Technology Essays (Examples)

Study Document

Technology Divorce And The Impact Of Social Inequality On Marital

Pages: 10 (2883 words) Sources: 7 Document Type:Essay Document #:95594472

… use it to obtain an understanding of what sorts of risks or challenges the child may be facing.
The GPS locator is a technology that parents can use to locate their child, literally. It is not a popular idea among many parents but it does provide some … of living in a world where there are dangers around every corner. The GPS locator is perhaps the most egregious example of how technology used by parents to support their style of raising children: it essentially puts the child on a digital leash. It may not allow ……



BLS. (2013). Marriage and divorce: patterns by gender, race, and educational attainment. Retrieved from 

Hamilton, L. & Armstrong, E. (2019). Shifting the Center: Understanding Contemporary Families. Thousand Oaks.

Jones, E. M. (2000). Libido Dominandi: Sexual Liberation and Political Control. IN: St. Augustine’s Press.

Marsee, S. (2019). Which couples are most likely to divorce? Retrieved from 

Nelson, M. K. (2010). Parenting out of control: Anxious parents in uncertain times. NYU Press.

Pew Research Center. (2015). Parenting in America. Retrieved from 

Wilkinson & Finkbeiner. (2019). Divorce statistics. Retrieved from 

Study Document

Drone Technology

Pages: 2 (668 words) Sources: 3 Document Type:Essay Document #:30881274

Acquisitions and Technology
Drone technology is going to impact numerous industries and fronts in the coming years. Amazon is developing drones for last mile delivery (Oswald, 2017) and … a concept plan that resembles a beehive, with drones emerging from it to deliver packages to customers (Yurieff, 2017). The military has drone technology too, except it is not delivering consumer goods but conducting surveillance and dropping bombs on targets (Military, 2019). What all this shows is … it is not delivering consumer goods but conducting surveillance and dropping bombs on targets (Military, 2019). What all this shows is that drone technology has come a long way from being a concept to a reality, and they will likely continue to develop and play a major … be used for heavier goods in the future and it would eliminate a lot of the need for courier services.…[break]…The future of drone technology is……



Military. (2019). Drones. Retrieved from 

Oswald, E. (2017). Here’s everything you need to know about Amazon’s drone delivery project, Prime Air. Retrieved from 

Yurieff, K. (2017). Amazon patent reveals drone delivery \\\\\\'beehives\\\\\\'. Retrieved from 

Study Document

Starbucks Use Of Wireless Technology

Pages: 2 (686 words) Sources: 5 Document Type:Term Paper Document #:87468045

… world of technological advancement, companies are trying to gain competitive advantage through using unique ways of reaching out to the customers. Since wireless technology is everywhere, many companies have commercialized and expanded their business through it. Starbucks is one such company.
Starbuck uses GPS (Global Positioning System) ……



Brewin, B. (2001, Jan 08). Starbucks takes wireless leap. Computer World .

Greenemeier, L. (2014, June 24). Starbucks to Offer Wireless Caffeine for Smartphones. Scientific American .

How Household Names Use GIS. (2019, October 9). USC Dornsife.

Torrington, M. (2016, April 12). Starbucks: A Case Study in Effective Mobile App Marketing. Digital Turbine.

Wheeler, C. (2014). Going BIG with GIS. Esri User Conference.

Study Document

Challenges In Management Facing Transformational Leaders Service

Pages: 5 (1606 words) Sources: 5 Document Type:Annotated Bibliography Document #:57833590

Annotated bibliography: Management and Accounting Challenges facing Transformational Leaders: Service and Technology
Carreiro, H., & Oliveira, T. (2019). Impact of transformational leadership on the diffusion of innovation in firms: Application to mobile cloud computing. Computers in … as diffusion of innovation model phases, utilizing PLS technique and information from as many as 154 companies, for studying the implementation of novel technology, namely MCC (mobile cloud computing). Factors like corporate vision, supportive leaders, intellectual stimulation, and personal acknowledgment are important when it comes to implementation … construct. The authors conclude that empathetic, efficient leadership, right from the vision stage to the stage of institutionalization, proves crucial to adopt information technology cloud innovation successfully. Superior communication skills, involving ensuring team motivation, personnel being up- to- date on reform and growth, and regular emphasis on ……



Al Ahmad, S., Easa, N. F., & Mostapha, N. (2019). The Effect of Transformational Leadership on Innovation: Evidence from Lebanese Banks. European Research Studies Journal, 22(4), 215-240.

Aldholay, A. H., Isaac, O., Abdullah, Z., & Ramayah, T. (2018). The role of transformational leadership as a mediating variable in DeLone and McLean information system success model: The context of online learning usage in Yemen. Telematics and Informatics, 35(5), 1421-1437.

Carreiro, H., & Oliveira, T. (2019). Impact of transformational leadership on the diffusion of innovation in firms: Application to mobile cloud computing. Computers in Industry, 107, 104-113.

Zappalà, S., & Toscano, F. (2019). Transformational leadership and innovation adoption: Is there a moderation role of personal initiative and job control?. Psychologica, 119.

Zhang, Y., Zheng, J., & Darko, A. (2018). How does transformational leadership promote innovation in construction? The mediating role of innovation climate and the multilevel moderation role of project requirements. Sustainability, 10(5), 1506.

Study Document

Web 2 0 And Online Studio Education

Pages: 6 (1931 words) Sources: 5 Document Type:Research Paper Document #:53632130

… eradicating the issue of distance in pursuing education (Bender, 2006). Higher education systems, especially the architectural and design courses, are moving towards integrating technology, transforming the traditional format of studying, but the studio courses have remained constant with the traditional style of education (Bender, 2006). Since distance … changed in order to incorporate the new social, economic, and technological changes (Pasin, 2017). Educational practices have changed due to the integration with technology, proving successful and efficient with the learning procedure and teaching style.
Traditional Design Studio is the kind of teaching environment that has a … (Nottingham, 2014).
Conclusively, as the world is moving towards technological advancement and digital innovation, the educational fields have also realized the importance of technology in making the entire learning procedure more effective. Online studio education has immense benefits for the entire curriculum, learning objectives, course outline, and ……



Bender, D. M. (2006). Using Online Education Technologies to Support Studio Instruction. Educational Technology and Society.

Kurt, S. (2009). An analytic study on the traditional studio environments and the use of the constructivist studio in the architectural design education. Procedia Social and Behavioral Sciences, 401-408.

Loannao, O. (2018). Opening up design studio education using blended and networked formats. International Journal of Educational Technology in Higher Education.

Nottingham, A. (2014). Reshaping design education: teaching graphic design online and onsite. The University of Melbourne.

Pasin, B. (2017). Rethinking the Design Studio-Centered Architectural Education. A Case Study at Schools of Architecture in Turkey. The Design Journal.

Siddiqi, A. A. (2002). ARCHITECTURAL DESIGN STUDIO PROJECTS AND THE CHARADES OF CURRICULUM. The 6th Saudi Engineering Conference, KFUPM. Architecture Department, College of Environmental Design, KFUPM Dhahran.

Study Document

Firewalls And Filtering

Pages: 4 (1317 words) Sources: 4 Document Type:Research Paper Document #:22384393

… afford the service. System vulnerability is one of the major concerns of organizations getting web servers, firewalls and security measures for their data. Technology companies burn the midnight oil trying to provide the highest level of security to databases, and a breach of security can be deemed … oil trying to provide the highest level of security to databases, and a breach of security can be deemed a lapse by the technology company or that their security measures being ineffective. Hackers might send unauthorized packets of data including network inhibitors that might stall the ABC ……



Anderson, R. O. (1997). EMERGING CHALLENGE: SECURITY AND SAFETY IN CYBERSPACE. In R. O. Anderson, In Athena's Camp: Preparing for Conflict in the Information Age (pp. 231–252). RAND corporation.

Martin C. Libicki, L. A. (2015). The Efficacy of Security Systems. In L. A. Martin C. Libicki, The Defender’s Dilemma: Charting a Course Toward Cybersecurity (pp. 23-40). Santa Monica: RAND Corporation.

Mays, J. (2018, September 24). Understanding Load Balancing for Web Servers. Retrieved from Liquid Web: 

Thu, A. A. (2013). Integrated Intrusion Detection and Prevention System with Honeypot on Cloud Computing Environment. International Journal of Computer Applications, 9-13.

Study Document

Cloud Computing And Cost Effectiveness

Pages: 5 (1591 words) Sources: 5 Document Type:Annotated Bibliography Document #:36737117

… and software. Also, a key feature of cloud computing is its capacity to diminish the financial burden that is placed on firms in technology adoption. The authors also demonstrate that cost reduction can be achieved through the capability to shift from a CAPEX cost structure to an … capabilities devoid of incurring the expenses associated with enforcing these systems and applications within their own IT divisions.
Attaran, M. (2017). Cloud Computing Technology: Leveraging the Power of the Internet to Improve Business Performance. Journal of International Technology and Information Management, 26(1), 112 – 137.
In recent times, cloud computing has emanated as a significant technology that could contribute to the operational efficacy of an IT platform through the provision of infrastructure and software solutions for the entire IT … computing model can render numerous instantaneous advantages to companies, including the eradicated necessity for maintaining a server, no need for setting……



Attaran, M. (2017). Cloud Computing Technology: Leveraging the Power of the Internet to Improve Business Performance. Journal of International Technology and Information Management, 26(1), 112 – 137.

Carcary, M., Doherty, E., & Conway, G. (2015). The adoption of cloud computing by Irish SMEs- an exploratory study. Electronic Journal of Information Systems Evaluation, 17(1), 3.

Elmonem, M. A. A., Nasr, E. S., & Geith, M. H. (2016). Benefits and challenges of cloud ERP systems–A systematic literature review. Future Computing and Informatics Journal, 1(1-2), 1-9.

Shankar, K. (2016). Effectiveness of Cloud Computing in Global Business. Journal of Applied Management-Jidnyasa, 8(1), 66-73.

Xue, C. T. S., & Xin, F. T. W. (2016). Benefits and challenges of the adoption of cloud computing in business. International Journal on Cloud Computing: Services and Architecture, 6(6), 01-15.

Study Document

Veteran Benefits Administration

Pages: 8 (2465 words) Sources: 3 Document Type:Implementation Paper Document #:56829115

Technology Proposal/Implementation Paper
A: Introduction
The Department of Veterans Affairs (VA) remains a vital entity in as far as the provision of key services … would also have embed audit trails.
E: Measurement Plan
There are several metrics that I would use to measure the effectiveness of the technology following its implementation. It is important to note that of key relevance on this front is whether the technology solution is technically sound, whether it was achieved on budget, and whether it was completed on time. Two of the metrics, i.e. adherence … the metrics, i.e. adherence to schedule and budget would come in handy in the evaluation of implementation success. The technical soundness of the technology solution, on the other hand, would be of great relevance in the measurement of the effectiveness of the technology following implementation. In this case, the concern would be whether the technology solution has achieved……



Aziz, A.A., Mohammad Y., Mokhtar, U.A. & Ambari, D.I. (2017). Establishing Policy for the Implementation of Electronic Document and Records Management System in Public Sector in Malaysia: The Influencing Factors. Advanced Science Letters, 23(11), 10732-10736.

National Archives and Records Administration (2016). Department of Veterans Affairs Records Management Program: Records Management Inspection Report. Retrieved from 

U.S. Department of Veteran Affairs (2020). About VBA. Retrieved from sp

Study Document

Cyber Crime IT Security Auditing

Pages: 11 (3165 words) Sources: 7 Document Type:Research Paper Document #:36684821

… lost much to these crimes and, hence, must come up with plans to prevent such future occurrences. In this paper, the processes information technology security audits entail and how such audits enhance organizational IT security will be dealt with. According to research on the subject, IT security … the form of a methodical analysis by an outside specialist on compliance, for identifying any chinks in the armor of the company's information technology system.
ICT advancements have meant the availability of vast quantities of data, which also creates considerable risks to the data itself, computer … dealing with central information systems.
Suduc and colleagues (2010) claim that modern-day corporations need to deal with the following major kinds of information technology risks: availability, security, compliance, and performance risks. Security risks constitute accessing data without permission, including information leakage, fraud, endpoint security, and data privacy. ……



Almatari, O. and Helal, I., and Mazen, S., and El Hennawy, S. (2018). \\\\\\"Cybersecurity Tools for IS Auditing.\\\\\\" The 6th International Conference on Enterprise Systems, At Limassol, Cyprus 10.1109/ES.2018.00040.

Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant\\\\\\'s handbook: Systems analysis and design. CRC press.

Diamantopoulou, V., Tsohou, A., & Karyda, M. (2019). From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security (pp. 238-257). Springer, Cham.

Khan, M. (2017). Computer security in the human life. International Journal of Computer Science and Engineering (IJCSE), 6(1), 35-42.

Lenghel, R. D., & Vlad, M. P. (2017). INFORMATION SYSTEMS AUDITING. Quaestus, (11), 178.

Manaseer, S., & Alawneh, A. (2019). ON CYBERSECURITY AUDITING AWARENESS: CASE OF INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR. International Journal of Computer Science and Information Security (IJCSIS), 17(7).

Suduc, A. M., Bîzoi, M., & Filip, F. G. (2010). Audit for information systems security. Informatica Economica, 14(1), 43.

Study Document

Barriers That Prevent Implementation Of IoT Within Small Businesses

Pages: 18 (5252 words) Sources: 37 Document Type:Case Study Document #:25628514

… especially into use by SMEs. To this end, this chapter describes more fully the study’s guiding Unified Theory of Acceptance and Use of Technology theoretical/conceptual framework followed by an overview of the Internet of Things (IoT) and an analysis of current trends that are having an impact … Davis (2003) by integrating a number of disparate elements from previous models to create a more accurate approach to understanding how and why technology-related decisions are made by organizations today. The Venkatesh et al. (2003) theoretical model draws on a number of key elements from eight previous … from eight previous theories or models in order to produce a more robust overview concerning the effects of different motivational factors on the technology-related decision-making process to identify how and why end users actually use different technologies.
The rationale in support of this more comprehensive model included … applied to similar situations involving……



Ahamed, J., & Rajan, A.V. (2016). Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 1-5.

Aishah, S., Sahandi, R., Prakoonwit, S., & Khan, W. (2019). Big data and IoT opportunities for small and medium-sized enterprises (SMEs). In Handbook of Research on Big data and the IoT. doi: 10.4018/978-1-5225-7432-3.ch005

An, N. & Wang, J. (2018, October). Research and practice on innovative methods of ideological and political education for college student. Educational Sciences Theory and Practice, 18(5), 2386-2391.

Banham, R. (2016, July-August). IoT complexity: As the Internet of Things expands, the risks-and questions of liability-become more complicated. Risk Management, 63(6), 39-44.

Bhardwaj, A., Subramanyam, G. V., Avasthi, V. & Sastry, H. (2016). Review of solutions for securing end user data over cloud applications. International Journal of Advanced Computer Research, 6(27), 2277-2291.

Bok, H. (2014, September). An empirical study on factors influencing Internet advertising effects. Advances in Management, 7(9), 6-9. (2018). Disaster preparedness for small businesses., September 26. Retrieved from .

Cass, J. (2019). Internet of Things: What it is, how it works, examples and more. Just Creative. Retrieved from .

Join thousands of other students and

"spark your studies".