Papers On Internet & Related Issues
Page 28 of 53
|
|
Intranet Use
[ send me this paper ]
This 11 page paper asserts that many businesses have
begun to either incorporate, re-evaluate and, or, update their in-house
computer networks. These same businesses are possibly looking at the
many advantages that come with a comprehensive intranet system to
facilitate company communications and interactions. Bibliography lists
15 sources.
Filename: KTintrnt.wps
Investment Choice; The Case for Amazon.com
[ send me this paper ]
This 5 page paper considers the reason why Amazon.com may be a good long term investment for an investor looking for an internet based NASDAQ company. The paper looks at general conditions as well as the status and predictions surrounding the company and the current financial performance. The paper contains two graphs and the bibliography cites 6 sources.
Filename: TEamazn4.wps
IP Multicasting / A Comprehensive Overview
[ send me this paper ]
A 10 page technical overview of IP multicasting, including a thorough explanation multicasting and its technological functions in internets, intranets and ethernets, the basis of the current internet servers, older multicasting hardware and software, and new "revolutionary" multicasting hardware and software. Bibliography lists 6 sources.
Filename: Multicas.wps
Is More Security Worth Less Privacy
[ send me this paper ]
A 14 page paper. Cybercrime is increasing every year. The costs are staggering, as much as hundreds of millions of dollars each year plus the cost to human dignity and morale. The crooks have had more tools to use than our law enforcement agencies and law enforcement has been consistently thwarted in their attempts to gain authority to use the kinds of programs and strategies that could result in capturing the criminals. That changed on September 11. The Attack on America woke up the public and the Congress and resulted in a number of new laws that give expanded authority to specific agencies to "listen" in on the Internet. This essay discusses Cybercrime and then, the issue of security versus privacy. The writer takes the position that more security is worth less privacy. Bibliography lists 10 sources.
Filename: PGscprv.rtf
ISDN in Nutshell
[ send me this paper ]
The 8 page paper explains what Integrated Services Digital Network (ISDN) is, how it works, the costs, suppliers, required equipment and related issues. The bibliography cites 6 sources.
Filename: TEidsn01.wps
Issues Concerning Biometrics And E-Commerce
[ send me this paper ]
A 15 page paper that discusses biometrics as a more reliable authentication technology. The writer begins with a definition of e-commerce, then, defines and describes biometrics, including the different categories, how it works and the size of this industry. The writer discusses the uses for biometrics in today's world and provides examples of how and where this technology is being used. Privacy issues are also discussed; biometric identification is compared with the acceptance of fingerprinting in terms of public acceptance. The major issue is storing these kinds of data in central databases but there are alternatives, which are identified. Legislation is mentioned although there are no laws that govern this technology directly. Finally, the writer discusses whether or not it is worth initiating biometric authentication devices in businesses who are engaged in e-commerce. 1 Table included. Bibliography lists 19 sources.
Filename: PGbiomtr.rtf
IT and business strategies
[ send me this paper ]
A sixteen page paper which looks at the way in which information technology is used in business, both in terms of company software systems and the Internet.
Bibliography lists 6 sources.
Filename: JLbusstrat.rtf
IT Ethics
[ send me this paper ]
A 7 page paper providing a literature review on this topic. Ethical
questions surrounding IT in former years focused on access. As access continues to be
less dependent on the possession and knowledge of computers, ethical questions appear to
be more concerned with use of information than with access to it. Bibliography lists 6
sources.
Filename: KS-ITethics.wps
IT System for a Newly-Merged Manufacturer
[ send me this paper ]
A 7 page paper discussing the IT
needs for the company resulting from the merger of three European manufacturers. The company
will have 10 locations including corporate headquarters after one year, and each of the three
manufacturing sites will be involved in increasing foreign business. The paper recommends an
intranet approach with each site optically networked. The arrangement allows the new company
to take advantage of a Just-In-Time (JIT) production inventory system for more efficient
operation, while providing two-way, real time communication ability among all sites.
Bibliography lists 11 sources.
Filename: KS-ITmerger.wps
IT’s Future Directions
[ send me this paper ]
A 6 page paper discussing the likely directions of IT in the first 10 or 15 years of the new century. As the boundaries between IT and the rest of the business blur, those designing, implementing and executing these and other changes will need to be conversant not only in business, but also in IT capabilities. Those currently in IT only will need to gain greater knowledge of the business needs of the organization. As the boundaries between data and active business continue to blur, so will the range of talents and abilities of those using them. Bibliography lists 7 sources.
Filename: KSitFutDir.rtf
The Paper Store Enterprises, Inc. Gladly Accepts:
Request A Free
Excerpt From Any Paper Before Ordering!
|