StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Concept of Digital Divide Information Technology Report
8 pages (2502 words) , Download 1 , Report
Free
The term digital divide was developed in the mid-1990s to the gap that separates individuals who have access to news forms of information and communication technology and those that do not. It has earned many definitions since. Indeed, some researchers have restricted their definitions to access to digital information and communication technology.
Preview sample
Context-Aware Sensor Networks for Smart Environments Information Technology Essay
22 pages (6162 words) , Essay
Nobody downloaded yet
Sensor-based applications of the early days had independent application domain and hardware platforms. Because of this, many sensor-based devices for new scenarios must be developed from scratch. This paper presents a detailed discussion of various aspects of context-aware sensor networks in smart environments.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Cloud Computing and Threats to Corporate Privacy Information Technology Research Paper
18 pages (4886 words) , Download 2 , Research Paper
Free
Maximizing user control is another important issue. Trust is one of the most important components in looking to develop a technology for a mass market; lack of control could have an indirect impact and result in distrust of the organization. Cloud computing increases risk, as personal information could be misused, leading towards distrust.
Preview sample
Testing Internet Applications Information Technology Literature review
8 pages (2215 words) , Download 0 , Literature review
Free
Amalfitano, Rita, and Tramontana (2011) stated that to test the internet applications for the Android internet applications, the testing application should put into consideration the behavior of the android that is normally triggered by the data input and data being received as the androids are usually event-driven. 
Preview sample
The Reliability of Privacy Information Technology Assignment
6 pages (1795 words) , Download 0 , Assignment
Free
Jenny has gone beyond respect on intellectual property. She hacked a system developed by Louis and Uncle Ken implying an important ethical concern (Mason, 1986). Any individual item is costly and therefore Jenny is getting into paying the costs associated with the unethical act if at all she is caught. 
Preview sample
Metropolitan Police Service Information Technology Assignment
6 pages (1574 words) , Download 0 , Assignment
Free
For MPS, Meta directories simplify user administration by removes instances of manual updates. In order to manage authentication and authorization, MPS can seek middleware like web access management (WebAM) or web single sign-on (WebSSO) to manage instances where users have access to one or more applications that are web-enabled.
Preview sample
Visual Image Quality Assessment Information Technology Term Paper
19 pages (5832 words) , Download 0 , Term Paper
Free
It is clear that most images are taken t be observed by human beings and as such the HVS has been given prominence by many researchers and experts in the field of image quality measurement. It is also important since it allows researchers and engineers to understand how images are perceived and thus how quality is perceived. 
Preview sample
Current Networking Trends and Poor Network Connectivity in the Orkney Islands Information Technology Case Study
11 pages (3028 words) , Download 0 , Case Study
Free
Networking has been one of the areas in IT where innovation has seen high growth in more advanced technologies. Resulting in high speed, more reliable, and highly available Internet. Also, the technological advancement in networking has also seen the realization of technologies that overcome the physical hindrances to the infrastructural developments.
Preview sample
Key Information Security Issues Information Technology Case Study
8 pages (2098 words) , Download 1 , Case Study
Free
In a society as well as companies, information is the tool that enlightens, and therefore people can make sound decisions. More so, some people analyze data to find meaningful patterns that aid in creating strategies in business. As seen in this case scenario, the protection of information starts with small steps and then advances. It is more of a routine rather than a one-time thing.
Preview sample
Information Technology for Management Information Technology Essay
8 pages (2188 words) , Download 0 , Essay
Free
An effective IT infrastructure management model ensures that the business progress is effectively monitored and evaluated to ensure productive strategies are maintained while those that are not performing, are sufficiently improved in order to effectively respond to emerging business issues, changes, and challenges (Choubey).
Preview sample
Information Classification in BioMed Company Information Technology Case Study
11 pages (3164 words) , Download 0 , Case Study
Free
The CEO will promote the proper management of the company. The GSM will be in use to protect the information using second generation (2G) principles derived from the first one (1G). The GSM deals with cellular phones in terms of the operation of networks. The standard is now the world’s standard now. The creation of the standard by The European Telecommunication body (EITD) is impressive.
Preview sample
The Companys Vulnerability of Information Leakages in BioMed Devices Information Technology Case Study
12 pages (3184 words) , Download 1 , Case Study
Free
The stakeholder in this process is the information security manager as he will help protect information leakage to the public and the company’s competitors to avoid exposing the company. In the endeavor to information protection, a global system for mobile communication will be made through the second generation principles that are derived from the first generation.
Preview sample
Information Plan to Protect Information for Mobile Communications Information Technology Term Paper
10 pages (2894 words) , Download 0 , Term Paper
Free
With the help of other parties such as VPN that will keep all the emails pertaining to the phone of the CEO the company’s computers. The CEO will promote the proper management of the company. The GSM will be in use to protect the information using second generation (2G) principles derived from the first one (1G). The GSM deals with cellular phones in terms of the operation of networks.
Preview sample
Boston Dynamics Company - IT Security and Management on Data Theft Information Technology Case Study
8 pages (2236 words) , Download 1 , Case Study
Free
Most organizations globally are facing a lot of challenges concerning data theft and data corruption. Considering this scenario attacking the Boston Dynamics company, an overview of the security measures is essential for the company. Putting up privacy measures to prevent data theft and corruption is, therefore, a step in every organization.
Preview sample
Mobile Banking Applications Security Risks Information Technology Literature review
9 pages (2373 words) , Download 0 , Literature review
Free
This paper aims at critically evaluating findings from two research papers associated with mobile application security. Authored by He, Tian, Shen, and Li (2015), the first journal is titled “Understanding Mobile Banking Applications’ Security Risks through Blog Mining and the Workflow Technology”; this paper will be referred to journal 1 in this essay.
Preview sample
Failure of the Enterprise Resource Planning Software System Information Technology Case Study
7 pages (1994 words) , Download 0 , Case Study
Free
Companies at times formulate assumptions that are broad and plan with high underestimation of the changes involved. (Besilj, 2005, pp.17) For real plans, identification of all requirements and the people to work on the plans is a necessity. The resources projected on are blundered. General understanding of external and internal resources required for the completion of the project is critical.
Preview sample
Information Systems Failure in a Small Enterprise Information Technology Case Study
11 pages (3148 words) , Download 0 , Case Study
Free
The Enterprise Resource Planning (ERP) systems implementation gives most of the companies significant challenges because some of them fail while others substantially exceed the project costs. Notably, the ERP systems are different from the other large-scale Information Technology (IT) implementations qualitatively in three ways.
Preview sample
Structure and Navigation System of the EBay Site Information Technology Essay
6 pages (1688 words) , Download 0 , Essay
Free
The world has now shrunken owing to the great leap of achievements seen in the communication industry. The internet is the greatest discovery of the millennium is fueling growths that would have been unimaginable earlier. Over the past ten years, the internet has paved way for more activities being done online, day to day.
Preview sample
The Key Areas of Risk and Compliance Information Technology Essay
6 pages (1792 words) , Download 0 , Essay
Free
Organizations are faced with various information security risks ranging from infrastructure vandalism and failure to fraud, theft, sabotage, and emergency occurrences such as fire, flood, and terrorism. In this regard, organizations need to have sound Information Systems policies in place to ensure that their information as well as that of the stakeholder is secure.
Preview sample
Cloud computing the Choice of Platform for a Pilot Study Information Technology Essay
9 pages (2532 words) , Download 0 , Essay
Free
This has led to the option of cloud computing. Cloud computing actually encompasses both a platform and an application. It could be described as the platform for the future generation that provides availability of a large number of virtual resources, dynamic allocation of these available resources, data storage facilities, servers hosting web applications.
Preview sample
Multitunneling Grid Transactions Information Technology Lab Report
6 pages (1888 words) , Download 0 , Lab Report
Free
The following are the situations that this can be important Where one needs to talk directly to a specific TCP port to a machine that is separated by a firewall/gateway if it is possible to SSH into the gateway. Where it is possible to send data to a machine but one wants the data to be encrypted Where 1 and 2 are to be done.
Preview sample
Microkernel Operating Systems - Approaches to Operating System Design Information Technology Essay
12 pages (3400 words) , Download 1 , Essay
Free
If privilege levels that are multiple are provided by the hardware, then the only software, which will execute the level that is the most privileged (that is kernel mode or supervisor), is the microkernel. The userspace contains actual services of the operating system such as user interface, device drivers, file systems, and protocol stacks. 
Preview sample
A Network-Based Intrusion Detection System for ACME Software Solutions Information Technology Lab Report
13 pages (3475 words) , Download 1 , Lab Report
Free
The paper explores how the setup of the NIDS and Network can be changed to suit the existing functionality with no extra expenses on security; how IDS support systems and tools may use NIDS to add the existing functionality of IDS; how the security of the database could be configured to minimize the effect on services in existence as well as maximize security.
Preview sample
Establishing Requirements, Low-Fidelity Prototyping and Proposed Data Gathering Information Technology Case Study
10 pages (2558 words) , Download 2 , Case Study
Free
Organizational needs must not be considered at the expense of human needs. While working towards the satisfaction of organizational needs, the enrichment of human users must also be considered with high requirements and early enough in the development cycle for effective implementation of human-supported information systems.
Preview sample
Digital Signature Algorithms and Application of a Scheme of Digital Signature in Electronic Government Information Technology Literature review
13 pages (3457 words) , Download 1 , Literature review
Free
With the rapid growth of mobile and wireless technologies, people have started using computer technology in e-commerce, mobile fund transfer, games online, and theatre booking. As a result of these multiple uses that require high security, digital signatures are used to provide the privacy of the users since these signatures can prove the source of the document and confirm its integrity.
Preview sample
Difference between Information Technology and Information System Information Technology Assignment
11 pages (3245 words) , Download 1 , Assignment
Free
The term knowledge worker refers to people with the ability to do the interpretation of information on a given area of a subject. They go ahead to analyze develop and design by the use of their skills in research. In this way, they enhance understanding of these things. They are influential and do affect the priorities, strategies, and decisions of the organization (Ackoff 1989 pp.3-9).
Preview sample
Reasons and Benefits of Information Technology Tools Used by Telecom Engineers in a Telecom Industries Information Technology Coursework
14 pages (3761 words) , Download 0 , Coursework
Free
Information technology (IT) entails the management of information in a compact manner by the use of software and hardware. It also employs various operating systems and servers. A more recent definition of information technology views it as being hardware and software used in the management of databases, administration of systems, and people using them.
Preview sample
The Red 5 Staff Login System, Computer-Based Monitoring and Data Security Information Technology Case Study
9 pages (2628 words) , Download 1 , Case Study
Free
We are building an online system where staff in RED5 Company view their timetable, add their feedback, read feedback, apply for holidays, and have their own email account within the company. Whereas manager can log in and update/change timetable, add staff to the system, delete staff, read feedback, delete feedback, confirm holiday requests and manager also have an email account.
Preview sample
Big Data Handling in the Minnesota Health Care System Information Technology Case Study
6 pages (1790 words) , Download 2 , Case Study
Free
It has challenges that must be addressed through technology in order to realize the importance of big data. The study seeks to know these challenges and how they have been addressed. To realize the objective, the study carries out survey research through a key informant in the healthcare system for the case of Minnesota.
Preview sample
Information Communication Technology and the Role of Social Media during Queensland Floods Information Technology Assignment
13 pages (3408 words) , Download 0 , Assignment
Free
There are high chances that the trend will continue to the level that ICT literacy will be a functional requirement for people’s work, personal and social lives. Globalization coupled with innovative information and communication technologies are affecting various societies in the world and are prompting organizations to re-engineer and re-think the ways they run their operations.
Preview sample
E-Banking and E-Commerce Security Issues and Solutions Information Technology Coursework
11 pages (3039 words) , Download 1 , Coursework
Free
With all the kinds of online transactions, there are security issues that come along with it. The use of online transactions in the majority of people across the world is determined by the security and privacy of user’s personal data, which include credit card numbers, virus attacks, and fear of identity theft among others.
Preview sample
Cloud Computing in Australian E-Healthcare System Information Technology Case Study
18 pages (4615 words) , Download 2 , Case Study
Free
Cloud computing is a familiar phenomenon in the recent past as far as modern computing is concerned. The pace at which the utility is adopted especially among private enterprises is high, and this can be attributed to the intense competition in providing the best services to the consumers.
Preview sample
Effectiveness of the Virgin Australia Online Ticketing System Information Technology Research Paper
6 pages (1636 words) , Download 0 , Research Paper
Free
Oral interviews were used and also went a step further in observing how the system functioned. The first customer will summarize the stages you go through while booking your flight at Virgin Australia. The second customer says that she is also enjoying faster Check-ins, with additional streamlined processes that reduce the number of stages required in the processing of bookings.
Preview sample
Management of Information Technology Resources and Information Security Information Technology Case Study
7 pages (2520 words) , Download 1 , Case Study
Free
This paper is an information security mapping case study and aims at identifying the importance of information to companies and society in general, discuss concepts, values, and techniques that relate to information security, and present advantages, threats, and susceptibilities linked to various IT environments. 
Preview sample
Development of a Competency Matrix Information Technology Case Study
11 pages (3038 words) , Download 0 , Case Study
Free
The company is also characteristic of supporting four online games, having server firms in London, Sydney, and Los Angeles. Currently, the company exhibits four games under direct development alongside three outsourced games. Under Milkwood Pty Ltd has the capacity of employing 400 individuals with Dylan Thomas being the company’s current CEO.  
Preview sample
Impact of the New MyPassword System for Students and Staff at the University of Tasmania Information Technology Literature review
10 pages (2628 words) , Download 0 , Literature review
Free
The study aims at increasing understanding of the skills required in the collection, analysis, and interpretation of qualitative data; increase understanding of the relationship between data collection, data analysis, and interpretation with respect to qualitative research systems of research. Finally, develop skills and competence in the carrying out of qualitative information system research.
Preview sample
Computer Networks and Network Designs Information Technology Coursework
12 pages (3370 words) , Download 1 , Coursework
Free
IEEE defines standards for the different types of networks and topologies. The most common network used in organizations is the LAN as it only covers a small geographical area. The WAN is most common among campuses and large organizations that extend up to more than one building for example a business park.
Preview sample
Motivation for Using Facebook Information Technology Research Proposal
11 pages (3191 words) , Download 0 , Research Proposal
Free
Among these emergent tools is Facebook. Facebook has been considered, among other tools, the most popular in the art of social networking. The popularity of Facebook has been accredited to the design of the tool, which allows easier navigation and appealing interfaces. Most people who are ‘friends’ on Facebook meet while offline.
Preview sample
The Impact of CCTV Cameras on Crime Rate in Australia Information Technology Literature review
6 pages (1751 words) , Download 1 , Literature review
Free
This is mainly due to the unintended consequences it brings. The first is displacement; if cameras are installed at particular place offenders shift their operation to another place. Secondly, they lead to suspicion where people have negative ideas over the existence of cameras at a place people feel like they are being spied on.
Preview sample
Ways in Which Fault Tolerance Can Be Added to a Network and Reasons for Use, and Disadvantages of Improvements Information Technology Assignment
9 pages (2412 words) , Download 0 , Assignment
Free
Any workstation can undergo an upgrade without causing unnecessary network downtimes in the corporate offices. Moreover, this connection allows easy integration of new technology because of its high flexibility. Furthermore, the components of the client-server connection of the corporate staff’s network are interoperable. 
Preview sample
Installing and Managing a Server the Global Solutions Pty Ltd Information Technology Case Study
7 pages (1900 words) , Download 1 , Case Study
Free
Servers have established to operate within a client-to-server architecture; the servers are the computer programs that run to execute the requests of other programs which are the clients. Computer servers normally take the dimensions of database servers, the file servers, the mail servers, print and web servers amongst other types.
Preview sample
Health and the NHS Information Strategy Information Technology Term Paper
16 pages (4475 words) , Download 1 , Term Paper
Free
The technological advancement in the contemporary world is changing almost every aspect of the human way of life. In order to achieve the provision of effective and efficient health care services, the NHS in the UK is shifting to information strategies that enable people to have easy access to quality and affordable health care services.
Preview sample
Database Management Systems Information Technology Case Study
12 pages (3210 words) , Download 1 , Case Study
Free
The database management system (DBMS) has the potential of recombining data elements to form various relations that enhance the flexibility of using data (Nichols 2007). The user perceives an RDBMS to be an array of two-dimensional tables manipulated as a single set at a time rather than one record at a time. Manipulating RDBMS necessitates the use of SQL.
Preview sample
Computer-Mediated Clinical Consultations: the Impact of the Computer Information Technology Term Paper
6 pages (1613 words) , Download 1 , Term Paper
Free
Initial costs for installation of the relevant applications remain relatively high but once operation, the system transforms medical practice and its outcomes on patient care. The system lays the ground for the effective and efficient performance of tasks by staff with invaluable support from the computers at a constantly reducing unit cost.
Preview sample
Software-Defined Networking Information Technology Literature review
6 pages (1810 words) , Download 1 , Literature review
Free
Apparently, SDN has brought significant changes and improvements in computer networking, which makes it imperative to understand its unique benefits through a review of literature as well as some of the security issues facing SDN. Furthermore, owing to the security issues that will be identified, it becomes crucial to propose a theoretical security framework.
Preview sample
Perfect Property Information Management System Information Technology Case Study
6 pages (1659 words) , Download 0 , Case Study
Free
The analysis of the company’s performance need also to be performed in detail and realize the practical and working system for the company’s management. In the preliminary task, it is required to Owner’s view chart for the aforementioned business narrative that can to be shown to stakeholders for feedback.
Preview sample
NIKE's ERP Implementation Failure and Lessons Learned Information Technology Case Study
9 pages (2439 words) , Download 4 , Case Study
Free
Today, globalization and increased competition has made organizations seek new ways of structuring their businesses so as to be flexible and reliable. ERP systems bring numerous benefits to the company, including communication, coordination, and organizational efficiency (Frey, Fukuda, and Rock 2011).
Preview sample
SABB Internet Banking and Online Phishing Information Technology Coursework
6 pages (1791 words) , Download 1 , Coursework
Free
A variety of cues can be used to avoid being a victim of phishing. These cues may be found within the headers or content of phishing email messages or within the content of the fraudulent websites. In addition, cues may be provided by browser-based security indicators and by ant-phishing tools (Dhamija, Tygar and Hearst, pp 583).
Preview sample
The Adoption of IC and Technology through the Installation of IS within the Steel Industry Information Technology Report
27 pages (6934 words) , Report
Nobody downloaded yet
As a way of strengthening the ever-increasing competitiveness, there is a need for manufacturing companies to develop new and innovative product systems of information as well as process ideas, establish manufacturing and development networks and even provide new as well as advanced ICT infrastructures that will enable the creation of fast knowledge and information exchange/ dissemination.
Preview sample
How Is Information Made Secure and Why Is This Necessary Information Technology Literature review
7 pages (2142 words) , Download 0 , Literature review
Free
Specialized means of ensuring that data is secure include the use of databases, securing the applications, and aligning the infrastructures so that they give the best results. Most breaches of security of information arise from lack of effective security configuration, inefficient or lack of system administrators, lack of clear policies and positions by organizations on securing their information.
Preview sample
2801 - 2850 results of 10273 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us