Research Paper On Internet Security Issues

Click on any of the term papers to read a brief synopsis of the research paper. The essay synopsis includes the number of pages and sources cited in the paper.

  • Formation of Security Management Policy and Risk Management Effects

    An 18 page paper discussing issues that need to be addressed when forming security risk management policy. The very essence of developing an effective security policy is dependent in great extent to the level of risk that exists. It has been demonstrated repeatedly that network and computer administrators face the threat of security breach each day. Building security is less predictable, particularly as groups of fanaticals place their energies into dreaming up increasingly grand plans for murdering innocents by the thousands. Those responsible for forming and implementing security management policy must be aware of the types of risk faced by the organization and then control for contributing factors. The paper discusses management of risks that are both physical and informational. Bibliography lists 17 sources.

  • Internet Addiction Disorder

    This is a 6 page paper discussing internet addiction. Internet addiction, also known as Internet Addiction Disorder (IAD), Internet Behavioral Dependence (IBD) or Problematic Internet Use (PIU), is considered a behavioral or social pathology similar to other nonchemical addictions such as pathological gambling, or compulsive shopping, sex or over-eating among others and has become an international concern. There are considered several different sub-types of internet addiction such as cyber-sexual addiction for those who are addicted to pornographic or sex web sites; cyber-relationship addiction for those who are addicted to online relationships; net compulsions which include internet shopping and gambling; information overload for those who compulsively surf the web or search databases; and computer addiction which is related to compulsive playing of computer games. Generally, internet addiction is assessed and treated similar to other addictive behavior which may include the 12-step program, cognitive therapy or other therapies such as expressive art therapy. Bibliography lists 5 sources.

  • Overview of GTE

    This 10 page report discusses GTE, one of the world's largest telecommunications companies. In the United States, GTE provides local service in 28 states and wireless service in 17 states; nationwide long-distance and internetworking services ranging from dial-up Internet access for residential and small-business consumers to Web-based applications. Outside the United States, the company serves more than 7 million telecommunications customers. Current merger issues with Bell Atlantic are also discussed. Bibliography lists 10 sources.

  • Constitutional Rights v. Internet Privacy

    A 9 page paper that examines the issues of privacy and freedom of information on the Internet as well as the crimes that have been bred by this privacy and freedom. Discussed are the types of crimes that occur in cyberspace, the attempts the U.S. government has made to deter these crimes, and the opposition these attempts have raised from civil liberty organizations. Bibliography lists 8 sources.

Copyright © 2000-2021 The Paper Store Enterprises, Inc. & Fast Papers On-line.
All rights reserved. Search for your essay here.

U.S. based premium essay, research and
term papers service since 2000.