Research Paper On Identity Theft
Click on any of the term papers to read a brief synopsis of the research paper. The essay synopsis includes the number of pages and sources cited in the paper.
Identity Construct, Gender, and Sexuality
An analysis of the concept of sexual identity within the context of socio-cultural ideologies, and the construction of identity. The writer looks at Foucault's perspective on identity, and at theories of masculinity and femininity in relation to postcolonialism. Bibliography lists 12 sources
Processes of Gay Identity Development
An 11 page research paper that explores the processes involved in developing a positive gay/lesbian identity. David Leavitt's short story "Territory" describes and suggests a great deal about the problematic nature of relationships that young gays and lesbians have with their families or origin and how this affects their sense of identity. Within the course of Leavitt's narrative, a young man makes the final transition from an insecure adolescent identity toward a more positive fully-adult identity that is inclusive of his sexual orientation. The issues raised by Leavitt provide a rough framework for further discussion about the problems inherent in establishing a sense of an adult-self within the context of alternative sexual orientation. Bibliography lists 8 sources.
The Theme of Identity in Derek Walcott's Omeros
This 8 page paper discusses the theme of identity in the epic poem by Derek Walcott, called Omeros. The characters of Achille and Plunkett are analyzed to show a search and discovery of self identity in the wake of two disparate cultures on St. Lucia. Many quotes and examples included and cited from text. Bibliography lists 1 source.
Report on Cyber Crime
This 8 page report discusses the fact that the “consensual hallucination” (a
term coined by science-fiction writer William Gibson) of cyberspace must, of necessity,
include a “consensual” understanding that the realm of cyberspace is no less vulnerable to
the negative aspects of human nature such as deceit, fraud, and theft. In many ways, the
opportunity for criminal activity in cyberspace is heightened due to its very nature which
supports anonymity and a certain freedom of action that few people would ever act on in
their “real” lives. Bibliography lists 10 sources.