SEARCH RESULTS

YOU WERE LOOKING FOR :Overview of Computer Crimes

Essays 151 - 180

Overview of Hate Crime

In eight pages the hate crime of racism is presented in an overview that includes various theories, legislation, study methodology...

Juvenile Crime Programs

Juvenile justice models are considered in an overview consisting of seven pages in which the community corrections approach to juv...

Ethics and Computers in the Workplace

problems is usually a human misuse of information and technology (1). Still, as new technologies unfold, specific ethical questio...

Russia Sales and IBM

In six pages this paper answers questions having to do with IBM's sale of a super computer and 16 computer work stations to a nucl...

Criminal Justice System and Organized Crime

international scope quite considerably since the spread of Internet communication. In addition, international travel has itself gr...

Illicit Drug Use in the United States and Control Efforts

In eleven pages this paper discusses US illicit drugs and the crime associated with them in an overview of what is being done to c...

Communications Between Computer and Printer in Document Printing

In five pages the communications between a computer and printer regarding document printing are examined within the contexts of ne...

South Africa's Youth Issues

This paper examines South African youth in this post apartheid overview that addresses HIV and AIDS heath concerns, education, cri...

Computer Hardware and Peripherals: The Evolution of Learning

use computers in our daily lives for both work and for play many of us are not as well educated in these machines as we maybe ough...

The History of Computer Ethics

information on using this paper properly August, 2010 The concept of computer ethics has been discussed as it relates to tradi...

Criminal Justice and Empiricism

new ideas that argued humans were intellectual beings who could control things. Positivism, which is based on science and empirici...

Victimization Recovery and the Effects of Social Support

impacts of criminal victimization, including interpersonal violence, sexual abuse and domestic violence, all of which comprise a s...

American Leadership as Personified by Steve Jobs and Virginia Henderson

CP/M, which was shortly to be succeeded by MS/DOS (Alsop 188). The Macintosh operating system offered an icon-driven system that a...

COMPUTERS, INPUT AND OUTPUT DEVICES

other end of the spectrum is the graphics tablet, an input device, complete with stylus, that allows the mover to move the cursor,...

Impact of Imperialism on South Africa

racism and the politics of apartheid or separatism between blacks and whites. This resulted in a history fraught with turmoil, wa...

Overview of Dell Computer Corporation

In eight pages the computer industry with emphasis upon Dell Computer Corporation is the focus of this examination that includes s...

Twenty First Century Outlook for the Personal Computer Industry

In a paper consisting of seven pages computer pricing and its industry implications are discussed with the end of 100 percent grow...

Computers: The Battlegrounds of the Future

and other highly specialized tasks. Information technology and the computers and global network that bind all three together, in ...

Safeguards and Penalties for Improper Use of Data and U.S. Law

to criminal issues were not sufficient to address computer fraud. To an extent, wire and mail fraud issues were addressed in the p...

Computer Anxiety and Gender Differences

In six pages this paper discusses how computer anxiety may be gender based with a consideration of 3 studies in which a correlatio...

South Philly Overview

(Learning Center/Philadelphia). However, shipbuilding still employed some 50,000 workers after World War II, but then began a pre...

American Prohibition and the Economic Boom of the 1920s

At the turn of the century, dry legislatures had been favoring womens suffrage and also allowed popular referenda in respect to wh...

Prison System of the State of Texas

prison although no threats have been made on her life. In other celebrity cases, Texas saw singer David Crosby of Crosby, Stills,...

Process Digitalization Through Computers as Employed by Kirwin Brewery Company

practical, but when firms use inventory, it is quite practical. The toy industry comes to mind because there is such a great deal ...

Russian Organized Crime

to the Russian Mafia are members of an organization that has "hundreds of gangs" and its membership numbers in the thousands (Meye...

Overview of Computer Database Structures

(George Mason University, 2003). Furthermore, the flat file database is familiar to most users -- meaning it is more familiar and ...

Overview of the SIGI-PLUS Computer Career Guidance System

looks at the pre-requisites, detailing the educational or training requirements for the occupations (Kivlighan et al, 1994). The ...

Profiles IBM Apple Dell

This essay provides a brief history and recent performance of IBM, Dell, and Apple Computer. The paper begins with a discussion of...

Middle Eastern Crime Fiction from 1916 to 1980s

In six pages this paper presents a textual overview of The Middle East in Crime Fiction by Reeva Simon. Four sources are cited in...

Overview of 1994's Crime Bill Act

In nine pages this paper examines the 1994 to 1996 effectiveness of the Crime Bill Act. Eight sources are cited in the bibliograp...