SEARCH RESULTS

YOU WERE LOOKING FOR :Forensics and Computer Crime

Essays 1591 - 1620

Politics, Health, Crime, and Code of Hammurabi

In six pages this research paper examines the Code of Hammurabi which is widely regarded as history's oldest legal code. Seven so...

Investigation of Crime Theories

In eight pages various theoretical perspectives are applied to the Columbine school shooting with an article written by James Gord...

History of the UNIX Computer Operating System

various programs written by many companies to distribute information between multiple computers within the network. This minimize...

Future Education and Computers

In ten pages future education is contemplated with a discussion of case studies and consideration of such topics as interactive me...

Carol Gould's Edited The Information Web Ethical And Social Implications Of Computer Networking Reviewed

In five pages this essay compilation first published in 1989 are reviewed in a consideration of information abuses and the importa...

Super Computers Inventor Danny Hillis

In five pages the history of supercomputers, their inventive creator, and their current uses, are examined. Three sources are cit...

Brief History of Computer Operating Systems

In five pages this research paper discusses OS in terms of history and through a comparative analysis of MS DOS and UNIX. There i...

Reviews of Articles on Various Computer Subjects

In four pages article reviews of approximately two paragraphs each consider such varied topics as robotics, software policy, Inter...

Overview of the Uniform Computer Information Transaction Act Law

An overview of this proposed law and its impact on America's corporate sector and consumers are presented in a paper consisting of...

Computer Music and its Social Effects

This paper discusses how digital or computerized music and its technology have significantly affected society in five pages. Four...

eCommerce Strategy of Dell Computer

In sixteen pages Dell's ecommerce strategy is examined in a direct distribution business model discussion. Fifteen sources are ci...

Development of Computer Software

In ten pages this research paper contrasts and compares third party outsourcing of software application design as opposed to doing...

Espionage and Computer Hackers

In ten pages the modern technological world is examined in terms of the dangers posed by espionage and hackers. Five sources are ...

Organized Crime Families and Psychological Factors

In twelve pages this paper discusses the stress associated with being a part of a Mafia family with various types of psychological...

Reason for Reeva Simon's The Middle East in Crime Fiction

In five pages this paper examines the author's reasons behind the writing of this text and how it impacts the book's structure. T...

Reeva S. Simon's The Middle East in Crime Fiction

In five pages this paper presents a review of this text. There are no other sources listed....

'Light' Sentences and Juvenile Crime

In about six pages this paper examines the controversy regarding 'light' sentences that are often unfairly received for juvenile o...

Crime and Punishment by Fyodor Doestoevsky

In two pages the murder scene's significance and an analysis of Raskolnikov's character are considered. There is no bibliography ...

Crime and the Mens Rea Concept

Criminal liability is relieved in the case of insanity. Legal minors are also relieved of criminal liability, as are persons subje...

The Activities and Crimes of Adolf Karl Eichmann

In five pages Nazi war criminal Adolf Eichmann, his activities during the Second World War, escape, capture and subsequent trial a...

Concepts of Punishment, Justice, and Crime in The Crucible by Arthur Miller

In five pages this paper discusses how this play is not a commentary on 17th century religious issues but deals instead with compl...

Personal Computers, Mainframes, and Business

This is the oldest form of commercially-viable computing, of course. These are the inhabitants of "the computer room," that myste...

Apple Computer Financial Conditions in Early 2001

In six pages Apple's finances as of early in 2001 are examined. Four sources are cited in the bibliography....

Handheld Notebooks and Palm Computers and Pen Based Input Technology

In six pages this paper discusses the technological implementation of pen based inputing and its market capabilities. Seven sourc...

Consideration of Suicide as Either a Crime or a Right

In five pages this paper compares and contrasts suicide perspectives offered in A Family Dinner by Kazuo Ishiguro and 'Night Mothe...

Crime Prevention as a Social and Not Situational Response and a Criminal Career

and adults are weak" (Citizens Commission on Human Rights, 2002). The absence of a solid, beneficial, healthy relationship with a...

Two Theories on Crime

In eight pages the ways in which theories attempt to explain why some individuals break the law are examined with a discussion of ...

Acer Computers and Possible Canadian Manufacturing Expansion

In a paper consisting of seven pages the proposal of Acer expanding manufacturing to a Canadian site is considered along with proj...

Crime and Women from a Feminist Perspective

This paper takes a feminist approach to female criminal behavior in five pages. Three sources are cited in the bibilography....

Business Computer Sales Outlook

In ten pages this paper examines small to medium size business in a consideration of the impact of computing changes on them. Elev...