Evaluation of E-Learning Program
12th Dec 2019
Introduction: Chapter one
Introduction
Nowadays, higher education is experiencing big challenges driven by many emerging trends, among which is the introduction of the means of online learning. Accordingly, many un...
Tag: Information Technology
Browse all dissertation content tagged as "Information Technology" including dissertation examples, dissertation proposals, topic and title ideas, individual dissertation chapter examples, and help guides for both undergraduate and masters students.
Articles
Analysis of Energy Saving Websites
12th Dec 2019
Introduction: In this Web assignment of session I have to complete six tasks. Each task has different functionality. In the task-1 of this assignment I have done some web base research on some energy saving sites. ...
Effects of Enterprise Resource Planning (ERP)
12th Dec 2019
Introduction: Abstract
Enterprise resource planning (ERP) systems are the most ambitious, sophisticated use of information technology (IT) by businesses to date. Managers must compare the massive investments of res...
Internet Protocol (VoIP) Technology
12th Dec 2019
Introduction: Abstract
Voice over Internet Protocol (VoIP) technology has come of age and is quickly gaining momentum on Broadband networks. VoIP packetizes phone calls through the same routes used by network and I...
Analysis of Honeynets and Honeypots for Security
12th Dec 2019
Introduction: Chapter 1 Introduction
Honeynet is a kind of a network security tool, most of the network security tools we have are passive in nature for example Firewalls and IDS. They have the dynamic database of ...
Facial Recognition Technology for Identification
12th Dec 2019
Introduction: Abstract
Facial recognition is a crucial factor of everyday identification processes: human beings recognize and evaluate each other by means of the face. Whenever driving licences, identity and membe...
Impact of IT on Bank Performance
12th Dec 2019
Introduction:
IMPACT OF INTERNET TECHNOLOGY ON BANK’S PERFORMANCE AND CUSTOMER’S SATISFACTION
ABSTRACT
Internet technology is very popular and has many benefits for the users; however it does has some ...
Impact of Information Technology on Human Resources
12th Dec 2019
Introduction: CHAPTER 1
INTRODUCTION
BACKGROUND OF THE TOPIC
Technology has affected every aspect of human life. Every field of business has been affected by it. It has changed the ways of living of human ,the way ...
Security for Insider Attacks in Mobile Ad Hoc Networks
12th Dec 2019
Introduction: Abstract
Mobile ad hoc networks are collection of wireless mobile nodes forming a temporary network without the aid of any established infrastructure. Security issues are more paramount in such networ...
Technology for Network Security
12th Dec 2019
Introduction: 2.0 CHAPTER TWO
2.1 INTRODUCTION
The ever increasing need for information technology as a result of globalisation has brought about the need for an application of a better network security system.
It ...
Card Security For Republic Bank Customers
12th Dec 2019
Introduction: There is no doubt that most organisations today are becoming essentially dependant on the use of credit cards, arguably its most strategic asset, is to support existing business operations.
However, c...
Computer Supported Cooperative Work (CSCW)
12th Dec 2019
Introduction: Abstract- In the Computer Supported Cooperative Work (CSCW) domain, researchers have always wondered about which principles and models to adopt for the development of collaborative applications capabl...
Effect of Computer on Design Creativity
12th Dec 2019
Introduction: Are computers taking away the creativity in design?
Abstract
Computers are an integral part of today’s design process. They, computers represent a time and cost saving device that aids designs i...
Concepts of Computer Networking
12th Dec 2019
Introduction: CHAPTER 1: NETWORKING CONCEPTS
NETWORKING BASICS:
At its most elementary level, a computer network consists of two computers connected to each other by a cable that allows them to share data. All comp...
Types of Cyber Crime and Strategies for Prevention
12th Dec 2019
Introduction: Crimes In cyber Age And Its Response By Indian Judiciary
Table of abbrevaitions
AIR – All India Reporter
AP – Andhra Pradesh
Art. – Article
Bom. – Bombay
ed. – Edition
L...
Database Management System for Car Company
12th Dec 2019
Introduction: STRATEGY & ANALYSIS
DESCRIPTION OF CURRENT BUSINESS ACTIVITIES
INTRODUCTION
DMC is a Dedicated cars company that is specialized in Car sales business, and it was established Four years ago in 7th...
Design of Mobile Banking Application
12th Dec 2019
Introduction: Mobile banking is the topic of today as internet banking was a few years ago. [3] Globally millions of people already use mobile devices to do their banking transactions. Mobile phones as a device wit...
Analysis of Intrusion Detection Systems (IDS)
12th Dec 2019
Introduction: Introduction
Intrusion detection systems (IDS) were developed in 1990’s, when the network hackers and worms appeared, initially for the identification and reporting of such attacks. The intrusion de...
Advantages of E-banking
12th Dec 2019
Introduction: Chapter 1: Introduction
Introduction
Nowadays, Malaysia is a multi sector economy and technology development based on the presence of many technological inventions. Traditional banking act as physical...
Information Technology Advantages and Disadvantages
12th Dec 2019
Introduction:
The importance of Information Technology
The importance of technology comes from that Technology has an important impact on innovation and the development of societies and economies. This impact can ...
Relationship between Business Strategy and IT Strategy
12th Dec 2019
Introduction: BUSINESS-IT ALIGNMENT (BITA)
The relationship between Business strategy and IT strategy and the influence of organisation culture on this strategic alignment in Saudi firms will form the basis of the ...
Strategies for Utilising IT in Business Operations
12th Dec 2019
Introduction: EXECUTIVE SUMMARY
Carsem founded in the year 1972 and had been acquired by Hong Leong Group in the year 1984. Carsem had been allocating most of its revenue in the research and development to maintain...
Types of Security Threats and Protection Against Them
12th Dec 2019
Introduction: Introduction
While attacks on computers by outside intruders are more publicized, attacks perpetrated by insiders are very common and often more damaging. Insiders represent the greatest threat to com...
Efficiency of IT Audit in Corporate Governance
12th Dec 2019
Introduction: Critical Research Analysis On The Effectiveness Of IT Auditing For Corporate Governance
Chapter 1: Introduction
1.1 Introduction
Auditing is one of the essential elements for the successful functionin...
Human Resources in Sri Lanka's IT Sector
12th Dec 2019
Introduction:
CHAPTER 1 INTRODUCTION
For an organization to survive and expand in the rapidly competitive environment dominated by several players, it is paramount for an organization to perform. The organization ...
Popular Tags
- Browse All Tags
- Accounting
- Banking
- Biology
- Biomedical Science
- Business
- Business Analysis
- Business Strategy
- Cancer
- Chemistry
- Computer Science
- Construction
- Consumer Decisions
- Criminology
- Cultural Studies
- Cyber Security
- Economics
- Education
- Electronics
- Employment
- Energy
- Engineering
- Environmental Science
- Environmental Studies
- Equality
- Finance
- Food And Nutrition
- Health
- Health And Social Care
- History
- Human Resources
- Information Systems
- Information Technology
- International Business
- International Relations
- International Studies
- Law
- Leadership
- Management
- Marketing
- Mechanics
- Media
- Medical
- Medicine
- Mental Health
- Neurology
- Nursing
- Pharmacology
- Physiology
- Politics
- Psychology
- Sciences
- Social Policy
- Sociology
- Sustainability
- Teaching
- Technology
- Tourism
- Young People