Browse by individual material type and use our filters to help sort the results to suit your requirements.
You Selected:
Area of Study:
- (-) Remove Business and Management filter Business and Management
Includes Teaching Notes:
Target Audience:
- (-) Remove Graduate Students filter Graduate Students
Topic:
- (-) Remove Information Systems filter Information Systems
Search
Content Type
Area of Study
- Covid-19 Research (0)
- Research Methods (0)
- murder case (0)
- Education (0)
- Integrated Marketing Communication (0)
- Law (0)
- Liberal Arts (0)
- Religion (0)
- Sciences (0)
Topic
- Economics (0)
Target Audience
Length
Region
Language
- Spanish (0)
Published by
Includes Teaching Notes
- No (0)
After a terrorist attack at the Pensacola Naval Air Station, Apple received immense public pressure to comply with the FBI’s request to assist in unlocking the encrypted iPhone of the attacker. Apple’s evolving technology will open the company...
Terrance Lau was the program manager of the Campus Network Refresh, a major program to upgrade network connectivity of the Mountainside State University (MSU). Lau was preparing for an upcoming meeting with the new executive sponsor. The...
In an environment where published public opinion can make or break a company, both individuals and organizations should be aware of what content is permissible in an online review, and what crosses the line into defamation. Also important is...
Google subsidiary, YouTube, has collected data of children users without the consent of parents and then sold the data to advertisers. The Federal Trade Commission fined Google $170 million in what was the largest fine in Google’s history....
On January 15, 2012, Zappos, an Amazon subsidiary, was the victim of a purposeful hacking attack. CEO Tony Hsieh sent out a tweet, alerting customers that the systems had been penetrated and directing them to a letter with incident details and...
In the aftermath of the San Bernardino shooting in December 2015, Apple was required by a federal court order to assist the FBI in unlocking the primary suspect’s iPhone 5c. Apple would need to build a new software program in order to comply...