SEARCH RESULTS

YOU WERE LOOKING FOR :The Study of Internet Addiction

Essays 1201 - 1230

Cable TV - Trends

This 6 page paper discusses trends in the cable TV industry, in particular the interest in cable modem technology for Internet acc...

Higher Education and Uses of the Internet and the World Wide Web

In fifteen pages this paper discusses how higher education can be enhanced through the uses of educational formats that are Web ba...

Ecommerce and the Internet

In six pages this paper discusses the Internet and its uses for banking and other types of electronic commerce and also considers ...

Internet and Pornography

In five pages this paper discusses issues involving the Internet and pornography. Six sources are cited in the bibliography....

Freedom of Speech and the Internet

In forty pages this paper discusses the Internet and the issues related to freedom of speech in a consideration of the constitutio...

Internet Pornography

In six pages this paper discusses Internet pornography in a consideration of how such content is harmful to children. Eight sourc...

A Computer History

In ten pages an overview that takes a nontechnical approach to computer history from ancient abacus and punched cards from ENIAC t...

The Uses of TCP/IP Protocol Today

their old SNA (systems network architecture) for crucial applications (Passmore, 1997) as real or potential hybridization of netwo...

Computer Hacking and Information Warfare

In twenty pages this paper discusses PC users and small business in a consideration of Internet security breaches through computer...

Overview of Internet Strategies

is a way of adding value greater than the cost of adding that value, making it different from the competition and stand out....

Internet and the Impact Upon Library Institutions

library, see information as both organized and structured and they comprehend the difference that exists between sources (2000). I...

Crimes on the Internet

Finally, another Internet crimes (which is similar to hacking) is to release a virus on the Internet. Again, viruses can disrupt t...

Report on Internet Protocol Telephony

there were: ". . . research activities of transmission of voice signals over packet networks in the late 70s and early 80s. . ...

Privacy Issues and Email

A paper addressing common privacy issues faced by Internet users. The author discusses e-mail, hacking, and relevant laws. This f...

Internet Banking and Value

third make use of internet banking services. This can be placed in the sector of remote banking, where when added together with te...

Controlling Workplace Internet Usage Through Planning

and fundamentals go to balancing conflicting ideas about the use of information. Many employees feel that they should have the rig...

Online Experience Offered by Toys 'R Us

ever has been (Moore, 2004). During the most recent holiday season, the retailer had pricing issues that it could not overc...

New Car Buying

one has to spend at one dealership. One of the common problems with shopping for a car the traditional way has been the huge expe...

Internet Commerce and Christianity

40 % (2004, p.12) of Internet users in general claim that they have either sent or received e-mail messages that have spiritual ...

Digital Media and Postmodernism

additional changes in society, most notably in belief systems and related economic and political views. Cavalli & Cavazza ...

Impressive Online Science Museums

Inside the DNA pages, the screens are interactive. You can probe the DNA sequence to find matches, and while youre doing that you ...

Promotional Analysis of Harry Potter Books and Films

in a British field weeks before the books release (msn, 2004). Both of the above hits are sandwiched in between the ads...

Internet Utilization of Virgin Records and Liz Claiborne

But Liz Claiborne has also worked in cyberspace as well. Needless to say, Claiborne has its own website, www.lizclaiborne.com, whi...

United Kingdom Sales of the X600 Mobile Telephone by Samsung

(Samsung, 2004). The telephone also has a number of features as well as the camera which is one of the fashionable items of ...

Analysis of Email Linguistics

written language, effectively bridging the gulf between these two forms of communication. Granted, there are many instances on the...

Information Technology Professionals and the Effects of Information Searching

his or her computer checks into a "third-party machine" and this is something that is controlled by a network administrator (Lee, ...

Overview of the Microsoft Antitrust Case

fence replied: "Thats crazy. Microsoft is on a rampage, and the Department of Justice should rein the company in" (1995, p.106). ...

TURNING POINT DRUG REHAB AND SOLUTION DESIGN

How Use Will Help System Analysis and Design Process As mentioned in the previous paper, use cases are ideal for determini...

Internet and Immorality

In looking at the greatest good we may argue that there are many people that have benefited from the use of the internet,...

WWW, Demographics, and Marketing Information Systems

information system. These include Plog Research, the web site of the Kentucky Cabinet for Economic Development, FreeDemographics....