SEARCH RESULTS

YOU WERE LOOKING FOR :Addiction to the Internet

Essays 631 - 660

Hypothetical Case Analysis of Catatech

differences, and the differences between currencies not only affect pricing, but represent obstacles that must be overcome in ord...

Hong Kong's eCommerce Challenges

In a paper consisting of fifty nine pages Hong Kong's business community is examined in terms of internet trading and ecommerce ch...

Ownership, the Internet, and Copyrights

emotional pain? Should she ethically bring a suit if she has a legal right to do so? Who would the defendant be?...

Internet Technology Project Management and 'Bricks and Mortar' Projects

myriad meetings discussing what individuals might want to use the building for, or trying to anticipate how the building can be ex...

AT&T, Rostelecom, and British Telecom Telecommunication Companies

In thirteen pages these American, Russian, and British telecommunications companies are contrasted and compared in terms of US GAA...

Business Operations and the Role of the Internet

of the card. As powerful as both realized and potential sales increases are, business use of the Internet is not limited only to ...

Dinty Moore The Emperor's Virtual Clothes The Naked Truth about Internet Subculture

The writer analyzes the Moore book using examples from the text and reveals the possible implications they have for today's techno...

Clifford Stoll's Silicon Snake Oil

In three pages Stoll's examination on how the Internet will expand social problems are discussed. There are two supporting source...

Results of Antisocial Survey and Internet Chatting

deeper, causing a vicious cycle to occur. II. EXECUTIVE SUMMARY There is no question that with the help of Internet chatti...

Internet and Pornography

In five pages this paper discusses issues involving the Internet and pornography. Six sources are cited in the bibliography....

A Computer History

In ten pages an overview that takes a nontechnical approach to computer history from ancient abacus and punched cards from ENIAC t...

The Uses of TCP/IP Protocol Today

their old SNA (systems network architecture) for crucial applications (Passmore, 1997) as real or potential hybridization of netwo...

Computer Hacking and Information Warfare

In twenty pages this paper discusses PC users and small business in a consideration of Internet security breaches through computer...

Reviews of Articles on Various Computer Subjects

In four pages article reviews of approximately two paragraphs each consider such varied topics as robotics, software policy, Inter...

Choices in Computer Software

In six pages Oracle's Oracle 8 and Access 97 by Microsoft are the focus of this paper that considers computer software choices wit...

Antitrust Issues and Internet Explorer of Microsoft

In five pages this paper examines the Department of Justice's antitrust case against Microsoft and issues regarding the Internet E...

Futures and Options on Silver and Yahoo!

strong case for silver on supply and demand fundamentals. Precious metals are not necessarily a good inflation hedge or lo...

Government Branches and Computer Industry Alliances

In five pages the significance of government and computer industry alliances is discussed with such results considered as software...

Censorship and Pornography on the Internet

In six pages this paper discusses censorship of the Internet in a consideration of pornography. Three sources are cited in the bi...

Internet Dangers and the Vulnerability of Children

In ten pages this paper examines how children using the Internet makes them vulnerable to various dangers including tobacco and al...

American Society and Internet Sex

and choose their words a little more carefully then they have so far. Last year, the Communications Decency Act was sponsored by S...

Free Speech and Obscenity

In five pages this paper discusses the free speech implications of obscenity in an examination of the Internet and the pornography...

Censorship and the Internet

In six pages this paper examines political and social arguments pertaining to the issue of Internet censorship. Nine sources are ...

Unfairness and Censorship of the Internet

In seven pages this paper argues that the Communications Decency Act is unconstitutional in its unfair Internet censorship. Eight...

Communications Decency Act of 1996 and Internet Censorship

In six pages this essay compares two articles as they examine the issue of censoring the Internet with the Communications Decency ...

Internet and the Impossibility of Censorship

In five pages this paper discusses how lawful censorship of Internet pornography is nearly impossible because of its widespread ca...

Internet Regulation and Civil Liberties

In nine pages this paper discusses legal regulation of the Internet in a consideration of the F.C.C., Communications Decency Act p...

National Information Infrastructure Developmental Importance

In eight pages this paper considers the lack of Internet organization in this analysis that examines the importanceof developing a...

NII Regulation

In ten pages this research paper discusses National Information Infrastructure government regulation support in a consideration of...

Security on the Internet and Cryptography

One of the most important solutions for Internet security is cryptography. This paper discusses use of encryption to enhance TCP/I...