Research Papers on Computers & The Internet

Click on any of the term papers to read a brief synopsis of the research paper. The essay synopsis includes the number of pages and sources cited in the paper.

 

Research Papers on Computers & The Internet

Click on any of the term papers to read a brief synopsis of the research paper. The essay synopsis includes the number of pages and sources cited in the paper.

  • Using Technology to Help Teach World History

    This 5 page paper discusses ways to use the computer, Internet and other technology to teach world history. The writer argues that the Internet provides a vast amount of information to the student, all in one place, making learning interesting and fun. There are 5 sources listed in the bibliography.

  • Internet and the Impacts on Post-Secondary Education

    In a paper of five pages, the author reflects upon the use of computer technology in post-secondary education, especially in relation to the role of the Internet and the skills needed by incoming learners. There are four sources.

  • Apple Computers' Struggle Against Microsoft.

    A paper that addresses the problems faced by Apple Computers, Inc. The author contends that Apple computers main competition, Microsoft, is the industry leader and maintains a monopoly on the home and business PC market. However according to the author, Microsoft's monopoly is due to a negative stigma on Apple Computers and clever marketing my Microsoft, not because Apple's are inferior. This five page paper has one source listed in the bibliography.

  • An Overview of Tablet Computers

    Tablet computers are becoming increasingly popular. The writer gives a broad overview of the technology, starting by defining the term tablet computer and then looking at the current life cycle stage, the patterns in use and take-up, ending by looking at the way in which tablet computers may be used in the future. Seven sources are cited in the bibliography this four page paper.

  • Investigating Computer Fraud

    This paper discusses the field of computer forensics, what it is, what investigators do, detection tools, cyberslacking, chain of custody, steps for computer forensic investigators. The paper comments on numerous topics that are integrated with computer forensics. There are sixty-four sources used in this forty-three page paper.

  • Computers in Classrooms

    This 5 page paper discusses the use of computers and other technology in classrooms from K through college and university level. The writer provdies an overview of the history of computer use in education, then discusses one successful program in detail. The writer also discusses the steps necessary to integrate computers and technology into a curriculum successfully, the need for better teacher training and the value to students of using cmputers. There are 6 sources listed in the bibliography.

  • Forensics and Computer Crime

    In eight pages computer forensic specialists are considered in a discussion of computer crime investigation that includes crime types and agencies that conduct investigations with the assistance of computer forensics. Five sources are cited in the bibliography.

  • Choosing a Computer

    This 7 page paper looks at how a computer may be chosen. The paper is written in three parts, looking first as the way the student may want to use the computer, then at the software that will be needed and finally at the hardware requirements. A computer system and software is selected using an $800 budget. The bibliography cites 7 sources.

  • Injuries Related to Computer Work

    Computer-related injuries in the workplace are more common than ever before because computers are now found in most every occupation. This three page paper examines work related computer injuries. Five sources are listed in the bibliography.

  • Cybercrime

    In eight pages dealing with the increased incidences of Internet cybercrime are discussed with a consideration of UK law and specifically the Computer Misuse Act of 1990. Twelve sources are listed in the bibliography.

  • Issues Involving Computer Viruses

    In a paper consisting of twenty one pages compromised computer security and Internet privacy are just two of the issues considered with a discussion of viruses, consumer data scanning and an examination of the differences between illegal hacking and appropriate data mining is also included. Eighteen sources are cited in the bibliography.

  • Society, Young Adults, and Computer Technology

    In four pages this paper discusses the importance of computer technology such as the Internet in teaching young people how to become productive adult members of society. Four sources are cited in the bibliography.

  • The Growth and Evolution of Blogs and E-Learning Resources

    Both blogs and e-learning resources have increased on Internet over the past few years. The writer looks at these two trends seen in a virtual environment, describing what is occurring, looking at the technology and the way in which it is impacting on Internet users. Nine sources are cited in the bibliography of this five page paper.

  • How has the Internet Impacted on the Global Environment?

    The writer takes a broad look at the way that the use of the internet has impacted across the global interdependent with the progress of globalization. The use to fools such as Facebook and twitter are considered in the context of use in protests and revolution, including Iran as well as looking at how the internet has supported the concept and development of global brands. Twelve sources are cited in the bibliography of this eleven page paper.

  • Diabetes, Internet Websites

    This research paper describes the content of five internet sites that pertain to diabetes mellitus. The writer discusses the utility of these sites and offers guidance as to the factors that patients should consider when researching information on the Internet. Three pages in length, five sources are cited.

  • The Impact of the Internet on Communication - Collective Work and Journalism

    This paper is written in two parts. The first part of the paper assessed the way that the internet has facilitated collective working towards common goals. The second part of the paper examines the impact internet reporting has had on journalism. Three sources are cited in the bibliography of this four page paper.

  • Access to Internet for Remote Areas: Annotated Bibliography

    This 4 page paper gives an overview of twelve sources related to internet technologies. This paper includes a discussion of drones and balloon as possible remote internet solutions. Bibliography lists 12 sources.

  • Innovation for Internet Banking - A Research Proposal

    The banking industry has changed a great deal, the use of internet banking has become more popular and reduced the level of differentiation between banks. The writer proposes research to find ways for banks so undertake innovation within the internet banking sector. Ten sources are cited in the ten page paper.

  • Computer Evolution from Mainframe to Distributed Systems

    In ten pages this paper considers the computer's 1944 beginnings with IBM and their evolution from mainframe to distributed systems with thin clients, fat clients, networking, and personal computers among the topics of discussions. Eighteen sources are cited in the bibliography.

  • Tourism and the Internet

    The internet has increase the flow of information that tourisms can use to make travel arrangements, from social networking forums and information site to the proliferation of travel agents and travel portals that are found on the internet. The paper examines the influences that are present and why the travel industry, especially companies like Expedia has benefits to such as high degree from the internet with specific interest its role as a distribution medium. Twenty sources are cited in this sixteen page paper.

  • The Regulatory Framework for Internet Banking in the United States

    Traditional banking regulations have not been sufficient to cope with the challenges presented by the online environment and the increased level of Internet banking take place. The writer examines the way in which the traditional banking regulations cover Internet banking and then at the way specific issues for Internet banking are being tackled, including issues such as identity theft and security. The regulatory and legislative tools are discussed and challenges are considered. Eleven sources are cited in the bibliography this eleven page paper.

  • Internet Technology and Society

    In eight pages this essay assesses the societal pros and cons of Internet technology.

  • Human Behavior and the Impact of the Internet

    In six pages this essay discusses how human behavior is affected by the Internet.

  • Email, Ecommerce, and the Internet

    In six pages this essay discusses the behavioral impact of the Internet in a consideration of electronic commerce and email.

  • Student Submitted Case Study on ILI

    In four pages this student case study on an early Internet auction company includes an assessment of corporate strategy.

  • Computer Security

    8 pages in length. As the first of billions of emails flew through cyberspace nearly thirty years ago, the idea of computer security was not at the forefront of users' minds. In fact, the very notion of any threat inherent to the World Wide Web was so unheard of that even those who stood a great deal to lose from unauthorized entry were basically oblivious to the looming danger that would appear only years later. Today, computer security is the number one priority for anyone who uses the Internet, a reality born of unforeseen infiltration by those who seek to do great harm to the recipient of such an attack. Bibliography lists 8 sources.

  • Overview of Computer Security

    In ten pages this research paper focuses on computer security and its breaches with statistics covering its type, incidences, and losses for 1998 along with security techniques to protect computers against hacking along with improvement recommendations. Six sources are cited in the bibliography.

  • Computer Aided Graphic Design

    A detailed history of graphic design, this thirty page paper emphasizes the importance of computers in computer aided graphic design. Several groundbreaking advancements have been made in the twentieth century. These include the utilization of feng shui and the transition from 2D to 3D. These advancements have not occurred without problems, however. Problems such as gender equality still exert a toll on the graphic arts. Eighteen sources are cited.

  • Buying a Laptop

    This 5 page paper considers the process of buying a laptop computer with the use of a needs analysis. The example used in s laptop computer for family use. The bibliography cites 4 sources.

  • Human Intelligence versus Computer Intelligence

    In an essay consisting of three pages an article that discusses human and computer intelligence distinctions is analyzed with the consensus being that human intelligence can never be completely reproduced by computer intelligences. There is no bibliography included.

  • The Technological Evolution of Computers

    The focus of this ten page paper is a delineation of the many changes that have occurred in computer technology since the introduction of the analog computer. Storage medium and CPU technology have experienced particularly dramatic changes. Nine sources are cited.

  • Evolution of Computer Technology

    In four pages computer evolution is traced from the 500 B.C. abacus to contemporary desktop computers. Four sources are cited in the bibliography.

  • Education and Computer Uses

    In five pages the evolution of computers in the field of education is traced to the 1944 MARK 1 installation as discussed in the June 1997 T H E Journal article 'Computers in Education A Brief History' written by Andrew Molnar with its instructional benefits emphasized. There are no other sources cited.

  • Computer Science Majors and Computers

    Core computer curriculum is discussed in six pages as it pertains to a computer scienc major with an emphasis upon getting back to basics which cement a strong vocational foundation. There is no bibliography included.

  • The Roles of the Computer and E-Commerce in a Video Store

    A two-part paper investigating the growing necessity of e-commerce and the computer in business, and examines computer-cataloguing system options for a video-rental store's website. The author applies conclusions from the first part to the video-rental business discussed in part two. This twenty-three page paper has thirty sources listed in the bibliography.

  • Ideal Computer Building

    In six pages the ways in which the ideal computer can be built with a $2,000 budget is examined in terms of keyboard and monitor selection as well as the computer itself that is powerful enough for an advanced user with cost breakdowns provided. Three sources are listed in the bibliography.

  • Computer Hardware and Peripherals: The Evolution of Learning

    In a paper of three pages, the writer looks at computer peripherals and hardware. The writer stresses how he or she has personally grown to learn more about computers over time as the result of practice and research. Paper uses one source.

  • Criminal Justice and Computers

    In five pages the criminal justice system is examined in terms of the significant impact of computers with FBI investigations of organized crime through computer usages discussed along with education and careers in the field of criminal justice also considered. Three sources are cited in the bibliography.

  • Do Pure Play Internet Banks Create Value?

    This 58 page paper looks at the way in which pure play internet banks, such as First Direct and Egg, may be able to create value. The paper presents a full dissertation style paper, with an introduction and objectives followed by an in-depth literature review. The literature review examines the role of the banks, examines the way that they compete and the importance and place of internet banking in the banking industry. The potential ways that pure play internet banks may add value studied from a theoretical perspective. After a section on methodology primary research using questionnaires is then simulated; assessing the perspective of internet banking using a sample made up of customers of the HBSC subsidiary; First Direct. The results are presented and then discussed. The bibliography cites 43 sources.

  • WIPO Internet Intellectual Property Protection

    The writer gives some background information on the World Intellectual Property Organization (WIPO) and then considers the two main treaties which are used to protect intellectual property in the internet; WCT and WPPT, which came into force in 2002. Three sources are cited in the bibliography of this three page paper.

  • Internet Marketing

    In eight pages this paper examines ecommerce in a consideration of Internet marketing, its opportunities, and emerging markets. Nine sources are listed in the bibliography.

  • Censorship and the Internet

    In six pages this paper examines political and social arguments pertaining to the issue of Internet censorship. Nine sources are cited in the bibliography.

  • Unfairness and Censorship of the Internet

    In seven pages this paper argues that the Communications Decency Act is unconstitutional in its unfair Internet censorship. Eight sources are cited in the bibliography.

  • Internet Censorship of Dangerous Information

    In five pages this report argues that Internet censorship of dangerous information such as bomb making is an important way of foreign terrorist attack prevention. Five sources are cited in the bibliography.

  • Advertising and the Internet

    In eight pages this paper examines Internet advertising in a discussion of marketing strategies and comparisons with conventional approaches to advertising. Seven sources are cited in the bibliography.

  • Internet Advertising and Economics

    In ten pages this paper discusses the economic effects of Internet advertising on both merchants as well as consumers. Ten sources are cited in the bibliography.

  • Current Market and Advertising on the Internet

    In fifteen pages this report examines Internet advertising and its significant contemporary market impact. Twenty five sources are cited in the bibliography.

  • Advantages and Disadvantages of Advertising on the Internet

    In eight pages the Internet advertising is discussed in a consideration of its history, advantages, and disadvantages. Seven sources are cited in the bibliography.

  • Corporate v Personal Rights on the Internet

    This 5 page paper discusses the rights of individuals vs. corporate rights on internet privacy. Bibliography lists 7 sources.

  • Internet Privacy and Safety

    This paper consists of twelve pages and discusses the Internet in a consideration of related issues regarding privacy and security. Thirteen sources are cited in the bibliography.

  • Controlling Workplace Internet Usage Through Planning

    In five pages the problems of Internet usage are supplemented with a balanced plan to deal with privacy and security issues. There are five sources cited in the bibliography.

  • SECONDARY DATA FOR INTERNET USAGE IN SINGAPORE

    Presents data on Internet usage in Singapore. There are 3 sources listed in the bibliography of this 4-page paper.

  • Legal Issues Involving Internet Usage and Minors

    In five pages this research paper discusses legal issues that pertain to Internet use by minors. Seven sources are cited in the bibliography.

  • Monitoring of Email and Internet Usage and Ethics

    In five pages this paper considers the ethical implications of Internet and email monitoring and offers a resolution that is both ethically as well as legally appropriate. Three sources are cited in the bibliography.

  • Analysis of the Internet's Past, Present, and Future

    In twenty one pages this paper analyzes the Internet's past, present, and future in a consideration of such topics as technology, sales, advertising, privacy, and security. Fifteen sources are cited in the bibliography.

  • The Internet, Security, and Financial Institutions

    This paper discusses Internet security issues with regards to banking and financial institution transactions and possible solutions to these growing problems in 6 pages. Two sources are cited in the bibliography.

  • Internet Security and Recent Developments

    In four pages this paper examines Internet security issues and system protection measures. Six sources are cited in the bibliography.

  • Internet and Hotel Industry

    In seven pages the hotel industry and the effects of the Internet are considered in an examination of 5 hotel websites that are found on the WWW. Six sources are cited in the bibliography.

  • Systems Analysis, Computer Design, and Mathematics

    In three pages this paper examines the employment position of systems analyst and the importance of mathematical proficiency. One source is cited in the bibliography.

  • Google And Internet Search Engine Industry

    This 4 page paper begins with a brief overview of Google, Inc. The paper provides an analysis of Google using Porter's 5 Force analysis. Bibliography lists 6 sources.

  • The Dangers of Internet Gambling

    A 3 page paper which illustrates the dangers of internet gambling with an argument it should be illegal. Bibliography lists 5 sources.

  • School Budget Internet Technology Spending

    In seven pages this paper considers primary school spending on early years' IT teaching in an identificationof needed equipment and persuasive choice justification. Four sources are listed in the bibliography.

  • Internet-Based Activities

    A 3 page research paper that describes and discusses 3 Internet-based activities designed to be used in a fourth-grade science class. The goal of the tasks is to teach the students about endangered species. The learning goals are scaffolded, each building on the other. Bibliography lists 3 sources.

  • Programs of University and Online Distance Learning

    In ten pages programs of distance learning that are being developed internationally through the Internet and offered by colleges and universities are examined. Ten sources are cited in the bibliography.

  • The Likely Effects Of E-Commerce On The Future Of Book Publishing

    This 10 page paper looks at the way on which e-commerce and the electronic media is likely to change the way books are published and sold in the future, looking at companies such as Amazon, eBay and Abe Books. The paper looks at the importance of the printed word and how publishing has changed in response to technology in the past and looks forward to the potential changes that may occur, especially with the concepts of e-books sold on the internet. The bibliography cites 4 sources.

  • Meanings of Copyright Laws

    International and domestic copyright laws are considered in this paper containing 8 pages which includes discussion of Internet copyright laws, WTO, WIPO, and the Copyright Law of 1976. There are 8 cited in the bibliography.

  • Three Stages in the Development of a Distance Learning Program

    The writer looks at a universe that is planning to implement a distance learning strategy utilizing the internet. The paper presents three of the many stages which will be needed for the different developments. The first is the assessment of the strategy and the development of web pages. The second is the requirements analysis and the third is the mobile computing application to support distance learning. Seven sources are cited in the bibliography of this nine page paper.

  • Should Your Company Accept Credit Cards Over the Internet?

    Nowadays, a company that cannot or will not accept credit cards for payment over the Internet is at a distinct disadvantage in terms of customer acceptance. This paper examines the issues a company wishing to start accepting credit cards must face, such as security and software available. This paper has seven pages and five sources are listed in the bibliography.

  • The Value of Customer Relationship Management for Web Based Retail Operations

    The writer proposes the implementation of a customer relationship management system (CRM), for a firm providing retail operations through the Internet. The potential benefits of CRM considered in the context of the value chain, required supporting technology infrastructure, implementation and consideration on the way in which the change should be implemented. Eleven sources are cited in the bibliography this sixteen page paper.

  • Marketing EMI Music in the Digital Age

    EMI are facing a number of marketing challenges, the decision by Radiohead to release tracks on their own website and increase in digital music downloads are all indicators of the changes. This 11 page paper looks at some of the challenges EMI face in terms of the general marketing of a service rather than a physical good and consideration of the influences and impact of marketing on the internet. The bibliography cites 11 sources.

  • Educational Trends

    This 9 page paper reviews five journal articles dealing with emerging or existing educational trends. Among the trends discussed are the increasing use of the Internet in the classroom, school-university partnerships and cooperative teaching. There are 5 sources listed in the bibliography.

  • British Airways and Iceland Air's E-Commerce Ventures

    A two-part paper, one looking at Iceland Air's and British Airway's web sites, the other providing a PEST analysis of economic, political, technological, and social influences on airlines, with respect to the Internet and e-commerce. This eight page paper has five sources listed in the bibliography.

  • Overview of Domain Name System

    This paper consists of five pages and considers the domain name system in terms of electronic mail and the Internet with the importance of various domain levels also discussed. Four sources are cited in the bibliography.

  • Service Characteristics and Consumption Trends That Impact on a Travel Agent

    This 9 page paper looks at the service characteristics needed by a travel agent and examines the trends within the travel industry. The writer looks at issues such as the changing role of the travel agent, increase consumer empowerment, the role and importance of the internet and general trends and preferences. The bibliography cites 10 sources.

  • Speech and Property Issues

    In fifteen pages this paper discusses intellectual property rights issues and free speech with Two Live Crew rap group and Dustin Hoffman cases and the impact of the Internet and file sharing upon idea ownership. Ten sources are cited in the bibliography.

  • Online Security

    In seven pages this paper considers Internet security issues in a consideration of such topics as hacker insurance and encryption technology. Nine sources are cited in the bibliography.

  • IPv6

    In four pages this paper examines Internet Protocol Version 6 in terms of definition, function, and how it improves over the previous version 4. Two sources are listed in the bibliography.

  • Downloading Music Legally

    In three pages this paper examines Internet music downloading form a legal standpoint and the benefits the music industry receives. Five sources are cited in the bibliography.

  • Professional Morality, Ethics, Email Privacy, and System Administrators

    In ten pages this paper examines Internet privacy issues and ethical problems that confront many systems administrators. Eight sources are cited in the bibliography.

  • Reallocating Marketing Budgets

    A 5 page paper that introduces the topic by commenting on marketing changes when television became popular. The essay comments on Internet marketing and corporate sponsorship of different events with examples. The last part of the paper focuses on sponsorship marketing in Singapore. Bibliography lists 3 sources.

  • MCBRIDE FINANCIAL SERVICES AND MARKETING

    This 3-page paper provides a marketing plan for McBride Financial Included in the paper is a discussion about Internet marketing. Bibliography lists 2 sources.

  • Hypothetical 2000 Advertising and Marketing Plan for Budweiser

    In fourteen pages a hypothetical Anheuser Busch marketing and advertising campaign is presented in terms of company challenges, and suggestions that favor Internet advertising with traditional approaches. Nine sources are cited in the bibliography.

  • Past, Present, and Future of the Brokerage and Banking Industry

    In thirty pages this paper examines the importance of brokerage firms in a consideration of how banks are no longer the only 'financial game in town' in a consideration of such issues as the effects of the Internet, competition, deregulation, pricing, and banking industry products. Sixteen sources are cited in the bibliography.

  • Case Study Involving Bank of America

    In seven pages changes in risk management, assessment of risk, management strategies, and measurement along with Internet and e-banking developments are examined in this case study of Bank of America. Six sources are listed in the bibliography.

  • WWW Shopping

    In seven pages this paper discusses Internet shopping in terms of its benefits and also its major flaw. Ten sources are cited in the bibliography.

  • Wireless Communication's History

    In five pages this paper discusses the evolution of wireless communication from Marconi's initial invention to the complexities of Internet technology in this historical overview. Five sources are cited in the bibliography.

  • TURNING POINT DRUG REHAB AND SOLUTION DESIGN

    This 9-page paper suggests steps and methods to technology project plans for a fictitious rehab center's web-based customer service design and Internet banner advertising. Bibliography lists 9 sources.

  • Futures and Options on Silver and Yahoo!

    This 6 page report discusses the various investment properties, futures, options, and features of silver and the web portal company Yahoo! The world of Internet stocks and investment is often bewildering to the more traditional investment experts, as well as the individual investors. However, attempting to protect investments through a commodity of great 'traditional' value such as silver is not a wise move in the modern marketplace. Bibliography lists 9 sources.

  • Electronic Media and Direct Marketing

    In thirteen pages direct marketing and the influence of electronic media such as the Internet and the marketing changes and adaptations that have resulted are considered within the context of the statement 'The power of the web…is as a direct marketing medium par excellence…the web or…email marketing…are simply new media offering new scope for the exercise of direct marketing skills.' Fifteen sources are listed inthe bibliography.

  • Pros and Cons of E-Commerce for SME's

    A paper evaluating the pros and cons that the growth of e-commerce and the Internet has on small and medium sized enterprises (SME). The author also presents some possible solutions to the problems faced by SME's within the world of e-commerce. This four page paper has five sources listed in the bibliography.

  • IS DOWNLOADING MUSIC STEALING?

    This 3-page paper examines the issue of downloading free music off the Internet. Bibliography lists 2 sources.

  • WWW's Future in Terms of Security and Electronic Commerce

    In five pages this paper discusses the future of the Internet as it pertains to ecommerce security and privacy issues with the encryption of data and TCP/IP protocol among the topics covered.

  • Control Management Systems Change

    In a paper consisting of sixty five pges the need for change management assessment in current automating systems as well as the issue of control management systems changes overall are discussed with a sample company used regarding control systems that are Web and Internet based. Thirty sources are cited in the bibliography.

  • Mobile Telephone Company and a Decision Support System

    In five pages a mobile telephone company is examined within the context of establishment an Internet based Decision Support System that requires an understanding of its developmental methods and what constitutes and effective online Decision Support System. Ten sources are cited in the bibliography.

  • Individual Rights Usurped by the U.S. Supreme Court

    In five pages this paper presents the argument that the U.S. Supreme Court's decisions have usurped the rights of the individual with the example of the infringement of constitutional rights, the rights of women, and Internet privacy issues among the topics discussed. There are included source copies and four sources are cited in the bibliography.

  • Overview of Life Insurance

    In twelve pages this paper discusses the life insurance industry that considers among other topics the influence of AIDS and HIV as well as Internet technology. Nine sources are cited in the bibliography.

  • CENSORSHIP IN MYANMAR (BURMA): AN OVERVIEW

    This 10-page paper examines media censorship in Myanmar. Topics include types of media censorship and how the Internet is starting to break through it. Bibliography lists 6 sources.

  • Marketing Management of Singapore's Royal Sporting House

    In ten pages this paper discusses RSH's marketing management as well as proposed Internet and new market expansion. Twelve sources are cited in the bibliography.

  • Developing Marketing for McBride

    The writer looks at the way a fictitious company; McBride Financial Services, offering a service to help home buyers find low cost mortgages, may develop a marketing campaign. The paper starts with a consideration of why and how market research should take place, and then assesses the different media forms that may be utilized effectively to appeal to a limited geographical market, including assessment of the Internet as a marketing channel. Three sources are cited in the bibliography this four page paper

  • New Media Technologies and Their Cultural Implications

    In ten pages the cultural implications of new media technologies are discussed withiin the context of developer awareness and how perceptions can be derived from Internet content. Eleven sources are cited in the bibliography.

  • Traditional Media and the Effects of New Media

    In four pages this paper discusses conventional media and the effects of the new media of CDs and the Internet. Four sources are cited in the bibliography.

  • Privacy Issues Involving Online Portals and Personal Information

    This paper examines how privacy can be infringed upon through online portals of Internet websites and the personal information they contain. Ten sources are cited in the bibliography.

  • Competition Issues and Microsoft

    In five pages this paper examines 3 issues regarding Microsoft and competition including Microsoft corporate acquisitions and the impact on Internet competitors' share prices, Microsoft's potentially threatening financial moves where competitors are considered, and if Microsoft's market dominance is threatening to competition. Six sources are cited in the bibliography.

  • Client Server Computing and the Significance of Java

    In ten pages Java's client server computing significance is examined in a discussion of its applications and the increased use of Internet servlet tools. Eight sources are cited in the bibliography.

  • Classifications of Web Sites

    This 9 page paper discusses three types of web sites and how they relate to front-end and back-end applications. The three types are database access sites, transaction-oriented sites and delivery system sites, and the term back-end applications refers to Internet, intranet and extranet applications. There are 8 sources listed in the bibliography.

  • Cultural Gatekeepers and Search Engine Politics

    In six pages this paper discusses Internet search engines and the impacts of how information is ranked and indexed. Four sources are cited in the bibliography.

  • It's Popcorn Time Marketing Mix

    In four pages this paper examines promoting IPT and introducing the product to new customers in a consideration that includes Internet sales' implementation and a potential national gift service association contract. Two sources are cited in the bibliography.

  • It's Popcorn Time Marketing Plan and Recommendations

    In five pages this paper presents a marketing plan for IPT along with recommendations regarding Internet sales with a PowerPoint speaker notes marketing plan presentation also available. Four sources are cited in the bibliography.

  • Home Shopping

    In twenty five pages this overview of home shopping services such as QVC and the Home Shopping Network include history, increasing popularity, and Internet shopping's future. Twelve sources are cited in the bibliography.

  • Advertising on the Internet; Creating Pull for Bricks and Mortar Stores

    This 4 page paper considers if it is possible to internet advertising in order to create demand for a product in retail stores and persuade the retailers to stock the goods. The paper looks at the case of Estee Lauders’ ‘Advanced Night Repair Concentrate’, and considers if this type of strategy will persuade the shops to stock the product. The bibliography cites 7 sources.

  • Academic Integrity, Student Research Methods, and Study Skills

    In six pages this paper discusses academic integrity, Internet and library research, time management, and the importance of setting and achieving objectives. Five sources are cited in the bibliography.

  • The Uses of TCP/IP Protocol Today

    This 5 page paper discusses the Transmission Control Protocol/Internet Protocol (TCP/IP), an older technology that is once again being widely used. There are 7 sources listed in the bibliography.

  • The Use of Venture Capital and the Impacts of the Internet on the Development of E-Commerce in China

    16 pages and 7 sources used. This paper provides an overview of the emerging role of venture capital on the development of Web-based business operations in China. This paper considers the impact of venture capital, the strategies for the use of capital investments, and the focus of these elements relative to the use of Internet operations in Chinese businesses.

  • Consumer Behavior Changes and Marketing Implications

    In thirty three pages consumer behavior since the 1920s is examined along with the implications changes had upon marketing with World War II, the Consumers Bill of Rights, TQM, and the Internet among the topics discussed. There are more than twenty sources cited in the bibliography.

  • The Research Process

    This 15 page paper discusses the steps in undertaking a research study, including an overview of research, developing a research project, using statistics and variables, using libraries and the Internet, types of research, writing the report, and a brief discussion of a potential research project. Bibliography lists 13 sources.

  • The Employment Situations in California and in America as a Whole

    5 pages and 10 sources used. This paper provides an overview of the employment situation, unemployment rates and the economics of the state of California in 2002. This paper also looks at the problems that occured in California's Silicon Valley, the declining conditions and problems with Internet company failure and their impacts on unemployment rates. This paper considers the problems in the economic health of the country as a whole in order to give some insight into the problems in California.

  • Fast Food and E-Commerce

    This 10 page paper considers the impact that e-commerce has had on the fast food companies and their financial management. The paper looks at the potential ways e-commerce may be used, such as management of the supply chain, marketing and the use of the internet as a sales medium. The paper uses examples of real companies to illustrate the points raised. The bibliography cites 15 sources.

  • Promotional Analysis of Harry Potter Books and Films

    In four pages this paper discusses the 'retailing' of the Harry Potter book and film franchise in an analysis of Internet, print, and television media promotion. Five sources are cited in the bibliography.

  • LEGAL ANALYSIS: BUG INC

    This 3-page paper answers questions about Internet trademark infringement and tort liability as it pertains to fictitious company Bug Inc. Bibliography lists 2 sources.

  • Bermuda Triangle and its 'Mystery'

    In five pages this paper discusses how Internet misinformation reinforces a nonexistent mystery regarding the Bermuda Triangle. Five sources are cited in the bibliography.

  • Types of eMarketing

    In six pages the differences between traditional and Internet marketing are considered in a discussion of various types of emarketing tools that are employed in enticing and retaining online customers. Nine sources are listed in the bibliography.

  • EBAY AND NEED FOR SECURITY

    About eBay and its Internet security efforts. There are 12 sources listed in the bibliography of this 10-page paper.

  • Types of Addiction

    A personal perspective on addiction with the focus on the Internet and comics are examined and strategies that might be employed to cure this addiction are included. There are two bibliographic sources cited.

  • AT&T and VoIP Technology; Strategic Issues

    This 9 page paper looks at the well known communications company AT&T and the way ion which VoIP will impact on it strategically. The paper gives a brief background to AT&T and then looks at the way voice over internet protocol (VoIP), has been adopted by the company and the way it may impact on the company along with the way the changes could be leveraged for its’ advantage. The bibliography cites 7 sources.

  • VoIP AND OVERVIEW

    Discusses Voice over Internet Protocol (VoIP), some history, current usage and predictions. There are 12 sources listed in the bibliography of this 10-page paper.

  • Overview of VoIP Technology

    In fourteen pages Voice Over Internet Technology and how it operates is examined in an overview that includes packet switching uses, price samples, and this technology's future. Five sources are listed in the bibliography.

  • Telecommunications, Technology, and Law

    In six pages this paper examines cable, wireless formats and Internet privacy as they relate to telecommunications and the law. Eight sources are cited in the bibliography.

  • Thornton's Strategy in Action, Strategy Development and Organizational Learning

    Thornton's is a premium chocolate supplier in the UK, selling though their own shops other outlets and on the internet. This 14 page paper is written in two parts. The first part identifies the strategies used by Thorntons and then looks at how they can be seen in action in the company. The second part of the paper looks at the way strategy may be developed and ho it appears to evolve at Thornton's and the way that organizational learning may be seen within the company. The bibliography cites 14 sources.

  • Putting Company Brands on the Internet

    The writer evaluates the idea that a brand is the same no matter where it is found, and that no special theories need to be developed when a company moves into Internet marketing. The writer argues that the statement is flawed and that a company needs to find a different approach for the Internet, particularly in an international market. The paper is seven pages long and there are eleven sources listed in the bibliography.

  • Internet Information Basics

    In a paper consisting of ten pages the ways in which the Internet can be used are examined with its historical development first considered before a discussion of such applications as web browsers, email, newsgroups, and Internet Relay Chat. Hackers, privacy and security breaches are also included. Nine sources are listed in the bibliography.

  • Privacy and the Internet

    In five pages this paper examines privacy issues with regard to the Internet in a consideration of privacy protection and its intrusion represented by the Internet. Six sources are cited in the bibliography.

  • Encouraging the Development of the Internet in Developing Nations

    This 16 page paper argues that developing nations should develop Internet usage and its supporting infrastructure within their borders. The writer suggests that it's arguable whether or not the government should be involved, but there is no argument that the Internet would have tremendous benefits for the economy, particularly as it has become so vital for business transactions. There are 25 sources listed in the bibliography.

  • Journalism and the Internet

    In six pages this paper examines the topic of journalism and the role of the Internet in a consideration of present, future, and the impact of Internet journalism upon the conventional print media. Eight sources are cited in the bibliography.

  • Dell Computer Pop Up Ad Design

    This paper consists of twelve pages and designs an Internet pop up ad for Dell which examines the intrusive nature of pop up and also considers ad goals, anticipated ressults, Internet advertisging costs, ad placement and adjustment, as well as results. Seven sources are cited in the bibliography.

  • The Deleterious Effects of Computer Gambling

    This 5 page paper addresses this compelling issue. Gambling addiction is only one reason considered to support a thesis opposing Internet gaming. The paper concludes that Internet gambling sets people up to lose money and should be illegal in all states. Bibliography lists 2 sources.

  • Internet Banking

    In a paper consisting of ten pages Internet banking is examined from customer and banking perspectives and also considers how one becomes a customer of an Internet bank and the advantages and disadvantages of this banking alternative. Seven sources are cited in the bibliography.

  • Pure Play Internet Banks; Can they Create Value?

    This 30 page paper considers whether or not pure play internet banks are able to create value. The paper starts with an in-depth literature review considering how internet banks may create value and the challenges they face along with the limited existing research. The paper then presents a methodology and some fictitious results to a survey of customers using the UK bank First Direct to assess the value the bank creates. The bibliography cites 23 sources.

  • Internet Automobile Shopping

    In eight pages shopping for automobiles on the Internet is considered in terms of the marketing challenges faced by sellers in this process of direct purchase with positive and negative factors related to Internet buying also included. Five sources are cited in the bibliography.

  • Love in internet relationships

    In this three page paper the writer considers love and romance via internet relationships, and if 'internet love' actually exists. There are two sources listed in the bibliography.

  • The History of the Internet

    This 3 page paper provides a brief history of the Internet. Specific individuals are named. The Internet and WWW are differentiated. Bibliography lists 4 sources.

  • Overview of the Internet and Marketing III

    In ten pages this paper examines Internet marketing in a consideration of what it is, how it takes place, and its benefits with online marketing approaches, credit card alternatives, costs, and Internet security issues among the topics discussed. Eight sources are cited in the bibliography.

  • The Bahamas, Internet Security and Governance, and Challenges Facing the Islands

    The writer discusses the issues of Internet governance and Internet security with reference to the Bahamas. There are six sources listed in the bibliography of this four page paper.

  • VoIP

    Voice Over Internet Protocol is the focus of this research paper consisting of seven pages and includes definition, functions, and its impact upon telecommunications and the Internet. Six sources are cited in the bibliography.

  • Job Analysis in Electronic Equipment

    This essay offers a job analysis. The job description was obtained through a Dept. of Labor publication and compared to what an employee actually does. The job is Computer User Support Analyst. Both the employee and the employee's supervisor were interviewed. There is one source listed in the bibliography of this five page paper.

  • Nanotechnology: Role In Speeding Up Computers

    10 pages in length. The yearly trek to upgrade outmoded electronic devices that have barely been paid off from the previous year has indeed become a tradition; with the ever-progressing nature of technological breakthrough, a computer that had all the new bells and whistles for 2007 can hardly draw one-quarter of its original sales price in 2009 when being sold on eBay. This never-ending cycle whereby perfectly good - if only a tad bit slow - computers are being tossed into the closet to make room for speedier versions of themselves has become somewhat of an obsession with the IT manufacturing industry and all those who eagerly wait to scoop the next version of electronic velocity. However, the time is nearing where such a huge step in the arena of computer speed - nanotechnology - is about to be realized that may well extinguish the need for inevitable annual upgrade. Bibliography lists 5 sources.

  • eBanking and its' Influence on Accounting Information Systems

    This 32 page paper looks at the use accounting information systems (AIS) in banks, and considers what impacts ebanking, or internet banking, has had on the AIS within banks. The paper starts with an introduction and discusses why and how this research is valuable. The use of AIS is then discusses before an in-depth look at the model of internet banks and the requirements that are made of any AIS within internet banking systems. This is examined to identify the areas of different which may have impacted on the evolution of AIS within banking. The bibliography cites 30 sources.

  • Title, Premise, Design for DNP Project

    This paper presents an outline for a student's Doctor of Nursing Practice (DNP) project. The paper describes the project title, premise and design. The DNP project proposes using an intervention that is designed to address depression among minority adolescents, which utilize a computer game. Five pages in length, five sources are cited

  • The Decision Over Justin Ellsworth's Email

    This 4 page paper gives an answer to the question of whether or not Yahoo should have given the email access to Justin Ellsworth's parents. This paper includes reason why it's wrong to decide not to protect someone's privacy over the internet when it is in other cases involving someone's private property. Bibliography list sources.

  • Security on the Internet and Cryptography

    One of the most important solutions for Internet security is cryptography. This paper discusses use of encryption to enhance TCP/IP and compares and contrasts the two.This paper has five pages and four sources are listed in the bibliography.

  • Positive and Negative Aspects of Computers

    In five pages the evolution of computers since the end of World War II has been fast and furious and this paper discusses its positive and negative impacts. Five sources are cited in the bibliography.

  • Real Estate and the Internet's Impact

    In seven pages this paper examines the commercial and residential real estate industry in terms of how each has been affected by the Internet's 'cyber real estate.' Seven sources are cited in the bibliography.

  • Digital Radio Developments

    In six pages this paper considers digital radio and its development and includes an examination of computers, telephones, interactive networks, satellites and the many digital gadgets and tools currently being created. Ten sources are cited in the bibliography.

  • Computer Networking and How It Evolved

    In three pages this paper examines computer networks in terms of definition and the changes in its processes with WAN and LAN types among the topics discussed. Five sources are cited in the bibliography.

  • Constitutional Rights v. Internet Privacy

    In nine pages this paper examines the conflicts regarding constitutional rights and civil liberties and Internet privacy. Eight sources are cited in the bibliography.

  • A Marketing Campaign to Promote Tasmania as a Tourist Destination

    Tasmania is an area of diversity and natural beauty. The writer presents a marketing campaign. The first part of the paper identifies a potential target market and justified why that market is to be targeted. The second part of the paper moves on the development of a marketing campaign using billboards, the internet and magazines. Six sources are cited in this seven page paper.

  • A Marketing Campaign to Encourage responsible Water Usage

    The writer develops a marketing campaign to support responsibility water usage. The campaign is targeting children, based on television advertising and an internet web site. The justification for the planned approach which uses an animated character is considered in the context of marketing theory. Fourteen sources are cited in the bibliography of this seven page paper.

  • Arguments Against Internet Censorship

    In a paper of four pages, the writer looks at arguments against internet censorship. The Toulmin model is then utilized to gauge the validity of the arguments. Paper uses four sources.

  • IWB-Latest technology for Schools

    IWB are whiteboards that attach to a computer and using a projector with special software, the teacher can broadcast large images onto a screen that is both finger and pen sensitive. Empirical evidence regarding the effect on student learning is lacking but there are good anecdotal comments. There are seven sources listed in the bibliography of this five page paper.

  • Learning as an Ecosystem

    This paper describes the open resource approach to learning that has emerged thanks to the Internet. Web 2.0, in particular, is discussed. There is one source in this five page paper.

  • Identifying a Suitable Organizational Diagnosis Model

    The writer looks at four different models which may be used to assess and organization and help with the determination of strategy. Using the example of Microsoft and their recent acquisition of internet communication company Skype, the models are discussed to identify which may provide the greatest value. The four models disused are Lewin's force field model, the congruence model of Nadler-Tushman, Weisbords 6 box model and McKensey's 7 S's model. Seven sources are cited in the bibliography of this seven page paper.

  • LAN Computer Network Construction

    In nine pages a Layered Approach Network for business is examined in a consideration of various standards, procedures, and techniques with definitions and construction issues as well as a description of each layer in this computer network provided. Nine sources are cited in the bibliography.

  • Pros and Cons with Search Engines

    In this essay of four pages, the writer examines why we need to scrutinize the content that our children are exposed to on the internet and why it is essential for them to use it. The essay also covers the Pros and Cons regarding search engines related to the topic.

  • The Process and Barriers in Communication

    The writer outlines the process and complexities of communication, including an analysis of the way communication takes place on the barriers which may stay with communication. Incorporated within the discussion is the impact of the Internet and the potential challenges faced by communicating in a foreign language. Eleven sources are cited in the bibliography this ten page paper.

  • Hackers and Hacking

    Hacking is an ongoing issue in computer security. This paper examining the issues associated with hacking. The paper starts by examining the scope and scale of hacking. The way hacking may take place is then discusses, and finally environmental influences that help to turn IT students into hackers is discussed. Five sources are cited in the bibliography of this three page paper.

  • Computers and the Y2K New Millennium Bug

    This paper examines the many computer problems that can result from the Y2K bug upon the year 2000 in five pages. Three sources are cited in the bibliography.

  • Investigating Cyber Bullying Using The Internet

    This essay pertains to critiquing three Internet sources, a blog, a video and a podcast, as to their validity and applicability to the topic of cyber bulling. Four pages in length, five sources are cited.

  • INTERNET SECURITY TECHNOLOGIES - AND PREVENTING THEM FROM BEING COMPROMISED

    This 5-page paper focuses on how to prevent humans from compromising Internet security. Bibliography lists 7 sources.

  • Impact on Those Who Play Computer Games

    There has been a debate about the impact of action and violent video and computer games on those who play them. This especially pertains to youth. Some argue these games will lead the user to commit criminal acts, other argue they will not. Finally, there are empirical research studies that demonstrate there are numerous positive cognitive and perceptual effects for those who play the games. There are three sources used in this four page paper.a

  • Overview of Computer Viruses

    In five pages computer viruses are discussed in terms of definition, effects, and various preventative measures. Five sources are cited in the bibliography.

  • History of the Internet

    In eighteen pages this paper presents an extensive history of the Internet with business, ecommerce, and user information provided. Twelve sources are cited in the bibliography.

  • Health People 2010: Low-Income, Low Literate, Diabetic New Yorkers

    5 pages in length. Statistics clearly illustrate the challenges low-income diabetic New Yorkers have in the ongoing quest to access the Internet to reach the plethora of helpful information pertaining to their disease. For example, seventy-seven percent with income of $15,000 or less have no computer, which equates to eighty-one percent unable to access from their homes (Commission on Independent Colleges and Universities, 2007). While these findings provide valuable information pertaining to how this works against their health, it is important to note that a number of programs are being implemented in order to fix the problem. Bibliography lists 7 sources.

  • The Need for Hard-Back Books

    A 3 page essay that discusses why hard-back books are better than reading books online. Reading a book is not the same as reading text on a computer screen. This is true for several reasons. First of all, there is the immediacy of hard-back book, as everything the reader needs is there, at the fingertips. There is also the factor of portability, that is, not everyone has a laptop or a book reader. Also, there is the problem of copyright and issues pertaining to access, which seem likely to continue to constitute obstacles to Internet access to recent books. Taking these points individually, the value of hard-back books is self-evident. Bibliography lists 1 source.

  • Human Learning and Computer Technology

    In a paper consisting of five pages the ways in which computers can enhance human learning skills are discussed in this educational consideration. Twelve sources are cited in the bibliography.

  • Don't Bother Me, Mom, I'm Learning by Marc Prensky

    In three pages this paper discusses how young people can be enticed to learn through the use of computer games. One source is cited in the bibliography.

  • English Language Instruction and Computers

    Teaching English and the value of computer software are the focus of this proposed research study and literature review consisting of four pages. Seven sources are listed in the bibliography.

  • Ethics and Copyright Infringement

    In five pages the ethical implications of reproducing computer software without authorization are discussed with morality and ethics being defined as each relates to copyright infringement and 'The Ring of Gyges' argments of Glaucon and Socrates is also used to discuss the economic and legal repercussions of such actions.

  • Technological Innovations Between 1930 and 1944

    This 6 page paper looks at a range of technological innovations which took place between 1930 and 1944. The paper discusses innovations including the development of photocopier technology, the radio telescope and a computer. The innovations are discussed and patterns underlying technological innovation of this time assessed. The bibliography cites 5 sources.

  • Post Industrialization Graphic Design

    In five pages this paper considers how graphic design has changed as a result of computer technology in a discussion of how graphic designers must rely upon eye catching creativity and the importance of conveying messages for marketing purposes. Two sources are cited in the bibliography.

  • Graphic Design, Typography, and the Impact of CAD Design

    In ten pages this paper discusses how graphic design and typography have evolved in a consideration of the impact of computer aided design. Ten sources are cited in the bibliography.

  • Computers and Floating Point Arithmetic

    In sixteen pages computers and floating point arithmetic are discussed in terms of establishing greater understanding of inexact floating number representations. Four sources are cited in the bibliography.

  • Modern Instructional Strategies and Computer Technology

    In five pages modern instructional strategies are examined within the context of computer technology's influence and the impact on technology development with an argument presented supporting educational uses in learning at the elementary and secondary academic levels. Six sources are cited in the bibliography.

  • Federal Government Sharing of Strategic Information

    In seven pages this paper discusses the problems associated with capital planning and budget computer information storage in a consideration of the compartmentalization of information and its strategic federal governmental sharing. Three sources are cited in the bibliography.

  • Literacy Improved Through Interactive Computer Reading Programs

    In five pages this paper examines how interactive computer reading programs have impressively improved children's literacy rates. Four sources are cited in the bibliography.

  • Marketing to the International Community

    Culture is important for a business to consider in international marketing, but also such mundane issues as electrical service and differing standards of business practice. This paper examines how a company can determine whether the international marketplace is right for its products and services. Examples include computers and candy bars. This paper has five pages and four sources are listed in the bibliography.

  • Computer Virus Spreading, Hacking, and Ethics

    This paper consists of ten pages and examines computer virus spreading and hacking from an ethical perspective. Eleven sources are cited in the bibliography.

  • Information Access and Computer Science

    In seven pages the technology of computer information retrieval systems is examined and discusses how it can be incorporated into other techniques such as summarization and information extraction in order to create a system of answering questions that is both user friendly as well as technologically sophisticated. One source is cited in the bibliography.

  • Chiropractics and Radiology

    In five pages this research paper examines how chiropractics will feature radiology in the future in a consideration of digital and computer records, acceptable error, and reliability rate of a cervical X ray intra examiner. Eight sources are cited in the bibliography.

  • Persuasion Analysis of Mac Advertisement

    This paper analyzes an Online advertisement for Mac computers from Apple, Inc. The paper discusses routes to persuasion, psychological concepts and elements of persuasion. Discussion is directed at the Mac advertisement. There are eight sources listed in the bibliography of this six page paper.

  • Firefighting Assistance from Computers

    In eight pages this paper examines how computers aid fire departments in a discussion of such topics as firefighting education, fire simulations and prevention, call responses, and fire tracking. Ten sources are cited in the bibliography.

  • Current Trends Regarding Network Security Issues

    In fifteen pages this paper examines computer networks in an overview of security issues and a discussion of such topics as wireless network protection and firewall problems. Six sources are cited in the bibliography.

  • Computer Network Security: Security Devices

    This 6 page paper discusses some of the devices used to enhance the security of computer networks, including keys, firewalls and digital certificates among others. Bibliography lists 6 sources.

  • Technology/Hospitality Industry

    A 4 page research paper that discusses the many uses of technology in today's hospitality industry. Technology has changed the way in which the hospitality industry operates. It has gone from pen-and-paper accounting to utilization of the latest computer and automated technology. The writer discusses property management systems and other innovations. Bibliography lists 5 sources.

  • Computer Design Evolution

    In five pages this paper examines how design and art were influenced by the evolution of computers. Four sources are cited in the bibliography.

  • Computer Science and Graph Theory's Future

    In three pages this paper defines graph theory and considers its mathematical uses and then it is applied to its future computer science uses. Four sources are cited in the bibliography.

  • Fuzzy Logic Controllers (FLC) In Computer Systems

    This paper analyzes the use of FLC in computer systems. The author includes a three-stage model of the FLC system and discusses the importance of neural networks. This nine page paper has eight sources in the bibliography.

  • P2P Connections, Grid Computing, and Their Impacts

    In five pages this paper discusses how the future of computers has been impacted by P2P connections and grid computing. Ten sources are listed in the bibliography.

  • Children's Developmental Disorders and Reading

    In four pages this paper discusses how reading and computer generated learning can have a positive impact upon children with attention deficit disorder, dyslexia, or other types of developmental disorders. Six sources are cited in the bibliography.

  • Computer Software and Hardware Assessment Questions

    In four pages four computer hardware and software questions are answered and include hardware ergonomics samples, T carrier and DSL differences, automated purchasing system changing and the selection of software and hardware, and artificial intelligence. Three sources are cited in the bibliography.

  • Do Computers Have Creative Ability? An Artificial Intelligence Consideration

    In seven pages this paper considers will examine the issues of 'what ifs' as they pertain to artificial intelligence and the creative abilities of computers. Three sources are cited in the bibliography.

  • Exporting Computers to Kenya

    In seven pages the ways in which an American company can export computers to the African region of Kenya are examined in a discussion that includes Kenya economic information, the market potential, political system, taxes, necessary licenses, and promotion methods. Five sources are cited in the bibliography.

  • Electrical Engineer's Duties

    In a paper consisting of eight pages electrical engineers and their duties regarding computer systems in the military are examined. Eight sources are cited in the bibliography.

  • Small and Medium Business Accounting Information Systems

    In this five page paper the impact of accounting systems on small and medium sized businesses are assessed with such issues as the advantages of using a variety of computer systems and networks, possible operational problems security, and information availability discussed. There are nine bibliographic sources listed.

  • Active Directory Plan

    This 3 page paper provides an overview of Active Directory Plan. Active Directory is a Microsoft directory service that first appeared in the Windows 2000 server. Active Directory is a database system that allows for the grouping of objects, including computers, users and shared folders. Bibliography lists 3 sources.

  • Computer Graphics Applied to Photography

    This 3 page paper discusses what the advances in computer graphics mean for traditional photography. The writer discusses the way in which images can be manipulated and transmitted around the world. There are 3 sources listed in the bibliography.

  • Apple and Dell, Supply Chain Management

    This 12 page paper looks at the supply chain of Apple Inc., focusing on the computers and the physical supply chain and compares it with Dell Inc. The paper gives some background to the companies and then looks at the way the supply chain operates upstream and the type of suppliers that are used as well as the management of the downstream supply chain. The bibliography cites 11 sources.

  • United Kingdom and Computer Crime

    In eight pages this paper considers UK computer crime levels and ponders whether the present legislation is sufficient to successfully combat 'cyber' crime with a surprising consideration of the barrier to fighting it. Thirteen sources are listed in the bibliography.

  • Computer Equipment Confiscation for Crime Investigation and an August 1999 Article in the Cyber Law Journal of the New York Times

    In five pages this report discusses an article that examines problems encountered with computer equipment confiscating as part of a crime investigation. Four sources are cited in the bibliography. -

  • Case Study on Decision Making

    In five pages five questions posed by a student are answered that involve executive cube usage, support for group decision making, modeling value, best teaching methods for using a computer system, Keirsey types of personality, and decision making process categories. Five sources are listed in the bibliography.

  • Crime of Computer 'Hacking'

    The topic of this argumentative essay consisting of seven pages is computer hacking, which is presented as a serious crime that requires critical evaluation by members of society. Eight sources are cited in the bibliography.

  • Proposal for a Small Business Management Information System

    In fifteen pages this paper examines how a small business can create a management information system to meet its need in a proposal of 2 possible computer solutions, pricing, and suggestions. Six sources are cited in the bibliography.

  • 4 Methodologies for Information Systems Development

    In nine pages information systems development is examined in a consideration of four methodologies including Information Systems work and Analysis of Change, Effective Technical and Implementation of Computer-based Systems, Dynamic Systems Development Method, and Jackson Structure Design with definitions and diagrams provided. Six sources are listed in the bibliography.

  • Stating a Business Case for the Linux Operating System

    In ten pages this paper explains a company's reason for bypassing Windows in favor of the Linux operating systems for computers. Eight sources are cited in the bibliography.

  • Hypothetical Case Assessment on Massage Therapy

    In five pages this paper presents a hypothetical assessment of massage therapy as it can be used to treat a computer programmer and middle aged bowler in massage focuses and pain contributing muscle factors. Four sources are cited in the bibliography.

  • Laptops and Babies Are Not a Good Combination

    The writer of this four page paper describes a day in which a friend worked on a laptop while his son tore up the computer owner’s house.

  • Increasing Laptop Sales Overview and Marketing Plan

    In five pages this paper examines how laptop computer scales can be increased through marketing techniques and plans with a sample executive board meeting's 'minutes' excerpt and mention of 'Robert's Rules' along with future outlook included. There is no bibliography provided.

  • Global and Multi-Country Strategies

    This 4 page paper looks at three different products; a personal computer, a washing machine and an online MBA degree and discusses whether a multi-national company should adopt a global or a multi-country strategy for each of these products. The bibliography cites 4 sources.

  • Disaster Recovery Planning

    In five pages this paper examines how companies can protect computers from viruses, hackers, or natural disasters. Six sources are listed in the bibliography.

  • Computers and the Use of Natural Language Processing

    In seven pages this paper examines computer word processing and the uses of natural language in a consideration of history and program improvement suggestions. Five sources are listed in the bibliography.

  • SECURITY OF INFORMATION

    This 4-page paper discusses the aspect of computer and network security and how much security is too much. Bibliography lists 3 sources.

  • Comparison of UNIX, OS2, and Windows Computer Operating Systems

    In fifteen pages these various computer operating systems are presented in an overview with pertinent information provided and a conclusion that user familarity and system compatibility are key determining issues. Fifteen sources are cited in the bibliography.

  • Project Proposal; A New Computer System for a Retail Firm

    This 4 page paper is a project proposal for the implementation of an integrated computer system for a small chain of retail stores. The organizational situation is reviewed, objectives are identified and then the 9 knowledge areas of PMBOK are briefly considered. The bibliography cites 3 sources.

  • Mobile Printer Product Management Plan

    In eighteen pages this paper discusses a mobile printer that can be used with both laptop and handheld computers in this product management plan overview. Nine sources are cited in the bibliography.

  • Prototype Model Building and Layer manufacturing

    In ten pages this paper discusses ProMetal Rapid Tooling System, Envisiontech's Perfactory Concept Modeler, and the 3D Thermojet Printer in a consideration of forming processes and computers in layering manufacturing. Three sources are listed in the bibliography.

  • Developmental Psychology and a Premier Virtual Computer Generated Symposium

    In twenty pages this paper considers how 21st century developmental psychology topics such as treatment of ADHD and prosecuting juveniles as adult offenders would be interpreted by Gilligan, Erikson, and Freud are considered in this virtual computer generated topical symposium. Twelve sources are cited in the bibliography.

  • Storage Capabilities and the Impact of Quantum Computing

    In fifteen pages this paper discusses computer hardware in miniature in a consideration of quantum computing and its storage capabilities. Ten sources are cited in the bibliography.

  • Flat Panel Computer Monitors Advantages and Disadvantages

    In six pages the advantages and disadvantages of flat top panel desktop computers and displays for laptops are assessed. Seven sources are listed in the bibliography.

  • Bangladesh's Computer Industry Development

    In twenty five pages this paper considers how in Bangladesh the computer industry developed and evaluates its Third World implications. Twenty sources are cited in the bibliography.

  • Background and Analysis of the UNIX OS

    The computer operating system known as UNIX is the focus of this overview of ten pages that includes its background history and analysis of its computing significance. Five sources are cited in the bibliography.

  • Examination of Computer Viruses

    In eleven pages this research paper considers computer viruses and their consequences in terms of societal effects, costs, future implications, and also examines Marxist theory as it applies to this topic. Ten sources are cited in the bibliography.

  • Types of Computer Viruses

    Computer viruses are discussed in terms of type and transmission in a paper consisting of four pages with two recent examples provided. Five sources are cited in the bibliography.

  • Computer Viruses 'Cyber Ethics' and Personal Responsibility

    In ten pages this paper examines the problems of computer viruses in terms of the destruction they inflict and the importance of increased social and personal responsibility so that this unfortunately practice can be eliminated. Eleven sources are cited in the bibliography.

  • Types of Computer Programming Languages and Basic Information

    In five pages computer programming language types such as object oriented, imperative, logic, and functional are discussed. Four sources are cited in the bibliography.

  • Types of Computer Programming Languages

    In a paper consisting of 5 pages the various computer programming language types are examined along with a consideration as to why there is such a diversity and a consideration of using C over other compilers in an assessment of advantages as well as disadvantages. Eight sources are cited in the bibliography.

  • Overview of Prolog Programming Language

    In ten pages this paper discusses the versatile Prolog computer programming language in this overview of its history and many uses. Five sources are cited in the bibliography.

  • Cluster Computing and Supercomputers

    In eight pages this paper discusses the usage of cluster computers and supercomputers and which system would work best for such corporations as Boeing, Nedcor, GE, and Wal Mart. Eight sources are listed in the bibliography.

  • Tutorial on Electronic Commerce Quality Management

    In eight pages Dell Computer Company and Amazon.com are discussed in this ecommerce tutorial that considers the importance of quality management with commentary and a literature review included. Eleven sources are cited in the bibliography.

  • Upgrading Riordan Manufacturing's Working Information

    A 3 page paper discussing upgrade needs in sales and marketing. Riordan Manufacturing has a wealth of information available to it, but it is not using that information to its best advantage. Providing the sales force with laptop computers networked to Riordan's primary system will provide a start on building current information, while the addition of appropriate database or forecasting software can make use of the information that already exists. Bibliography lists 1 source.

  • Third Party Computers and Denial of Service Attack

    In three pages this argumentative paper discusses a denial of service attack within a business context and whether or not there is any type of possible legal culpability if a third party computer was employed as a zombie in order for the attack to be completed. Ethical considerations and tort law are applied. Two sources are listed in the bibliography.

  • Home Computer System Purchase

    In five pages this paper considers hardware, software, speed, and size as each pertains to buying a home computer. Four sources are cited in the bibliography.

  • Crimes Committed by Computers

    In twelve pages this paper examines computer hacking and traces its origins back to the 1960s and includes a discussion of John 'Captain Crunch' Draper who hacked into phone company lines in the 1970s along with other relevant topics considered pertaining to cyber crime. Fifteen sources are cited in the bibliography.

  • Computer Hacking History

    In three pages this paper briefly considers computer hacking in a history that dates back to the Sixties. Twelve sources are cited in the bibliography.

  • Computer Hacking and Ethics

    In five pages this paper examines computer hacking from all sides and then presents the argument that such a practice is unethical. Five sources are cited in the bibliography.

  • Computer Hacking's Impact

    In seven pages this paper analyzes computer hacking and its effects upon corporations and individuals. Five sources are cited in the bibliography.

  • Disadvantaged or Low Income Learners and Computer Literacy

    A proposal outline consisting of eleven pages describes computer literacy program funding designed to assist students who are either disadvantaged or from low income households with a sample budget and program benefits also provided. Six sources are cited in the bibliography.

  • Literacy Standards Within Nursing Education Programs

    This paper examines the necessity for various types of literacy among nursing students. The author discusses computer, information, and thinking literacy. This seven page paper has eight sources listed in the bibliography.

  • Importance of Literacy in the Workplace

    In eight pages this paper examines the importance of literacy in the workplace such as organizational, computer, cross culture, interpersonal, listening, speaking, and writing skills. There are about fifteen sources cited in the bibliography.

  • ARP Protocol Subversion and Network Security

    In nine pages this report examines ARP protocol subversion which can allow a hacker to significantly compromise computer network security. Five sources are cited in the bibliography.

  • Overview of Network Security

    This paper considers computer network security and related issues in ten pages. Ten sources are cited in the bibliography.

  • Security Issues and Computer Viruses

    In four pages this research paper examines computer viruses in terms of how they are spread, their destructive characteristics, and various risk factors with system protection techniques also discussed with the emphasis that there are unfortunately no foolproof safeguards. Four sources are citd in the bibliography.

  • Civil Engineering Applications of Computer Technology

    In fifteen pages computer technology is examined within the context of its impact upon civil engineering in terms of operations and systems with various technology applications discussed along with potential problems and an evaluation of their successes supplied. Twelve sources are cited in the bibliography.

  • Computers and Usage of Security Blankets

    In seven pages this paper discusses how security blankets can be used in the protection of digital copyrights and prevention of computer security circumventing. Ten sources are cited in the bibliography.

  • Memorandum on Computer Security

    In a paper of three pages, the writer looks at computer security. An inter-office memo is used to explore various security approaches and outcomes. Paper uses two sources.

  • Computer Security Issues

    This 4 page paper discusses computer security in four areas: auditing and monitoring; cryptosecurity; transmission security; and TEMPEST. Bibliography lists 7 sources.

  • Telecommunication Battery Industry

    In ten pages this paper presents an overview of computer and cellular telephone battery manufacturing in a consideration of competition and marketing issues. Six sources are cited in the bibliography.

  • Films and 3D Computer Graphics

    In five pages this essay considers how special effects are no longer conventionally created by rather achieved through the use of 3D computer graphics. Four sources are cited in the bibliography.

  • Overview of Computer Aided Software Engineering

    The various aspects of CASE or Computer Aided Software Engineering are examined in eight pages. Seven sources are cited in the bibliography.

  • 3D Computer Graphics and Film Special Effects

    This research paper consisting of seven pages presents the argument that producing special effects through the uses of 3D animation and computer generated graphics represent a considerable improvement in a foreward progression of the film industry. Six sources are cited in the bibliography.

  • The Ethics of Hacking

    An 8 page overview of computer crime related to hacking. This paper explores the ethics and justifications of hacking, dismissing those justifications as simply illogical. Bibliography lists 9 sources.

  • Using Computer Networks and Security Issues

    In eighteen pages this paper examines computer network usage and the threats to security such networks confront with the future of network security also contemplated. Twenty five sources are listed in the bibliography.

  • Personal Finance and the Impact of Technology and Computers

    In six pages this paper discusses how personal finance has been affected by technology and computers. Four sources are cited in the bibliography.

  • Dell Computer's Capital Sources

    In three pages this paper examines the 2003 Annual Report of Dell Computers in a consideration of its Weighted Average Cost of Capital and capital sources. Five sources are cited in the bibliography.

  • Home Health and Hospice Company Business Requirement Analysis

    In ten pages a home health and hospice company is examined in terms of its two information technology needs which include adding laptop computers, printers, and a wireless network for visiting nurses to educated patients and a self service automated HR system. Ten sources are cited in the bibliography.

  • E-Mail Security on Laptops

    This 3 page paper looks at the problem of security of e-mails on laptop computers in a wireless environment. The paper assesses the problem and presents some solutions. The bibliography cites 4 sources.

  • Complex Problems Solved Through Transmission Control Protocol / Internet Protocol

    In twelve pages this essay presents a TCP IP overview which includes Internet history and the necessity for this protocol's development with TCP and IP layer tasks also outlined. Fourteen sources are cited in the bibliography.

  • India's Internet Services Industry

    This paper examines India's web services industry in a determination whether or not such an investment could be regarded as high risk in four pages. Two sources are cited in the bibliography.

  • The Emergence of a New Internet Society

    In a paper containing 5 pages 'Internet Addiction,' its causes and problems are considered. There are five sources cited in the bibliography.

  • Teens and Addiction to the Internet

    In six pages this paper examines the Internet addiction social problems among teens. Five sources are cited in the bibliography.

  • Internet Addiction Disorder

    In six pages this paper examines types of Internet addictions and how this behavior can be successfully treated by using expressive art therapy or the twelve step program. Five sources are cited in the bibliography.

  • The Internet

    A 5 page paper which compares and contrasts Greenfield’s Virtual Addiction (Chapter 2: The Nature of Addiction), and Stoll’s Isolated by the Internet. No additional sources cited.

  • Best Practices for Internet Security Protection

    Internet security 'best practices' are the focus of this paper consisting of 6 pages. The bibliography cites 12 sources.

  • Amazon.com and Internet Jurisdiction

    A 5 page paper discussing Amazon.com's international operations and legal problems that the company potentially could become entangled with as Internet law continues to change. Amazon operates 9 sites (US, UK, China, etc.) and likely is bound by the laws of the country in which those sites are located. Jurisdiction changes have been occurring since an Australian court decided in 2002 that the site of injury imposed by a US site owner was Australia. Bibliography lists 6 sources.

  • Computer Operating Systems at Huffman Trucking

    Based on a fictitious case study the network diagrams are examined in order to discover the operating systems that are used in the firm and at each location, followed by consideration of the motivations for the use of the systems that are present. One source is cited in this three page paper.

  • Internet's 'Industrial Revolution'

    In eight pages this paper compares the Internet with the Industrial Revolution in a consideration of similarities. Six sources are cited in the bibliography.

  • Comparison of Internet and Traditional Shopping

    The writer looks at the way consumer experiences of internet and traditional shopping takes place with the aim of assessing whether or not there is a good potential for businesses to increase revenues by competing online. The two concepts are contrasted and compared and the general trend in shopping patterns in order to determine the potential for firms. There are specific references to firm in Turkey. Eight sources are cited in the bibliography of this none page paper.

  • Time Travel and the Internet's Cyber Telephone Museum

    In twelve pages this paper examines the Cyber Telephone Museum in which the Internet uniquely depicts the history of the telephone. Seven sources are cited in the bibliography.

  • Developments in Voice Over Internet Protocol

    In three pages VoIP developments are discusses with the Nortel Networks and IBM alliance among the topics examined. Four sources are cited in the bibliography.

  • Voice Over Internet Protocol History

    In six pages this paper examines VoIP in a consideration of its history and its future posibilities that include taking over the 'plain old telephone service' or POTS. Seven sources are cited in the bibliography.

  • Essay Questions on Voice Over Internet Protocol Answered

    In four pages this paper considers VoIP with various essay questions answered.

  • Handheld Notebooks and Palm Computers and Pen Based Input Technology

    In six pages this paper discusses the technological implementation of pen based inputing and its market capabilities. Seven sources are cited in the bibliography.

  • Internet Tax Resources

    In five pages this paper examines various online tax sources for the purposes of researching U.S. tax laws and codes.

  • The Rise of the Internet in Kenya

    The history of the Internet is provided as it respects Kenya's access. There are two sources listed in the bibliography of this three page paper.

  • Future of the Internet

    In fourteen pages this history of the Internet also considers its future applications and uses. There are 8 sources cited in the bibliography.

  • Internet Right to Privacy and Communications Policy

    In five pages the various privacy issues that pertain to the Internet are examined in terms of the communication issues and concerns involved regarding telecommunications and policy. Four sources are cited in the bibliography.

  • Internet vs. Privacy up to Individual Tastes

    This 5 page opinion paper posits that Americans have no privacy rights on the Internet under the law in the way they imagine their rights. Privacy is up to each individual. Bibliography lists 3 sources.

  • Pros and Cons of Internet Grocery Retailers

    In fourteen pages and 2 parts this paper considers the pros and cons of online grocery selling with an application of student research.

  • Internet Marketing Options for a New SME

    This 3 page paper considers potential marketing options for a new medium sized e-business. Choices such as search engines, banner advertisements and viral marketing are discussed along with a potential way of monitoring the sales that the different marketing sources create. The bibliography cites 3 sources.

  • Globalization and the Internet's Role

    In eight pages this paper examines globalization in an overview of the role the Internet plays. Eleven sources are cited in the bibliography.

  • Comparative Analysis of Ask Jeeves and Yahoo Internet Search Engines

    This paper examines which represents the best stock investment in a comparative analysis of stockholder equity and prices for Ask Jeeves and Yahoo search engine stocks in three pages.

  • Computer System Security Types

    In four pages this paper discusses business and individual Internet security with software problems and Mac OS, Windows and Linux operating systems examined. Three sources are cited in the bibliography.

  • Nike's Internet Initiative, E-Nike and E-Marketing Strategies

    A report examining e-marketing practices of corporate powerhouse, Nike. The author discusses the unique methods used by Nike in its e-commerce efforts. This six page paper has eight sources listed in the bibliography.

  • China, Singapore, and New Media and Internet Technology Uses

    The ways in which Singapore and China employ new media and Internet technology are discusses in twelve pages with the role of the government a primary focus. Twenty sources are cited in the bibliography.

  • China and Internet Negotiations for the 2008 Olympics

    A 3 page look at China’s negotiations for limited Internet during the 2008 Olympics. Bibliography lists 3 sources.

  • Technology Teaching on the Internet and Student Characteristics

    In sixteen pages this paper examines technology instruction in the Internet such as Java programming language teaching and considers student characteristics in an evaluation of who would enjoy the greatest success in such education. Thirteen sources are cited in the bibliography. -

  • Internet Marketing of Nokia to Students

    In twenty six pages this paper examines how to market Nokia cellular telephones and accessories to a student target market in a discussion of ecommerce and emarketing concepts, approaches, security, advantages and disadvantages, with a recommendation offered. Twenty sources are listed in the bibliography.

  • Risk Management and Construction Information Sharing on the Internet

    In ten pages this paper discusses the importance of information sharing on the WWW in the construction industry in this risk management overview. Seventeen sources are cited in the bibliography.

  • Cyberbullying and Internet Privacy

    The cases of Megan Meier and Tyler Clementi are examined. Laws on cyberbullying are addressed. There are six sources listed in the bibliography of this 5 page paper.

  • Internet and Information Democratization

    In four pages both sides of the issue regarding democratization and the Internet are discussed with an emphasis upon informations pertaining to health with the inclusion of a research project proposal. Two sources are cited in the bibliography.

  • Internet Gambling Should be Banned

    This 3 page argumentative essay looks at gambling and why Internet gambling is particularly disturbing. Gambling addiction is discussed. Bibliography lists 8 sources.

  • Computer Environment and Making Smart Networking Choices

    In five pages this paper examines networking options and include such relevant topics as Ethernet, Fast Ethernet, client server networks and peer to peer networks. Eight sources are cited in the bibliography.

  • ASP Code and Internet Shopping Carts

    In three pages this research paper discusses Internet shopping carts in a consideration of the ASP code, Security Sockets Layer code, and shopping transactions as handled by PayPal. Three sources are cited in the bibliography.

  • Internet Banking and Traditional Banking

    This 10 page paper discusses the ways in which the role of the traditional bank is changing, and in particular, the fact that banks now need to provide Internet banking services. The writer considers how banks can supply these services and also considers such issues as security, risk and problems caused by a lack of personal contact. There are 9 sources listed in the bibliography.

  • British Banking, the Internet and Bank Competition

    In fifty pages online banking services with regards to Great Britain are discussed in terms of characteristics, profitability, customer loyalty, aggregation and other relevant issues. Twenty sources are cited in the bibliography and twenty one charts and tables are also included.

  • Internet Advertising Effectiveness

    In six pages this research paper discusses the Internet with the focus being banner advertising. Three sources are cited in the bibliography.

  • Security on the Internet and Cryptography

    One of the most important solutions for Internet security is cryptography. This paper discusses use of encryption to enhance TCP/IP and contrasts the two.This paper has five pages and four sources are listed in the bibliography.

  • Computer Science's Shifting Paradigm

    In this paper consisting of nine pages the ways in which the salesperson's role has been influenced and changed by the Internet are discussed and asserts that the position has been elevated to that of consultant and offers more rewarding satisfaction and profitable possibilities than ever before. There are twelve bibliographic sources cited.

  • Changes in Higher Education Due to the Internet

    This 7 page paper discusses the changes that online education has had on higher learning. It considers the rise of the Internet education; the way in which this type of education has moved away from the liberal arts tradition; and the impact on tenure caused by distance education. Bibliography lists 4 sources.

  • Dealing with Disaster using Computer Networks

    A disaster, natural or otherwise, can tax Local Area Nets and Wide Area Nets to the breaking point. This paper examines the design elements that should go into structuring a system robust enough to handle the extra load that would result from such a disaster. Includes Asynchronous Transfer Mode. This paper has eight pages and nine sources are listed in the bibliography.

  • Literature Review on Uninhibited Internet Effects and Safeguards

    This 5 page paper explores several topics related to internet censorship and social theories. Bibliography lists 8 sources.

 

Copyright © 1994-2018 The Paper Store Enterprises, Inc. & Research Papers Online. All rights reserved.