SEARCH RESULTS

YOU WERE LOOKING FOR :The History of Computer Ethics

Essays 421 - 450

Why Did the Roman Empire Fall?

life-span of cities and the formulation and decline of the empires and civilizations. The Romans themselves took many elements of...

Vengeance Themes in the 'History' of Herodotus

In six pages this paper examines Herodotus' History text in a consideration of its vengeance themes. There is only the primary so...

Drunk History and Substance Abuse Counseling

This essay pertains to "Drunk History," a TV show in which participants describe instances from history while inebriated. The writ...

Young Adult, History and Health Screening

This research paper presents the client's biographical background, his past health history and a well young adult behavior al heal...

Ancient Jewish Leaders

The major challenge in constructing histories of Israel and Judah is the fact that they were individuals but they also had cities ...

African International Relations

International relations in Africa have been heavily influenced by their colonial history, a history that still impacts on internat...

African International Relations

International relations in Africa have been heavily influenced by their colonial history, a history that still impacts on internat...

Periods in Music History and Timeline of Events

This paper is comprised of two sections. The first section is speed sheet, khmuschtl.xlsx, which describe each period in western m...

Indian Warrior by Diego Rivera

This paper pertains to Diego Rivera's "Indian Warrior" and the Mexican history to which the work refers. The writer discusses this...

Asia and Western Expansionism

The ways in which modernization in Asia was influenced by Western expansion are examined in five pages with references made to She...

American Holocaust by David Stannard

In six pages Stannard's contention that the Europeans were responsible for world history's greatest acts of genocide in the exterm...

Historical Analysis of Edward Gibbons' 'The Decline & Fall of the Roman Empire,' Thucydides' 'History of the Peloponnesian War,' and Tacitus' 'The Annals'

In ten pages three ancient historical texts are analyzed in terms of author's approach to history, the representation of the past,...

Looking Back at the Culture of the 20th Century from the 22nd Century

This 8 page paper gives a cultural history of the 20th century from the perspective of someone living in the 22nd century. The wri...

Historical Achievements of Man and Edward Gibbon

Strategic bombing was an aspect of World War II, and people didnt think much about that aspect" (Feld 961b-feld.html). There is n...

A Review of The Shoemaker and the Tea Party by Alfred Young

In this five page paper the fact that our perception of history changes over time is illustrated with a look back some fifty years...

Two Issues/Social Stratification

surpass them (Kerbo, 2009, p. 52). As this indicates, issues of power, status and economics have tremendous influenced the ways in...

Background Information on GE

and Coffins companies expanded, but it soon became apparent that it would be difficult for either company to the alone, relying on...

Internet Usage by Two Companies - Gateway 2000 and DLJ Direct

taking itself too seriously and has collectively remembered to have fun in business as well as build profitability. All com...

System Development Life Cycle: Compare/Contrast

a specific definition and set of goals for the project" (Ntuen, 1991, p. 33). II. SYSTEM DEVELOPMENT LIFE CYCLE MODELS Ever sinc...

IT Forensics: Digital Evidence

reason than the tangible factor inherent to typical sites. The extent to which tangible investigations are inherently valuable to...

Computer Security

a large group of Milwaukee hackers known as 414s, whose infiltration impacted such organizations as the Los Alamos National Labora...

High-Tech Crime: How The Criminal Justice System Has Had To Change Its Approach

equipped to penetrate any computer system with the intent to take, destroy or manipulate the information found upon that system; i...

Don Tapscott's Promise and Peril in the Age of Networked Intelligence

The 'digital economy' is the focus of this paper consisting of five pages with computer networking's advantages viewed within the ...

Computer Espionage and Emergencies of National Security

In five pages this paper examines the computer espionage threats to national security and technology being developed to eliminate ...

Home Businesses and Computer Generated Changes

In a paper consisting of five pages home businesses are examined in terms of the changes brought about by computers. Eight source...

Global Impact of Computers

parts of the world. In Japan the realities that involve the computer and the participation in such is called maruchmedia, or mu...

Computer Automation in the Workplace II

In nine pages this paper discusses office automation in the form of computers in the workplace. Nine sources are cited in the bib...

Business World, Computability, and Machine Languages

the work, or the game, or the information beyond the commands and the toolbars. He or she knows the limits of what the computer c...

A Feasibility Study of Marketing Economics in Spain

This paper examines marketing concepts pertinent to a multinational computer company entering into business in Spain. This ten pa...

Electronic Data Transfer Evolution Through the Internet

In ten pages this paper examines how EDI has evolved as a result of the Internet and considers the future of business computer net...