Research Papers on Computer Technology

Click on any of the term papers to read a brief synopsis of the research paper. The essay synopsis includes the number of pages and sources cited in the paper.

  • A Case Study Concerning Data Protection

    This 3 page study examines various ways to protect data in a stand alone computer. Authentication is discussed. Bibliography lists 3 sources.

  • BROADWAY CAFÉ - A CASE ANALYSIS

    This 16-page paper focuses on the Broadway Cafe case study, along with information technology and information systems advise. Bibliography lists 9 sources.

  • Risk and Security Considerations for the IT System of Huffman Trucking

    This 4 page paper looks at a case study provided by the student. Huffman Trucking are considering introducing a new information technology system to do with employee benefits, the paper discusses the potential risks of security issues that need to be considered when undertaking this project. The bibliography cites 2 sources.

  • SOCIO-TECHNICAL SYSTEMS -- TELEBANK

    This 7-page paper examines socio-technology systems as introduced by the case study about Telebank Call Center. Bibliography lists 5 sources.

  • Computer System Development

    This 6 page paper looks at a case study provided by the student and summarised the problem, the need to develop a computer network for a doctors surgery that will allow connections to the hospital and the doctors home and then carry out a requirements analysis. The bibliography cites 3 sources.

  • Technology In The Doctor's Office

    A 3 page paper that describes and explains how one physician's office uses technology to save time for everyone. This is real doctor's office. Bibliography lists 1 source.

  • Home Health Agency Information Technology Upgrading

    A 5 page paper describing the work process at a home health agency and how increased use of information technology could improve work processes, patient care and responsiveness of the company to both patients and their doctors. Bibliography lists 1 source.

  • New Frontier of Cyberspace

    5 pages in length. John Perry Barlow concludes that cyberspace is a new frontier where people may find a communal home. The reasons why Barlow initially believed this to be true have been somewhat modified from their original composition; however, Barlow still subscribes to the belief that cyberspace presents a certain – if not unorthodox – form of communal atmosphere. The writer discusses that while others acknowledge this seemingly inherent element of Internet relations, there is still some trepidation with regard to fully condoning Barlow's assertion. Bibliography lists 4 sources.

  • Technophobia and Cyberphobia

    6 pages in length. The writer provides a 15-source annotated bibliography.

  • Employees and Corporate Cyber Security

    This 5 page paper discusses the state of cyber security, what sorts of problems companies encounter in trying to maintain security, and how their employees are involved in these efforts. Bibliography lists 10 sources.

  • Forensics And Cyber Crime

    5 pages in length. The writer discusses how and why cyber forensics has become a growing consequence of the digital age. Bibliography lists 8 sources.

  • This 2.5-page paper analyzes the potential threat of cyber war and my opinion on the topic based on the 60 Minutes news story. There are 2 sources cited.

  • The Computer In Criminalistics

    3 pages in length. Staying one step ahead of the criminal has long been the first line of defense for law enforcement officers; when intelligence is gathered that precludes the ability for the offender to actually commit the crime, it serves to establish a pattern by which subsequent foils can also be utilized. However, technology has created quite a significant challenge for law enforcement to maintain that critical step ahead of criminal activity by virtue of the wholly comprehensive nature of cyber crime. As such, the entire criminal justice field has come to incorporate the very instrument that has facilitated so many crimes as part of its arsenal for thwarting those offenses and ultimately catching the lawbreakers. Bibliography lists 6 sources.

  • The Development and History of Artificial Intelligence

    A 10 page paper discussing the history and development of artificial intelligence to the current time and an analysis of IBM's Deep Blue chess-playing computer. Bibliography lists 10 sources.

  • PC's History and Impact

    7 pages. Personal computers have come a long way since the seventies, the eighties, and even within the last five years. Because technology is changing at such a rapid pace we have seen personal computers impact our lives in many different ways. Socially, economically and industry-wise the personal computer and its history are described in this well-written and concise paper. Bibliography lists 7 sources.

  • History and Future of TCP/IP

    A 3 page paper tracing TCP/IP’s origins and assessing its likely future. Other technologies such as Ethernet and ATM have too many technical barriers that TCP/IP does not. In determining TCP/IP’s future, it appears that the connected world is moving more toward IP communications. The interim points between should be able to provide a rather seamless transition. Bibliography lists 7 sources.

  • Historical and Social Relevance of Silicon Valley

    This 11 page paper provides a history of Silicon Valley and also delves into how personal computers and the Internet are important to society. Many people are named in this historical look at computers, inclusive of Bill Gates, Steve Jobs, and Frederick Terman. Bibliography lists 5 sources.

  • Computer Hacking History

    3 pages in length. The writer provides a brief history of computer hacking from the 1960s forward. Bibliography lists 12 sources.

  • Voice Over Internet Protocol History

    A 6 page paper reviewing the history of voice over Internet protocol (VoIP). From its beginnings as an old and expensive technology that no one could find a good use for, VoIP now is poised to overtake POTS (plain old telephone service) in the future. If the future unfolds as the creator of the Skype VoIP service envisions, then existing telephone companies will find themselves with the need to discover new sources of revenue. Bibliography lists 7 sources.

  • History of the Modem

    This is a 5 page paper which explains the history and development of modems. The bibliography has 5 sources.

  • Hotel Revenue Management Systems Twenty Five Article Literature Review

    This is an 8 page literature review on hotel revenue management systems. A literature review on hotel revenue management systems covers not only the recently developed technological systems which handle different revenue management concerns such as forecasting, demand, competition and hospitality networks but also covers many traditional avenues used to increase revenue such as customer satisfaction, environmentally efficient programs, introduction of innovative and unique facilities and catering to specific target groups among other factors. Bibliography lists 25 sources.

  • Email Laws and Relevant Literature

    4 pages in length. The tremendous impact computers have had upon today's global community represents the staggering progress contemporary society is experiencing. That business is conducted from opposite ends of the planet, people forge lifelong relationships without ever having met and employees work from the comfort and convenience of home via telecommuting speaks to the reality of what was once only far off aspirations. Indeed, the benefit of computers far outweighs the inherent drawbacks, however, those negative aspects are not so insignificant that they can be ignored; rather, the extent to which such concerns as email laws are necessary to address issues pertaining to personal privacy, unsolicited correspondence/advertisements and hacking. Bibliography lists 5 sources.

  • Manuel Castells' "The Power Of Identity" - Literature Review

    3 pages in length. Technological advancement of the late twentieth century has transformed into an ironic duality of both blessing and curse as mankind ventures into the twenty-first century. Manuel Castells utilizes myriad examples of how humanity's desire to improve and simplify have actually complicated and even threatened global societies in a number of ways. With rapid technological change arguably the single most important aspect of mankind's progress over the past fifty years, there can be no question as to the double-edged sword inherent to such tremendous advancement. Social and ethical threats abound from the combined speed and expanse with which the world is being inundated with rapid technological growth. Bibliography lists 4 sources.

  • Literature Review: Cloud Computing Efficiencies

    This is a 4 page paper that provides an overview of cloud computing. A review of literature documents the efficiency delivered by cloud computing. Bibliography lists 5 sources.

  • Education Technology and Teacher Training Effects

    A 6 page research paper that investigates educational literature pertaining to the effect of teacher training on the implementation of technology into classroom instruction. The writer argues that this literature review shows the crucial nature of this factor. Bibliography lists 8 sources.

  • ICT School Strategies Development

    This 37 page paper examines the way in which strategies should be formulated for teaching information and communication technology ICT, or information technology (IT) on schools so that all students can leave with good IT skills. The paper is written with a full table of contents (not included in the page count), includes the research rationale and keys aims. An in-depth literature review is conducted, studying the different barriers that exist and the different approaches which may be used for curriculum design. The paper then presents some primary research (fictitious) to demonstrate how this can be presented and then tied in with the literature review. The paper needs with recommendations of future ICT teaching strategies. The paper focuses on UK secondary schools (years 7 – 13), but would be applicable to other countries and other areas of education. The bibliography cites 34 sources.

  • IT Acquisition by Developing Nations and Strategies of Identification

    This 13 page paper is an outline for a paper studying the best ways for developing countries to develop strategies to help them develop information technology competences. The paper gives an introduction and a justifications of the research and then gives a lengthy literature review that focuses on the way foreign direct investment,(FDI), may be used with knowledge transfer and the role of education and internal policies. The bibliography cites 15 sources.

  • Risks, Structure, and Security Management

    (8 pp) The complexities of modern society have combined to generate a variety of threats to business organizations, information networks, military installations, government operations, and individuals. For information technology, information is the core of its existence. Anything that threatens information or the processing of the information will directly endanger the performance of the organization. Whether it concerns the confidentiality, accuracy, or timeliness of the information, the availability of processing functions or confidentiality, threats that form risks have to be countered by security. That means there are structural risks. Structural risks require structural security. Bibliography lists 5 sources.

  • Knowledge Management and Information Technology

    A 13 page paper discussing the point at which IT data becomes organizational knowledge. In its early days and even until rather recently, IT provided only a means of tracking historical data and contributed virtually nothing to the bottom line. Every organization must operate as efficiently as possible in today's business environment, however, and IT moved into the position of being a strategic tool. The data it held then came to be knowledge that the organization could use and needs to use to achieve and maintain a competitive advantage. As Laudon (1995) notes, IT truly is too important to the organization to leave only to the IT professionals. Marketing and senior management need the knowledge it holds or can create in order to form the most effective strategy for the future. Bibliography lists 13 sources.

  • Machine Learning, Data Mining, and KM

    This 19 page paper looks at knowledge management and the use of data mining in conjunction with machine learning. The writer considers how this may add value to banking practices, such as managing and reducing risk, increasing marketing response rates, retaining customers and maximising the use of resources. The bibliography cites 22 sources.

  • Telecommunications Management and Intelligent Agents

    This 7-page paper reports on intelligent agents and their role in telecommunications management. Topics discussed include intelligent agents and their impacdt on organizations, trends and definitions. Bibliography lists 5 sources.

  • Knowledge Management (KM) Processes

    This 5 page report discusses the fact that virtually every organization in the modern world has somehow been transformed by the availability and ongoing development of information technology. Case-based reasoning (CBR) is used as an example of that fact. Bibliography lists 2 sources.

  • E-Systems and the Addition of a KMS or Knowledge Management System

    A 13 page paper discussing the addition of a knowledge management system to an existing e-system, in this case drug retailer Rite Aid’s e-commerce efforts. As specific systems, they have existed only for a relatively short time. As for feasibility, many organizations have enough trouble defining what they would want from a knowledge management system to make any such addition impractical. One of the hallmarks of successful IT project management and completion is that there are highly specific and narrowly-defined end goals quite clear at the beginning. The purpose here is to follow a knowledge management upgrade through the process of being added to an existing electronic system. Bibliography lists 9 sources.

  • Using MIS

    This 12 page paper looks at the use of Management Information Systems (MIS), what makes them successful and uses an example of an MIS to show how information is used and the value of the results. The bibliography cites 7 sources.

  • Questions on Information Technology and Management Supply

    A 10 page paper answering 6 questions about supply chain management; JIT; ERP; EDI and accounting. The paper contains diagrams for the supply chain of two manufacturers and a university. Bibliography lists 6 sources.

  • General Overview of Knowledge Management

    This 15 page paper examines the rise of knowledge management; KM. Written in 5 parts the first part considers why this rise has taken place, the paper then considers the potential problems encountered in implementing an intranet into an organization, the existent to which social capital facilitate the creation of knowledge in organizations, Nonaka and Takeuchi’s four means of Knowledge creation and the defining characteristics of knowledge workers. The bibliography cites 11 sources.

  • Evaluating Models of Project Management

    This 12 page paper examines various models inclusive of but not limited to SSADM. Other models such as TQM are examined. The use of the conventional approach is discussed in depth. Bibliography lists 5 sources.

  • Common Management Information Protocol and Simple Network Management Protocol

    This 17 page paper looks at Simple Network Management Protocol also known as SNMP and Common Management Information Protocol also known as CMIP are both alternatives that can be used in network management. Both of these systems have advantages and disadvantages. This paper considers why Simple Network Management Protocol is not the ideal system for network management and how Common Management Information Protocol may resolve many of these issue, but also has some additional problems, such as increase use of overhead resources and increased complexity and also examines the functionality of CMIP. The paper presents two case studies to illustrate the way that CMIP is of great benefit to the telecommunication industry, but is of limited benefit to other industries. The bibliography cites 10 sources.

  • Systems Analysis, Computer Design, and Mathematics

    This 3 page paper discusses the job of a systems analyst and why he/she needs to be good in mathematics to hold the position. Bibliography lists 1 source.

  • Advanced Practice Nurse And Informatics

    A 7 page paper that first reports the setting-an individual has applied for an APN position in the described physician's office. The first section describes the writer's vision of the most effective use of communication and information technologies in this office. The vision includes scanning all documents into a patient's file, networking all PCs and many other things. The next section recommends the kinds of programs to consider ending with the benefits of using these kinds of systems. Bibliography lists 5 sources.

  • Home Health and Hospice Company Business Requirement Analysis

    A 10 page paper discussing two identified IT needs at HHH, a home health and hospice company. One of the needs is for automated HR services to provide self-service HR; the other is the addition of laptops, printers and a wireless network so that visiting nurses can reinforce patient education with printed information that patients can use as references after the nurse leaves. Bibliography lists 10 sources.

  • Digital Music - Blog Entries

    This 8 page paper looks at different aspects of digital music. Written in the style of blog entries the development of digital music formats, the influence of iTunes on the industry, piracy and measures to prevent piracy, music and cellular telephones and the opportunities offered to unsigned bands. The bibliography cites 10 sources.

 

Most Relevant Research Papers

Click on any of the term papers to read a brief synopsis of the research paper. The essay synopsis includes the number of pages and sources cited in the paper.

 

Copyright © 2000-2021 The Paper Store Enterprises, Inc. & Fast Papers On-line.
All rights reserved. Search for your essay here.

U.S. based premium essay, research and
term papers service since 2000.