|
Select
any paper listed below and receive it TODAY
for only $
/page +FREE bibliography!!!
|
Papers On Computers & The Internet
Page 191 of 273
|
|
Reviewing Research into SME’s Low Take-up of E-Commerce
[ send me this paper ]
This 6 page paper reviews the research undertaken in Australia in the report “Taking the Plunge 2000; Sink or Swim”. The paper looked at the level of participation in e-commerce by small to medium sized enterprises. The desk research and the primary research is critiqued with improvements suggested. The bibliography cites 1 source.
Filename: TEsmeEcom.rtf
Reviews of Linear Programming and Queueing Application
Articles
[ send me this paper ]
A 7 page paper analyzing two journal articles for the presence and treatment
of critical points. The first article discusses a linear programming article, "Stripping
Coupons with Linear Programming" (Allen, Thomas and Zheng, 2000); the second is a
report on a queueing application, "Optimization of discrete event systems via simultaneous
perturbation stochastic approximation" (Fu and Hill, 1997). The same analysis steps are
applied to each article. Bibliography lists 2 sources.
Filename: KS-ITreview.wps
RFID at Target
[ send me this paper ]
A 7 page paper discussing radio frequency identification tags and their potential use for tracking inventory at the item level. This is a technology that is not yet available for retailers, though some – most notably Wal-Mart – are investing in developing the technology for use. Consumer and privacy groups complain that retailers can continue to track RFID-tagged items after they leave the store; the paper suggests that Target adopt the technology and provide self-service stations so that customers bothered by the tags can remove or neutralize them before leaving the store, and the action does not increase Target's labor costs. Bibliography lists 6 sources.
Filename: KSitTargetRFID.rtf
RFID in the Supply Chain
[ send me this paper ]
A 10 page paper discussing Radio Frequency Identification (RFID) in terms of Wal-Mart's supply chain. It is not yet cost effective to use RFID tags at the item level, but that is Wal-Mart's goal, one shared by other retailers. Though it enables a degree of automation that has enabled organizations such as Wal-Mart to save on operating costs by being able to operate more efficiently, the bar code still requires a line of sight in order to be read. It requires physical handling by a human, which always increases costs. RFID tags increasingly are linked to network-resident information rather than carrying their own information. This is seen as bringing down the cost within two or three years so that it will be cost effective to use RFID at the item level. Bibliography lists 10 sources.
Filename: KSsupChnRFID.rtf
Risk Assessment and Process
[ send me this paper ]
An 11 page paper defining risk and risk assessment, and exploring some of the tools emerging to assist with risk assessment and risk management. Varying approaches appear to be emerging in different industries. The paper discusses risk associated with IT projects, but also includes mention of the banking, petroleum, healthcare and insurance industries. Bibliography lists 10 sources.
Filename: KSriskAsProcToo.rtf
Risk Assessment Of Information Systems
[ send me this paper ]
10 pages in length. The extent to which information systems have virtually transformed the way contemporary society conducts every level of business is both grand and far-reaching; that those same information systems – which single-handedly support the daily operations of entire industries – are vulnerable to security breaches speaks to the tremendous need for risk assessment in order to protect against harmful infiltration. When the student conducts this risk assessment on his/her chosen business or organization, particular aspects to evaluate include firewalls, backups, security providers, email security and electronic funds transfers. Bibliography lists 11 sources.
Filename: TLCRiskAsse.rtf
Risk Management Exercise: Personal Information Assets at Home
[ send me this paper ]
An 11 page paper discussing the risk to which personal information is subjected at home. Home is the primary repository for personal information for most people. The paper provides an inventory of the types of personal information held in a single home that also houses a business and a graduate student, followed by assessment of the risks to that information and a security plan intended to control those risks. The plan follows that of the “Risk Management Guide for Information Technology Systems,” Special Publication 800-30 of the National Institutes of Standards and Technology (NISTA), identifying information assets; assigning a loss value to each; and identifying vulnerabilities and the likelihood of each to arrive at a risk-rating factor for each item. The paper concludes with a security plan for those items at greatest risk. Bibliography lists 2 sources.
Filename: KSriskAssesHom.rtf
Rocky Hill Laboratories
[ send me this paper ]
An 8 page analysis of a case illustrating lack of planning and lack of knowledge of the nature of IT projects. A director launched a project without realizing the need for an implementation plan and he now needs to know how to proceed to minimize risks while gaining a functional system within the original budget. Bibliography lists 3 sources.
Filename: KSmgmtRockHil.rtf
Didn't find what you're
looking for yet? Try a keyword search above or
have a NEW research paper customized
on any topic you like!!!
-or-
SELECT ONE OF THE TERM PAPER
ASSISTANCE OPTIONS BELOW:
Samples
| Testimonials
| Best
Term Paper Help Links
MORE TERM PAPER HELP
SITES:
Shakespeare
- The Best Papers
| Best
Term
Paper Tutors
| Best
Paper
Hunting
|
Best
Papers
24 7
|
| More
Papers
|
No Cheaters Papers
|
Buy Papers
|
Term
Paper HQ
|
Term Papers - Help NOW!
|
Term
Paper Geeks
| Thesis
Statements
|
Paper Writers
|
Papers 1-2-3
|
Online-Papers
|
Paper Download
|
Pick-a-Paper
|
Web-Based-Papers
|
Writing Papers
|
Sharing Papers
|
Easy Papers
| Best
Term Paper Advice
|
Choose a Paper
|
Best Advanced Papers
|
Ace Papers
|
Plato Papers
|
Aristotle Papers
|
Philosophy Papers
|
Criminal Justice Papers
|
Best Political
Science Papers
| Ecology
Papers |
Best History Papers
| Best Health Papers
|