|
Papers on Technology
Accounting Information Systems In A Changing Environment
Number of words: 2146 | Number of pages: 8.... to make an informed decision about whether to move to a computerised accounting system. We shall discuss the changing business environment and it’s impact on accounting information systems; computerised accounting systems and their cost; and the advantages of a computerised system.
2. The Changing Business Environment
THE ONLY CERTAINTY IN TODAY’S WORLD IS CHANGE
The world is growing smaller. Most markets are becoming unified across the world and this has created increased uncertainty. Along with these changes is a demographic explosion and dramatic changes in technology. According to Schutzer (1991: xiii) technology ac .....
Get This Essay
|
|
Anti-government Censorship On The Internet
Number of words: 1301 | Number of pages: 5.... into an uproar. Thinking that young children could get uncensored porn pictures off the Internet created chaos among the politicians. the Time cover story looked very convincing for many Americans who are uneducated about the Internet access. It suggested there was a sincere problem with uncensored material on the Internet. According to Time article 917,410 sexually explicit pictures, descriptions, short stories and film clips were studied on an 18 month period. Along with porn there are more concerns on the Internet with images that cannot be found in the average magazine rack. Such images include photos of children, ima .....
Get This Essay
|
|
Technology Of The Twenty First Century
Number of words: 591 | Number of pages: 3.... for military purposes but look around today almost every home that has a computer has the Internet. The Internet has came a long way. Everyone has the Internet or has some access to the Internet some how. It serves for many purposes one being for business. Another may be just for enjoyment. The Internet allows people to communicate together at high speeds with their computers. People can go onto chat services and talk to other people around the world. They may also use the Internet to find out about a specific topic. People are linking up more than ever before. Soon all the phone lines are going to be done away with and you will c .....
Get This Essay
|
|
What Is A GDSS?
Number of words: 788 | Number of pages: 3.... problems within the group dynamic at varying costs.
To provide a better view of what each of the three architectures of GDSS's can provide, a brief description of each follows:
The single-computer, software only system is the simplest and cheapest form of a GDSS. The system consists of a single computer running specialized GDSS software. The group involved in the decision making process can view all that is displayed on the screen and then assign weights to criteria or register comments regarding possible courses of action. In this type of system, the achievement of anonymous input is not realized but the other two funct .....
Get This Essay
|
|
Videoconferencing
Number of words: 1456 | Number of pages: 6.... to one another, a communications network run through the telephone system is the most cost-effective approach. A T1 line (the equivalent of 24 standard voice-grade telephone circuits) or a portion of a T1 is required to run high-quality video and audio in two directions. The fiber optic cabling now being installed by telephone companies in many parts of the country has a very high capacity compared to more traditional copper wiring. Videoconferencing will eventually be as practical as placing a telephone call.
Wiring used to connect personal computers in local area networks also can be used to conduct videoconferences. A sma .....
Get This Essay
|
|
Effects Of The Year 2000 Problem
Number of words: 1661 | Number of pages: 7.... causing a major
headache for government agencies and major businesses, not to mention all
home owners and other people. Gina Smith writes in a August 1998 issue of
Popular Science about the fixing of the problem
"You are probably wondering why the problem is so hart to fix. It isn't
It's just that there's so much to be fixed. Updating software to handle the
new century is sometimes a matter of culling through millions of lines of
code, and the finding and fixing every two-digit date reference. One
mistake and the entire operation may be unsuccessful" (Smith 26).
What can the Y2K prblem effect?
On the home front people could .....
Get This Essay
|
|
The Telephone
Number of words: 317 | Number of pages: 2.... Companies that posessed
a telephone had a enormous advantage over the rest. And in a time as
economically troubled as the 30's depression, everyone was looking for a
competitive edge.
The telephone wasn't invented in the thirties, nor was the first
transatlantic line built then, but the thirties represents a time in history
when the world was changing incredible fast and much of that change was made
possible by the the telephone. Without the telephone, progress would have been
much slower and people might not have been so receptive to change. We owe a
great deal to Alexander Graham Bell, the inventor of the telephone, for his
i .....
Get This Essay
|
|
“Sin In The Global Village”: Privacy In Cyberspace
Number of words: 970 | Number of pages: 4.... left for others to find.
Linda Tripp, who taped her conversations with the former White House intern Monica Lewinsky, exposed President Clinton’s recent oral sex scandal by means of surveillance. Wright is suggesting that this could happen to anyone. Computer surveillance isn’t all that uncommon these days so people should look out for what they write and where they go on the Internet because someday it might be used against them.
Disintegration of privacy complicates life. Wright lists some of the precautions people have to think about in ordering a hotel room for an extramarital date: don’t write e-mail to each other about .....
Get This Essay
|
|
Bugged
Number of words: 289 | Number of pages: 2.... few basic steps.
First, a person needs to select the bug. There are many different types
of bugs ranging from the infinity bug with which you can listen in on a
telephone conversation from over 200 miles away to an electaronic laser beam
which can pick up the vibrations of a person's voice off a window pane. The
infinity bug sells for $1,000 on the black market and the laser for $895. Both,
however, are illegal.
Second, one needs to know where to plant the bug. A bug can be hidden in a
telphone handset, in the back of a desk drawer, etc. The important thing to
remember is to place the bug in a spot near wher .....
Get This Essay
|
|
Computer Security And The Law
Number of words: 4533 | Number of pages: 17.... in the development of computer security law and
public policy. This paper is meant to help bridge to gap between technical and
legal computer security communities.
II. THE TECHNOLOGICAL PERSPECTIVE
A. The Objectives of Computer Security
The principal objective of computer security is to protect and assure
the confidentiality, integrity, and availability of automated information
systems and the data they contain. Each of these terms has a precise meaning
which is grounded in basic technical ideas about the flow of information in
automated information systems.
B. Basic Concepts
There is a broad, top-level consensus rega .....
Get This Essay
|
|
|