Computer Technology Essays (Examples)

Studyspark

Study Document Study Document

Starbucks Use Of Wireless Technology

Pages: 2 (686 words) Sources: 5 Document Type:Term Paper Document #:87468045

… world of technological advancement, companies are trying to gain competitive advantage through using unique ways of reaching out to the customers. Since wireless technology is everywhere, many companies have commercialized and expanded their business through it. Starbucks is one such company.
Starbuck uses GPS (Global Positioning System) ……

References

References

Brewin, B. (2001, Jan 08). Starbucks takes wireless leap. Computer World .

Greenemeier, L. (2014, June 24). Starbucks to Offer Wireless Caffeine for Smartphones. Scientific American .

How Household Names Use GIS. (2019, October 9). USC Dornsife.

Torrington, M. (2016, April 12). Starbucks: A Case Study in Effective Mobile App Marketing. Digital Turbine.

Wheeler, C. (2014). Going BIG with GIS. Esri User Conference.

Studyspark

Study Document Study Document

Security Of Computers Data

Pages: 2 (729 words) Sources: 3 Document Type:Essay Document #:20542054

… one to become a member of the FBI CART team they need to have exceptional problem solving and analytical skills, thorough understanding of computer and computer systems and cyber and computer crime investigation. This is because CART offers assistance to the FBI field offices when it comes to the search and seizure of computer evidence. This team is charged with the performance of forensic examinations for all FBI seizures that are related to technology and computer. Therefore, computer forensics is a mandatory requirement for this position. The potential candidate should have a bachelor’s degree in an IT-related field. However, they should … requirement for this position. The potential candidate should have a bachelor’s degree in an IT-related field. However, they should have a major in computer forensics. A candidate is required to have good communication skills since they will be required to communicate effectively their findings to other non-technical……

References

References

Federal Bureau of Investigation. (July 2, 2019). Workers’ Compensation Fraud.  https://www.fbi.gov/news/stories/workers-compensation-fraud-conspirators-sentenced-070219 

Kentucky RCFL. (June 6, 2013 ). Louisville Man Guilty of Harboring 20,000 Images of Child Pornography.  https://www.rcfl.gov/kentucky/news 

Regional Computer Forensic Laboratory. (n.d.). About the RCFL. Retrieved from  https://www.rcfl.gov/about 

Studyspark

Study Document Study Document

Challenges In Management Facing Transformational Leaders Service

Pages: 5 (1606 words) Sources: 5 Document Type:Annotated Bibliography Document #:57833590

Annotated bibliography: Management and Accounting Challenges facing Transformational Leaders: Service and technology
Carreiro, H., & Oliveira, T. (2019). Impact of transformational leadership on the diffusion of innovation in firms: Application to mobile cloud computing. computer in Industry, 107, 104-113.
The authors of this article maintain that leadership forms one of the main factors for organizational adoption of successful innovation. … as diffusion of innovation model phases, utilizing PLS technique and information from as many as 154 companies, for studying the implementation of novel technology, namely MCC (mobile cloud computing). Factors like corporate vision, supportive leaders, intellectual stimulation, and personal acknowledgment are important when it comes to implementation … construct. The authors conclude that empathetic, efficient leadership, right from the vision stage to the stage of institutionalization, proves crucial to adopt information technology cloud innovation successfully. Superior communication skills, involving ensuring team motivation, personnel being up- to- date on reform and growth, and……

References

References

Al Ahmad, S., Easa, N. F., & Mostapha, N. (2019). The Effect of Transformational Leadership on Innovation: Evidence from Lebanese Banks. European Research Studies Journal, 22(4), 215-240.

Aldholay, A. H., Isaac, O., Abdullah, Z., & Ramayah, T. (2018). The role of transformational leadership as a mediating variable in DeLone and McLean information system success model: The context of online learning usage in Yemen. Telematics and Informatics, 35(5), 1421-1437.

Carreiro, H., & Oliveira, T. (2019). Impact of transformational leadership on the diffusion of innovation in firms: Application to mobile cloud computing. Computers in Industry, 107, 104-113.

Zappalà, S., & Toscano, F. (2019). Transformational leadership and innovation adoption: Is there a moderation role of personal initiative and job control?. Psychologica, 119.

Zhang, Y., Zheng, J., & Darko, A. (2018). How does transformational leadership promote innovation in construction? The mediating role of innovation climate and the multilevel moderation role of project requirements. Sustainability, 10(5), 1506.

Studyspark

Study Document Study Document

Virtual Learning Solutions For English As Second Language Students

Pages: 11 (3230 words) Sources: 10 Document Type:Research Paper Document #:70086670

How technology Enhances ESL Students’ Learning Experience
Introduction
In the COVID-19 era, education has taken a dramatic turn towards distance learning, meaning that virtual classrooms … turn towards distance learning, meaning that virtual classrooms are now more popular than ever. But what is the effect of the use of technology in an ESL classroom? Evidence shows that technology actually does enhance ESL students’ learning experience (Kasapoglu-Akyol, 2010). The fact is that ESL students use technology tools in their daily lives and thus not to use technology for learning purposes is akin to taking a fish out of water and then asking it to learn to swim. In the digital … taking a fish out of water and then asking it to learn to swim. In the digital era, digital natives have been using technology since birth and it is older teachers and educational systems that are slow to recognize this……

References

References

Alvarez-Marinelli, H., Blanco, M., Lara-Alecio, R., Irby, B. J., Tong, F., Stanley, K., & Fan, Y. (2016). Computer assisted English language learning in Costa Rican elementary schools: an experimental study. Computer Assisted Language Learning, 29(1), 103-126.

Beetham, H., & Sharpe, R. (Eds.). (2013). Rethinking pedagogy for a digital age: Designing for 21st century learning. NY: Routledge.

Cassady, J. C., Smith, L. L., & Thomas, C. L. (2017). Supporting emergent literacy for English language learners with computer?assisted instruction. Journal of Research in Reading.

Jiang, H., Tang, M., Peng, X., & Liu, X. (2018). Learning design and technology through social networks for high school students in China. International Journal of Technology and Design Education, 28(1), 189-206.

Kahai, S. S., Carroll, E., & Jestice, R. (2007). Team collaboration in virtual worlds. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 38(4), 61-68.

Kasapo?lu-Akyol, P. (2010). Using educational technology tools to improve language and communication skills of ESL students. Novitas-Royal, 4(2).

Meskill, G., & Mossop, J. (2003). Technologies use with learners of ESL in New Your State: Preliminary report. Retrieved from  https://www.albany.edu/lap/Papers/technology%20use.htm 

Park, J. Y. (2011). Design education online: Learning delivery and evaluation. International Journal of Art & Design Education, 30(2), 176-187.

Studyspark

Study Document Study Document

Shortages Of Health Care Providers

Pages: 7 (2037 words) Sources: 8 Document Type:Essay Document #:32789324

… with health care providers to go over options, and so on.
Health care shortages are an issue, but the possibilities afforded by communications technology in the 21st century show promise. Informatics may be luring potential nurses away from actual nursing, but the plus side is that informatics ……

References

References

Clemmer, T. P. (1995). The role of medical informatics in telemedicine. Journal of Medical Systems, 19(1), 47-58.

Demiris, G. (2003). Integration of telemedicine in graduate medical informatics education. Journal of the American Medical Informatics Association, 10(4), 310-314.

Foster, M., & Sethares, K. (2017). Current strategies to implement informatics into the nursing curriculum: an integrative review. J Nurs Inform, 21(3).

Haddad, L. M., & Toney-Butler, T. J. (2019). Nursing shortage. In StatPearls [Internet]. StatPearls Publishing.

Hasbrouck, L. (2016). Strengthening local health department informatics capacity through advocacy, education, and workforce development. Journal of Public Health Management and Practice, 22(Suppl 6), S3.

IOM. (2010). The future of nursing. Retrieved from  http://nacns.org/wp-content/uploads/2016/11/5-IOM-Report.pdf 

O’Brien, J. (2003). How nurse practitioners obtained provider status: Lessons for pharmacists. American Journal of Health-System Pharmacy, 60(22), 2301-2307.

Snavely, T. M. (2016). A brief economic analysis of the looming nursing shortage in the United States. Nursing Economics, 34(2), 98-101.

Studyspark

Study Document Study Document

Counterintelligence

Pages: 12 (3490 words) Sources: 6 Document Type:question answer Document #:11133529

… all-seeing eye through the use of cameras, machine learning, and tracking systems has to be developed. Without so many people using digitally connected technology today, it should not be difficult to know who is where and what they are doing.
The problem of privacy rights holds up … doing.
The problem of privacy rights holds up any real and substantive approach to detecting subversion, unfortunately. Privacy rights of users of digital technology can be respected at the same time the safety of the nation has to come first. Monitoring all digital activity should be the ……

References

Bibliography

Counter intelligence for National Security, CIA, 1993. https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol2no4/html/v02i4a10p_0001.htm

Johnston, David and James Risen, “U.S.had evidence of espionage,” New York Times, 2001. https://www.nytimes.com/2001/02/23/us/us-had-evidence-of-espionage-but-fbi-failed-to-inspect-itself.html

National Counterintelligence Strategy of the United States of America 2016 (Strategy).  https://www.dni.gov/files/NCSC/documents/Regulations/National_CI_Strategy_2016.pdf 

Prunckun, Hank. 2012. Counterintelligence Theory and Practice, Lanham: Rowman&Littlefield Publishers Inc. Read the following: Chapters 8 to 14, pages 131 to 217. Appendices A to D, pages 219 to 231.

Richelson, Jeffrey. 2007. “The Pentagon’s Counterspies: The Counterintelligence Field Activity (CIFA).” (September 17). National Security Archive. Accessed January 19, 2017.  http://nsarchive.gwu.edu/NSAEBB/NSAEBB230/ .

Van Cleave, Michelle. “Strategic Counterintelligence: What Is It and What Should We Do About It ?” 2007. CIA Center for the Study of Intelligence. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol51no2/strategic-counterintelligence.html

Studyspark

Study Document Study Document

Supply Chain Management In Ethiopia

Pages: 4 (1174 words) Sources: 4 Document Type:Article Review Document #:76860957

… industry, the garment industry, wood industry, textile, leather, food, and ceramics industries.
The biggest challenge facing these firms is simply the fact that technology has not advanced in the developing world to assist with supply chain integration. The firms interviewed across the nine different industries were all … across the nine different industries were all still using telephone, verbal instructions and letters to relay information. There was no use of digital technology to facilitate and enhance communication. Data collection was all paper based, which means that information processing is extremely slow compared to what is … that the tools needed to facilitate it are lacking in the developing world. The developed world may take it for granted that communication technology and information systems have advanced to the point where it is no longer necessary for individuals to think twice about sending messages and … Big Data analytics.
How It……

References

References

Afshan, N. (2013, December). The performance outcomes of dimensions of supply chain integration: A conceptual framework. Business: Theory and Practice, 14(4), 323.

Georgise, F. B., Thoben, K. D., & Seifert, M. (2014). Supply chain integration in the manufacturing firms in developing country: An Ethiopian case study. Journal of Industrial Engineering, 2014.

Prensky, M. (2001). Digital natives, digital immigrants part 1. On the horizon, 9(5), 1-6.

Spiess, J., T'Joens, Y., Dragnea, R., Spencer, P., & Philippart, L. (2014). Using big data to improve customer experience and business performance. Bell labs technical journal, 18(4), 3-17.

Studyspark

Study Document Study Document

What Is Cybercrime And How To Deter It

Pages: 7 (2243 words) Sources: 5 Document Type:Research Paper Document #:58559500

What is Cybercrime?
Definition of Cybercrime
Cybercrime is any criminal activity that is conducted using computer or the Internet. As today’s digital natives have the most experience with computer, cybercriminals tend to be of the Millennial generation—i.e., born after 1980. They are young, digitally sophisticated, and able to operate with a degree … by professional criminals to lure victims into traps or sites that have the appearance of legitimacy.
Cybercrime is committed by people who know computer code, understand computer systems and networks, know how to navigate databases, access data storage, get past firewalls, exploit cloud computing services, control the Internet of Things … data storage, get past firewalls, exploit cloud computing services, control the Internet of Things and more. They
How Cybercrime Has Evolved over Time
computer and the rise of the Internet ushered in the era of cybercrime. IBM’s first computer arrived in the 1950s, but it was……

References

References

Computer Hope. (2019). When was the first computer invented? Retrieved from  https://www.computerhope.com/issues/ch000984.htm 

Crane, C. (2019). 33 alarming cybercrime statistics you should know in 2019. Retrieved from  https://www.thesslstore.com/blog/33-alarming-cybercrime-statistics-you-should-know/ 

Schjølberg, Stein. (2017). The History of Cybercrime (1976-2016). Books on Demand.

Statista. (2020). Global digital population. Retrieved from  https://www.statista.com/statistics/617136/digital-population-worldwide/ 

Taylor, R. W., Fritsch, E. J., Liederbach, J., Saylor, M. R., & Tafoya, W. L. (2019). Cyber crime and cyber terrorism. NY, NY: Pearson.

Studyspark

Study Document Study Document

The Cost Effectiveness In Cloud Computing Within An Accounting Organization

Pages: 15 (4615 words) Sources: 15 Document Type:Research Paper Document #:23416384

… 17
6 Conclusion 17
Introduction
Background
Corporations of all sizes in the accounting industry, in addition to other industries such as retail, information technology, insurance, and media industries, capitalize on public cloud services. The steadily advancing features of the cloud, including infinite and unrestricted storage and powerful … business operations. Significantly, in the contemporary setting, companies and entrepreneurs in the accounting sector are no longer constantly installing software apps on their computer or computer systems situated within the premises to operate their businesses. Rather, they are opting for the cloud. Cloud computing is facilitating substantial agility for … accounting industry, have business operations across the globe. However, there is increasing competition from both local and international businesses. Also, the advancement of technology has intensified the level of competition, prompting organizations to seek out competitive advantages. Significantly, competitive advantages do not simply emanate in one distinctive … service provider that……

References

References

Bauer, E., & Adams, R. (2015). Reliability and availability of cloud computing. Hoboken: John Wiley & Sons.

Chang, W. Y., Abu-Amara, H., & Sanford, J. F. (2018). Transforming enterprise cloud services. New York: Springer Science & Business Media.

Chang, V. (Ed.). (2015). Delivery and adoption of cloud computing Services in Contemporary Organizations. IGI Global.

Hsien, W. F., Yang, C. C., & Hwang, M. S. (2016). A Survey of Public Auditing for Secure Data Storage in Cloud Computing. IJ Network Security, 18(1), 133-142.

Jamsa, K. (2016). Cloud computing. New York: Jones & Bartlett Publishers.

Maguire, M., & Delahunt, B. (2017). Doing a thematic analysis: A practical, step-by-step guide for learning and teaching scholars. AISHE-J: The All Ireland Journal of Teaching and Learning in Higher Education, 9(3).

Mehmood, R., Katib, S. S. I., & Chlamtac, I. (2020). Smart Infrastructure and Applications. New York: Springer International Publishing.

Prabhu, C. S. R. (2015). E-governance: concepts and case studies. New Delhi: PHI Learning Pvt. Ltd.

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 7 (2040 words) Sources: 5 Document Type:Research Paper Document #:12891464

… Meets Strategic Deterrence”, Journal of Strategic Security 4, no. 2 (2011):1] [2: Atul Agarwal & CERT-IN, “Cyber Espionage, Infiltration and Combating Techniques”, Indian computer Emergency Response Team, 2013. https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf]
Background Information
Cyber espionage has become one of the most important and complex international problem in today’s world. … numerous risks or threats to the owner/possessor of the information. Cyber espionage is carried out through various exploitation methods or techniques on individual computer, networks or the Internet. Some of these techniques or methods include the use of malicious software and computer viruses like Trojan horses and spyware. This practice basically entails intentional activities to infiltrate or penetrate computer systems or networks used by a rival to obtain information within or transmitted through these networks or systems.[footnoteRef:3] Cyber espionage has emerged as ……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).

Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).

Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017.  https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf 

National Counterintelligence and Security Center. “Foreign Economic Espionage in Cyberspace.” Office of the Director of National Intelligence, 2018.  https://www.dni.gov/files/NCSC/documents/news/20180724-economic-espionage-pub.pdf 

Rubenstein, D. “Nation State Cyber Espionage and its Impacts.” Washington University in St. Louis, December 2014.  https://www.cse.wustl.edu/~jain/cse571-14/ftp/cyber_espionage/ 

Weissbrodt, D. “Cyber-Conflict, Cyber-Crime, and Cyber-Espionage.” Minnesota Journal of International Law 22, no. 2 (2013).

Join thousands of other students and

"spark your studies".