Verified Document

PC's, Central-System Computing, And Government Functionality In Term Paper

PC's, Central-System Computing, and Government Functionality In this article, the authors use correlational methods to prove their point-of-view. The way that this is accomplished is through a survey. They used percentages comparing two sets of subjects as well as a statistical analysis based on Cramer V scoring. The importance of the correlation was based upon whether or not the values in the study were greater than.20 on the Cramer V scale. If the score was under.20 it showed a weak relationship, while scores greater than.20 on the Cramer V scale showed a moderate relationship.

The authors address the computing problem quickly. The problem being the widespread belief that PC's can easily and cheaply replace mainframe computers in governmental operations (page 1, paragraph 3, lines 1-4). The problem itself was deduced from research studies completed over the last decade and is answered by the study conducted by the authors. The objective of the study is stated as, "Our aim is to assess whether the two computing environments are functionally equivalent, as many of the PC advocates would have it, or whether PC-only environments provide only some of the functions, applications, and benefits of their bigger brothers and sisters -- the mainframe and minicomputer environments" (page 2, paragraph 3, lines 1-4). There are two types of variables used...

The first being the independent variable defined by the authors as the computing environment (page 7, paragraph 5, line 2). The second is the dependent variable, defined as the relationship between specific impacts (page 7, paragraph 5, line 1). These variable were used throughout the study, except for one instance where due to the wording of the questionnaire these variables where unable to be used.
The scope of the study conducted by the authors clearly addresses all of the concerns raised in the article. However the population of this study is defined as, "...two sets of cities..." (page 2, paragraph 4, line 1). The description of this population is very vague in that there is no clear definition as to the size of the cities involved. It is impossible for the reader to know whether this study is based on small cities or a large metropolis. The population used in studies referenced by the authors range from small to medium cities, but no reference is made as to whether or not the authors used the same size population in their own study. The authors specify the sampling of this study to be, "Assistant managers, department heads, technical staff, and administrative staff..." (page 4, paragraph 3, line 3), and referred to studies used for comparison that used the same sampling. It is unclear as to whether the same population…

Cite this Document:
Copy Bibliography Citation

Related Documents

Wireless Broadband Technology
Words: 20344 Length: 50 Document Type: Term Paper

Wireless Broadband Technology Overview of Wireless technology Presently it is quite evident to come across functioning of a sort of wireless technology in the form of mobile phone, a Palm pilot, a smart phone etc. With the inception of fast connectivity in the sphere of commerce it is customary and useful to operate from central locations communicating with the remote branches, conducting conferences in remote places, discussing with every body at every

Benchmarking Key Loggers for Gathering Digital Evidence on Personal...
Words: 8600 Length: 18 Document Type: Multiple Chapters

Benchmarking Keyloggers for Gathering Digital Evidence on Personal Computers Keyloggers refers to the hardware or software programs, which examine keyboard and mouse activity on a computer in a secretive manner so that the owner of the computer is not aware that their actions are monitored. The keyloggers accumulate the recorded keystrokes for later recovery or remotely convey it to the person employing them. Keyloggers aimed to serve as spyware and currently

Smartphone and Tablets Smartphones and
Words: 2484 Length: 8 Document Type: Research Paper

This section of the paper is providing the disadvantages of smart phones and tablets technology for the employees working in private and government organizations. a. Cost Undoubtedly, the biggest disadvantage of smart phones and tablets technology is the cost as compared to the standard mobile phones. Since, it has been examined that the cost of smart phones is more upfront as compared to the less than about a third of such

Building a Secure Workflow Management
Words: 11534 Length: 35 Document Type: Research Proposal

Each onion router removes a layer of encryption to uncover routing instructions, and sends the message to the next router where this is repeated. This prevents these intermediary nodes from knowing the origin, destination, and contents of the message. 1.4. Lecture Survey. The predicted solution of the problems related to e-government administration depends on answering the following questions as brainstorming ideas to solve the problem and the features provided by the system

Metrics Implementation and Enforcement Security Governance
Words: 2896 Length: 10 Document Type: Research Paper

Metrics, Implementation, and Enforcement (Security Governance) How can you determine whether there has been a malware outbreak? The threat situation today has become more dangerous than in the past. Security and safety threats have been increasing in an alarming rate; there are more than 70,000 brand new bits of malware recognized daily. Well-funded cybercriminals have been currently making advanced malware that has been made to bypass present security options by launching prior

Diffusion of Innovation Diffusion Research
Words: 3226 Length: 9 Document Type: Term Paper

Potentially, this changes the way profit is used to build a larger network of computer users who now wish to harness the power of technology to develop a new world. Chapter: 9 Socioeconmics Berlin Wall Falls/Soviet Union Collapses Citation: Koeller, D. (2003), Fall of the Berlin Wall. WebChron. URL: http://www.thenagain.info/webchron/world/berlinwallfall.rev.html Tags: Political innovation, political/social upheaval, modernism in Europe Summation: By the end of 1989, the Soviet-backed regimes of Eastern Europe no longer existed and the

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now