396 Search Results for Information Technology Annotated Bibliography Information Technology
Information Technology -- Annotated Bibliography
Information Technology
Baker, N. (2011). The Borderless Enterprise. Internal Auditor, August, 28 -- 33.
This article endeavors to explain the various trends in digital media. The author contends the Continue Reading...
Information Technology Annotated Bibliography
Annotated Bibliography
Cloud Computing and Insider Threats
Bhadauria, R., Chaki, R., Chaki, N., & Sanyal, S. (2011) A Survey on Security Issues in Cloud Computing. CoRR, abs/1109.5388, 1 -- 15.
Th Continue Reading...
Performance Management Strategies Used by Organizations in the Private and Public Sectors
Having already established the importance of performance management to an organization's overall strategy, it makes sense to use the final project to gain ins Continue Reading...
Management: Annotated Bibliography
Anyim, F.C. (2012). The Imperative of Integrating Corporate Business Plan with Manpower Planning. International Journal of Business and Management, 7(8).
This article talks about how traditionally, manpower planni Continue Reading...
Fan Fiction Annotated Bibliography
Baron, N. Always On: Language in an Online and Mobile World. New York: Oxford University Press, 2008. Print.
In our viritual community, people still need to have a way of communicating their words and messages. Th Continue Reading...
The demonstration of the fear and the potential losses that the industry demonstrate that such fears went largely unrealized and if the industry continues to instead utilize technology and also build specialized systems to offer electronic formats t Continue Reading...
IT Ethics -- Annotated Bibliography
Bowie, Norman E. (2005). Digital Rights and Wrongs: Intellectual Property in the Information
Age. Business and Society Review, 110(1), 77-96.
Norman Bowie takes great pains in his peer-reviewed article to point Continue Reading...
"The Revolution Will Be Shared: Social Media and Innovation."
Research Technology Management, Vol. 54, No. 1; (2011): 64-
66.
Research Technology Management is a professional journal intended for consumption by managers of research, development, Continue Reading...
Terrorism Annotated Bibliography
Gardner, K.L. (2007). Fighting terrorism the FATF way. Global Governance: a Review of Multilateralism and International Organizations. (13:3). 325-45. FATF, or Financial Task Force, is considered a successful organiz Continue Reading...
Zaslavsky is the leader of the Semantic Data Management Science Area (SMSA). He has published more than 300 publications on science and technology. Perera has vast experience in computing and technology as he is a member of the Commonwealth Scientif Continue Reading...
Authors Note: Rosenbaum is technology and retail analysts. She writes articles for the New York Times and Forbes.
Saikali, A. (2013, December 30). The Target Data Breach Lawsuits: Why every Company Should Care. Data Security Law Journal. Retrieved Continue Reading...
Standards
Annotated Bibliography
Loveland, T.R. (2005) Writing standards-based rubrics for technology education classrooms, Technology Teacher, Vol. 65, Issue 2
This article can be used in the proposed writing study because it presents informatio Continue Reading...
Management
Annotated Bibliography
Ahronovitz, Miha, Amrhein, Dustin, Anderson, Patrick, & de Andrade, Andrew. (2010).
Cloud computing use cases white paper. Cloud Computing Use Case Discussion Group. Web. Retrieved February 3, 2014 from http: Continue Reading...
In the work they review several burgeoning adult learning sites that can be accessed via the WWW.andhow they as a group and individually are changing the outlook of adult education, on a basic and continuing education level. Learners are seeking tec Continue Reading...
These problems are compounded for African-Americans by cultural insensitivity in health materials." (Birru and Steinman, 2004)
V. LITERACY TODAY
8) Mann, John G. (1989) Literacy Today: A Realtime Technology Transformation. Office of Educational Re Continue Reading...
It provides the starling figure that private industry spends $150 billion dollars fighting the war on terror.
More money has been made available to entrepreneurs to address computer security demands, and the government has found itself in a kind of Continue Reading...
The patients selected had to meet certain criteria. They had to have access to a telephone a home or at work, they had to have the ability to keep an Oxford knee score sheet and relay the information coherently over the phone, and they had to speak Continue Reading...
Bellinger, a.M., Mongillo, M., & Marks, a.R. (2008). Stressed out: the skeletal muscle
Ryanodine receptor as a target of stress. Journal of Clinical Investigations. 118(2):
In this report prior the researchers addressed overall present unders Continue Reading...
The article also focuses on the differences in decision making of senior accountants based on the type of education they received vs. The amount of practical experience they had. The article focuses on these issues as it pertained to the value of ac Continue Reading...
Use of video technology allows the viewer to feel what it is like to experience this sensation, and also contains interesting anthropology of the culture of devotees, who are often societal outsiders, whose existences revolve around their cars and t Continue Reading...
US General Accounting Office & National State Auditors Association. "Management Planning Guide for Information Systems Security Auditing." Issued 10 December 2011. Retrieved from http://www.gao.gov/special.pubs/managementpln.pdf
This source is Continue Reading...
Mass Communication
Bryant, J. (2008). Media Effects. New York: Routledge Press.
This book is able to aptly examine some of the more pervasive impacts of mass media, while discussing the bulk of the effects arena, offering up more focused commentar Continue Reading...
U.S. Education
James W. Guthrie, Paul T. Hill, Lawrence C. Pierce. (1997) Reinventing Public Education: How Contracting Can Transform America's Schools Illinois: The University of Chicago Press.
This book presents a creative approach to the current Continue Reading...
Technology- M-Commerce
Research Plan: Mobile Commerce (m-Commerce)
Outline of Research Plan
The introduction of mobile commerce (or m-Commerce) demonstrates the invasiveness and interactivity of technologies today and the extension of the 'virtual Continue Reading...
According to the Technology/Education Curriculum Guide, published by the New Hampshire Department of Education in 2008, technology "is an activity that involves the generation of knowledge and processes to develop systems that solve problems and ex Continue Reading...
Technology, Transportation, and Society - Then, Now and the Near Future
Technology, transportation and society are three areas that are interlinked. Technology determines what transportation will exist. The transportation that exists determines how Continue Reading...
This is unfortunate, as there has never been a more critical time for innovation, not litigation especially in an industry that can elevate the national and global economy if opened up for greater freedom from lawsuits (Vance, 2011). There are many Continue Reading...
Software and Hardware Problems
Introduction & Working Thesis Statement
Software is a pool of information that directs the digital computers of what to do and how to proceed. Software consists of numerous computer programs or appropriate data pe Continue Reading...
Daley, J. (2018, January/February). Where the Ice Age Caribou Ranged: Searching for Prehistoric Hunting Grounds in an Unlikely Place. Archeology, 34-37.The author of this article, Jason Daley, recalls an amazing attempt by John OShea, a University of Continue Reading...
Compendium to Research in Cardiology and Telemetry
Cotiga, D., et al. (2007). Acute Conversion of Persistent Atrial Fibrillation During Dofetilide Initiation. Pacing & Clinical Electrophysiology, 30(12), 1527-1530. doi:10.1111/j.1540-8159.2007.0 Continue Reading...
Technology in Today's World
A recent car commercial featured a twenty-something woman who expressed pity that her parents had only nineteen Facebook friends, while she herself had several hundred. The humor in the commercial lies in its irony. The y Continue Reading...
Annotated bibliography: Management and Accounting Challenges facing Transformational Leaders: Service and Technology
Carreiro, H., & Oliveira, T. (2019). Impact of transformational leadership on the diffusion of innovation in firms: Application to mo Continue Reading...
Supply Chain Ann
Supply Chain Management Annotated Bibliography
Chopra, S., & Meindl, P. (2010). Supply chain management: Strategy, planning and operation (4th ed.).Upper Saddle River, NJ: Prentice Hall
The text by Chopra & Meindl (2010) i Continue Reading...
Hunt, G.M. (2003). Outcome in people with open spina bifida at age 35: Prospective community-based cohort study. BMJ: British Medical Journal, 326(7403), 1365-1366.
doi: 10.1136/bmj.326.7403.1365
A survey of surviving adults with spina bifida mye Continue Reading...
These studies show the importance of confronting feared stimuli for extinguishing anxiety. However, at the same time, other research has found that the cognitive methodology has had equal results to the ERP in OCD treatment. Hackman and McLean repor Continue Reading...
Nursing Informatics / Annotated Bibliography & Brief Critique
Harris, R., Bennett, J., and Ross. F. (2013). Leadership and innovation in nursing seen through a historical lens. Journal of Advanced Nursing, 70(7. 1629-1638.
Aim of the Article an Continue Reading...
Nursing According to the Systems and Diffusion of Innovations Theories
The internet and the distribution of electronic health records have changed the way the we receive and use health information but as health professionals and as patients. Particu Continue Reading...