Research Papers on Computers & The Internet

Click on any of the research paper to read a brief synopsis of the paper. The essay synopsis includes the number of pages and sources cited in the paper.

 

Research Papers on Computers & The Internet

Click on any of the term papers to read a brief synopsis of the research paper. The essay synopsis includes the number of pages and sources cited in the paper.

  • Internet Addiction Disorder

    This is a 6 page paper discussing internet addiction. Internet addiction, also known as Internet Addiction Disorder (IAD), Internet Behavioral Dependence (IBD) or Problematic Internet Use (PIU), is considered a behavioral or social pathology similar to other nonchemical addictions such as pathological gambling, or compulsive shopping, sex or over-eating among others and has become an international concern. There are considered several different sub-types of internet addiction such as cyber-sexual addiction for those who are addicted to pornographic or sex web sites; cyber-relationship addiction for those who are addicted to online relationships; net compulsions which include internet shopping and gambling; information overload for those who compulsively surf the web or search databases; and computer addiction which is related to compulsive playing of computer games. Generally, internet addiction is assessed and treated similar to other addictive behavior which may include the 12-step program, cognitive therapy or other therapies such as expressive art therapy. Bibliography lists 5 sources.

  • Cybercrime

    This 8 page paper considers the increase in the use fo the internet and cybercrime and the way that the Computer Misuse Act 1990 may be used it dealing with different cybercrimes such as cyberobscenity, cybertrespass, cybertheft and cyberviolence which can include cyberstalking. The paper looks at what the Computer Misuse Act 1990 will cover and how it may be possible to improve the legislation and enforcement of the law concerning cybercrime. The paper is written with reference to UK law. The bibliography cites 12 sources.

  • Historical and Social Relevance of Silicon Valley

    This 11 page paper provides a history of Silicon Valley and also delves into how personal computers and the Internet are important to society. Many people are named in this historical look at computers, inclusive of Bill Gates, Steve Jobs, and Frederick Terman. Bibliography lists 5 sources.

  • Dell Computer's Corporate History

    5 pages in length. The year 1984 marked the beginning for the country's largest direct seller of personal computers. Michael Dell first began constructing his company from his dorm room at the University of Texas-Austin, often taking drastic measures -- such as hiding his computers in the bathtub -- to make sure that no one suspected his sideline. The business that emanated from this dorm room eventually became known as Dell Computer Corporation in May of 1984. The writer chronicles the growth and development of Dell Computer Corporation. Bibliography lists 5 sources.

  • Ethics of Global Computer Laws

    This 7 page report discusses international computer laws and their ethical impact. What are the problems that are being presented on an international basis due to the Internet and expanded information technology? Issues relating to privacy, decency, and political speech are of particular concern when they cross both international and cultural boundaries. A greater potential for technology-based international crime also exists. Bibliography lists 5 sources.

  • Resources on the Internet and its Applications

    This 10 page report discusses a broad range of reference information that relates to the Internet and its various applications. Numerous citations are include with brief pieces of information written to provide a more comprehensive, yet condensed, overview of the Internet. Bibliography lists 24 sources.

  • PC's History and Impact

    7 pages. Personal computers have come a long way since the seventies, the eighties, and even within the last five years. Because technology is changing at such a rapid pace we have seen personal computers impact our lives in many different ways. Socially, economically and industry-wise the personal computer and its history are described in this well-written and concise paper. Bibliography lists 7 sources.

  • Computer Viruses 'Cyber Ethics' and Personal Responsibility

    A 10 page discussion of the problems presented with computer viruses. The author contends computer viruses cause tremendous societal harm on both macro and micro levels. The thesis is presented that while the creation and intentional perpetuation of computer viruses is ethically and morally wrong, and even subject to the same societal provisions for legal punishment as is any other type of crime, we must take increased personal and societal responsibility for the abatement of the practice. Bibliography lists 11 sources.

  • Internet History and General Information

    This 5-page paper provides an overview of the history of the Internet, as well as dial-up, satellite, cable modem and DSL Internet connections. Also included are discussions about Internet 2.

  • Websites on Black History and Information Verification

    A 5 page research paper that contrasts and compares sites on black history. An Internet site entitled "History Notes" lists numerous articles by Runoko Rashidi. Two of these articles were selected for comparison with other Internet sites for verification of information and to discern if contradictions exist between the articles selected and other Internet sources. The two articles chosen were "Ancient Africa and Early Rome" and "The Moors in Europe." Bibliography lists 7 sources.

  • Elementary School Mathematics, Science, and the Internet

    A 9 page literature review that addresses the use of the Internet in teaching math and science in the elementary classroom. Elementary school teachers today are confronted not only with the sometimes daunting task of instructing a diverse student population in the intricacies of science and mathematics, but they are also frequently required to incorporate new technology into their pedagogy as they do so, such as the Internet. This review of relevant literature on this topic examines several questions. First of all, it asks if use of the Internet helps or hinders the instruction of elementary student in regards to studying science and math, or is it simply one more item to be addressed in an overworked teacher's busy agenda? Assuming that the use of the Internet facilitates educational goals for elementary schoolchildren studying math and science, what are the best pedagogical practices in regards to Internet instruction? Bibliography lists 15 sources.

  • American Leadership as Personified by Steve Jobs and Virginia Henderson

    A 5 page research paper that profiles 2 American leaders: Steve Jobs of Apple Computers and nursing theorist and innovator Virginia Henderson. The writer offers a profile of each leader and argues that these two individuals exemplify leadership qualities. Henderson's work changed the entire perspective of modern day nursing, making it more patient-oriented and humanistic. Jobs' missionary zeal towards computing has broadened the horizons of human knowledge by bringing computers into the home and making them "user-friendly" so that even children can access the Internet's broad knowledge base. Bibliography lists 5 sources.

  • History of the Arpanet

    5 pages in length. Reviews the history of the Arpanet from its beginnings, the problems it has faced and the innovation it has wrought as a forerunner to the Internet. The myth surrounding the Arpanet is that it was devised as a means to survive a nuclear war. While this is certainly interesting, the truth is that the Arpanet was commissioned by the Department of Defense in 1969. The true purpose of the Arpanet was to save money by linking the computers of scientists and researchers. The writer explains in this well-written paper details regarding the Arpanet. Bibliography lists 4 sources.

  • Computer Equipment Confiscation for Crime Investigation and an August 1999 Article in the Cyber Law Journal of the New York Times

    This 5 page report discusses an article in the “Cyber Law Journal” (8-27-99) dealing with the problems associated with confiscating computer equipment when a crime using that computer is suspected. The article points out that investigators almost always have the upper hand when they confiscate private property, yet such officials rarely have the time, resources, or expertise to perform a “forensic analysis” on the impounded machines. Bibliography lists 4 sources.

  • Children and Computer Introduction

    4 pages in length. Had this question been asked a mere two decades ago, the consensus would have likely been that a child's introduction to computers was not warranted until well after elementary school when their perceived readiness for such technological integration was well established. However, experts in academia and child psychology alike have come to realize the cognitive, dexterous and overall developmental value of a child's early introduction to computers. Bibliography lists 3 sources.

  • Critique of "Computers in Clinical Assessment: Historical Developments, Present Status, and Future Challenges"

    A 3 page paper critique of a paper appearing in the Journal of Clinical Psychology discussing various types of assessment that have used the Internet as the medium. The authors suggest that the single most inhibiting factor preventing more widespread use of Internet-based testing is that of copyright and other intellectual property restrictions. Bibliography lists 2 sources.

  • Traditional Media and the Effects of New Media

    4 pages in length. Why purchase a print copy or an entire CD when the very same thing can be found on the Internet? The prevalence of online reading and music material has literally skyrocketed to the point where people are no longer finding a need to subscribe to print publications or visit mall music stores. Daily newspapers are available at the crack of dawn; monthly magazines are accessible earlier than those sent out buy postal mail; and entire CDs are being uploaded to the Internet for one's listening enjoyment. The writer discusses the impact Internet media is having upon traditional media. Bibliography lists 4 sources.

  • Mass Media and Entertainment

    This is a 5 page paper discussing mass media for pleasure and entertainment with examples from British history. Mass media in relation to today’s society has a great many formats in which to give the public information, promotion of new merchandise, news, entertainment and various forms of pleasure in the world of television, journalism, films, computer games and the internet to name a few. Traditionally, media was thought to be a source of viable information to the masses yet history shows that media was also used as much for the pleasure and entertainment of the masses as it was to provide information about current, world or political events. In today’s newspapers, although seemingly filled with violent news, they are also filled with “feel good” stories, entertainment sections, film and literary reviews as well as the classic comic, jumble and crossword features. In the Victorian era, the mass media were the providers of scandals and serial novels highly popular in that time. Bibliography lists 4 sources.

  • Cyber Bullying

    3 pages in length. Schoolyard bullies have long made lives miserable for their victims who typically endure unrelenting taunting and physical abuse, a problem administrators and teachers alike continue to address in today's academic environment. Disturbingly, just as education has taken to the Internet, so too has the menacing act of cyber bullying where its presence has been magnified to such a degree that people have actually committed suicide to escape the online harassment. Bibliography lists 3 sources.

  • Summary of Cyberdistributors The Liability Of Online Service Providers For Defamatory Speech Of Others by Mark D. Robins

    3 pages in length. The writer discusses if there is a viable and legal way for online service providers (OSPs) to police the content of message boards where subscribers post defamatory and/or false statements, given the enormity of the Internet and the undetermined legal ramifications of such behavior. Bibliography lists 1 source.

  • Constitutional Rights v. Internet Privacy

    A 9 page paper that examines the issues of privacy and freedom of information on the Internet as well as the crimes that have been bred by this privacy and freedom. Discussed are the types of crimes that occur in cyberspace, the attempts the U.S. government has made to deter these crimes, and the opposition these attempts have raised from civil liberty organizations. Bibliography lists 8 sources.

  • Overview of GTE

    This 10 page report discusses GTE, one of the world's largest telecommunications companies. In the United States, GTE provides local service in 28 states and wireless service in 17 states; nationwide long-distance and internetworking services ranging from dial-up Internet access for residential and small-business consumers to Web-based applications. Outside the United States, the company serves more than 7 million telecommunications customers. Current merger issues with Bell Atlantic are also discussed. Bibliography lists 10 sources.

  • Email Laws and Relevant Literature

    4 pages in length. The tremendous impact computers have had upon today's global community represents the staggering progress contemporary society is experiencing. That business is conducted from opposite ends of the planet, people forge lifelong relationships without ever having met and employees work from the comfort and convenience of home via telecommuting speaks to the reality of what was once only far off aspirations. Indeed, the benefit of computers far outweighs the inherent drawbacks, however, those negative aspects are not so insignificant that they can be ignored; rather, the extent to which such concerns as email laws are necessary to address issues pertaining to personal privacy, unsolicited correspondence/advertisements and hacking. Bibliography lists 5 sources.

  • Dystopia and the Film The Matrix

    This is a 5 page paper discussing the film “The Matrix” as a dystopia. The 1999 Wachowski brothers’ film “The Matrix” reflects the most severe fears and anxieties within today’s society in regards to a futuristic world as a “dystopia”. Opposite of More’s idealistic world portrayed in his work “Utopia”, the literary term “dystopia” refers to a “bad place”. Since the industrial revolution and more recently the computer and information revolution, society’s fears of possible negative results from growing technological achievements have been reflected in literature and cinema. While currently cyber-technology, that which is related to the computer world and artificial intelligence, is being promoted as a positive element within society in that humans are able to access free information and share information on a global scale, the film “The Matrix” portrays more so that element not promoted within technological circles, that is, the negative and de-humanizing aspects of cyber-technology which robs human of their individuality from a physical and mental perspective and uses humans for the proliferation and eventual dominance of artificial intelligence. Bibliography lists 3 sources.

  • IT Forensics: Digital Evidence

    5 pages in length. The article entitled "Computer Forensics" by Peter Sommer delves deeply into the advantage law enforcement officials have in the ongoing pursuit of apprehending cyber criminals. Discussing each component of IT forensics in a comprehensive yet understandable manner, the author provides a beginning-to-end overview of why computer forensics has become a necessity in today's high-tech world, how police carry out the often-tedious task of finding virtual evidence and when said evidence is considered permissible in a court of law. In short, Sommer offers an encapsulated yet thorough glance at the inner workings of an entirely unprecedented element of technological law enforcement. Bibliography lists 4 sources.

  • Mobile Printer Product Management Plan

    An 18 page paper providing a product management plan for a versatile printer to be used with handheld and laptop computers. There is need for printers that are light enough to be truly portable and durable enough that they can withstand the shocks they may receive in being moved regularly. The company has developed such a printer, one that fills the gap left by similar products that already exist. The paper describes opportunity identification and selection; concept generation; concept/project evaluation; development; and launch. It includes a project plan for the test marketing phase and a capital budget analysis for the first three years of operation. The project is a modest one, in part because of the limited penetration of handheld computers to date. The advantage to the company in pursuing this project now is that it fills a specific need and has the ability to gain first-mover advantage in the industry. Bibliography lists 9 sources.

  • Nursing and Computers

    The extent that computers have entered the world of nurses begins with education and includes almost all aspects of the work environment. The role of nurse in the health care industry will continue to be of value. The role of nurses is expanding and includes more responsibility as well as a need for a greater knowledge base. This 5 page paper asserts that the days when nurses believed they could avoid using computers and continue to do an excellent job of nursing are forever gone. Bibliography lists 5 sources.

  • The Internet Law of Australia

    A 4 page overview of recent attempts at regulating Internet content in Australia. These actions have occurred in the face of laws which have been on the books since 1982 insuring Australians freedom of information. Australia’s solution to this contradiction has been to amend the Freedom of Information Act itself. The author contends that Australia’s attempts at censoring the Internet are the equivalent of fighting a windmill and suggests that many stand ready to fight for the rights originally granted by Australia’s Freedom of Information Act. Bibliography lists 5 sources.

  • Unfairness of Telecommunications to Women

    This 6 page paper describes the phenomenon of tele or 'cyber - commuting' and its popularity in modern society. It is argued that tele-commuting has actually intensified the consequences of a male-dominated workplace and that women are afforded the same lesser economic status and lower positions in the corporation they have always had as a result of the advent of computer technology in terms of telecommuting. Bibliography lists 7 sources.

  • Cyberterrorism Danger

    In the wake of the 9-11 terrorist attacks on U.S. soil, the U.S. government has stepped up efforts to protect its citizens. Among those efforts is protection of computer networks that control power grids, water and the utilities. This paper examines what, exactly, is being done and how cyberterrorism is defined. Bibliography lists 5 sources.

  • Computer System Development

    This 6 page paper looks at a case study provided by the student and summarised the problem, the need to develop a computer network for a doctors surgery that will allow connections to the hospital and the doctors home and then carry out a requirements analysis. The bibliography cites 3 sources.

  • A Case Study Concerning Data Protection

    This 3 page study examines various ways to protect data in a stand alone computer. Authentication is discussed. Bibliography lists 3 sources.

  • Frantek Case Study

    This 5 page paper looks at a case study supplied by the student. Frantek are a company that had a contract to sell computer boards, but they have not been able to meet their contractual obligations. The buyer re-negotiates some more favorable terms for Frantek. The paper looks at the impact on accounting issues such as revenue recognition, inventory valuation and accounting for liabilities. The bibliography cites 3 sources.

  • Employment Law and Employer Duties; A Case Study

    This 9 page paper looks at a case concerning English employment law and assesses three different scenarios. The first concerns the way that work conditions are provided with cramped conditions and glaring computer monitors. The second issue concerns vicarious liability of the employer for an employee who catapults scissors across a room and injures another employee. The last issue considered is a scenario where an employer writes a false reference. The bibliography cites 4 sources.

  • Nonprofit Organization Management

    An 8 page paper on the importance of studying nonprofit management today. The writer posits that non-profit organizations require many of the same administrative skills that their profitable counterparts do and stresses the influence of funding, financial analysis, computer knowledge, evaluation, etc; Bibliography lists 5 sources.

  • English Language Instruction and Computers

    This 4 page paper is a dissertation plan to examine how and why computer teaching is able to help students learning English. The paper presents the reasons for the research, the research question, undertakes a brief literature review and states how the research will be useful for others in the future. The bibliography cites 7 sources.

  • Year 2000 Crisis and How Y2K Can Be Successfully Managed

    A 10 page overview of the predicted computer/communications apocalypse and management techniques. The author concentrates on two areas of concern, date coding and the introduction of viruses based on the millenium and other biases. However, the larger view is taken of 'mainstream' date coding problems, and considers audit cases and costs. Mitigation focuses on internal and global management of the problem. Bibliography lists 15 sources.

  • Merger of CIT and Newcourt Credit and Subsequent Management

    A 3 page paper discussing CIT’s acquisition of Newcourt Credit, emphasizing the current management styles at both organizations. CIT is more reserved and methodical in its operations, while Newcourt has a history of seeking innovation in finance. The company acts as the financing arm of Dell Computer and Yamaha Motors, but in a way that the customer never sees. Bibliography lists 6 sources.

  • The Development and History of Artificial Intelligence

    A 10 page paper discussing the history and development of artificial intelligence to the current time and an analysis of IBM's Deep Blue chess-playing computer. Bibliography lists 10 sources.

  • Multimedia and Communications' History

    This 20 page paper provides an overview of the history of communications leading up to and including multimedia. Various aspects are discussed inclusive of the history of video and audio communications and the way in which computer technology has affected the lives of ordinary individuals. The transitions over time are explored and a historical perspective is provided. Finally, the paper takes a look at how the media as a form of communications has affected the world. Bibliography lists 9 sources.

  • Computer Hacking History

    3 pages in length. The writer provides a brief history of computer hacking from the 1960s forward. Bibliography lists 12 sources.

  • Literacy Standards Within Nursing Education Programs

    A 7 page research paper. In nursing, as with other healthcare professions, it is imperative to the standards of a professionalism that nurses make learning a continuing priority throughout their careers. In order to accomplish this goal, specific literacy skills are required. Nursing personnel should cultivate critical thinking skills, computer literacy, information literacy, and literacy in nursing informatics. This examination of these topics focuses on the available literature. Bibliography lists 8 sources.

  • Compaq Computer's Logistics and Quality Management Tutorial

    This 2.5-page tutorial examines quality management and how it can be used as part of an overall corporate strategy program. The tutorial uses as an example Compaq Computer's inbound logistics plan. Bibliography lists 1 source.

  • Customer Management and the Fictional Sunshine DVD Rental Company

    This 4-page paper examines the fictional company SUN SHINE DVD Rental Store and the best computer-based system to help the store better manage customers and inventory. Under discussion are inventory management systems and CRM. Bibliography lists 2 sources.

  • Essays on Computer Management

    This 5-page paper provides a series of questions to be answered dealing with technology and computers. Questions include ethics over selling names to other businesses, competitive advantage and technology, how to configure a system for a small business and advice to an employee who is looking for a promotion

  • Job Tasks in Accounting and Financial Management

    This 15-page paper focuses on tasks and job descriptions of financial managers and accountants, for purposes of putting together a potential "job" that such a person might have in a computer services company. Bibliography lists 4 sources.

  • Article Analysis/Evidence-Based Practice

    A 9 page article analysis of a research study, Pravikoff, Tanner and Pierce (2005), that was designed to evaluate the knowledge, computer literacy skills and general readiness of American nurses to implement evidence-based nursing practice. The writer summarizes and evaluates each section of the study, concluding with an evaluation of the research's significance to nursing. No additional sources cited.

  • Computer Music and Its Impact Upon Society

    A 5 page research paper that examines how the advent of computerized music has impacted society. The writer focuses on how computers have made musical instruction, performing and composition more available to a wider section of the public. Bibliography lists 4 sources.

  • Cognition and Solving Problems

    The ability to assess a problem and formulate solutions has been a subject within such varied disciplines as mathematics, psychology, linguistics, neurobiology and computer science. The fact remains that problem-solving is a complicated procedure that merits study. This 10 page paper explores information processing and memory in terms of problem solving. Bibliography lists 10 sources.

  • Music Instruction and the Use of Technology

    A 10 page research paper which looks at how computer technology is impacting the field of music education. The writer gives an overview of some of the technological marvels available and then discusses the controversy as to how much these new innovations should replace traditional pedagogies. Bibliography lists 9 sources.

  • Recording Studios and Changes in Technology

    A 12 page discussion of the technological changes which have occurred in the recording studio since the popular music explosion of the late 1950s and early 1960s. Emphasizes the impetus behind these changes is attributable not only to the entertainment industry but also to factors as diverse as computer, military, and medical applications. Notes specific changes in Signal Inputs, Signal Conditioning, Sound Recording Equipment, Mixers, and Signal Outputs. Bibliography lists 7 sources.

  • Napster

    This 4 page paper looks at Napster and the way in which it brought the downloading of music over the internet into the mainstream. The paper is based on questions and materials supplied by the student.

  • Burning CDs/Ethical Issues

    A 3 page research paper/essay that analyzes the ethical issues involved in downloading music illegally from the Internet or burning an illegal copy of a CD obtained from a friend. Utilitarian and deontological positions are discussed. Bibliography lists 4 sources.

  • WIPO Internet Intellectual Property Protection

    This 3 page paper looks at the role and remit of the World Intellectual Property Organization (WIPO). The paper then considers the way intellectual property on the internet is protects, with specific attention to music by looking at the WIPO Copyright Treaty (WCT) and the WIPO Performances and Phonograms Treaty (WPPT).The bibliography cites 3 sources.

  • Classrooms, Technology, and Education

    This 5 page report discusses the changes and trends in teacher education over the past two decades and the all-important introduction of technology into mainstream use in virtually all aspects of life, including the classroom. Teaching music teachers to use Internet technology in their classrooms is the focus of the studies proposed here. Bibliography lists 6 sources.

  • The Dissemination and Marketing of Music from Tin Pan Alley to the Modern Day

    This 8 page paper looks at the way music has been distributed and marketed from the latter part of the nineteenth century and the role of Tin Pan Alley up until the model day of the internet and the iPod. Included in the paper is consideration of the impact of technology including records, cassette tapes, CD's and MP3 files as well as the role of the media. The bibliography cites 4 sources.

  • The Music Industry

    This 6 page paper looks at the industry and the changes it has gone through. The Internet is noted as something that has altered it to some extent. Economic factors are considered. Bibliography lists 3 sources.

  • How Mass Media Can Impact Teenage Girls.

    (7 pp) Almost all of us are affected by mass media in one form or other: films, television, radio, music and music videos, magazines and other print media, and now, the internet. We delude our selves, when we say that, we are not influenced by media: it comes in with the oxygen and leaves with the Co2. Yet of all those under the "spell" of the media, it appears that adolescent girls are the most vulnerable. Bibliography lists 7 sources.

  • RADIOHEAD, THE MUSIC INDUSTRY AND THE INTERNET

    This 12-page paper provides an essay about the band Radiohead and how the Internet has changed the recording industry. Bibliography lists 5 sources.

  • The Internet as Distribution Medium for Music

    This 3 page paper is written in two parts. The first part looks at the supply and value chain comparing the internet and the bricks and mortar distribution medium. The second compares the costs associated with each medium. The bibliography cites 3 sources.

  • Connection Between Youth Culture and Pop Music

    A fourteen page paper which looks at the relationship between youth culture and the development of music genres, and the way in which the development of particular genres is related to such elements as socio-economic issues and generational influences, especially with regard to the wider dissemination of information now available via the Internet. Bibliography lists 10 sources.

  • Marketing EMI Music in the Digital Age

    EMI are facing a number of marketing challenges, the decision by Radiohead to release tracks on their own website and increase in digital music downloads are all indicators of the changes. This 11 page paper looks at some of the challenges EMI face in terms of the general marketing of a service rather than a physical good and consideration of the influences and impact of marketing on the internet. The bibliography cites 11 sources.

  • Downloading Music Legally

    A 3 page paper which examines the controversy surrounding downloading music from the Internet, discusses recent court rulings and mandates, and considers how the music industry will benefit from legally downloaded music. Bibliography lists 5 sources.

  • Nursing Shortage and Effect on Job Market

    This 5 page research paper describes the writer's investigation through nursing sources on the Internet in order to investigate how the nursing shortage is affecting the Maryland nursing job market. Bibliography lists 5 sources.

  • Literature Review of Psychosocial Treatment of Mental Illness

    This paper examines the literature and research available for psychosocial (i.e., non-medical or non-invasive) intervention in treatment of mental illness, mental retardation and learning disorders. The paper also examines how to best use the massive amounts of research that is available on this topic, both through the Internet and the library. Bilbiography lists 20 sources

  • Literature Review on Uninhibited Internet Effects and Safeguards

    This 5 page paper explores several topics related to internet censorship and social theories. Bibliography lists 8 sources.

  • Voice Over Internet Protocol History

    A 6 page paper reviewing the history of voice over Internet protocol (VoIP). From its beginnings as an old and expensive technology that no one could find a good use for, VoIP now is poised to overtake POTS (plain old telephone service) in the future. If the future unfolds as the creator of the Skype VoIP service envisions, then existing telephone companies will find themselves with the need to discover new sources of revenue. Bibliography lists 7 sources.

  • eCommerce Management Challenges

    This 5 page report discusses the management of electronic commerce or “e-commerce” and how it continues to revolutionize the way the modern world is doing business. The most successful businesses involved in e-commerce are able to provide dynamic connections to customer data bases using numerous interconnected routers for corporate clients, as well as Internet access for mainstream consumers. Bibliography lists 7 sources.

  • Literature Review of Internet Survey Research

    7 pages in length. Internet survey research is one of myriad up-and-coming methods for companies to acquire the critical public feedback needed for product satisfaction and development. Issues pertaining to this particular survey research approach are vast, indeed, given the still unknown legal ramifications of such; however, one that stands out as quite important is that of copyright concern. Bibliography lists 4 sources.

  • Literature Review and Contemporary Business Sales Strategies

    An eleven page literature review relating to sales and marketing strategies in the modern business environment, with particular reference to the impact of Internet and Web technology, and the changes in marketing which have been brought about by the development of e-commerce. Bibliography lists 15 sources.

  • Wireless Communication's History

    This 5 page paper presents an overview of wireless communication from Marconi to the Internet. Spanning a century, the paper explains how the new technology evolved. Safety is discussed as well. Bibliography lists 5 sources.

  • Internet Medieval History Websites Compared

    A 6 page research paper that examines and critiques three internet sites that deal with medieval history. The writer evaluates each site according to graphics, usability and the quality of information. Bibliography lists 3 sources.

  • Web Design and Internet Technology

    This 6 page paper considers two aspects of new technology. The first part of the paper considers development and spread of the Internet. The second part of the paper considers web design, why it is important and how it has developed. The bibliography cites 4 sources.

  • Ecommerce and Logistics Management

    This paper examines how the Internet and other digital tools are providing an impact on supply chain management and logistics functions. The paper discusses both pros and cons of the electronic age on logistics management. Bibliography lists 4 sources.

  • Estelle Enterprises Case Study on Strategy Development

    This 6 page paper considers a case study provided by the student where a company faces threats and has to develop a strategy to cope with the threats. The case is briefly outlined, and the strategy included related diversification, the development of a new channel of distribution; the Internet and the development and maximization of competitive advantages. The bibliography cites 2 sources.

  • Internet Gerocery Shopping and the Case of Webvan

    This 8 page paper looks at a case study provided by the student. The market for the internet shopping services is considered and the needs of the segment are outlined, the cost structure is considered in order to identify areas that may be leveraged in order to support profit creation and the problems that the firm faces in becoming profitable. The bibliography cites 6 sources.

  • Research Issues for Bookworm

    This 6 page paper is based on a case study supplied by the student. Bookworms need to undertake some market research to assess the potential for an internet café. The paper looks at what type of information would be needed the way that data can be gathered and considers the best approach to sampling. The bibliography cites 2 sources.

  • Developing a Communication Plan for Jack B Nimble

    This 14 page paper provides a communication plan for a case study supplied by the student. Jack B Nimble is a fictitious company that has a number of communication issues, where communication has broken down between the company and different stakeholders, including suppliers, business partners and expatriate employees. The communication plan outlines the communication requirements, proposes a communication strategy and examines the way in which implementation may take place utilizing an Internet and intranet infrastructure. The bibliography cites 3 sources.

  • Case Study; Freedom of Speech and Satire Criticizing a Company

    This 3 page paper looks at a case study, where a disgruntled employee sets up a satire of the company on the internet. The employee believes he is using his first amendment right for free speech. The writer considers the position of the company and how they should react, looking at both legal and ethical considerations. The bibliography cites 4 sources.

  • An Internet strategy for Kudler Fine Foods

    This 18 page paper is based on a case study supplied by the student. Kudler Fine Foods want to increase their revenues; the paper puts forward a strategic plan to implement and Internet sales strategy. This is considered by first looking at the company and undertaken an environmental scan. Implementation plan includes a work breakdown schedule, and Gantt chart and a budget. The bibliography cites 8 sources.

  • Internet Health Information Resources and Their Reliability

    This 6 page paper examines the Internet as well as several books to demonstrate that authorship and publishing house are important in determining credibility. The M.D. designation does not guarantee accuracy. The works of several well known doctors are examined. Bibliography lists 10 sources.

  • New Perspective Through Cyberspace

    A 4 page paper which examines how cyberspace, the internet, is creating a different kind of society with new perspectives. Bibliography lists 5 sources.

  • Researching the Poem ‘Ars Poetica’ by Archibald MacLeish on the Internet

    In four pages this paper instructs the student how to conduct Internet research on the poem ‘Ars Poetica’ by Archibald MacLeish with a description of how the research was conducted, resources used, and how the selected literary criticism assists in a greater understanding of the poem included. Three sources are cited in the bibliography.

  • Ethics Pornography Cyberspace

    This 8 page paper reviews the literature to determine the answers for three critical questions regarding the regulation of pornography on the Internet, texting, and other realms of cyberspace. Bibliography lists 15 sources.

  • Cyberspace Business Startup

    This 15 page paper provides an overview of how to begin a business inclusive of financial considerations. The business plan is explained and the paper goes on to address issues of management and marketing. Applicable theories are provided. A sample business related to information technology is used. Because the case study is an Internet based business, much of the literature and analyses are pertinent to e-businesses. Bibliography lists 15 sources.

  • WWW History

    This paper provides an overview of the development of the internet and the world wide web, providing a great deal of technical information in 9 pages. In addition to the evolution of this widely used phenomenon, current application in terms of business, entertainment and education are noted as well. Bibliography lists 5 sources.

  • Risk Management Issues in E-Law

    4 pages answering 4 questions about Internet law and risk management, particularly in matters of privacy and use of information gathered from site visitors. Bibliography lists 10 sources.

  • Overview of Honolulu Annotated Bibliography

    This 9 page paper is an annotated bibliography of sources giving information regarding Honolulu and the surrounding area. Sources are drawn from books, journals, magazines and Internet sites covering such things as geography, history, society, politics and culture. The paper lists 22 sources.

  • A Case for Making Virtual Pornography Outlawed

    An 8 page discussion of the impacts of virtual pornography on society. The writer emphasizes that while the issue of Internet regulation is highly controversial, pornography on the World Wide Web should definitely be outlawed if for no other reason than its impacts on the most vulnerable members of our society, our children. Bibliography lists 13 sources.

  • Internet Laws and Pornography

    5 pages in length. The writer discusses the need for legal control with regard to pornography and the Internet. Bibliography lists 4 sources.

  • Personal Jurisdiction Issues and Internet Business Websites

    This 6 page paper discusses the personal jurisdiction problems involved with business on the internet. Bibliography lists 6 sources.

  • New Frontier of Cyberspace

    5 pages in length. John Perry Barlow concludes that cyberspace is a new frontier where people may find a communal home. The reasons why Barlow initially believed this to be true have been somewhat modified from their original composition; however, Barlow still subscribes to the belief that cyberspace presents a certain – if not unorthodox – form of communal atmosphere. The writer discusses that while others acknowledge this seemingly inherent element of Internet relations, there is still some trepidation with regard to fully condoning Barlow's assertion. Bibliography lists 4 sources.

  • Revenue Assessment and Projected Income Statement for Micro Chip Computer Corporation

    This 3 page paper looks at a case study supplied by the student. The first part of the paper looks at the change in the net sales between 2004 and 2008 and considers if and how this may be used to assess future performance. The second part of the paper prepares and discusses a projected consolidated statement of operation for the following year based on the ratio method. The bibliography cites 2 sources.

  • Computer System and Development Government Agency Fiasco

    This 3-page paper describes a case study involving a government agency that spent $1 million on a systems development project that never ended up being used. The paper discusses how the agency and contractor could have handled things differently, and whether, based on the case, government agencies shouldn't have custom software written for them. Bibliography list 1 source.

  • The Computer In Criminalistics

    3 pages in length. Staying one step ahead of the criminal has long been the first line of defense for law enforcement officers; when intelligence is gathered that precludes the ability for the offender to actually commit the crime, it serves to establish a pattern by which subsequent foils can also be utilized. However, technology has created quite a significant challenge for law enforcement to maintain that critical step ahead of criminal activity by virtue of the wholly comprehensive nature of cyber crime. As such, the entire criminal justice field has come to incorporate the very instrument that has facilitated so many crimes as part of its arsenal for thwarting those offenses and ultimately catching the lawbreakers. Bibliography lists 6 sources.

  • Computer-Based Instruction/Effect on Reading Achievement

    A 33 page research paper that offers a review of literature addressing this topic. The following study surveys a broad-selection of scholarly literature pertaining to the effect that CBI has on increasing reading achievement. Using Internet resources and database, the researcher located articles describing empirical research studies with CBI and also articles summarizing and discussing CBI in regards to reading. These articles are summarized in an extensive literature review and then summarized and analyzed as to content and the resulting implications. Results from this investigation were mixed, but, on the whole, they support the contention that CBI does increase student reading achievement. However, the researcher also discusses literature that disagrees with this assessment and what this suggests as to future ramifications. Paper includes 1 page abstract and a 2 page table of contents. Bibliography lists 30 sources.

  • Computer Industry and the Importance of Channel and Distribution Management

    This 10 page paper looks at why the distribution channels ands systems are so important in this industry and outlines how they have been used to create competitive advantages. Companies such as Dell, Compaq and Hewlett Packard are considered, with a brief look at Microsoft. The bibliography cites 15 sources.

  • Systems Analysis, Computer Design, and Mathematics

    This 3 page paper discusses the job of a systems analyst and why he/she needs to be good in mathematics to hold the position. Bibliography lists 1 source.

  • Mathematics and Computer Technology

    This 15 page paper provides an overview of articles related to a research review of literature on topics that include mathematics software, technology and use in the classroom, the use of word problems and the use of techniques for the instruction of children with learning disabilities in mathematics. Bibliography lists 15 sources.

  • Developmental Psychology and a Premier Virtual Computer Generated Symposium

    This 20 page paper addresses the problems of ADHD treatment, treatment of juvenile offenders as adults, and the treatment of many psychiatric or psychological problems with drugs. While a symposium including Freud, Erikson and Gilligan would be impossible, with the magic of virtual reality and imagination, such a symposium comes to life. How might these theorists feel about these twenty-first century topics? Background information is also provided on each particular topic. Bibliography lists 12 sources.

  • BayesiaLabs Data Mining System

    A 5 page paper discussing the operation and benefits of BayesiaLabs data mining system. Much of the focus of marketing lies in knowing the target customer, but much of the knowledge that could be used is virtually buried in nondescript forms and electronic files. The process of extracting these bits of information and combining them in meaningful ways is not economical manually, but automatic data mining can make “hidden” information available to marketers while not incurring any significant labor costs in the process. Bibliography lists 3 sources.

  • Cyberbullying and Internet Privacy

    This 5 page paper examines laws on cyberbullying. The link between bullying and suicide is examined. Bibliography lists 6 sources.

  • Internet Business Marketing

    This 5 page paper focuses on Monster.com as an example of an e-business and looks at a variety of marketing schemes. ACNielsen, SRI and Cyber Dialogue are noted as companies that help businesses gain access to marketing information and techniques. Bibliography lists 6 sources.

  • Women and Telecommunications II

    In this well-argued 6 page paper, the point is made that tele-commuting does little more for women than keep them at home-- where they were a century ago. Women who work from their home office/computer are expected not only to handle corporate business from 9 - 5, they are also usually expected to take care of household affairs and even to raise children during the same time. This stands in contrast with men who cyber-commute but who are not expected to do anything other than work during the course of the business day. Various other relevant ethical issues are discussed and it is ultimately concluded that women have very little to gain in today's workplace. Bibliography lists 2 sources.

  • Digital And Psychological Profiling Of Cyber Crime

    10 pages in length. Witnesses are often the single most important elements of securing a conviction or realizing an acquittal; without these observers to testify as to what they saw, heard or know, myriad court cases would either go unsolved or erroneously resolved. With the technological age, however, has come an entirely different type of witness who - by virtue of its unique position to collect incriminating data - does not have the capacity to lie. Computers have become some of the most critical tools law enforcement agencies have encountered, inasmuch as they provide a clear-cut path to criminals who use them as cyber weapons. Bibliography lists 13 sources.

  • Gateway Inc. and the Application of Sales Management Principles

    An 11 page paper. This essay presents a sales plan for Gateway, Inc., which is the #2 direct marketer of personal computers. Topics include: description of Gateway, Inc, including their vision and philosophy; selected fiscal data; marketing mix (4Cs); competition; fiscal comparison with primary competitor; competitive environment; goals; marketing strategies; sales plan monitoring and controlling; summary and conclusions. 2 tables are included. Bibliography lists 12 sources.

  • Formation of Security Management Policy and Risk Management Effects

    An 18 page paper discussing issues that need to be addressed when forming security risk management policy. The very essence of developing an effective security policy is dependent in great extent to the level of risk that exists. It has been demonstrated repeatedly that network and computer administrators face the threat of security breach each day. Building security is less predictable, particularly as groups of fanaticals place their energies into dreaming up increasingly grand plans for murdering innocents by the thousands. Those responsible for forming and implementing security management policy must be aware of the types of risk faced by the organization and then control for contributing factors. The paper discusses management of risks that are both physical and informational. Bibliography lists 17 sources.

  • Tutorial on Electronic Commerce Quality Management

    This is an 8 page tutorial paper that presents a discussion of quality management in electronic commerce businesses. The writer first presents a proposition that quality management is needed for success. The method of research is explained and the two companies to be considered (Amazon.com and Dell Computer) which is followed by a literature review. The paper includes a brief explanation of total quality management and a discussion of why quality management is essential. Comments are offered regarding the quality of management at the two identified companies. Tutorial comments are included throughout the paper. Bibliography lists 11 sources.

  • eCommerce History

    An 11 page paper tracing the history of ecommerce over the past century. After computers became necessary for business, it became desirable to use the electronic environment for more than only information storage. Data networking was the only missing link, and eventually telecommunications networks were sufficiently available to enable purchasing and payments in the electronic environment. Ecommerce was born, to be embraced by business and consumer segments at different rates. The purpose here is to trace the history of ecommerce and technology over the past century, and to make a conclusion as to whether the industrial age has ended. Bibliography lists 5 sources.

  • Management, Organizational Structure, and National Culture

    A 14 page paper. The essay begins by defining national culture and corporate culture and how national culture influences business culture. The writer then explains the different factors that influence the national culture, such as language, class stratification, emphasis on group or individual. Hofstede's four dimensions of culture are described and used as the benchmark for determining the national culture in the U.K. and the U.S. The writer uses two companies to illustrate the relationships between and among national culture, organizational culture and management styles. The companies used are Dyson Appliance from the UK and Apple Computer from the US. Bibliography lists 15 sources.

  • Overview of Information Security Management

    A 10 page paper. In today's electronic world securing information is difficult and complex. There are so many ways in which security can be breached. This essay discusses why it is important for information managers to understand the many ways information can be compromised. The essay provides some specific examples and how to prevent these types of incidents. The writer also discusses the laws that are in place regarding computer abuse. Bibliography lists 8 sources.

  • Failures at the Passport Office; The Summer of 1999

    In the summer of 1999 the passport agency and the United Kingdom faced a crisis. The implementation of the new computer system resulted in lengthy delays in the issuing of passports. This 10 page paper is written in two parts. The first part of the paper looks at the reasons why projects fail looking at a range of models that encompass a broad-spectrum of potential causes of failure. The second part of the paper examines the case of the passport agency in the context of the potential reasons failure identified in the first part of the paper. The bibliography cites 12 sources.

  • Role of Nurse Educator

    An 8 page research paper that addresses the field of nursing education. Nursing education is a dynamic field that has been challenged in recent years by the issues entailed in the national nursing shortage, as well as the related faculty shortage, while also addressing the innovations presented in increasingly sophisticated technologies (Nurse educator, 2008). This discussion of the nurse educator role looks at various issues associated with this pivotal cog in the nation's healthcare system and the responsibilities involved in being a nurse educator. The final 2 pages on the paper offer an appendix that identifies 5 Internet sites related to nurse educators and discusses these sites. Bibliography lists 10 sources.

  • eCommerce Content Management

    33 pages in length. The ever-changing face of global e-commerce has called for greater efficiency when it comes to content management, a critical component of online retailers that helps maintain unstructured information found on any given Web site. This information exists in many digital forms, not the least of which include text documents, engineering drawings, XML, still images, audio/video files and many other types/formats. Modification is a primary consideration when addressing issues of content management, given the constant modification required for maintaining a current cyberlocation. This ability to constantly modify a Web site's content also carries with it a tremendous responsibility for doing so properly in relation to easy reorganization and updating. The reason why content management has become such a critical component to the success of e-commerce sites is, as Ko et al (2002) note, is because Internet/Web users are becoming more savvy with so many emerging resources. Bibliography lists 23 sources.

  • Restraint Uses in Psychiatric Nursing

    A 4 page research paper that contrasts and compares position papers from the Internet sites of two psychiatric nursing organizations. The International Society of Psychiatric-Mental Health Nurses (ISPN) and the American Psychiatric Nurses Association (APNA) both have position paper posted regarding the use of seclusion and restraint on psychiatric patients. The positions of these organizations are extremely similar. They both, for example, approve of the use of seclusion and restraint only as a last resort. However, there are also differences between the two documents. Examination of the two official position papers reveals that the APNA document is more informative and more precise, while assuming what is basically the same position as the ISPN on this topic. Bibliography lists 2 sources.

  • The Branding of a New Range of Refrigeration Products

    This 10 page paper considers the way in which a new product may be considered in terms of branding strategy. The example of a new range of refrigeration units for the home, car and caravan are considered. The paper outlines the way in which a branding strategy may be considered, including the name and design of the logo, as well as the psychology behind the brand and the way that it may be utilized in Internet marketing. The last of the paper considers the way in which the brand may be managed in an international environment. The bibliography cites 14 sources.

  • Music of Jamaica

    (6 pp.) According to an internet site labeled "fantasy tours," Jamaica is "eternal summer." So it only makes sense that it would have "hot music." But we also learn, "the island" "has rugged mountain ranges, with Blue Mountain Peak, the highest point, soaring 7,402 feet. It has miles of white beaches, bordered by the blue Caribbean. It has 120 rivers flowing from the mountains to the coast. And it has great central plains, fertile agricultural lands, towering cliffs, magnificent waterfalls, and dense tropical forests." What that tells us is our "hot music," still has a lot of varied cultural influences. Bibliography lists 8 sources.

  • Content Regulations in Canada

    A 6 page research paper that discusses Canadian regulations that govern music content over radio. For over thirty years, the Canadian government has required that a certain percentage of the music broadcast within the country should be of Canadian origin. This has proven to be a boon to the Canadian recording industry and Canadian artists. However, as these regulations were instituted prior to the development of the Internet, MP3s, satellite radio, etc., the question arises as to whether or not these regulations can continue to be relevant in the contemporary technologically oriented age. Bibliography lists 4 sources.

  • Various Formats of Digital Audio

    A 4 page paper discussing .wav, MP3, MIDI and MOD music-storing formats. Digital music and other audio forms have benefited greatly from the innovations of recent years. After the advent of the Internet, audiophiles formerly started their music downloads before going to bed for the night, for the download time of only a few files would take hours to complete. The legal landscape has greatly changed as well; the involvement of more corporate entities in music and other audio file downloading has resulted in more options being available for today’s users. Bibliography lists 3 sources.

  • Development in the Lifespan/Preschool & Elderly

    An 11 page research study (including an abstract) that consists of a literature review of scholarly research and articles available online through the Internet databases. Through this investigation, the researcher endeavors to contrast and compare early childhood (preschoolers) to senior adults (age 60 or older) in regards to social, cognitive and physical developmental domains. The review encompasses 12 sources, which includes sources for establishing a theoretical base. The researcher analyzes this data in order to reach conclusions about the generations and concludes that while there are, of course, marked differences, the literature supports the study hypothesis that there are numerous common factors across the generations that support the conceptualization of the lifespan as a continuum and not a series of distinct, separate stages. Bibliography lists 12 sources.

  • Information and Knowledge in the Age of Cyberspace

    6 pages in length. Knowledge and information have become synonymous in the cybernetic age, but not necessarily to the benefit of understanding. The power of this statement illustrates that while technology might improve man's progress in some areas, it also fails to do so in a holistic manner. The global community is bombarded with information from myriad sources unlike any other time in history, which would lead one to presume this generation to be more knowledgeable than their parents or grandparents. This is, indeed, a logical deduction to make considering this age group was quite literally brought up in the midst of the technological revolution. However, the barrage of information today's younger generation receives on a daily basis via the Internet, television, radio, newspapers and magazines serves more to clog the assimilation into understanding than to allow for it. In short, the information is dispensed but the receivers have not been adequately taught how to decipher and retain what is important. Bibliography lists 9 sources.

  • Cybercafe Gaming

    A 6 page paper discussing a popular trend. The game-specialist cybercafé in Hong Kong as in any other country offers patrons a wide variety of activities they can pursue. It provides a setting like no other that can be found by any other means. Individuals can be and remain anonymous online while taking part in solitary activities in a social setting. Alternatively, they can choose to meet those who they discover through their online gaming entertainment. The atmosphere of the game-specialist cybercafé in Hong Kong broadens the options available to game players who use the Internet. Some are so compatible that they choose to make their partnerships more permanent. Bibliography lists 7 sources.

  • Peapod Case Study

    This 4 page paper examines the case of a supermarket in the US using e-commerce to sell groceries. The paper answers three questions. The first considers why the supermarket has been so successful in its’ internet shopping venture. The second part of the paper looks at the challenges the company may face in the future. The last part of the paper discusses whether the same model would be useful if the company wanted to start up in the UAE and/or GCC. The paper focuses on the supply chain issues.

  • Contemporary Manifestations of Terrorism

    This 10 page paper is really three essays combined into one paper. Three sections address different subjects related to terrorism. Sections are as follows: I. Major trends in terrorism in recent years; II. The most important emerging trends in terrorism; III. Major organizational patterns of current terrorist groups and how they may or may not change in the future. Many issues are addressed including biological warfare, suicide bombing and Internet terrorism. Bibliography lists 6 sources.

  • Post 911 Laws

    A 10 page paper. Americans have enjoyed a degree of freedom few, if any, other countries enjoy. Yet, it was that freedom that was at least partially responsible for the horrific events of September 11, 2001. In wake of the Attack on America, new laws have been passed that give far more freedom to different government agencies to monitor communications. The new laws cover the Internet, as well as all other telecommunication technology. This paper discusses these new laws and the need for them. It also discusses the need to balance national security with individual privacy. Bibliography lists 5 sources.

  • Contract Law Case and the Internet

    This well written 16 page paper considers the following case; Jez, subscribes to an Internet magazine site. After paying his subscription fee, he is required to agree to the terms of use Jez does read them, but and proceeds to click on The “I agree to the terms of use”. Rob, a work colleague, discovers Jez's username and accesses the site without Jez's permission. Rob spams members of the chat room advertising his services as a freelance artist. The magazine wish to end the contract, the users of the chat room are not happy and he employers are also unhappy. The paper advises Jez, Rob, the magazine, the chat room users and the employers. The paper then considers a second issue where a company with a similar name wish to set up a domain and take action against the magazine company who have a very similar domain name. The case is written with reference to English law and cases are cited throughout. The bibliography cites 10 sources.

 

Copyright © 2000-2021 The Paper Store Enterprises, Inc. & Fast Papers On-line.
All rights reserved. Search for your essay here.

U.S. based premium essay, research and
term papers service since 2000.