIn contains sections entirely dedicated to job opportunities that work best for students who want to take their academic career to the next level without having to leave their jobs. 
Preview sample
What Is a Distributed Database Information Technology Assignment
6 pages (1638 words) , Download 1 , Assignment
Free
The client-server model is used both in local area networks and on the internet. Some of the main examples of the client-server model include FTP servers and clients, Web servers and Web browsers, and the DNS (Mitchell n.d.). Modern companies make use of LANs, as well as the internet for carrying out their business processes.
Preview sample
The Expected Benefits of HTML5 Adoption Information Technology Research Proposal
9 pages (2549 words) , Download 2 , Research Proposal
Free
Although the research is expected to achieve its objectives, there are a few unavoidable limitations that may slightly affect the validity of its findings. Fist and foremost because of the short time limit, the research will only be conducted on small population size and therefore the researchers will not be able to effectively assess the target variables.
Preview sample
MediTech Healthcare Information System Information Technology Case Study
7 pages (1952 words) , Download 2 , Case Study
Free
In order to address the security issues, professionalism is required in terms of design and development, and acquisition and maintenance while operating electronic health records. However, health professional shares their own code of ethics which is not effective in terms of Health Information Professionals (HIPS).
Preview sample
Conceptual And Logical Database Design Information Technology Assignment
12 pages (3000 words) , Download 2 , Assignment
Free
Without an efficient database, then we cannot have a successful information system. Conceptual database design focuses on the theoretical aspects of a database. It is the first crucial step in the modeling of any database. A logical database design analyses the flow of data in a database. It identifies the unique relationships that exist within various entities in an information system.
Preview sample
Heuristic versus Systematic Processing of Online Privacy Policy Information Technology Research Paper
10 pages (2541 words) , Download 1 , Research Paper
Free
Consistent with the HSM of heuristic processing, information perceivers’ process the information by relying on the positive heuristics triggered by the familiarity cue. Furthermore, information perceivers are more likely to make their judgment based on the familiarity cue. Finally, information perceivers’ adoption of heuristic processing leads to acceptance of privacy policy.
Preview sample
Security in New Generation Cell Phones Information Technology Report
5 pages (1371 words) , Download 2 , Report
Free
The new generation cell phones have marvelous and attractive features that appeal to most users especially the youths. Additionally, they continue to revitalize the banking and communication industries. However, they also come with various security risks discussed above. There is a need for combined and coordinated efforts from three groups of people to ensure safety.
Preview sample
2601 - 2650 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us