Geographic information science

Decent Essays
Improved Essays
Superior Essays
Great Essays
Brilliant Essays
    Page 8 of 50 - About 500 Essays
  • Great Essays

    The impact of ICTs on social movement in China: Xiamen Anti-PX demonstration. INTRODUCION The past decade has seen the rapid development of information communication technologies (ICTs) in China. For example, “China has become the biggest mobile communication carrier in the world since 2001.” (Jun and Hui, 2010). The advanced communication technology is an important component in the social movements and plays a key role in environmental activism. As Hung Chin-Fu (2013) point out, the civil…

    • 1171 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Section A – Question 1 Evidence from Canada and elsewhere suggests that new computer-based information technologies are having differential effects on employment and the quality of work. Which groups of workers may be benefiting from the implementation of these technologies and which groups may be negatively impacted? Why? Is the situation any different for workers in the information-services economy compared to workers in the older industrial economy? It is undeniable that technology,…

    • 1208 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Wolftech Case Study

    • 1164 Words
    • 5 Pages

    a. Information Security Risk Assessment System for Wolftech The risk management is a process to identify risks within organization and to further manage the operations through putting up necessary controls in place. The further importance of risk assessment can be ascertained through fact that about 48% of the 283 companies have been victims of the computer crimes over 12 months’ period. In some other incident the internet worm affected the largest and complex network of computer in few hours.…

    • 1164 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Social Engineering Essay

    • 1422 Words
    • 6 Pages

    of Malicious Communication Defining Social Engineering Social engineering is defined by Berti (2003) as “the criminal art of tricking staff into revealing corporate information.” Social engineering can take place on various levels, and for various purposes. Social engineers can target other individuals and extract enough information to steal their identities (Brower, 2010). They can also use social engineering to perform reconnaissance on an organization, gaining critical knowledge to plan a…

    • 1422 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    only changing the form in which learning opportunities are offered, but also enabling students to survive and prosper in digitally-based learning environments… Traditional notions of literacy need to be challenged, and new literacies, including information literacy and IT literacy, need to be considered as foundation elements for digitally involved learners. (Martin, 2006) It is by no means Judgment Day (a reference to the Terminator…

    • 1385 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    The Dark Side Documentary

    • 715 Words
    • 3 Pages

    Imagine having your whole family being humiliated on the internet and there is nothing that can be done about it. This scenario in particular happened to a family in the documentary Lo and Behold: Reveries of a Connected World. In the documentary Werner Herzog examines the digital landscape in the world. The scenario of the tragedy that happens in the documentary is explained the section “The Dark Side”. The Dark Side expresses the bad and horrible effects of the internet, which includes…

    • 715 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    there is no expectation of honesty neither party will be completely invested in the communication. Utilizing honesty as a cornerstone of all communication within an organization will ensure that participants of the communication can rely on the information passed along. Additionally, dishonestly has been shown to not only harm personalities and relationships but also reduces the effectiveness of the parties that are lied to (Dauten, 1964). Considering a business can only be as effective as…

    • 1189 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    affected the creature in a negative way. Victor began to keep his work hidden after he started to talk with the philosopher at Ingolstadt. He describes this professor of natural philosophy as “an uncouth man, but deeply imbued in the secrets of his science” (26). It is here where Victor learned that it is socially acceptable to cover up mistakes,…

    • 792 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    is life without technology? We live in a world where technology is developing even as we speak. It is important to understand the knowledge of information technology as well as keeping up to date with various changes that are always developing. It is continuously changing in the business community and I wish to be a part of these changes. Studying information technology for many years, I have grown to enjoy the subject. Although, part of the course is fairly demanding, I relish in working under…

    • 700 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Edward Snowden Violations

    • 1039 Words
    • 5 Pages

    I can imagine that people would not want to help you if you don’t trust them and feel the need to spy on them. The debate of whether what Edward Snowden did was the right or wrong thing also seems kind of up in the air. Obviously releasing the information that he did got the U.S. government into quite a bit of trouble with other countries and angered many of its own citizens, but are the government’s actions of disregarding the rights of the people justified if it is for the sake of protecting…

    • 1039 Words
    • 5 Pages
    Improved Essays
  • Page 1 5 6 7 8 9 10 11 12 50