Make
Your Selection Below:
Papers On Internet & Related Issues
Page 8 of 92
|
|
The Harrison-Ruzzo-Ullman (HRU) Model
[ send me this paper ]
This 5 page paper looks at the The Harrison-Ruzzo-Ullman (HRU) model of information security. The model is defined and its positive and negative features are highlighted. Bibliography lists 5 sources.
Filename: SA208HRU.rtf
"Chicken" Porn on the Internet
[ send me this paper ]
This 6 page paper discusses child pornography on
the Internet. It examines the psychological effects
on the child, as well as reviewing the issue of free
speech - harm none based on the opinion of John
Stuart Mill. Bibliography lists 7 sources.
Filename: BBcporn.doc.
"Cyber Reader" by Victor Vitanza
[ send me this paper ]
5 pages in length. The anthology Cyber Reader edited by Victor Vitanza gives the reader some keen insight on what technology has made available through the internet and the rapid changes that accompany it. This paper focuses on the psychic and social consequences of the internet as a medium of change. Bibliography lists 1 source.
Filename: JGAcyber.wps
"Internet and Computer Law: Cases-Comments-Questions": A Discussion of the Principles Illuminated by Authors Peter B. Maggs, John T. Soma, and James A. Sprowl
[ send me this paper ]
A 12 page discussion of the ease with which private and proprietary information can be unscrupulously gleaned from the multitude of computerized digitized files which exist in the contemporary world. The laws which exist for the purpose of protecting our privacy and the ownership of intellectual property have proven to be a little real benefit. The case law outlined by Maggs, Soma, and Sprowl is used as a springboard in this paper to discuss several independent examples of where information privacy becomes an issue and the measures that can be taken
to protect that privacy. Bibliography lists 3 sources.
Filename: PPlwComp.rtf
2Oth Century Computer Graphic Designs
[ send me this paper ]
This 30 page paper considers the nature of graphic design in 20th century, the approaches to developing graphic design and the way the focus on design has changed in recent years through the
introduction of WEB design and the use in advertising and marketing. Bibliography lists 20 sources.
Filename: MHgraphi.wps
802.11 Technology
[ send me this paper ]
This 16 page paper considers the 802.11 set of protocols looking at the use of the technology in general as well as 802.11a, 802.11b and 802.11g individually looking at their relative advantages and disadvantages. The paper then considers the dangers of using these in terms of security and where the technology may lead on the future. The bibliography cites 16 sources.
Filename: TE80211g.rtf
888.com
[ send me this paper ]
This 5 page paper examines the online gambling and casino company 888.com and considers the strategy of the company using Porters Five Forces model, which looks at existing competition, new entrants, customers and suppliers and substitutes. The bibliography cites 8 sources.
Filename: TE888com.rtf
A Look at Congress and the Internet
[ send me this paper ]
This 3 page paper looks at the first four chapters of the book Congress and the Internet that highlights the views of various politicians. How Congress has changed as a result of the advent of the net is the focus of this paper. No additional sources cited.
Filename: SA312net.rtf
A Case for Outlawing Virtual Pornography
[ send me this paper ]
An 8 page discussion of the impacts of virtual pornography on society. The writer emphasizes that while the issue of Internet regulation is highly controversial, pornography on the World Wide Web should definitely be outlawed if for no other reason than its impacts on the most vulnerable members of our society, our children. Bibliography lists 13 sources.
Filename: PPpornRg.rtf
A Comparison between Three Personal Firewalls
[ send me this paper ]
This 5 page paper considers three easily available firewalls; BlackICE Defender, Zone Alarm and Sygate Personal Firewall. The writer compares aspects such as price, features, ease of use and general strengths and weaknesses. The writer then makes a preference choice and outlines how it may be installed on a small network. The bibliography cites 8 sources.
Filename: TEfirewl.wps
The Paper Store Enterprises, Inc. Gladly Accepts:
Request A Free
Excerpt From Any Paper Before Ordering!
Be
sure to also visit:
Term Paper Help On
File, 12000 Papers,
Research Papers Dot Net,
Essay Site, Paper
Geeks, Paper or Essay
Finder, The Essay Page,
Reports and Papers,
Report Finders, 12000
Papers, Real Papers, E
- Coursework, Choose
a Paper,
Pick a Paper, Paper
Download, & Expert
Term Paper Advice
(Click Here For MORE Term Paper &
Research Paper Help Sites!)
|