StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Mobile Health Applications Information Technology Research Paper
8 pages (2489 words) , Download 1 , Research Paper
Free
The development of mobile health services affects many stakeholders which necessitate their participation. This study explores the issues of mobile health service using secondary data from a scholarly articles and proceeds to conduct a primary research survey in two remote locations in the UK.
Preview sample
Organization Assets Physical Security Information Technology Research Paper
10 pages (3015 words) , Download 1 , Research Paper
Free
Organizations recognize the aspect of security as important in assuring their best interests. Security professionals have established that risks arise from the existing threat as well as the vulnerability of an asset which can result in the destruction or loss of the assets. An asset can be defined as an item of value within the organization.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Meaning of Systems Approach to Physical Security Information Technology Research Paper
9 pages (2770 words) , Download 0 , Research Paper
Free
Information and associated technologies play a major role in the innovations and competitive advantage generation by organizations. Organizations today face a range of security issues, especially in the information technology sector. This exposes them to vulnerabilities that would threaten the existence of the organization.
Preview sample
Physical Data Security, Defense in Depth Theory Information Technology Research Paper
10 pages (3138 words) , Download 0 , Research Paper
Free
The security industry engages in a multi-discipline and diverse knowledge base which involves the management of risk as the fundamental aspect to be mitigated. There is limited study on understanding and drawing the expert security knowledge to be used in a particular region. Physical security is necessary for assets such as people, information, and property.  
Preview sample
Age Restrictions on Social Networks to Avoid Cyber Bullying and Related Child Abuses Information Technology Research Paper
7 pages (2302 words) , Download 0 , Research Paper
Free
A review of the literature concerning cyberbullying and other forms of child abuses was completed. Findings showed that over the last few years, internet usage among children has been rising in steady fashion consequently resulting in cyberbullying. Cyberbullying refers to an online harassment of children through mediums such as, but not limited to, emails, text messages, Facebook, WhatsApp, Instagram among other social network platforms.
Preview sample
The Nonsense of the Internet and How to Stop It Information Technology Lab Report
7 pages (1917 words) , Download 0 , Lab Report
Free
Globalization, Neoliberalism, and internet freedom have played a significant role in ensuring that there has been a shift in media regulations. Advancement of technology and apps such as Facebook has made it easier to pass information. However, it should be noted that the government is still central to media regulations.
Preview sample
Optimization of Defence as an Enabler for Cloud Services and Applications Information Technology Research Paper
14 pages (2771 words) , Download 0 , Research Paper
Free
Google Cloud Platform Marketplace is dominated by a wider range of SaaS brands, which has led to simplified software processes to attract more customers. In this type of cloud computing market, there is more than three hundred SaaS software, thus giving the consumers the liberty to select the best option for their business.
Preview sample
Windows 10 Inspection Tests Information Technology Essay
8 pages (1824 words) , Download 0 , Essay
Free
There is rapid development in the personal computing and technology sector accompanied by advancements in user interfaces that seek to improve user experiences. These tools provide a form of interaction between the user and the personal computer or mobile device, considering that machines and humans use different languages.
Preview sample
The Truth about Internet Search Information Technology Essay
6 pages (1539 words) , Download 0 , Essay
Free
It is disconcerting when one gets online to get substantial information only to be harassed by advertisement pop-ups that are even irrelevant to the needs of the internet user. Sometimes, I get offended because some content that comes into view on my Facebook page does not align with my ethics and beliefs.
Preview sample
Internet of Things as an Emerging Technology Information Technology Essay
7 pages (1817 words) , Download 1 , Essay
Free
Internet of things also known as IoT is an emerging trend of technology today. It’s high in use today as its applications are found from schools, hospitals, governments' houses, and cars. Its applications are seemingly limitless and its demand is high. However, like every good thing in technology it has, its own cons.
Preview sample
How Apple Changed our Lives Information Technology Essay
7 pages (1778 words) , Download 0 , Essay
Free
Founded in 1976 by Steve Jobs and Steve Wozniak, the company introduced the Apple II microcomputer way back in 1977. It was the first company developed to use the graphical user interface (GUI) in the product that it launched in 1983, the Lisa. However, its phenomenal success came with the launch of Macintosh (popularly known as Mac) in 1984.
Preview sample
Information Technology as an Integrative Mechanism in an Organization Information Technology Research Paper
17 pages (4336 words) , Download 0 , Research Paper
Free
The accessibility of digital technology impacts the structure and the management of an organization in a significant way, especially in the value. Different approaches can be used for the infusion of technology provides an essential field for evaluating how the amount of information technology impacts organizational structure.
Preview sample
Application reation Information Technology Essay
6 pages (1558 words) , Download 0 , Essay
Free
Analytics: it is key in that it will help the company come up with better analytics and storage and features that will be used for data lakes, big data analytics and internet of things. Through this, the company will be able to analyses the progress of the applications and how best the users are using it.
Preview sample
Network Attack and Defense Information Technology Research Paper
10 pages (2288 words) , Download 0 , Research Paper
Free
The evolution of technology and the internet has led to the emergence of interdependence in computer systems. The complexity in the systems has led to exploitation of vulnerabilities by the hackers. The recent upsurge in cybersecurity crime statistics has alert the security engineering field to investigate the matter.
Preview sample
Android Malware Detection and Prevention Techniques Information Technology Literature review
28 pages (6899 words) , Literature review
Nobody downloaded yet
This paper will follow the systematic review process carefully, with results from over 100 research papers in different conferences and journals earmarked for analysis. The taxonomy will be constructed by conducting a “survey of various surveys” on associated taxonomies as well as performing an iterative content analysis. 
Preview sample
Violence in Video Games Information Technology Essay
7 pages (1910 words) , Download 0 , Essay
Free
This fast-growing habit has seen the profits in the video gaming sector rise to almost $21.53 billion. Recent studies in video gaming have also shown that more than 50% of video games contain an element of violence and due to this fact, violent video games are not allowed in learning institutions because they facilitate the increase in violence-related cases.
Preview sample
Android Malware Detection Using Machine Learning or Other Techniques Information Technology Research Paper
14 pages (2515 words) , Download 1 , Research Paper
Free
Android malware has been growing in scale and complexity, making the traditional methods of scanning and stopping malware irrelevant in the anti-malware war. There are few new techniques to mitigate the threats posed by malware. A machine learning approach is prescribed as a sustainable solution to mitigating these problems.
Preview sample
Rapid Changes and Developments in the Field of Information Technology Information Technology Essay
6 pages (1600 words) , Download 0 , Essay
Free
Terrorism has become an issue of concern globally due to the technological dynamics that allow faster and efficient communications globally. Technology provides numerous platforms where terrorists can use the web to access information about viable targets that meet their maximum casualties’ mission criteria.
Preview sample
The Huge Development of Digital Technologies Information Technology Essay
7 pages (1796 words) , Download 0 , Essay
Free
It is similar to the magazine app but customized to the feature of the Snapchat showing trending live stories on fashion and beauty and animated photography and texts. The strategy behind this app is to enable Vogue Magazine to reach more audiences. This is since the number of people using the Snapchat app daily has hit over 100 million individuals.
Preview sample
Cyberbullying Using Information Technology Information Technology Essay
7 pages (1815 words) , Download 0 , Essay
Free
In fact, perpetrators may not be cognizant of the harm they inflict on the victim since they do not have the opportunity to see the victim's reaction. The cyberbullying instances narrated by Ellis and Kestrel McNeill demonstrate that the physical distance between the cyberbullies and the victims was a key motivating factor for the perpetrators.
Preview sample
Digital Forensics in Criminal Justice Information Technology Essay
8 pages (2132 words) , Download 0 , Essay
Free
The members of the team that worked on “Project X” should be interviewed to find out whether the disgruntled employee showed any interest in their work that could have at the time seemed normal, but in retrospect, could be considered to be suspicious. The people who worked on the source code project could also be interviewed.
Preview sample
Internet Service as a Major Tool for Information Access Information Technology Essay
6 pages (1568 words) , Download 0 , Essay
Free
The different email service providers such as Yahoo, Gmail, and Hotmail have taken stringent measures to promote email security. They send an email to notify you when your email is being accessed from a different IP address. That explains why you always get warnings and alerts in your inbox from the service providers.
Preview sample
Opportunities and Challenges of Internet of Things Information Technology Literature review
11 pages (2841 words) , Download 1 , Literature review
Free
It focuses on the analysis of views of various authors regarding the Internet of Things, paying specific interest to the benefits and challenges of IoT to the global market. It examines the factors favoring the emergence and expansion of this technology, the documented uses, distribution, and projected growth of IoT, and how it will impact the lives of the people.
Preview sample
Impact of Technology Development in Financial Reporting University Information Technology Literature review
7 pages (1790 words) , Download 0 , Literature review
Free
It also increases the use of financial management. Businesses, especially Small Medium Enterprise’s flourish well when their business process are recorded as well as reported appropriately. Usually, ICT is considered as one of the most consistent and reliable means of giving a stable platform for an efficient system of internal control over financial reporting.
Preview sample
The Student's Evaluation of eBooks Information Technology Research Paper
10 pages (2890 words) , Download 0 , Research Paper
Free
This will be the most significant information to the designers in having a common policy in terms of agreed procedures, regulations, standards and measures to evaluate eBook effectiveness to the user. This has not happened, and only a few researchers are attempting to set up the evaluation tools to gather evidence of the good practice.
Preview sample
Survey of Privacy-Preserving Technologies in Electronic Health Record Management Information Technology Research Paper
24 pages (5960 words) , Research Paper
Nobody downloaded yet
Various aspects and data mining techniques reveal that the desired outcomes would depend on the tradeoffs between the preservation of private data sharing and data utility in a specific database. The anonymization techniques explored are among the vital discoveries in this paper as they inculcate the dynamism of the modern world via the use of social media platforms.
Preview sample
Website Allempires.com and Focus on Medieval Europe Information Technology Coursework
11 pages (2946 words) , Download 0 , Coursework
Free
The size of the home page: 529.20 kilobytes. The sizes of other linked pages vary from around 50 kilobytes to 900 kilobytes depending upon the text and image content. All Empires (AE) is a community site for world history and a leading forum on the subject. It was founded in 2001 and is run by volunteers and persons who pursue history as their hobby. 
Preview sample
Adverse Consequences of IT Innovations Information Technology Essay
8 pages (2191 words) , Download 0 , Essay
Free
The world today is driven forward by technology and the social effects of technology have become the biggest debate. There are lots of people running behind the latest innovations of technology without even understanding what it is for. Electronic or computer automation has come in every sphere of life and the idea of functioning without a computer has been unimaginable and the process has been speeded up by the arrival of computers.
Preview sample
Do All Inventions Equate To Progress Information Technology Essay
7 pages (2016 words) , Download 0 , Essay
Free
The essay will discuss one of the major inventions which have completely changed life. The invention of the Internet is one of the most impactful inventions in the history of mankind. The Internet has become an essential part of our life and it has become the best tool for being connected with the world.  
Preview sample
Dangerous Effects of IT Innovation Information Technology Essay
10 pages (2753 words) , Download 0 , Essay
Free
The problem with inventions and innovations lies solely with the user. The good effect of the internet lies with the user. The Internet has opened a Pandora of bad effects along with good effects. The harm lies with the people using it rather than the technology.
Preview sample
Global Positioning System Information Technology Coursework
8 pages (2163 words) , Download 0 , Coursework
Free
There are still a number of issues associated with GPS and these include the various ways in which the system can be jammed, liability issues, responsibility for operating the system, funding for the base stations, how precise the positioning data should be, and what type of users should be authorized access to the most precise signals.   
Preview sample
Internet and Digital Crimes Information Technology Essay
8 pages (2183 words) , Download 0 , Essay
Free
The general developments in technology have over the years build up new chances for criminal activities hence driving the process of the development of the latest technology. The escalating development of the vast new technologies opens the door for expanding alternatives for the inventive mind.
Preview sample
Crowd-Sourcing Issues Information Technology Essay
7 pages (1979 words) , Download 0 , Essay
Free
The origin of crowd-sourcing was during the initiation of web 2.0, and so crowdsourcing was coined by a user in an internet forum. Crowdsourcing shares its ridding principles with web-based social media, where a user gets feedback from other users on a certain topic of their own choice. It uses the philosophy of “two heads are better than one".
Preview sample
The Development of the Internet and the Services like Twitter and Facebook Information Technology Coursework
13 pages (3693 words) , Download 0 , Coursework
Free
The user’s public information can disclose much about the organizations in which they work. This makes it possible for an attacker to create a whole personality apparently working in an organization and use the chance to gain access to private information within the organization (Herrero, 2010, p. 139).
Preview sample
YouTube Censorship in Turkey Information Technology Essay
11 pages (3009 words) , Download 0 , Essay
Free
The internet is a place where repressed societies can revive and develop and this is one of the major fears that authoritarian states harbor (Reporters without borders 2010). In the internet, economic and political issues have become intertwined and the need to protect information has become very important.
Preview sample
Protecting WI-FI Insecure Channels Information Technology Coursework
11 pages (3347 words) , Download 0 , Coursework
Free
Misconfigured APs: When separate APs are independently managed, configuration errors appear as a significant security danger. Nowadays, the majority of corporate WLANs are centrally handled, by means of synchronized updates as well as periodic reviews to reduce TCO, develop dependability, and as a result minimize risk.
Preview sample
The Concept of Terrorism That Takes on a Whole New Dimension with Regard to the Sophistication Information Technology Coursework
11 pages (3067 words) , Download 0 , Coursework
Free
The Government on its part is striving hard to wipe out terrorism but the process is slow and long-drawn. The governments of countries like the USA and the UK have made a lot of amendments to their existing legislation in addition to bringing out many antiterrorism activities and policies to curb the escalating terrorism.
Preview sample
Information and Communication Technology Policy and Strategy Information Technology Coursework
20 pages (5660 words) , Download 0 , Coursework
Free
Management of virtual communities is not that easy a task, It requires people that are knowledgeable and skilled in the field. This is because of the impact that their decisions have on the general running of the community. A decision by the virtual manager may cause the whole system to come to a halt due to stagnation and withdrawal of members.
Preview sample
Systems Development of Waterfall Approach Information Technology Coursework
9 pages (2629 words) , Download 0 , Coursework
Free
For the sake of IS system procurement, we need to manage and handle a number of aspects. From my personal experience, one of the initial aspects we need to take care of is our already available technology. We need to be careful regarding the application of a new technology-based system with more and compatibility with our previously available technology.
Preview sample
The Electronic Culture Information Technology Essay
8 pages (2215 words) , Download 0 , Essay
Free
This latest development has been confronted by extensive amplification and accelerated growth which has been spearheaded by the heightened awareness and popularity of multi-user software, networked computers as well as the internet which have been subjected to the elevated investigation (Deuze, 2006, p. 63).
Preview sample
The Impact of Social Media on Culture Information Technology Essay
7 pages (2124 words) , Download 0 , Essay
Free
The article highlights the use of different concepts which has their relevance and usage. The article in a similar manner shows the manner in which technology and the growth of social networking sites can be used for reducing the cultural gaps and ensuring that the required platform is developed for better interaction.
Preview sample
Performance of Information Technology Service Management in Australia Information Technology Essay
8 pages (2293 words) , Download 0 , Essay
Free
More organizations like the Dubai Aluminum Company Limited (DUBAL) are also working towards achieving ISO/IEC 20000-1:2005 I.T Service Management certification while incorporating ITSM. The organization has implemented ITIL which is an international operating system to issue instructions for effective IT management.
Preview sample
Development of Social Networks Information Technology Essay
7 pages (2356 words) , Download 0 , Essay
Free
The social network is arguably developing as the leading platform of getting news especially on the trending fashion and brands that rule the day. Most marketers are still struggling to find the best ways of promoting and ensuring sustainable development of their brands on social networking platforms.
Preview sample
Technological Inventions in Enhancing the Quality of Life Humanity Information Technology Essay
6 pages (2436 words) , Download 0 , Essay
Free
Elgin (2006) observes that the internet has necessitated the growth of an online community that allows people to connect and share information on various issues through social sites and micro-blogging sites. This offers individuals to build social contacts, thereby expanding the social network of individuals (See Appendix 4).
Preview sample
Effects of Internet on Politics and Social Life Information Technology Essay
6 pages (1746 words) , Download 0 , Essay
Free
Prior to the diversifications of the internet, people were compelled by circumstances to communicate but its spread has contributed to mute relationships. For example, it is quite possible to board a train or a plane but you will not communicate with the person seated next. This is only because that you may have a PC or tablet that you are using to surf the internet.
Preview sample
Communication Protocols Information Technology Essay
12 pages (3221 words) , Download 0 , Essay
Free
The transmission system is valuable in carrying the data while the receiver contributes by converting the received signals into data. In the final stage, the destination is critical in taking the incoming data. The purpose of this research is to focus on two critical communication protocols with the intention of understanding their effectiveness and efficiency in handling diverse responsibilities and obligations.
Preview sample
In What Way Has the Internet Changed China Information Technology Essay
8 pages (2230 words) , Download 0 , Essay
Free
During a few decades until present, with the development of technology and science in China, it has undergone a dramatic change in culture structure and people’s lifestyle. It is acknowledged that political strategy will affect the improvement of domestic economy, and the overall development of one’s country is influenced by the economy. However, technology has gradually played an essential role in the world stage.
Preview sample
US Laws Cannot Prevent Cyber-Bullying Information Technology Essay
6 pages (1796 words) , Download 0 , Essay
Free
Cyberbullying can be described as defaming, insulting, threatening, or deliberately harassing other individuals via contemporary communication techniques. Such harassment is, in general, for protracted periods. Cyberbullying transpires on the Internet or over the telephone. In the majority of the instances, the offender, who is termed the bully, acts anonymously, and the victim fails to realize the source of such attacks.
Preview sample
Commercial OLAP Tools Functions And Limitation Information Technology Essay
6 pages (1730 words) , Download 0 , Essay
Free
To make any management decision, you must have the information necessary for this, usually quantitative. To do this, it is necessary to collect this data from all information systems of the enterprise, bring it to a common format and only then analyze it. For this, data warehouses are created.
Preview sample
Professional IT Culture Information Technology Essay
6 pages (1824 words) , Download 0 , Essay
Free
Leadership is among the most important aspects that separate success from unsuccessful businesses. Although most organizations concentrate on the importance of operational success, it is impossible to realize better and efficient results through pioneering such activities under the supervision of leaders.
Preview sample
1051 - 1100 results of 10276 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us