Information Technology Essays and Research Papers Page 13

Management of Information Security
The paper “Management of Information Security” is a perfect variant of literature review on information technology. There have been numerous recent cases of security threats to business information holdings inhuman, electronic, and physical form. These threats need effective management to prevent firms from undergoing heavy losses in terms of valuable assets and information.…
Read Text
Management of Information Technology Resources and Information Security
The paper “Management of Information Technology Resources and Information Security”  is a persuasive example of a case study on information technology. This paper is an information security mapping case study and aims at identifying the importance of information to companies and the society in general, discuss concepts, values, and techniques that relate to information security.…
Read Text
Managing Risks for IT Managers, Auditors, and Investigators
The paper “Managing Risks for IT Managers, Auditors, and Investigators” is a fascinating case study on information technology. Forensic artifacts form an important role in computer systems. The many artifacts realized in windows systems play an important role in serving specific tasks that are assigned to.…
Read Text
MaxiMarket Interactive Directory - Establishing Requirements, Low-Fidelity Prototyping, and Proposed Data Gathering
The paper “MaxiMarket Interactive Directory - Establishing Requirements, Low-Fidelity Prototyping, and Proposed Data Gathering” is a spectacular variant of case study on information technology. Human-computer interaction is a critical component of information systems. Successful completion of any information systems projects requires comprehensive requirements analysis, design, etc.…
Read Text
Memory Management - Virtual Memory with Paging and Segmentation
The paper “Memory Management - Virtual Memory with Paging and Segmentation” is an exciting example of a literature review on information technology. Memory paging according to Dhamdhere (2006) is a management method for memory for managing how resources of virtual machines or computer memory are shared.…
Read Text
Metropolitan Police Service
The paper "Metropolitan Police Service" is a wonderful example of an assignment on information technology. In determining the best kind of technology to use to manage user identities, organizational leadership has to identify factors such as different kinds of data, the possible variety of identity stores, the levels of employees who access such systems.…
Read Text
Microkernel Operating Systems - Approaches to Operating System Design
The paper “Microkernel Operating Systems - Approaches to Operating System Design” is an affecting variant of an essay on information technology. Early Microkernel operating systems were smaller in size, partly due to limited computer memory. The number of devices to be controlled by kernel grew with the growth of computer capabilities.…
Read Text
Microsoft Corp: Information Technology Ethics and Policy
The paper "Microsoft Corp: Information Technology Ethics and Policy" is a good example of a case study on information technology. On the July of 1994, a representative at the Department of Justice, for the United s, sued Microsoft for illegally retaining domination in the operating system market under anti-competitive circumstances in its licensing in addition to software development agreements.…
Read Text
Microsoft Office Project Portfolio
 The paper "Microsoft Office Project Portfolio" is a great example of a term paper on information technology. MS Office Project is application software specially developed for project management and it uses a set of actions and procedures with high power combination in planning, tracking and controlling a project through creation of tasks with timeline.…
Read Text
Mitigating Cyber-Attacks by Destructively Counter-Striking against Attackers
The paper “Mitigating Cyber-Attacks by Destructively Counter-Striking against Attackers” is a  convincing variant of literature review on information technology. Lobby groups together with IT security professionals are calling for new regulations that could facilitate the private companies to effectively counter-strike or retaliate against cyber attackers.…
Read Text
Mitigating the Threat of Malicious Insiders
The paper “Mitigating the Threat of Malicious Insiders” is a great example of a literature review on information technology. In today’s digital age, most businesses rely on information systems that are under constant threat of attacks. This applies to the problem of a malicious insider. Businesses that seek to operate effectively must develop ways to mitigate the threat of malicious insider.…
Read Text
Mobile Banking Applications Security Risks and the Workflow Technology, Security Challenges of Mobile Banking and Payments System
The paper “Mobile Banking Applications’ Security Risks and the Workflow Technology, Security Challenges of Mobile Banking and Payments System” is a breathtaking variant of literature review on information technology. This paper aims to critically evaluate findings from two research papers associated with mobile application security.…
Read Text
Mobile Phone Dependency in Children
The paper "Mobile Phone Dependency in Children" is an excellent example of an assignment on information technology. Electronic devices have changed the world by making it easier for people to learn, communicate, and go about their day to day activities. However, when unregulated, it can bring potential harm to our kids.…
Read Text
Modeling Security Risk

The paper "Modeling Security Risk" is a perfect example of a literature review on information technology. According to Devi and Priyadarshini, (2016), risk modeling can be defined as the process of optimizing network security by identifying objectives and vulnerabilities and coming up with mitigation factors of the threats.

Read Text
Modus Operandi of a Typical Winery

The paper "Modus Operandi of a Typical Winery" is a perfect example of a report on information technology. The modus operandi of a typical winery mainly starts with the picking of grapes and it ends at the bottling of the wine. Various processes are usually undertaken and it is also important to note.

Read Text
MovieMania Database
The paper "MovieMania Database" is a perfect example of a report on information technology. MovieMania is a new online DVD rental service where users can register by providing their personal details accompanied by their payment via an online website. A user is able to create a list by selecting the desired movies from an online catalog.…
Read Text
Multitunneling Grid Transactions
The paper “Multitunneling Grid Transactions” is a meaty variant of a lab report on information technology. An SSH tunnel can be described as an internet pipeline in which data moves through. The data can be encrypted to avoid eavesdropping. Apart from this SSH can be used as a tool to connect machines on opposite sites of a firewall(s).…
Read Text
Need for Sound Information Security Management
The paper “Need for Sound Information Security Management” is a persuasive variant of literature review on information technology. Small and Medium Enterprises (SMEs) can be described as business units with fewer employees and low turnover as compared to large firms. Small firms have less than 50 workers, while the medium-sized firm has 500 workers.…
Read Text
Negative Impacts of Smart Phone Promptness and Addiction

The paper "Negative Impacts of SmartPhone Promptness and Addiction" is a good example of a term paper on information technology. The smartphone is a cell phone with Internet access and a variety of applications, including instant text messaging, social media, calling and Email services (Ching et al., 2014, p.8).

Read Text
Negative Implications of Posting, Sharing and Circulation Information Online
The paper "Negative Implications of Posting, Sharing and Circulation Information Online" is an excellent example of an essay on information technology. The evolution of technology has brought about transformation on how previous private information is shared and made readily available to the public.…
Read Text
Net Communication
The paper "Net Communication" is a perfect example of an annotated bibliography on information technology. Van Dijck, J. (2009) ‘Users like you Theorizing agency in user-generated content’, Media, Culture & Society, vol. 31 (1), pp.41-58. The article of Joseph van Dijck speaks about the appearance of a new type of media consumer -prosumer.…
Read Text
Network Infrastructure Improvement
The paper "Network Infrastructure Improvement" is a wonderful example of a case study on information technology. In the business world, technologies provide a competitive advantage if timely adopted and deployed. Technologies help in reducing inefficiencies and closing gaps that increase business costs. In the DoD, technologies are employed in order to maintain secure communication.…
Read Text
Network Monitoring
The paper "Network Monitoring" is a great example of a report on information technology. With the growth in computer networks that are used in organizations, there is a need to have a way in which networks are managed and monitored. This phenomenon is taking shape as more and more companies develop their intranets.…
Read Text
Network Security Fundamentals
The paper "Network Security Fundamentals" is a wonderful example of a report on information technology. In this scenario, secure and steady communication infrastructure is required for both end-users and companies in an attempt to get a number of advantages from the enhancements and developments that the Internet has provided them.…
Read Text
Network Simulation for Small Businesses
The paper “Network Simulation for Small Businesses” is an affecting variant of a literature review on information technology. The network is a variable asset to small organizations in the ever-changing business environment. It enhances communication among employees as well as improve productivity due to sharing of information.…
Read Text
Contact Us