• Recent Papers

    • Research Proposal to Increase Knowledge of Online Purchasing Processes

      Before buying a product or a service online consumers traverse a number of processes, identifying potential products or services, and potential suppliers. This 21 slide presentation is a proposal for research to increase knowledge regarding the way consumers develop preferences. The proposal is for the research to be undertaken using online hotel booking. The slides are provided with speaker notes. Five sources are cited in the bibliography of this seventeen page paper. ... MORE

    • Cognitive-Behavioral Family Therapy

      This essay has attempted to provide a strong background in marriage and family counseling by reporting a brief history, the needs in the field of marriage and family counseling, identification of some of the therapeutic models, and an explanation and discussion of cognitive-behavioral family therapy, which is the most commonly-used approach in the field. ... MORE

    • Hackers and Hacking

      Hacking is an ongoing issue in computer security. This paper examining the issues associated with hacking. The paper starts by examining the scope and scale of hacking. The way hacking may take place is then discusses, and finally environmental influences that help to turn IT students into hackers is discussed. Five sources are cited in the bibliography of this three page paper. ... MORE

    • Do e-cigarettes Work

      The question is whether or not e-cigarettes work in terms of quitting smoking. This paper continues some earlier papers that were about beginning a smoking cessation program in a mental health hospital. The tool is the e-cig. This essay provides learning objectives from nursing essentials, timeline for student's work, and leadership and other activities the student will do for the program. There are two sources used in this three page paper. ... MORE

    • Investigating Computer Fraud

      This paper discusses the field of computer forensics, what it is, what investigators do, detection tools, cyberslacking, chain of custody, steps for computer forensic investigators. The paper comments on numerous topics that are integrated with computer forensics. There are sixty-four sources used in this forty-three page paper. ... MORE

Copyright © 2000-2026 The Paper Store Enterprises, Inc. & Fast Papers On-line.
All rights reserved. Search for your essay here.

U.S. based premium essay, research and
term papers service since 2000.