SEARCH RESULTS

YOU WERE LOOKING FOR :Investigating Cyber Bullying Using The Internet

Essays 91 - 120

Research Summary, Greba, et al (2001)

This research paper is a summary of the research conducted by Greba, Gifkins and Kokkinidis (2001), who investigated the amygdaloi...

Palliative Care/Hospice Websites

This research paper investigates the quality of three sites that pertain to the medical specialty Palliative and Hospice care. Eva...

Tired Nurses

The organizational behavior problem selected for this analysis is nurse fatigue. Thousands of nurses arrive at work in a state of ...

The IRS and Other Cheaters

Ariely and his team conducted a number of experiments at three universities to investigate the likelihood of cheating if the stude...

Can God and Evil Co-exist

One of the questions that has plagued theologians, Biblical scholars, philosophers and others has to do with God and evil. How can...

Fraud in the Court

Inspector generals investigate and audit departments or agencies to detect and prevent fraud, waste, abuse, and corruption. This p...

Investigating Different Crimes

Over the last decade, there have been numerous high-profile, huge scams from organizations. These are called white-collar crimes a...

Hepatitis C Report Study Design

This essay reports the methodology section of a research study that investigated the correlation between diabetes 2 and hepatitis ...

Research Introduction

This essay presents an overview of introductory research with a specific focus on how it is used in regards to investigating relig...

Argument: It is Time to Change Visual Flight Rules

This 10 page paper argues that investigations of airplane crashes can be impeded by current VFR regulations. The crash of JFK Jr. ...

John Locke Sources Plus an Annotated Bibliography

and not just as a theorist. Krueckeberg, Donald A. "The difficult character of property to whom do things belong?". Journal of t...

Educational Uses of the Internet

In five pages this paper examines how the Internet has been integrated into the classroom in a consideration of this technology's ...

Uses of the Internet

In ten pages this paper discusses the uses of the Internet with various concepts and services described. Ten sources are cited in...

Higher Education and Uses of the Internet and the World Wide Web

In fifteen pages this paper discusses how higher education can be enhanced through the uses of educational formats that are Web ba...

Using the Internet to Build a Competitive Brain Trust

and commitment to the venture, help to guide the venture in the right direction. This includes not only team members, but, critica...

China, Singapore, and New Media and Internet Technology Uses

control the people by controlling the Internet. Yet, it likely realizes, it can only do so much to control something that is rathe...

Internet Uses by Museums

their work" (Will, 2003). There are many types of resources that museums can use, depending on what they want to do. Some "have ...

Internet and its Strategic Uses

seen as part of a higher level IT strategy. In looking at the use of the internet it cannot be separated form the IT strategy and ...

The Decision-Making Process Involved in Using or Changing Internet Vendors

is the responsibility of the project manager to ensure that everyone involved is on the same page. All project team members shoul...

Business, Technology Uses, and the Internet

In three pages this paper discusses the impact of the Internet on businesses in this overview of how new technology is being used....

Internet Marketing of New and Used Automotive Parts

all has been that of the computer. In more recent times, the computer has moved from the restriction of industry well into the ma...

Uses of the Internet

before, ways that can be seen as positive as well as negative. People can also use the computer to communicate with others...

Cyber Intrusions and the US Military

are not exempt from this unauthorized access and sometimes the results can be deadly. Epstein (2008) reports that battleground co...

Report on Cyber Crime

situation has resulted in opportunities for great innovation and creativity in both legitimate and illegitimate enterprise. Not su...

Cyber Cafe Setup Business Plan

similar. 2. Rationale and significance 2.1 Problem definition To achieve this goal an existing business that is a caf? needs to...

Cyber Setting Leadership and Decision Making

with equipment and teaching and directing from a distance, decision making and general management will be more effective. In term...

Internet Business Marketing

And the transformation is expected to become even more important as the twenty-first century unfolds (1999). While it seems as if ...

United Kingdom and Computer Crime

censorship, where there has been increased realisation and commitment to deal with the type of information that is on the internet...

Crimes Committed by Computers

The Comprehensive Crime Control Act was created as a means by which to provide Secret Service with legal influence over both compu...

Cyber Cafe 'Coffee Connection' Marketing Plan

embrace diversity as a main stay of our business. Coffee Connection will pursue and achieve the highest standards of excellent to...