SEARCH RESULTS

YOU WERE LOOKING FOR :Types of Internet Telephony Software

Essays 1111 - 1140

Unfairness and Censorship of the Internet

In seven pages this paper argues that the Communications Decency Act is unconstitutional in its unfair Internet censorship. Eight...

Communications Decency Act of 1996 and Internet Censorship

In six pages this essay compares two articles as they examine the issue of censoring the Internet with the Communications Decency ...

Internet and the Impossibility of Censorship

In five pages this paper discusses how lawful censorship of Internet pornography is nearly impossible because of its widespread ca...

Freedom of Speech and the Internet

In forty pages this paper discusses the Internet and the issues related to freedom of speech in a consideration of the constitutio...

Internet Pornography

In six pages this paper discusses Internet pornography in a consideration of how such content is harmful to children. Eight sourc...

Clifford Stoll's Silicon Snake Oil

In three pages Stoll's examination on how the Internet will expand social problems are discussed. There are two supporting source...

Results of Antisocial Survey and Internet Chatting

deeper, causing a vicious cycle to occur. II. EXECUTIVE SUMMARY There is no question that with the help of Internet chatti...

Internet and Pornography

In five pages this paper discusses issues involving the Internet and pornography. Six sources are cited in the bibliography....

Internet Regulation and Civil Liberties

In nine pages this paper discusses legal regulation of the Internet in a consideration of the F.C.C., Communications Decency Act p...

National Information Infrastructure Developmental Importance

In eight pages this paper considers the lack of Internet organization in this analysis that examines the importanceof developing a...

NII Regulation

In ten pages this research paper discusses National Information Infrastructure government regulation support in a consideration of...

Security on the Internet and Cryptography

One of the most important solutions for Internet security is cryptography. This paper discusses use of encryption to enhance TCP/I...

Security on the Internet and Cryptography

One of the most important solutions for Internet security is cryptography. This paper discusses use of encryption to enhance TCP/I...

Policies, Management, Measures, and Threats Relating to Internet Security

In twelve pages Internet security is analyzed in a consideration of problems relating to threats, measures, management, and polici...

The Rise of Feminism On The Internet

This research paper examines the ways in which feminist ideology has utilized the Internet as a way of disseminating information o...

US Democracy and the Increasing Influence of the Internet

In fourteen pages this research paper discusses how the process of American democracy is being profoundly influenced by the Intern...

Internet and Political Campaigns

In five pages this paper examines the growing political importance of the Internet and considers how it was used during the presid...

Literature Overview on Higher Education Applications of the Internet

In fourteen pages this research study considers literature that covers how higher education applies the Internet and the Web and i...

Speech and Property Issues

In fifteen pages this paper discusses intellectual property rights issues and free speech with Two Live Crew rap group and Dustin ...

Constitutional Issues and National Security

In eight pages this paper examines national security in the United States in an assessment of strengths, weaknesses, and the issue...

Internet and Electric Utilities

In five pages this research paper examines the marketplace and influence of recent legislation with Internet technology allowing u...

Internet Technology and Curriculum Development

In six pages the benefits of Internet technology on the development of curriculum are examined in terms of its removal of the educ...

Community Service and Rural Libraries

In eighteen pages this research project discusses better community service regarding rural libraries and Internet access. Eight s...

Amazon.com, the Internet, and IT

In eight pages this paper examines the information technology uses of Amazon as a way of creating competitive advantage and also c...

Authors and Resource Validity

results of a survey revealed that 66 % of teachers used their computers "a lot" for classroom instruction, and 39 % frequently use...

Database Protection

simply company preference (Spalka and Cremers 67). Thus, in evaluating the need for security in databases, many issues will be bro...

Health Care Applications of the Internet

This paper discusses the medical and health care benefits created by the Internet. This five page paper has eight sources listed ...

Eastern Europe and the Internet

In eight pages this paper discusses Internet access and usage by Eastern European countries. Eight sources are cited in the bibli...

Monitoring of Email and Internet Usage and Ethics

carry out consistent monitoring. When the workforce is large, the cost of this kind of monitoring technology breaks down to just a...

Internet Purchasing and Supply Chain Research

In six pages this paper discusses the present and future changes represented by the Internet in this supply chain research conside...