Biometric Applications for Information Security
12th Dec 2019
Introduction: Chapter 1
1 .0 Introduction
In recent times, the use of computer towards accessing information has increased and this has made our lives simplified in different ways, whereby easing people around the ...
Tag: Information Technology
Browse all dissertation content tagged as "Information Technology" including dissertation examples, dissertation proposals, topic and title ideas, individual dissertation chapter examples, and help guides for both undergraduate and masters students.
Articles
Feasibility of Online Shopping in UK Primark
12th Dec 2019
Introduction: Abstract
The purpose of this research is to study the online shopping in UK clothing retail market, and how it will be helpful to the researcher to get the idea about the feasibility of Primark online...
Review of IT Project Management Practices in the UAE
12th Dec 2019
Introduction: A Study on the UAE IT Industry
ABSTRACT
“I keep six honest serving men, (They taught me all I know);
Their names are What and Why and When And How and Where and Who”.
-Rudyard Kipling
This...
Smart Medical Diagnosis for Common Diseases
12th Dec 2019
Introduction:
1. Introduction
1.1. Present Scenario
Internet is the latest and the most powerful innovation of mankind. In present era of internet we used computer technology to solve our many problems. Today in e...
Importance of Smartphone Security in Business Environment
12th Dec 2019
Introduction:
1.0 Introduction
The purpose of this document is to expose a business problem from a technological viewpoint. The subject of the business problem I have selected is smartphone security. This subject ...
Sniffing Attacks Prevention and Detection Techniques
12th Dec 2019
Introduction: Security in Wired/Wireless Networks: Sniffing Attacks Prevention and Detection Techniques in Wired and Wireless Local Area Networks (LAN)
ABSTRACT
During the past era, Information Technology made a r...
Causes of Software Project Failure
12th Dec 2019
Introduction: All successful software projects start with the premise that the end result will be successful. The owner of the project initial goal is to deliver on time and on budget. Although these are the primar...
Factors Influencing the Technical Defensive Measures on Spyware
12th Dec 2019
Introduction: Computers and mobile devices are widely used; they are used to access the internet, while everyone wants to acquire the internet in today's world....
Internet Threats and Security for Protection
12th Dec 2019
Introduction: Introduction
Technology is still under development in Saudi Arabia and has not reached the advance level as its reached in UK and USA. Therefore Internet Security is still a main as well as a major is...
The Emergence of IT Governance in Greece
12th Dec 2019
Introduction: Introduction
The emergence of IT Governance
The cases of Enron, Worldcom and other corporate and financial scandals in the early years of the century have raised the significance of corporate governan...
User Perceptions of Web 2.0
12th Dec 2019
Introduction: Abstract
With the advent of the internet and the evolution of e-business, the widely held perception is that we operate in a know ledged-based economy. Many organisations have realised that changing a...
Impact of Spyware on Computers and Mobile Devices
12th Dec 2019
Introduction: 1.0 INTRODUCTION
1.1 PROJECT OUTLINE
The title of the project chosen by the author is “Study on the impact of spyware on computers and mobile devices” which simply means that the author analyzes t...
Succession Planning for SMEs in IT Industry
12th Dec 2019
Introduction: Purpose
This thesis is based on an investigation into succession planning in small to medium-size organisations within the Information Technology (IT) industry.
The main area of research is centred on...
Analysis of Information Technology Role for Global Retailer
12th Dec 2019
Introduction:
PART 1: INTRODUCTION
1.1 Purpose of report:
This report has been requested by Mr Frank Hedge, the CEO of Myer Department Stores- Australia. The reports purpose is to investigate and analyse the strat...
Analysis of Information Technology in Public Sector
12th Dec 2019
Introduction: Chapter 1 Introduction
Countries and governments in the world try to develop and extend their business and economies throughout built relation and agreements among them for the exchange and transactio...
Internet Enabled Mobile Phones: Usage Patterns
12th Dec 2019
Introduction: Leapfrogging into the future
Research on usage pattern of internet enabled mobile phones in rural India and its implications as an agent of rural empowerment
Executive Summary
The Indian telecom secto...
Internet Protocol Version 4 Analysis
12th Dec 2019
Introduction: Chapter 2: Literature Review
2.1 Introduction
Multimedia streaming over internet is getting its revolutionary in the communication, entertainment and interactive game industries. The web now becomes a...
Internet Protocol Version 6 (IPv6) Analysis
12th Dec 2019
Introduction: Overview
Internet Protocol version 6 (IPv6) is the next generation of protocol defined by InternetEngineering Task force (IETF) to replace the exiting IPv4 protocol. At present, the majority of Intern...
Analysis of IT Requirements for Pharmaceutical Business
12th Dec 2019
Introduction: Project Title
Analyzing the IT requirement and developing software for a small pharmaceutical wholesaler working in India.
Abstract
The aim of this project is to enhance the effectiveness of pharmaceu...
Integration of WLANS, PAN, LAN and GSM in Hmanets
12th Dec 2019
Introduction: INTERWORKING ISSUES IN INTEGRATION OF WLANS, PAN, LAN AND GSM IN HMANETS
KEY TO SYMBOLS OR ABBREVIATIONS
AP Access Points
AMASS Architecture for Mobile Ad-hoc Systems and Services
AODV Ad Hoc on Deman...
Mobile Game-Based Learning (mGBL) Development Methodology
12th Dec 2019
Introduction: 1.0 Introduction
There is increasing interest in the use of ICT and educational technology to promote learning formally or informally. Such technologies are educational software in CD, web-based or on...
Benefits of Network Management Tools
12th Dec 2019
Introduction: 1. Introduction
These are the various network management tools used by network manager to verify network connection, monitor network packets, analyse captured packets, troubleshoot network connectivel...
Network System for Secure Communication
12th Dec 2019
Introduction: Methodology:
The main methodology involved behind this research project is to provide the importance of such technology from professionals and well referred articles. Some of the general interviews wi...
Implementation of New Computer Network
12th Dec 2019
Introduction: Here we are going to implement an new computer network for this company that 25 employees have been working in.
Suppose you want to build a computer network, one that has potential to grow to global p...
Development Using XNA Game Studio
12th Dec 2019
Introduction: Chapter 1: Preface
Over the past few years where two dimensional and three dimensional graphic has been utilized consecutively for developing computer games and console games. Two dimensional graphic ...