Technology Thesis Examples & Study Documents

Get access to our online database of Technology Thesis writing samples.

Get inspired with 750,000+ our samples

Find Writing Inspiration in Our Data Base

WordsChoose values from min to maxminmax
1 page ≈ 275 words

Cybersecurity in IOT

Hence, this thesis focuses on the security issues of IoT. Moreover, it…

Words: 19214Pages: 72

Strategic Information System Coles Supermarket

A strategy which is a plan of how an information system will…

Words: 2747Pages: 11

Essay on Data Management

And so to acquire the above customer details, the analyst should scrutinize…

Words: 764Pages: 3

A Six Year Old Child Reaction

For instance, a six year old child saw Heinz was definitely wrong…

Words: 634Pages: 3

Technology Solutions and Recommendations

Other than offering buyers an excellent opportunity to view the products description,…

Words: 995Pages: 4

The Role Of Affect In Human Computer Interaction

The major objective of the article is stipulating the means in which…

Words: 686Pages: 3

Unique challenges faced by the healthcare systems

It is through these systems that the managers provides estimates in various…

Words: 935Pages: 4

Big Data in Government

The conclusion of the report will indicate how this technology can transform…

Words: 3341Pages: 13

Capstone Project Computer Hardware and Software Upgrade

In this African country, more than 90% of the students who graduate…

Words: 1048Pages: 5

Technology life cycle

However, the ideal timing for adoption of any new technology is greatly…

Words: 1595Pages: 6

THE EFFECTIVENESS OF BUSINESS INFORMATION SYSTEMS IN A CAR PARKING SYSTEM

Also, the distinction between the two types of customers (ordinary and fixed)…

Words: 1621Pages: 6

Big Data Analytics in Retailing

They can check and compare prices in a split second. However, many…

Words: 614Pages: 3

CYBERCRIME IN RELATION TO BUSINESS

When an individual commits the crime of identity theft, there are several…

Words: 2584Pages: 10

Zazzle com Usability Report

I will use zazzle. com. au to achieve the main purpose of…

Words: 1369Pages: 6

Ethical Implication to ethics

The use of Multi factor authentication tools has exponentially decreased the number…

Words: 796Pages: 3

Employee privacy and data protection of employees

The universal utilization of scope of observation methods, for example, CCTV cameras…

Words: 2809Pages: 11

Prototypes of Future Technologies in Sci Fi Movies

The movie’s first scene opens with a solar storm that attacks about…

Words: 1084Pages: 4

Is Technology and Social Media Making Society better or worse

There is no socialization anymore; it has been replaced with technology. As…

Words: 2759Pages: 11

ELECTRONIC COMMUNICATION OUTAGE MANAGEMENT ECOM SYSTEM

This, therefore, means that utility employees are made aware of the power…

Words: 1697Pages: 7

Synthesis of crystalline nanocellulose using acid hydrolysis

The study was also focused on the degree of reactivity of cellulosic…

Words: 609Pages: 3

How ethical are major internet companies

This business report discusses in detail and compares codes of ethics of…

Words: 1670Pages: 6

Heavy Metals in Rice

Asian rice consumption is more than 100 kilograms per capita per year…

Words: 2393Pages: 9

How digital reading can affect reading comprehension

‘My Father, My Mother, My Brothers, My Sisters, and Lovely Kids’, As…

Words: 31867Pages: 173

CASE STUDY REPORT FOR ZURICH

The consultancy will be glad to meet you upon request and discuss…

Words: 5175Pages: 20

Detailed program design prototype school management system

The design should also give an intractable graphical user interface (GUI) that…

Words: 1015Pages: 4

Wal Mart Case Study

The establishment of an omnichannel strategy allows the entity to offer variety…

Words: 654Pages: 3

IS Audit Report

During the auditing period, the company focused on warehouse IT infrastructure. It…

Words: 1423Pages: 6

Digital Forensics Investigative Plan

Meeting Agenda 5 4. Forensic Readiness 5 5. Focus of the Examination 5 Tools Needed For the Investigation 6 People…

Words: 2979Pages: 12

Security of Sensor Networks

The architecture of the WSN adheres to the OSI model. In this…

Words: 1886Pages: 7

POWER BI implementation

In addition, Power BI is able to provide BI services as well…

Words: 1042Pages: 4

Different Git workflows Comparison

al, pg. In its application, Git involves continuously changing codes which are…

Words: 1766Pages: 7

Agency for Healthcare Research and Quality Case Study

The agency is charged with the responsibility of enhancing the quality and…

Words: 747Pages: 3

Hotels and Casinos in Las Vegas Research

For this to work, the shareholders in the industry and the authorities…

Words: 2808Pages: 11

A Report on Number of Cases by City

The graph is presented below. From the bar graph, several observations can…

Words: 483Pages: 2

A REPORT ON ETHICAL ISSUES

Secondly, the cases measured to be termed as wicked are selected so…

Words: 1194Pages: 5

The Big Four report

These four companies are coming up with several types of products that…

Words: 2750Pages: 11

Data analysis report of the health and population statistics of East Asian and the Pacific countries

3 Scope. 4 Methodology. 4 2 Data setup. 4 3 Exploratory Data analysis. 1…

Words: 1496Pages: 6

E Commerce History Present and Future Trends

E-commerce utilizes such technologies as automated data collection systems, inventory management systems,…

Words: 1661Pages: 7

CBT Analysis Workbook Review

However, there is little variation in anger management programs a theme explored…

Words: 2110Pages: 8

Impact of Artificial Intelligence in Pharmacy

However, the negative effects of AI seem to have been overlooked. These…

Words: 1786Pages: 7

HITECH Act and HIPAA Sanctions

According to the Health Insurance Portability and Accountability Act, the Office of…

Words: 868Pages: 4

Case of study of a Profinet network using Asset Detection Methods

Its setup provides star and line topologies, besides a ring topology using…

Words: 2980Pages: 12

Cyber Espionage and its Impact

The targeted information varies depending on the spying organization and its intention…

Words: 848Pages: 4

E Commerce between the Middle East and China

MacBride8 and Feuilherade1 have done separate research works on how the online…

Words: 5052Pages: 21

Enterprise Systems Essay

Finally, the organizational change that is required in the in integrating the…

Words: 2357Pages: 9

Information security threats

Technology keeps on changing and the more it has become incorporated in…

Words: 3083Pages: 12

Analysis and Possibilities in Level Two of the Work System Method

The level brings out a work system clearly as the way an…

Words: 907Pages: 4

Security Issues in Cloud Computing

Research problem/ statement of the problem 4 1. Research questions/hypotheses 4 1. Delimitations of the study 5 1…

Words: 3066Pages: 12

Artificial Intelligence for Cyber Security Thesis

The increasing trends of the complex internet computing and distribution raise vital…

Words: 12899Pages: 49

Starbucks Coffee Company report

The trio founders of Starbucks company shared two familiar interest. They all…

Words: 6050Pages: 24

Financial statement Auditing

The materiality allocation must generally be given a low value, normally as…

Words: 1378Pages: 6

Case Study Network Design for EZY Books

Further, an explanation of each of the elements of the network infrastructure…

Words: 2028Pages: 8

Moving Existing IT Infrastructure to a Cloud Based Environment

However, with the current surge in cloud computing, making the decision is…

Words: 705Pages: 3

CISCO BASED ACADEMIC RESEARCH NETWORK ARNe

It is fundamental that the next generation networks are implemented with the…

Words: 3534Pages: 14

INTELLIGENT TRANSPORTATION SYSTEM

To highlight just but a number of services that have been facilitated…

Words: 2270Pages: 9

Teacher confidence about technology in the classroom

Using web-based learning is been proved as a progressive method of schooling…

Words: 1352Pages: 5

Report On Uber Taxi Company

Uber company was established in 2009 as UberCab by Garrett Camp, the…

Words: 1088Pages: 4

Emerging Technologies against Cybercrime

However, these developments in the computer world have created new avenues for…

Words: 4695Pages: 18

Role of Women in the Medieval Ages

Women had to adhere to strict guidelines which outlined their role in…

Words: 1191Pages: 5

EVALUATION OF WWW.PARADISEWITHAVIEW.COM WEBSITE

These rules are: consistency of user interface, shortcuts for frequent users, presence…

Words: 1213Pages: 5

Role of Twitter in Feminism

The technological advancements have impacted the economic, social and political aspects of…

Words: 1478Pages: 6

FISMA legislation compliance

Sarbanes-Oxley Act This management system act was immediately introduced after they were…

Words: 1535Pages: 6

Intelligent advertising report

There are various privacy issues associated with IOT. The data is usually…

Words: 626Pages: 3

Literature review internet of things

The basic idea was the application of electronic codes to products. These…

Words: 1740Pages: 7

Cryptography research paper

The idea of secret communication has been applied from ancient times to…

Words: 1594Pages: 6

Technology systematic literature review

Technology is now becoming a significant idea in running society efficiently. Various…

Words: 3086Pages: 12

Cyber crime lab interview

Public spaces like recreation areas have WIFI networks which are risky since…

Words: 1018Pages: 4

Why people should invest in your choice of company

Even though new investments are risky, it has been considered to be…

Words: 355Pages: 2

Information system management

Hospitals, schools, hotels among other organizations are taking on information systems to…

Words: 1194Pages: 5

Location recognition by image processing

Nowadays, the photography scene is revealed by its comparison to a database…

Words: 872Pages: 4

Fraud done on computers

Computer fraud are in many cases unrecognised. They are the biggest threat…

Words: 1807Pages: 7

Cyber security jobs research paper

Cybersecurity encounters cyber threats which are developing rapidly day by day. Due…

Words: 1421Pages: 6