Papers On Internet & Related Issues
Page 18 of 99
|
|
Communication and Disputes in Cyberspace
[ send me this paper ]
This 10 page paper considers how disputes and misunderstandings can occur in cyberspace as a result of the style of the communication medium and the way the communication is interpreted. The paper also looks at how and where he disputes may be resolved and where the distance and detachment of cyberspace is an advantage or a disadvantage. The bibliography cites 18 sources.
Filename: TEcybercom.rtf
Comparing Encyclopedias
[ send me this paper ]
A 3 page research paper that contrasts and compares articles from two online encyclopedias, Encyclopedia Britannica and the Encyclopedia Americana. This examination of these encyclopedias focuses on how each represents the topic of the Nile River, comparing and contrasting the features of these articles according to Katz's criteria (2002). No additional sources cited.
Filename: khencyc.rtf
Comparing Online and Print Newspapers
[ send me this paper ]
This 3 page paper compares the online and print versions of “USA Today” for January 11-13, 2008. Bibliography lists 4 sources.
Filename: HVComNws.rtf
Comparing Search Engines; Dogpile and Kartoo
[ send me this paper ]
This 6 page paper compares two meta search engines, comparing the search features, way that they index results, present results, different features and ownership of the sites. The paper compares an identical search on each engine. The bibliography cites 4 sources.
Filename: TEdogpile.rtf
Comparison of eCommerce (B2C) Websites
[ send me this paper ]
(5 pp) The challenge for all of us who shop for
merchandise on the internet, is to first apply the
ol' shopping code of 'the best 'goods' for the best
price,' and the second is the ease of movement
through the website of the merchandiser. This
discussion will be based on two 'department store'
(B2C) type websites: www.sundancecatalog.com and
www.eddiebauer.com
Filename: BBeCom.doc
Comparison of Internet Sites on Medieval History
[ send me this paper ]
A 6 page research paper that examines and critiques three internet sites that deal with medieval history. The writer evaluates each site according to graphics, usability and the quality of information. Bibliography lists 3 sources.
Filename: khcommed.rtf
Computer Crime
[ send me this paper ]
12 pages in length. That hacking was present in the phone system over one hundred years ago speaks to a problem that has experienced a slow but steady evolution. The 1960s, however, is where the timeline of contemporary hacking gets its start, continuing on into the 1970s with John Draper – aka Captain Crunch – hacking the phone company by mimicking the tone that opens a line. By the 1980s, hacking had become much more sophisticated as a vast new entity called 'cyberspace' was introduced to the world. Bibliography lists 15 sources.
Filename: TLCCompCrm.rtf
Computer Crime And Forensics
[ send me this paper ]
12 pages in length. Policing of computer crimes is considerably more difficult than regulating criminal activity in real life, inasmuch as the perpetrator can move about in complete anonymity for long periods of time before officials can ever connect him or her to a particular white collar crime. Indeed, policing tactics have vastly improved over the years to include such aspects as firewalls, backups and other security providers; however, the extent to which IT forensics strategies must go in relation to existing problems reflects a perpetual and worsening dilemma. Bibliography lists 14 sources.
Filename: TLCCmpCrmFr.rtf
Computer Crime in the UK
[ send me this paper ]
This 8 page paper considers the current levels of computer crime in the UK and asks the question "is there sufficient legislation to combat computer crime or is there still a need for more?". The writer considers the barrier to combating this type of crime with some surprising results. The bibliography cites 13 sources.
Filename: TEcompcm.rtf
COMPUTER CRIME: A CASE STUDY
[ send me this paper ]
This 6-page paper focuses on a case study detailing a disgruntled employee who set a time bomb in a company's computer. The paper answers questions such as whether the employee's act was criminal, how it could have been prevented, and how the database could be restored. Bibliography lists 3 sources.
Filename: MTcomcri.rtf
The Paper Store Enterprises, Inc. Gladly Accepts:
l
Request A
Free
Excerpt From Any Paper Before Ordering!
Be
sure to also visit:
Term Paper Help On
File, 12000 Papers,
Research Papers Dot Net,
Essay Site, Paper
Geeks, Paper or Essay
Finder, The Essay Page,
Reports and Papers,
Report Finders, 12000
Papers, Real Papers, E
- Coursework, Choose
a Paper,
Pick a Paper, Paper
Download, & Expert
Term Paper Advice
(Click Here For MORE Term Paper &
Research Paper Help Sites!)