SEARCH RESULTS

YOU WERE LOOKING FOR :Overview of Computer Crimes

Essays 1741 - 1770

Office Equipment and Computer Misuses and Abuses by Employees

In six pages this research paper examines email and Internet misuses and abuses by employees in the workplace, discussing issues o...

Carol Gould's Edited The Information Web Ethical And Social Implications Of Computer Networking Reviewed

In five pages this essay compilation first published in 1989 are reviewed in a consideration of information abuses and the importa...

President Bill Clinton's Violent Crime Control and Law Enforcement Act

In seven pages this research paper focuses upon the anticrime bill passed during the first term of President Bill Clinton in an ov...

Crime, Justice, and Changing Lenses by Howard Zehr

of their crimes against individuals and communities by holding them directly accountable for making amends to for the damages comm...

'Light' Sentences and Juvenile Crime

In about six pages this paper examines the controversy regarding 'light' sentences that are often unfairly received for juvenile o...

Concepts of Punishment, Justice, and Crime in The Crucible by Arthur Miller

In five pages this paper discusses how this play is not a commentary on 17th century religious issues but deals instead with compl...

Capital Punishment: Morally Acceptable And Effective Crime Deterrent

far less heinous than murder, so how is it that the Bible can be mistaken for harboring judgmental opinion against capital punishm...

Digital And Psychological Profiling Of Cyber Crime

still in its infancy; only in the recent past have inroads been made in overcoming the boundaries inherent to such undesirable tec...

Cyberspace Crimes and the Law

offences and the law has not been able to keep pace with new technology. With law enforcement lagging behind, cyber criminals some...

Criminal Justice and Treating Juvenile Crime as Adult Offenses

does not treat all of its juvenile offenders as adults. Indeed, the state is one of the most progressive in the nation in terms o...

Human Nature, Morality, Punishment, Guilt, Crime, Justice, and Law in Literature

(Sophocles). In this she is arguing how she has not followed the laws of "men" or even of the gods in this case, but rather per...

Comparative Analysis of Gateway and Dell Computer Companies

In thirty two pages overviews, mission, goals, and corporate visions of these conglomerates as well as current data, inventory con...

A Financial Analysis of Apple Computer, Inc.

In five pages this paper discusses company profitability through the maximizing of stock prices while minimizing risk and includes...

Computer Assisted Design as a Tool in Organizational Communication

an excellent tool which free the architect/artist/creator a broader area of time and space to develop an appropriate solution to a...

A Case Study in Requirements of Functional Human/Computer Interactions

This paper examines functionality issues required by a video shop to set up a database information system to allow customers easie...

Acer Computers and Possible Canadian Manufacturing Expansion

In a paper consisting of seven pages the proposal of Acer expanding manufacturing to a Canadian site is considered along with proj...

Two Theories on Crime

In eight pages the ways in which theories attempt to explain why some individuals break the law are examined with a discussion of ...

The Use of Computer Aided Design and its Layer Standards

5 pages and 3 sources used. This paper provides an overview of the central components of the CAD operations with a specific focus...

Crime and Punishment in American History by Lawrence Meir Friedman

In five pages this comprehensive American history text is examined in terms of the author's detailed consideration of the U.S. cri...

Jack Maple's Crime Fighter

In five pages Maple's book is critically reviewed and lauded for its thorough research and is described as an essential read for t...

Crimes Committed by Males and Females, Aggression, and Testosterone

nature versus nurture; females are, by nature, less aggressive than males are, because they do not have near the same level of tes...

Medicare Crime Deterrence and the FCA

then the financial "risk" of being caught. Like any crime, if the law is lax in either the presence of legal directive or its enf...

Marketing at Dell Computer Corporation

the United States market (Dell, 2001). Compaq Computer Corporation still has the largest market share of servers in the world. D...

Corruption of Business Through the Computer Security Endangerment of Internet Hacking

is practically nothing that computers do not influence in one manner or another, which has caused society to render itself depende...

A Strategic Case Study of Acorn Computers

In ten pages this paper considers a student supplied case study that applied short term rather than long term corporate strategies...

Ray Kurzweil's The Age of Spiritual Machines, When Computers Exceed Human Intelligence

This book is examines in a paper consisting of 6 pages. There is 1 source cited in the bibliography....

Computer Graphic Designes in the 2Oth Century

A paper consisting of 30 pages twentieth century graphic design is considered with a discussion of various influential development...

Computer Manufacturing Entrepreneur Michael Dell

In five pages this paper discusses Michael Dell's entrepreneurial characteristics which include having fun, recognizing change opp...

Computer Music and Its Impact Upon Society

in the past (Forest 35). For example, using Macintosh computers and a software program called "Kids Notes," four-year-olds can c...

Juvenile Arrests and Gun Crime Policy Analysis

In thirteen pages this paper presents a problem analysis, objectives establishment, policy or program design, action development, ...