Research Papers on Internet 

Click on any of the term papers to read a brief synopsis of the research paper. The essay synopsis includes the number of pages and sources cited in the paper.

  • Collaborative Group Online Learning Management

    In 10 pages this paper examines an online collaborative learning environment in terms of management pros and cons. There are 8 sources cited in the bibliography.

  • Both Sides of the Distance Learning Issue

    In ten pages distance learning's pros and cons are examined. Ten sources are cited in the bibliography.

  • Online Learning Issues

    The purpose of Online learning, or, e-learning is to provide knowledge and enhance skills. There are many advantages to e-learning. There are also challenges. For instance, students must be self-directed and self-motivated or they will not complete the course. Interactivity between and among instructor and students is essential with e-learning. There are three sources listed in the bibliography of this five page paper.

  • Literature Review of Mathematics Distance Learning

    In eight pages this paper discusses mathematics online education in a literature review of the topic. Six sources are cited in the bibliography.

  • Assessing Distance Learning Online Class Groups

    In five pages this paper discusses the obstacles to distance learning in a consideration of online class groups' advantages and disadvantages.

  • History of Distance Learning

    In four pages this research paper examines distance learning in terms of its history, programs, and future outlook. Five sources are cited in the bibliography.

  • FINANCIAL INDUSTRY'S USE OF BIG DATA

    Discusses the concept of Big Data, and how it is being used in by banks and other financial institutions. Also included is a discussion about fintech. There are 4 sources in the bibliography of this 5-page paper.

  • Employees and Electronic Monitoring

    In three pages electronic monitoring is first considered in terms of its history and then how it found itself in the workplace is explored with the electronic monitoring of employees and why many employers engage in this practice. Four sources are cited in the bibliography.

  • Content of Web Pages and Electronic Commerce Regulations

    In eleven pages this paper discusses electronic commerce and the problems that can result due to the content of web pages with national and international law and electronic merchant self regulation among the topics considered. Sixteen sources are cited in the bibliography.

  • Should Your Company Accept Credit Cards Over the Internet?

    Nowadays, a company that cannot or will not accept credit cards for payment over the Internet is at a distinct disadvantage in terms of customer acceptance. This paper examines the issues a company wishing to start accepting credit cards must face, such as security and software available. This paper has seven pages and five sources are listed in the bibliography.

  • The Value of Customer Relationship Management for Web Based Retail Operations

    The writer proposes the implementation of a customer relationship management system (CRM), for a firm providing retail operations through the Internet. The potential benefits of CRM considered in the context of the value chain, required supporting technology infrastructure, implementation and consideration on the way in which the change should be implemented. Eleven sources are cited in the bibliography this sixteen page paper.

  • Accreditation Need and Distance Education

    In ten pages distance education is considered in an overview that compares higher education programs that are online versus traditional classroom curriculum with the accreditation need factored into this examination. Twelve sources are cited in the bibliography.

  • Wireless Industry Overview and ATandT

    In fifteen pages a U.S. ecomomy overview is first presented before a discussion of the wireless industry is introduced with a concentration on ATandT Wireless and includes a Porter's Five Forces analysis, company background and a competitive strategy consideration. Eight sources are cited in the bibliography.

  • Google And Internet Search Engine Industry

    This 4 page paper begins with a brief overview of Google, Inc. The paper provides an analysis of Google using Porter's 5 Force analysis. Bibliography lists 6 sources.

  • Search Engines and Google from a Commercial Perspective

    Google are the dominant web search engine, but there is a dynamic environment and there are many influences present that may impact on this position. The writer looks at these influences and the way that Google compete, ending with recommending for the future. Six sources are cited in this seven page paper.

  • Internet and Hotel Industry

    In seven pages the hotel industry and the effects of the Internet are considered in an examination of 5 hotel websites that are found on the WWW. Six sources are cited in the bibliography.

  • Music CD Sales in Australia and the Impact of P2P File Sharing

    In twelve pages this paper discusses how the music industry in Australia has been profoundly affected by the sharing of P2P music files. Six sources are cited in the bibliography.

  • Weakened Human Interaction and Technology

    This paper discusses the views of Anna Akbari and Andrew Sullivan pertaining to the issue of how technology has altered the nature of human social interaction. The writer argues that Akbari's perspective is more in-tune with contemporary society. Five pages in length, the two essays are the only sources cited.

  • Monster Networking Case Study

    A 15 page paper. Monster.com is the best known job search e-business in the world. In 2003, the company launched Monster Networking, a work-related social networking site. This essay begins with an overview of the history of Monster.com, its sale to TMP, its growth and competitors and the issues surrounding the Monster Networking site and its disappointing results. The problem is identified and discussed, alternative solutions are analyzed and discussed and a recommendation is made. This is based on a Harvard case study. Bibliography lists 4 sources.

  • Social Networking Does Not Enhance Life Skills

    Social networking is discussed. Both sides of the controversy on this new medium is included. The paper concludes that the sites are more negative than positive. There are five sources listed in the bibliography of this six page paper.

  • On-Line Fraud and E-Commerce

    A paper addressing the issue of on-line fraud and its effects on e-commerce. The author discusses various scams, problems combating fraud and the range of on-line fraud. This ten page paper has five sources listed in the bibliography.

  • WIPO Internet Intellectual Property Protection

    The writer gives some background information on the World Intellectual Property Organization (WIPO) and then considers the two main treaties which are used to protect intellectual property in the internet; WCT and WPPT, which came into force in 2002. Three sources are cited in the bibliography of this three page paper.

  • Advertising and the Internet

    In eight pages this paper examines Internet advertising in a discussion of marketing strategies and comparisons with conventional approaches to advertising. Seven sources are cited in the bibliography.

  • Advantages and Disadvantages of Advertising on the Internet

    In eight pages the Internet advertising is discussed in a consideration of its history, advantages, and disadvantages. Seven sources are cited in the bibliography.

  • Censorship and the Internet

    In six pages this paper examines political and social arguments pertaining to the issue of Internet censorship. Nine sources are cited in the bibliography.

  • Unfairness and Censorship of the Internet

    In seven pages this paper argues that the Communications Decency Act is unconstitutional in its unfair Internet censorship. Eight sources are cited in the bibliography.

  • Internet Censorship of Dangerous Information

    In five pages this report argues that Internet censorship of dangerous information such as bomb making is an important way of foreign terrorist attack prevention. Five sources are cited in the bibliography.

  • Putting Company Brands on the Internet

    The writer evaluates the idea that a brand is the same no matter where it is found, and that no special theories need to be developed when a company moves into Internet marketing. The writer argues that the statement is flawed and that a company needs to find a different approach for the Internet, particularly in an international market. The paper is seven pages long and there are eleven sources listed in the bibliography.

  • Internet Marketing

    In eight pages this paper examines ecommerce in a consideration of Internet marketing, its opportunities, and emerging markets. Nine sources are listed in the bibliography.

  • Constitutional Rights v. Internet Privacy

    In nine pages this paper examines the conflicts regarding constitutional rights and civil liberties and Internet privacy. Eight sources are cited in the bibliography.

  • Internet Information Basics

    In a paper consisting of ten pages the ways in which the Internet can be used are examined with its historical development first considered before a discussion of such applications as web browsers, email, newsgroups, and Internet Relay Chat. Hackers, privacy and security breaches are also included. Nine sources are listed in the bibliography.

  • Privacy and the Internet

    In five pages this paper examines privacy issues with regard to the Internet in a consideration of privacy protection and its intrusion represented by the Internet. Six sources are cited in the bibliography.

  • Analysis of the Internet's Past, Present, and Future

    In twenty one pages this paper analyzes the Internet's past, present, and future in a consideration of such topics as technology, sales, advertising, privacy, and security. Fifteen sources are cited in the bibliography.

  • The Internet, Security, and Financial Institutions

    This paper discusses Internet security issues with regards to banking and financial institution transactions and possible solutions to these growing problems in 6 pages. Two sources are cited in the bibliography.

  • Internet Security and Recent Developments

    In four pages this paper examines Internet security issues and system protection measures. Six sources are cited in the bibliography.

  • ASP Code and Internet Shopping Carts

    In three pages this research paper discusses Internet shopping carts in a consideration of the ASP code, Security Sockets Layer code, and shopping transactions as handled by PayPal. Three sources are cited in the bibliography.

  • WWW Shopping

    In seven pages this paper discusses Internet shopping in terms of its benefits and also its major flaw. Ten sources are cited in the bibliography.

  • Encouraging the Development of the Internet in Developing Nations

    This 16 page paper argues that developing nations should develop Internet usage and its supporting infrastructure within their borders. The writer suggests that it's arguable whether or not the government should be involved, but there is no argument that the Internet would have tremendous benefits for the economy, particularly as it has become so vital for business transactions. There are 25 sources listed in the bibliography.

  • Controlling Workplace Internet Usage Through Planning

    In five pages the problems of Internet usage are supplemented with a balanced plan to deal with privacy and security issues. There are five sources cited in the bibliography.

  • SECONDARY DATA FOR INTERNET USAGE IN SINGAPORE

    Presents data on Internet usage in Singapore. There are 3 sources listed in the bibliography of this 4-page paper.

  • IPv6

    In four pages this paper examines Internet Protocol Version 6 in terms of definition, function, and how it improves over the previous version 4. Two sources are listed in the bibliography.

  • Telecommunications Development

    In five pages this paper examines the development of telecommunications in a consideration of monopolies, shifting needs, legal issues including 1996's Telecommunications Act, Baby Bells and AT&T. Five sources are cited in the bibliography.

  • Search Applications, Java, and Complexity of Symbolic Artificial Intelligence

    In ten pages this paper discusses the Java programming language as one of the issues surrounding symbolic artificial intelligence. Twelve sources are cited in the bibliography.

  • Investigating Computer Fraud

    This paper discusses the field of computer forensics, what it is, what investigators do, detection tools, cyberslacking, chain of custody, steps for computer forensic investigators. The paper comments on numerous topics that are integrated with computer forensics. There are sixty-four sources used in this forty-three page paper.

  • CLOUD COMPUTING, ITS ADVANTAGES AND DISADVANTAGES

    Discusses the advantage and disadvantages of cloud computing, with focus on the security issues. There are 5 sources listed in the bibliography of this 14-page paper.

  • Internet and Information Democratization

    In four pages both sides of the issue regarding democratization and the Internet are discussed with an emphasis upon informations pertaining to health with the inclusion of a research project proposal. Two sources are cited in the bibliography.

  • Guide to Software Download and Installation

    In six pages this paper serves as a kind of how to guide in which the various steps regarding software downloading and istallation are detailed.

  • X.500, Novell Directory Service, and Active Directory

    In this paper consisting of three pages the X.500 subsets of Microsoft's Active Directory and Directory Service by Novell are discussed as Microsoft attempts to unseat the industry leader Novell. There are six bibliographic sources cited.

  • Control Management Systems Change

    In a paper consisting of sixty five pges the need for change management assessment in current automating systems as well as the issue of control management systems changes overall are discussed with a sample company used regarding control systems that are Web and Internet based. Thirty sources are cited in the bibliography.

  • Research into the Use of CRM in a Kazakhstan Hotel

    This 5 page paper is a proposal for a study to look at the best type of CRM to use in a hotel in Kazakhstan. The paper includes an introduction, objectives, brief literature review and presents an outline methodology for primary research. The bibliography cites 18 sources.

  • Data Security and Cyber Crime

    This 3 page paper looks at the issue of data security in the context of cyber crime. The paper gives a good overview of the subject from as range of literature, discussing what is meant by cyber crime, how it takes place and how it is dealt with. The bibliography cites 10 sources.

  • Law Enforcement and Cyber Crime

    In five pages the rapidly growing cyber crime is discussed in terms of the difficulties agents face in its detection because of the difficulties in obtaining data with FBI Cyber Agent commentary and crime examples and how various agencies work in conjunction with each other in order to solve these complex crimes. Seven sources are cited in the bibliography.

  • United Kingdom and Computer Crime

    In eight pages this paper considers UK computer crime levels and ponders whether the present legislation is sufficient to successfully combat 'cyber' crime with a surprising consideration of the barrier to fighting it. Thirteen sources are listed in the bibliography.

  • Report on Cyber Crime

    In eight pages this report considers the phenomenon known as cyber crime that preys upon the negative elements of human nature through ways such as theft, fraud, and deception that leave individuals particularly vulnerable. Ten sources are cited in the bibliography.

  • CAUSES, CONSEQUENCES AND PREVENTION OF CYBERBULLYING

    An overview of the causes of cyberbullying, the results and how it can be prevented. There are 4 sources listed in the bibliography of this 3-page paper.

  • Cybercrime

    In eight pages dealing with the increased incidences of Internet cybercrime are discussed with a consideration of UK law and specifically the Computer Misuse Act of 1990. Twelve sources are listed in the bibliography.

  • Cybercrime, Privacy, and Security

    In fourteen pages this paper examines cybercrime in an assessment of whether or not sacrificing privacy is worth increased security. Ten sources are cited in the bibliography.

  • CYBERCRIME PLAN - PREVENTING PHISHING

    Discusses a plan for preventing phishing. There are 2 sources listed in the bibliography of this 3-page paper.

  • About Security Officers

    This essay discusses security guards/officers by responding to more than a dozen questions about the industry and the officers. Some of the many issues discussed are identifying threats from natural disasters, crime, and accidents, phishing, cybercrimes, risks to utilities and entertainment and many other issues. There are twenty-two sources used in this fifteen page paper.

  • EPA and Envirofacts Data Warehouse

    In five pages the envirofacts data warehouse and the website for the U.S. Environmental Protection Agency are examined in an overview of why this data warehouse system was created, its motivations, and how its objectives are achieved. Four sources are listed in the bibliography.

  • BayesiaLabs Data Mining System

    In five pages this paper examines this system of data mining in a consideration of its functions and marketing benefits with the knowledge extraction process among the topics of discussion. Three sources are cited in the bibliography.

  • WWW's Future in Terms of Security and Electronic Commerce

    In five pages this paper discusses the future of the Internet as it pertains to ecommerce security and privacy issues with the encryption of data and TCP/IP protocol among the topics covered.

  • WWW and Down's Syndrome

    In nine pages the available information on the World Wide Web regarding Down's Syndrome is considered in a review of 10 websites that are consumer based with a table of features also included for each of the sites considered. There are no other sources cited.

  • DOWNLOADING MUSIC -- FOR FREE

    This 5-page paper focuses on various methods by which a teen consumer can download music for free. The paper focuses on pros and cons of this. Bibliography lists 3 sources.

  • European E-Commerce

    A paper addressing the current state of European e-commerce. The author suggests strategies for American businesses releasing European websites for retail commerce. This eleven page paper has thirteen sources listed in the bibliography.

  • Assessment Three Cinema Websites Using Nielsen's 10 Heuristics

    This 27 page paper examines three cinema websites which markets the cinema and encourage ticket sales. The three websites assessed in terms of their target population and the way they are presented with reference to Neilson's 10 usability heuristics. The cinemas chosen for the assessment the Odeon, Vue and a small independent called Palace Cinema. The websites assessed the UK websites for the cinema. The bibliography cites eight sources.

  • The Roles of the Computer and E-Commerce in a Video Store

    A two-part paper investigating the growing necessity of e-commerce and the computer in business, and examines computer-cataloguing system options for a video-rental store's website. The author applies conclusions from the first part to the video-rental business discussed in part two. This twenty-three page paper has thirty sources listed in the bibliography.

  • How Important Suppliers are In the Development Of eBusiness B2B Solutions?

    This 5 page paper considers the B2B eCommerce and looks at how important the suppliers are in the development of ebuisness solution and the advantages of using B2B ecommerce. The bibliography cites 8 sources.

  • Pros and Cons of E-Commerce for SME's

    A paper evaluating the pros and cons that the growth of e-commerce and the Internet has on small and medium sized enterprises (SME). The author also presents some possible solutions to the problems faced by SME's within the world of e-commerce. This four page paper has five sources listed in the bibliography.

  • eCommerce and Global Business

    In ten pages this paper examines the connection between ecommerce and international business with various topics discussed and a general ecommerce SWOT analysis is also provided. Ten sources are cited in the bibliography.

  • Smyth Printing and Ecommerce

    In six pages this paper discusses how Smyth Printing should plan to design and implement ecommerce and analyzes whether it should be automated or manual, identifies ecommerce applications, and considers cost effective goal ways of achieving these objectives. Four sources are cited in the bibliography.

  • Issues in e-Commerce

    This 10 page paper discusses five issues that are of importance in e-commerce: security; identity theft; legal issues such as copyrights; cross-border problems; and market valuation. Bibliography lists 12 sources.

  • Electronic Commerce Trading Accessibility and Security Dichotomy

    In ten pages this statement 'Security in the world of e-commerce is focused on protecting information - information about accounts, credit card numbers, social security numbers, and identities. It is not about hardware or physical access. But there is a built-in paradox; e-Commerce systems must be open enough to be inviting to customers and users, and at the same time the systems must be difficult to penetrate to those who would steal the information. Achieving the balance that satisfies those opposing needs is the challenge of security in the e-Commerce world. Too much security pushes away the people you have invited; too little and valuable information can be stolen' is assessed. Seven sources are listed in the bibliography.

  • Electronic Payment And Security Subsystems in E-Commerce

    An in-depth paper detailing electronic payment and security subsystems available for e-commerce companies. The author addresses the impact and significance of e-commerce on contemporary businesses. This fifteen page paper has fifteen sources listed in the bibliography.

  • A Dissertation Proposal For E-Commerce Strategies

    A paper providing an outline of a dissertation to implement an e-commerce division within a large company. The author discusses pros and cons, security and legal issues, and different e-commerce approaches. This five page paper has eleven sources listed in the bibliography.

  • Privacy Ethics and Ethical Hacking

    In a paper of ten pages, the writer looks at ethical hacking. Privacy concerns are addressed from a number of perspectives. Paper uses twenty sources.

  • Ethics and Information Technology

    In seven pages this paper presents a literature review involving the ethical issues surrounding IT and information access. Six sources are cited in the bibliography.

  • CLUB IT AND INFORMATION TECHNOLOGY ANALYSIS

    Discusses information technology needs for Club IT. There are 3 sources listed in the bibliography of this 4-page paper.

  • Evolution of Technology and Communication

    This paper discusses how technology has changed our modes of communication from emails to social networks. There are ten sources listed in the bibliography of this seven page paper.

  • The Digital Divide - 6 Blogs

    This 12 page paper looks at different issues concerning the digital divide, written in the style of 6 blog entries. Subjects considered include looking at what it meant by the digital divide, how the digital divide manifests, how the digital divide may simply be a part of larger social inequalities, the policies that have been used to try and minimize the digital divide, how it may undermine democracy and the global digital divide. The bibliography cites 17 sources.

  • Using Computer Networks and Security Issues

    In eighteen pages this paper examines computer network usage and the threats to security such networks confront with the future of network security also contemplated. Twenty five sources are listed in the bibliography.

  • Security on the Internet and Cryptography

    One of the most important solutions for Internet security is cryptography. This paper discusses use of encryption to enhance TCP/IP and compares and contrasts the two.This paper has five pages and four sources are listed in the bibliography.

  • The Potential Influence of the Digital Revolution on Society

    Information technology is change the way in which society operates, the writer assess this the potential impacts on a country, using Ireland as an example. The paper starts with a description and definition of digital information and then discusses the concept of a digital revolution, determining that information technology has the digital devolution rather than digital revolution. This is followed consideration of the way in which the changes which have been observed impact on society. Five sources are cited in the bibliography this six page paper.

  • Cyber Bullying

    Examining the trend of cyber bullying from a probabilistic perspective finds many connections with schoolyard bullying, not the least of which includes often being a precursor to a vicious cycle of adolescent and adult violence. Those who instigate the bullying are sometimes from broken homes where proper moral and ethical values were not instilled; others, however, have emotional and/or mental disorders. Three sources are cited in this three-page paper.

  • The Problem of Data-Mining and Data-Warehousing

    This 3 page paper examines both positive and negative aspects. Bibliography lists 3 sources.

  • Data Mining and Ethics

    In ten pages this paper defines data mining and discusses the ethics of individual data compilation. Ten sources are cited in the bibliography.

  • Dealing with Disaster using Computer Networks

    A disaster, natural or otherwise, can tax Local Area Nets and Wide Area Nets to the breaking point. This paper examines the design elements that should go into structuring a system robust enough to handle the extra load that would result from such a disaster. Includes Asynchronous Transfer Mode. This paper has eight pages and nine sources are listed in the bibliography.

  • Security on the Internet and Cryptography

    One of the most important solutions for Internet security is cryptography. This paper discusses use of encryption to enhance TCP/IP and contrasts the two.This paper has five pages and four sources are listed in the bibliography.

  • Information Security

    This paper provides and evaluation of an article about cyber security. Specifically, it discusses designing the best kinds of passwords. There are two sources listed in the bibliography of this three page paper.

  • Discussion Questions on Cyber Security

    In a paper of four pages, the writer looks at cyber security discussion questions. Topics such as spyware and adware are addressed. Paper uses five sources.

  • Expand and Peribit Data Compression

    In five pages Expand and Peribit's data compression methods are contrasted and compared in terms of bandwith maximization, solutions' costs and support offered. Five sources are listed in the bibliography.

  • Compression of Text, Audio, and Video

    In ten pages this paper discusses different file compression types with audio and video MPEG format compression a primary focus. Eight sources are listed in an MLA bibliography.

  • 21st Century Retrieval of Information

    In seven pages this paper discusses the issues involved in the retrieval of information during the twenty first century. Six sources are cited in the bibliography.

  • The Sociological Impact of Jealousy on Facebook

    In a paper of three pages, the writer looks at jealousy on Facebook. Links between Facebook and jealousy in relationships are established through examining a university study. Paper uses three sources.

  • E-commerce Service Options

    A paper addressing out-sourced customer service options and payment services available to on-line merchants. The author presents a variety of services available and notes that the costs for said service providers is less than would be seen with in-house attempts to provide the same services. This five page paper has six sources listed in the bibliography.

  • Technology

    A 3 page paper which examines technology regarding education and technology involving digital pursuits from a global perspective. Bibliography lists 1 source.

  • Change and Geocast Network Systems

    In five pages this paper discusses the problems confronting Geocast Network Systems when it introduced a new product and concept for the transmission of information. Three sources are cited in the bibliography.

  • Comparing Search Engines; Dogpile and Kartoo

    This 6 page paper compares two meta search engines, comparing the search features, way that they index results, present results, different features and ownership of the sites. The paper compares an identical search on each engine. The bibliography cites 4 sources.

  • Charter One Bank's and Bank of America's Online Banking

    In eight pages this paper examines how these 2 banks engage in electronic commerce in terms of customer satisfaction, success, and end user value among other relevant topics. Six sources are cited in the bibliography.

  • Internet Banking and Traditional Banking

    This 10 page paper discusses the ways in which the role of the traditional bank is changing, and in particular, the fact that banks now need to provide Internet banking services. The writer considers how banks can supply these services and also considers such issues as security, risk and problems caused by a lack of personal contact. There are 9 sources listed in the bibliography.

  • British Banking, the Internet and Bank Competition

    In fifty pages online banking services with regards to Great Britain are discussed in terms of characteristics, profitability, customer loyalty, aggregation and other relevant issues. Twenty sources are cited in the bibliography and twenty one charts and tables are also included.

  • Hackers and Hacking

    Hacking is an ongoing issue in computer security. This paper examining the issues associated with hacking. The paper starts by examining the scope and scale of hacking. The way hacking may take place is then discusses, and finally environmental influences that help to turn IT students into hackers is discussed. Five sources are cited in the bibliography of this three page paper.

  • The Ethics of Hacking

    An 8 page overview of computer crime related to hacking. This paper explores the ethics and justifications of hacking, dismissing those justifications as simply illogical. Bibliography lists 9 sources.

  • Security and Wireless Technologies

    This paper examines wireless technologies' benefits in nine pages which includes research studies regarding increasing productivity of workers and also addresses security issues and risk reductions through 802.11b standards and Bluetooth among other topics of relevance. Eight sources are cited in the bibliography.

  • VIDEO GAME INDUSTRY - AN OVERVIEW

    This 4-page paper examines the video game console industry, its major players and its strategies (both development and marketing).

  • The Use of the Cloud in Banking

    In a paper of 3 pages, the author reflects on the importance of cloud computing in the banking industry. Specifically, the research provided considers the need for an assessment strategy for the use of cloud computing. There are six sources utilized.

  • Tutorial on Electronic Commerce Quality Management

    In eight pages Dell Computer Company and Amazon.com are discussed in this ecommerce tutorial that considers the importance of quality management with commentary and a literature review included. Eleven sources are cited in the bibliography.

  • Fast Food and E-Commerce

    This 10 page paper considers the impact that e-commerce has had on the fast food companies and their financial management. The paper looks at the potential ways e-commerce may be used, such as management of the supply chain, marketing and the use of the internet as a sales medium. The paper uses examples of real companies to illustrate the points raised. The bibliography cites 15 sources.

  • B2B and B2C Electronic Commerce

    In six pages business to commerce and business to business types of electronic commerce are discussed with sales data and management factors considered. Ten sources are cited in the bibliography.

  • Electronic Commerce and Technologies

    This 3 page paper gives an overview of how social media and mobile devices help electronic commerce. This paper includes and description of what e-commerce is and how these other devices help boost business. Bibliography list 3 sources.

  • E-Commerce, Tax Revenues and Physical Stores

    A paper discussing two specific questions relating to the impact of e-commerce on brick-and-mortar stores, and the impact on tax revenues generated for cities and states. The author presents arguments that e-commerce will continue its growth-trend, as well as arguments that state the opposite, concluding that neither argument is valid. This eight page paper has nine sources listed in the bibliography.

  • Gap Inc, Nordstrom Inc and E-Commerce Operations

    A paper comparing the competitive e-commerce practices of two companies, Gap Inc and Nordstrom Inc. The author provides a background of both companies and addresses their e-commerce strategies. This seventeen page paper has eleven sources listed in the bibliography.

  • Daycare Centers and Surveillance Cameras

    In three pages this paper argues that video surveillance in daycare settings represents an invasion of employee privacy. Five sources are cited in the bibliography.

  • Cyber Attacks and Psychological Profiles

    In a paper of ten pages, the writer looks at cyber attacks. An in-depth analysis reveals psychological aspects of such attacks. Paper uses six sources.

  • SQL Injection Attacks

    A common form of hacking is the SQL injection attack. The paper looks at how this attack is used and what vulnerabilities exist in systems that make this form of hacking so common. The writer looks at this with an example; the hacking of Nokia in 2011. Eleven sources are cited in the bibliography of this nine page paper.

  • Denial of Service Attacks Overview

    In six pages DDoS are presented in an overview that identifies them and examines their impact and prevention options. Six sources are cited in the bibliography.

  • Third Party Computers and Denial of Service Attack

    In three pages this argumentative paper discusses a denial of service attack within a business context and whether or not there is any type of possible legal culpability if a third party computer was employed as a zombie in order for the attack to be completed. Ethical considerations and tort law are applied. Two sources are listed in the bibliography.

  • Crimes Committed by Computers

    In twelve pages this paper examines computer hacking and traces its origins back to the 1960s and includes a discussion of John 'Captain Crunch' Draper who hacked into phone company lines in the 1970s along with other relevant topics considered pertaining to cyber crime. Fifteen sources are cited in the bibliography.

  • Computer Hacking and Ethics

    In five pages this paper examines computer hacking from all sides and then presents the argument that such a practice is unethical. Five sources are cited in the bibliography.

  • Computer Hacking's Impact

    In seven pages this paper analyzes computer hacking and its effects upon corporations and individuals. Five sources are cited in the bibliography.

  • ARP Protocol Subversion and Network Security

    In nine pages this report examines ARP protocol subversion which can allow a hacker to significantly compromise computer network security. Five sources are cited in the bibliography.

  • Overview of Computer Viruses

    In five pages computer viruses are discussed in terms of definition, effects, and various preventative measures. Five sources are cited in the bibliography.

  • Examination of Computer Viruses

    In eleven pages this research paper considers computer viruses and their consequences in terms of societal effects, costs, future implications, and also examines Marxist theory as it applies to this topic. Ten sources are cited in the bibliography.

  • Types of Computer Viruses

    Computer viruses are discussed in terms of type and transmission in a paper consisting of four pages with two recent examples provided. Five sources are cited in the bibliography.

  • Tourism and the Internet

    The internet has increase the flow of information that tourisms can use to make travel arrangements, from social networking forums and information site to the proliferation of travel agents and travel portals that are found on the internet. The paper examines the influences that are present and why the travel industry, especially companies like Expedia has benefits to such as high degree from the internet with specific interest its role as a distribution medium. Twenty sources are cited in this sixteen page paper.

  • EVE Online/Authority in an Online Community

    An 8 page research paper that explores the virtual world of an online community, specifically the science fiction world of EVE Online. The writer focuses on the economy of this online community and how it functions. Bibliography lists 6 sources, with additional information drawn from an interview with an EVE player.

  • Personal Finance and the Impact of Technology and Computers

    In six pages this paper discusses how personal finance has been affected by technology and computers. Four sources are cited in the bibliography.

  • Electronic Commerce and Wal Mart

    Questions regarding ecommerce and Wal Mart are answered in three pages.

  • A Research Proposal for Transition Into E-Commerce

    This paper presents an outline of a research proposal project within e-commerce. The research project examines the pro's and con's faced by existing businesses expanding into e-commerce. The author provides the most effective strategies for entering the e-commerce marketplace and thriving in the on-line environment. This four page paper has one source listed in the bibliography.

  • Identity Theft

    A 5 page paper which examines identity theft. Bibliography lists 6 sources.

  • REDUCING IDENTITY THEFT RISK

    Discusses what identity theft is, how it happens, and how to reduce the chances of it happening. The paper covers identity theft online and in the real world. There are 3 sources listed in the bibliography of this 5-page paper.

  • Internet Addiction Disorder

    In six pages this paper examines types of Internet addictions and how this behavior can be successfully treated by using expressive art therapy or the twelve step program. Five sources are cited in the bibliography.

  • The Internet

    A 5 page paper which compares and contrasts Greenfield’s Virtual Addiction (Chapter 2: The Nature of Addiction), and Stoll’s Isolated by the Internet. No additional sources cited.

  • The Bahamas, Internet Security and Governance, and Challenges Facing the Islands

    The writer discusses the issues of Internet governance and Internet security with reference to the Bahamas. There are six sources listed in the bibliography of this four page paper.

  • Best Practices for Internet Security Protection

    Internet security 'best practices' are the focus of this paper consisting of 6 pages. The bibliography cites 12 sources.

  • EBAY AND NEED FOR SECURITY

    About eBay and its Internet security efforts. There are 12 sources listed in the bibliography of this 10-page paper.

  • INTERNET SECURITY TECHNOLOGIES - AND PREVENTING THEM FROM BEING COMPROMISED

    This 5-page paper focuses on how to prevent humans from compromising Internet security. Bibliography lists 7 sources.

  • Computer Security

    8 pages in length. As the first of billions of emails flew through cyberspace nearly thirty years ago, the idea of computer security was not at the forefront of users' minds. In fact, the very notion of any threat inherent to the World Wide Web was so unheard of that even those who stood a great deal to lose from unauthorized entry were basically oblivious to the looming danger that would appear only years later. Today, computer security is the number one priority for anyone who uses the Internet, a reality born of unforeseen infiltration by those who seek to do great harm to the recipient of such an attack. Bibliography lists 8 sources.

  • Marketing Plans and the Incorporation of eMarketing

    In eight pages this paper examines the importance of ecommerce in a consideration of how marketing plans should incorporate emarketing with 3 Web positioning types among the topics of discussion. Nine sources are cited in the bibliography.

  • Types of eMarketing

    In six pages the differences between traditional and Internet marketing are considered in a discussion of various types of emarketing tools that are employed in enticing and retaining online customers. Nine sources are listed in the bibliography.

  • Electronic and Physical Best Buy Stores

    In six pages the shopping experience is discussed in a comparative examination of physical and virtual shopping with Best Buy serving as a sample with complementary strengths that are contributing success factors considered. One source is cited in the bibliography.

  • Why Passwords and Good Information Security Technologies Are Compromised by Users

    In three pages this paper discussed why in a corporate an/or business environment passwords and decent information technologies that are in place are still compromised by the people who use them and also considers how information security can be improved. Four sources are cited in the bibliography.

  • Business Neural Networking

    In five pages this paper examines the importance of neural networks to business in a consideration of features that result in reliable networks and ensure increased productivity of employees. Four sources are cited in the bibliography.

  • Effect of Social Medea

    This paper pertain to recent literature and the influence of social media. The writer argues that while social media provides benefits, it is also associated with numerous negative effects, which must be considered. Seven pages in length, six sources are cited.

  • Failure Prevention and Development Problems Associated with Software Engineering

    In eight pages this paper examines such software engineering issues as problematic development and preventing failure with compatibility regarding operating systems and networking among the topics of discussion. Fifteen sources are cited in the bibliography.

  • Online Research Review

    A 5 page paper. The writer was asked to participate in several Online research projects and critique them. The paper begins with an introduction to research conducted on the Web, the typical formats, and the risks. The writer presents several studies with brief comments about them, regarding purpose, reliability, validity and format. No Bibliography.

  • Printing Industry and Its Technology's Economic Impact

    In ten pages the printing industry is examined in terms of the economic impact of technology and print value. Five sources are listed in the bibliography.

  • Amazon.com Case Study

    This 6 page paper answers specific questions regarding Amazon and its market. The questions include consideration of how or why Amazon have been a successful online retailer, whether or not Amazon customers also use other sites to shop for books and CDs, what aspects of customer services have aided Amazons development, why high turnover does not necessarily result in higher profits, the differences between an online and a bricks and mortar experience and the potential problems Amazon.com may face as they continue to expand their product ranges. The bibliography cites 10 sources.

  • Amazon.com and Internet Jurisdiction

    A 5 page paper discussing Amazon.com's international operations and legal problems that the company potentially could become entangled with as Internet law continues to change. Amazon operates 9 sites (US, UK, China, etc.) and likely is bound by the laws of the country in which those sites are located. Jurisdiction changes have been occurring since an Australian court decided in 2002 that the site of injury imposed by a US site owner was Australia. Bibliography lists 6 sources.

  • Comparing and Contrasting Forms of Dating: Online and Traditional

    A comparative analysis of online and traditional dating is presented in 3 pages. The bibliography cites 2 sources.

  • Malaysia's Online Marketing

    In eight pages this paper discusses Malaysia in a consideration of online marketing of goods and services. Twelve sources are cited in the bibliography.

  • Risk Management and Construction Information Sharing on the Internet

    In ten pages this paper discusses the importance of information sharing on the WWW in the construction industry in this risk management overview. Seventeen sources are cited in the bibliography.

  • Microsoft's Operating Systems Dominance and the Emergence of Linux

    In four pages the Linux v. Microsoft battle of the operating systems is examined. Five sources are cited in the bibliography.

  • Love in internet relationships

    In this three page paper the writer considers love and romance via internet relationships, and if 'internet love' actually exists. There are two sources listed in the bibliography.

  • The Use of Censorship in the Mass Media

    14 pages and 6 sources used. This paper provides an overview of the application of censorship principles to entities in the mass media. This paper considers whether censorship has become stronger or weaker since the 1980s, and relates changes both to political culture and social change.

  • Classifications of Web Sites

    This 9 page paper discusses three types of web sites and how they relate to front-end and back-end applications. The three types are database access sites, transaction-oriented sites and delivery system sites, and the term back-end applications refers to Internet, intranet and extranet applications. There are 8 sources listed in the bibliography.

  • SECURITY OF INFORMATION

    This 4-page paper discusses the aspect of computer and network security and how much security is too much. Bibliography lists 3 sources.

  • Preventing Network Attacks

    A 5 page discussion of network security. This paper emphasizes the importance of approaching this problem not just from a technological perspective but also from a human perspective. Bibliography lists 2 sources.

  • General Overview of Network Security

    In ten pages network security is examined in an overview that considers Target.com in a consideration of various threats from hackers and how they operate. Nine sources are cited in the bibliography.

  • New Media Technologies and Their Cultural Implications

    In ten pages the cultural implications of new media technologies are discussed withiin the context of developer awareness and how perceptions can be derived from Internet content. Eleven sources are cited in the bibliography.

  • Online Shopping Analysis of Singapore's NTUC FairPrice Supermarket Website

    In fifteen pages this report examines NTUC FairPrice in a consideration of online revenue, customers targeted, position in the market, 4Ps, design of the website and web page, methods of payment, security, and policy regarding privacy. Five sources are cited in the bibliography with the inclusion of two tables.

  • Online Retailers, Social and Legal Issues

    In four pages consumer privacy, accurate transaction recording, contracts, and security are among the social and legal issues that are discussed pertaining to the growing online retail industry. Four sources are cited in the bibliography.

  • Online Jewelry Company Marketing Plan Development

    In five pages the ways in which an online jewelry store would be marketed are discussed along with considerations and success story information. Five sources are cited in the bibliography.

  • Online Trading and the Infrastructure of Technology

    In three pages this paper examines an online trading brokerage network's infrastructure and considers the impact of technology on the fictitious Primus Securities. Four sources are cited in the bibliography.

  • Computer System Security Types

    In four pages this paper discusses business and individual Internet security with software problems and Mac OS, Windows and Linux operating systems examined. Three sources are cited in the bibliography.

  • Globalization and the Internet's Role

    In eight pages this paper examines globalization in an overview of the role the Internet plays. Eleven sources are cited in the bibliography.

  • Pros and Cons of Internet Grocery Retailers

    In fourteen pages and 2 parts this paper considers the pros and cons of online grocery selling with an application of student research.

  • Pros and Cons with Search Engines

    In this essay of four pages, the writer examines why we need to scrutinize the content that our children are exposed to on the internet and why it is essential for them to use it. The essay also covers the Pros and Cons regarding search engines related to the topic.

  • Cultural Gatekeepers and Search Engine Politics

    In six pages this paper discusses Internet search engines and the impacts of how information is ranked and indexed. Four sources are cited in the bibliography.

  • Maximizing Search Engines

    In six pages this paper discusses how websites can achieve high search engine rankings in a consideration of various methods, possible misuse, with both Flash and HTML pages examined. Five sources are listed in the bibliography.

  • Using socially Oriented Media by Youth

    This 3 page paper gives an overview of some positive and negative parts of social media use. This paper includes things such as addiction and neglecting everyday life as outcomes of too much use. Bibliography list 4 sources.

  • Test

    Test

  • Web Developer Career Path

    A 5 page paper discussing qualities of a success web developer. The new web developer leaves school with a solid foundation of technical knowledge ready to use. S/he also leaves school with the greatest learning in the future rather than in the past. The path of a successful career as a web developer includes learning about business processes, business needs, customer concerns and similar matters. Bibliography lists 8 sources.

  • The History of the Internet

    This 3 page paper provides a brief history of the Internet. Specific individuals are named. The Internet and WWW are differentiated. Bibliography lists 4 sources.

  • Future of the Internet

    In fourteen pages this history of the Internet also considers its future applications and uses. There are 8 sources cited in the bibliography.

  • History of the Internet

    In eighteen pages this paper presents an extensive history of the Internet with business, ecommerce, and user information provided. Twelve sources are cited in the bibliography.

  • Small Family Travel Agency Going Online

    In seventeen pages this paper discusses why a small family owned travel agency should 'travel' into cyberspace and examines the importance of having a strong presence online. Fifteen sources are cited in the bibliography.

  • Windows LINUX and UNIX Implementations

    In ten pages this paper examines Windows operating system alternatives to achieving network security in a consideration of LINUX, UNIX, and their implementation and performance evaluation. Six sources are cited in the bibliography.

  • The Use of Venture Capital and the Impacts of the Internet on the Development of E-Commerce in China

    16 pages and 7 sources used. This paper provides an overview of the emerging role of venture capital on the development of Web-based business operations in China. This paper considers the impact of venture capital, the strategies for the use of capital investments, and the focus of these elements relative to the use of Internet operations in Chinese businesses.

  • Developments in Voice Over Internet Protocol

    In three pages VoIP developments are discusses with the Nortel Networks and IBM alliance among the topics examined. Four sources are cited in the bibliography.

  • Voice Over Internet Protocol History

    In six pages this paper examines VoIP in a consideration of its history and its future posibilities that include taking over the 'plain old telephone service' or POTS. Seven sources are cited in the bibliography.

  • Essay Questions on Voice Over Internet Protocol Answered

    In four pages this paper considers VoIP with various essay questions answered.

  • VoIP AND OVERVIEW

    Discusses Voice over Internet Protocol (VoIP), some history, current usage and predictions. There are 12 sources listed in the bibliography of this 10-page paper.

  • Overview of VoIP Technology

    In fourteen pages Voice Over Internet Technology and how it operates is examined in an overview that includes packet switching uses, price samples, and this technology's future. Five sources are listed in the bibliography.

  • Shifting Media Formats Comparing News on the Web by Comparing Five Web Sites

    In six pages five web based news services are contrasted and compared with limitations of HTML of each discussed while editorial content in each radically vary. There are 2 sources cited in the bibliography.

  • Web Services Technologies

    This 10 page paper looks at web services technology and considers different aspects. The first part looks at Web Services-Interoperability (WS-I) Basic Profile, what it is and its components and then considers how it may compete or compliment EDI. The second part of the paper looks at RCP v Document usage for messages and other technologies useful for business. The bibliography cites 7 sources.

  • XML and Web Services Development

    This paper on web services development focuses upon XML's importance in twelve pages with ecommerce, Australian corporate globalization, and international trade among the topics of discussion. Eighteen sources are cited in the bibliography.

  • India's Internet Services Industry

    This paper examines India's web services industry in a determination whether or not such an investment could be regarded as high risk in four pages. Two sources are cited in the bibliography.

  • Website Questions

    An 11 page paper in two parts. Part 1 assesses the websites of EasyJet, British Airways and Malaysia Airlines. Part II is a discussion of considerations for Kohinoor Ltd's website design. Included in the discussion are the topics of strategy, business model, objectives and Google Analytics. Bibliography lists 10 sources.

  • Web Page Design

    In four pages this report examines what is involved in a website design including understanding the site's purpose with appropriate information and links to pertinent search engines included without overwhelming the page with unnecessary graphics and text. Three sources are cited in the bibliography.

  • Design for Politicians' Website

    In four pages this students supplied case study examines website design and then suggestions are offered regarding a web page for politicians. Four sources are cited in the bibliography.

  • Websites Design Methodologies

    In five pages website design system methodologies that are information based, relationship based and structure based are discussed. Four sources are cited in the bibliography.

  • Website Design Analysis

    In eight pages this paper analyzes the website design of 20 home pages in terms of what sets the effective ones apart from the less attention grabbing ones.

  • Daily Life and the Impact of Wireless Technology

    In three pages this paper examines how daily life has been affected by wireless communications technology and also considers future development. Three sources are listed in the bibliography.

  • Advantages and Disadvantages of Wireless Networks

    This paper examines WAN and LAN wireless network types in eight pages and argues that their disadvantages are outweighed by their advantageous aspectes. Twelve sources are listed in the bibliography.

  • E-Mail Security on Laptops

    This 3 page paper looks at the problem of security of e-mails on laptop computers in a wireless environment. The paper assesses the problem and presents some solutions. The bibliography cites 4 sources.

 

Most Relevant Research Papers

Click on any of the term papers to read a brief synopsis of the research paper. The essay synopsis includes the number of pages and sources cited in the paper.

 

Copyright © 1994-2018 The Paper Store Enterprises, Inc. & Research Papers Online. All rights reserved.