Research Papers on Technology & Society

Click on any of the term papers to read a brief synopsis of the research paper. The essay synopsis includes the number of pages and sources cited in the paper.

  • Dangers of Driving While Using Cell Phones

    3 pages in length. In this day and age of tremendous technological advancements, there is almost nothing that cannot be accomplished with a cell phone from the convenience of one's automobile, with drivers conducting business, making doctor's appointments, talking to friends, dialing in for radio station contests and everything else that can be done from a conventional landline telephone. At issue, however, is the one significant difference where cell phones are concerned: The inherent danger of driving and talking at the same time. Bibliography lists 5 sources.

  • Cyberterrorism Danger

    In the wake of the 9-11 terrorist attacks on U.S. soil, the U.S. government has stepped up efforts to protect its citizens. Among those efforts is protection of computer networks that control power grids, water and the utilities. This paper examines what, exactly, is being done and how cyberterrorism is defined. Bibliography lists 5 sources.

  • Design and Cyber Culture

    This 12 page paper examines the new era of modern technology in terms of design. A variety of modern technological products are identified and analyzed from a deisgn point-of-view. Paul Kunkel's, "Digital Dreams" is consulted for this paper as the "micro-chip aesthetic" is examined. Bibliography lists 10 sources.

  • Computer Viruses 'Cyber Ethics' and Personal Responsibility

    A 10 page discussion of the problems presented with computer viruses. The author contends computer viruses cause tremendous societal harm on both macro and micro levels. The thesis is presented that while the creation and intentional perpetuation of computer viruses is ethically and morally wrong, and even subject to the same societal provisions for legal punishment as is any other type of crime, we must take increased personal and societal responsibility for the abatement of the practice. Bibliography lists 11 sources.

  • Data Security and Cyber Crime

    This 3 page paper looks at the issue of data security in the context of cyber crime. The paper gives a good overview of the subject from as range of literature, discussing what is meant by cyber crime, how it takes place and how it is dealt with. The bibliography cites 10 sources.

  • Ethics Pornography Cyberspace

    This 8 page paper reviews the literature to determine the answers for three critical questions regarding the regulation of pornography on the Internet, texting, and other realms of cyberspace. Bibliography lists 15 sources.

  • Dystopia and the Film The Matrix

    This is a 5 page paper discussing the film “The Matrix” as a dystopia. The 1999 Wachowski brothers’ film “The Matrix” reflects the most severe fears and anxieties within today’s society in regards to a futuristic world as a “dystopia”. Opposite of More’s idealistic world portrayed in his work “Utopia”, the literary term “dystopia” refers to a “bad place”. Since the industrial revolution and more recently the computer and information revolution, society’s fears of possible negative results from growing technological achievements have been reflected in literature and cinema. While currently cyber-technology, that which is related to the computer world and artificial intelligence, is being promoted as a positive element within society in that humans are able to access free information and share information on a global scale, the film “The Matrix” portrays more so that element not promoted within technological circles, that is, the negative and de-humanizing aspects of cyber-technology which robs human of their individuality from a physical and mental perspective and uses humans for the proliferation and eventual dominance of artificial intelligence. Bibliography lists 3 sources.

  • International Law and Nuclear Weapons

    This 36-page paper covers the issue of nuclear weapons and whether they ae prohibited by international law. The paper discusses the history of nuclear weapons, the use of treaties in terms of legal control and the 1996 ruling of the IJC World Court on the legality of nuclear weapons. Bibliography lists 36 sources.

  • Contemporary Law Practice and Technology

    A 19 page contention that technology has impacted the manner in which law is practiced in a multitude of ways. From the perspective of the forensics which can be used to prove innocence or guilt, to the way we communicate with other law professionals or even our clients, to the way we conduct our research, to the way we manage our offices, technology has taken more and more importance. The modern attorney has been quick to embrace this technology. Its incorporation cannot safely occur, however, without deliberate attention to a multitude of issues. Bibliography lists 18 sources.

  • Role of a Masters in Geography/GIS

    A 3 page research paper that discusses the the role that a master's degree in Geography/GIS plays for a government employee or an educator in GIS. The topic of GIS is defined and the particular are described. Bibliography lists 3 sources.

  • A Superpave Project Short History

    This 4 page paper defines Superpave and delves into the Superpave project. How Superpave has revolutionized an industry and changed the state of roads around America is the focus of this paper. Bibliography lists 5 sources.

  • Machines and Their History

    A 14 page paper which examines the history and development of machines. Bibliography lists 8 sources.

  • Information Technology Lessons, Student Performance, and Gender Differences

    There is a great deal of research that indicates there is a gender difference in the classroom when studying IT. Most research indicates that female students are disadvantaged and are not reaching their full potential. However, there is also some research that indicates there is equality. This 30 page paper undertakes a literature review to identify the relevant studies and how gender differences may be manifesting and then conducts primamry research based on a questionnaire supplied by the student to test the empirical evidence. The paper then correlates the primamry research and the literature review in a discussion and recommendations. The bibliography cites 15 sources.

  • IT Acquisition by Developing Nations and Strategies of Identification

    This 13 page paper is an outline for a paper studying the best ways for developing countries to develop strategies to help them develop information technology competences. The paper gives an introduction and a justifications of the research and then gives a lengthy literature review that focuses on the way foreign direct investment,(FDI), may be used with knowledge transfer and the role of education and internal policies. The bibliography cites 15 sources.

  • Year 2000 Crisis and How Y2K Can Be Successfully Managed

    A 10 page overview of the predicted computer/communications apocalypse and management techniques. The author concentrates on two areas of concern, date coding and the introduction of viruses based on the millenium and other biases. However, the larger view is taken of 'mainstream' date coding problems, and considers audit cases and costs. Mitigation focuses on internal and global management of the problem. Bibliography lists 15 sources.

  • Telecommunications Management and Intelligent Agents

    This 7-page paper reports on intelligent agents and their role in telecommunications management. Topics discussed include intelligent agents and their impacdt on organizations, trends and definitions. Bibliography lists 5 sources.

  • Risk Management and Airline Security

    A 5 page paper discussing aviation’s efforts to manage the risk to flight safety that became glaringly apparent with the terrorist attacks of September 11, 2001. The paper discusses the need for security risk management, offers several alternatives and recommends an alternative currently scheduled to go into effect on January 1, 2004, that of fingerprinting many foreign visitors arriving at American airports and seaports for the purposes of positive identification and comparing to terrorist watchlists. Bibliography lists 5 sources.

  • Management and Airport Security

    A 16 page paper. Airport security has changed in the United States and other countries since the September 11 attacks. Had certain technology, like face recognition, been installed, at least two of the hijacker may never have boarded the plane. Many different systems have been proposed and some have been initiated. For example, the airport in Amsterdam installed iris scanning technology for passengers who fly a great deal. A similar pilot program was installed in one terminal at JFK is using iris scanning for employees. This paper discusses the types of biometric devices that are being considered and/or that have been installed and where they are being used to improve airport security. Bibliography lists 8 sources.

  • Hidden Dangers In Various Modes of Transportation

    This 5 page paper explores automobile, railroad, pipeline, air and sea methods of transportation and the dangers they pose to society. An outline is included. Bibliography lists 4 sources.

  • 4 Issues Involving Health Information Management

    This 8 page paper discusses four issues related to health information management. The first discusses emphasizes the changing roles and responsibilities of the HIM, including the transition from paper patent records to electronic ones. The second section presents a discussion of the skills, knowledge and competencies today's health information manager must have, including examples from some job descriptions. The third section deals with the ways in which the HIM is unique and different from other information managers. The last section discusses the challenges for health information managers. Bibliography lists 5 sources.

  • Demographics and the Transportation Industry

    This 3 page paper provides a summary and article review. An article entitled " Transport industry prepares for major shift in demographics" by Misty Harris is discussed. The article focuses on the aging population and driving. No additional sources cited.

  • TV Viewer Types Types Of Television Viewers: Home Shopping Addicts, Diehard Sports Fans And Public Television Loyalists

    5 pages in length. Since television's entrance into mainstream society more than fifty years ago, certain formations have taken place with regard to content and personal preference. The last half-century has transformed television into a multifaceted entity where specific factions can focus upon their most beloved form of televised entertainment, information or opportunities. Three of these types of groups – home shopping addicts, diehard sports fans and public television loyalists – represent the tremendously diverse role that television has come to play in contemporary society. No bibliography.

  • Internal In-Flight Acts of Terrorism

    This 5 page paper purports that internal in-flight acts of terrorism are the greatest threat to network security. Bibliography lists 8 sources.

  • Future Transportation Transformed by Digital Technology

    This 6 page paper discusses the future in terms of travel, and how it will be impacted by digital technology. This paper focuses on air travel, space travel, trains, cars, etc. Bibliography lists 5 sources.

  • Nursing Competency and the Use of Technology

    An 8 page discussion of the need for technological competence in nursing. This paper asserts that utilizing technology to optimize patient outcome is directly dependent on a nurse’s competence with that particular technology. Because technology is changing on a daily basis in the medical environment, nursing competency is an ever evolving phenomena. The problem which exists, therefore, in insuring nursing competency revolves around insuring both adequate training and provisions to provide the proper management format and accountability which is necessary to insure that nurses continually perform their duties in the most competent and constructive manner. The establishment of well designed quality assurance/quality improvement models and clinical pathways are critical components of this task. A 1/2 page Roman Numeral outline is included. Bibliography lists 7 sources.

  • Music Licensing and Technology

    This 7 page paper provides an overview of the use of technology and the problem of music licensing. This paper considers the reasons why music licensing has come up as a major issue in the midst of significant changes in technological access. Bibliography lists 8 sources.

  • Music Instruction and the Use of Technology

    A 10 page research paper which looks at how computer technology is impacting the field of music education. The writer gives an overview of some of the technological marvels available and then discusses the controversy as to how much these new innovations should replace traditional pedagogies. Bibliography lists 9 sources.

  • Recording Studios and Changes in Technology

    A 12 page discussion of the technological changes which have occurred in the recording studio since the popular music explosion of the late 1950s and early 1960s. Emphasizes the impetus behind these changes is attributable not only to the entertainment industry but also to factors as diverse as computer, military, and medical applications. Notes specific changes in Signal Inputs, Signal Conditioning, Sound Recording Equipment, Mixers, and Signal Outputs. Bibliography lists 7 sources.

 

Most Relevant Research Papers

Click on any of the term papers to read a brief synopsis of the research paper. The essay synopsis includes the number of pages and sources cited in the paper.

 

Copyright © 2000-2021 The Paper Store Enterprises, Inc. & Fast Papers On-line.
All rights reserved. Search for your essay here.

U.S. based premium essay, research and
term papers service since 2000.