Term Papers - - Research help w/ term papers more than 15,000 example papers to help you with your research papers and term papers
term papers and more papers - help w/ research and term papers
Research papers - Click Here For Custom WorkFAQ -  re: term and research papersTerm Papers & Research Papers -  Main Page For Assistance With All Papers
Papers and More Papers - - Help With Term Papers !
 

Research Papers - Help w/ Term Papers !Papers And More Papers - Same Day Delivery!Order Help With Your Research Or Term Paper TODAY !


Papers On Internet & Related Issues
Page 25 of 53

Previous 10 Items Next 10 Items

INTERNET ABUSE: A WORKPLACE PROBLEM
[ send me this paper ]
This 14 page paper examines the problem of Internet abuse in the work place as a 'sample' to helping a company that is having this particular problem. Discussion centers around loss of productivity and increase liability to the company. Charts are included Bibliography lists 8 sources.
Filename: MTintabu.rtf

Internet Addiction
[ send me this paper ]
This is a 6 page paper discussing internet addiction. Internet addiction, also known as Internet Addiction Disorder (IAD), Internet Behavioral Dependence (IBD) or Problematic Internet Use (PIU), is considered a behavioral or social pathology similar to other nonchemical addictions such as pathological gambling, or compulsive shopping, sex or over-eating among others and has become an international concern. There are considered several different sub-types of internet addiction such as cyber-sexual addiction for those who are addicted to pornographic or sex web sites; cyber-relationship addiction for those who are addicted to online relationships; net compulsions which include internet shopping and gambling; information overload for those who compulsively surf the web or search databases; and computer addiction which is related to compulsive playing of computer games. Generally, internet addiction is assessed and treated similar to other addictive behavior which may include the 12-step program, cognitive therapy or other therapies such as expressive art therapy. Bibliography lists 5 sources.
Filename: TJintad1.rtf

Internet Advertising
[ send me this paper ]
This 8 page paper is an excellent research example of internet advertising and all it involves. The advantages, disadvantages, and history of the internet, characteristics of internet advertising, as well as the future outlook of internet advertising are all included in this comprehensive well-written paper. Bibliography lists 7 sources.
Filename: JGAinadv.wps

Internet Auction Industry
[ send me this paper ]
A 7 page paper that describes the Internet auction industry, including a SWOT and key success factors. The ratings of Dell's, Amazon's and eBay are included. An emphasis is placed on eBay, including recommendations for the company to maintain their dominance in this industry. 1 table is included. Bibliography lists 8 sources.
Filename: PGnetauc.rtf

Internet Banking: Its Impact Upon Bank Staff Employment
[ send me this paper ]
7 pages in length. The writer discusses the impact Internet banking serves to have on staffing. Bibliography lists 9 sources.
Filename: TLCintbk.wps

Internet Browsers' Telecommunications Capabilities
[ send me this paper ]
An 8 page paper discussing the abilities of the products of the two most popular Internet browsers providers, Microsoft and Netscape. As the browsers increase in their visibility, it is likely that they will be judged less on obvious tasks, being judged instead on ease of use and the degree of user-friendliness they can offer. At the root of that ease of use and user-friendliness is a solid grounding in communications abilities, and the way chosen by the consumer could well be put off until after the millennium. After that, the mechanics of kinds and types of tasks the browsers will be firmly set unless the browsers evolve into their own class of operating system. Otherwise, their prime point of competition could well become centered in their telecommunications abilities. Bibliography lists 10 sources.
Filename: Browsers.wps

Internet Censorship / Shoot the Messenger
[ send me this paper ]
A 6 page essay comparing two articles on the topic of Internet censorship. The Communications Decency Act, as part of the Telecommunications Act of 1996, was signed into law in February, 1996. One of these articles was published in April, one in May of the same year, and both explore some of the implications that such censorship entails. In June of the same year, a panel of Federal judges blocked the law by labeling it unconstitutional, a move that will likely be in appeal for some time to come. Bibliography includes two sources, the full text of both sources is included.
Filename: Censor.wps

Internet Censorship In China: Past And Present
[ send me this paper ]
6 pages in length. The extent to which Internet censorship has become a requisite part of the entire World Wide Web experience is clearly indicative of the manner by which society's offensive element has found a way to reach its vulnerable audience. That pornography has been cited as the primary search objective on the Internet today speaks to the fact that children and adolescents are among the tremendous number of virtual onlookers visiting these sites every day. China is no stranger to this occurrence, inasmuch as Asian pornography is one of the worlds most popular and sought after commodities. Efforts to censor this decidedly harmful social element have been both significant and laborious; it sometimes seems as though the pornographic Web masters know all the tricks to bypass sophisticated obstacles. Bibliography lists 2 sources.
Filename: TLCChnSn.rtf

Internet Communication
[ send me this paper ]
This 7 page paper considers the different types of communication that are available on the internet. The paper considers ICQ, mIRC, Netmeeting and e-mail, looking at the roles they perform, the similarities and the differences. The bibliography cites 6 sources.
Filename: TEcomprg.wps

Internet Crime: Examination
[ send me this paper ]
15 pages in length. As the world embarks upon the new millennium, questions abound with regard to problems associated with the twenty-first century and Internet white-collar crimes. Will these problems be different than what exists now at the end of the twentieth century? Indeed not; in fact, the problems that plague contemporary technology will only continue to escalate if immediate modifications are not made to existing Internet Protocol systems. System security has become increasingly more important within the past several years, inasmuch as new and innovative methods have been developed in order to breach well-tested protective measures. That hackers can readily infiltrate any given company's entire computer system with the intent to destroy data is more than enough reason to augment security measures. Bibliography lists 15 sources.
Filename: TLCcollr.wps


Page 25 of 53
<< more 21  22  23  24  25  26  27  28  29  30  more >>

Previous 10 Items Next 10 Items

Didn't find what you're looking for?

Just enter any keyword or group of keywords below - 
-our engine will quickly search the entire database of 15,000+ papers! 
You will receive a list of results in order of relevance!


Enter a few keywords above to describe your term paper topic, 
then click search.

 
The Paper Store Enterprises, Inc. Gladly Accepts:
Term Papers -  Research Help For Term Papers  - Payment Options


Request A Free Excerpt From Any Paper Before Ordering!

   
Custom Research - Term Papers - - Help w/ All Papers Is HERE !FAQ  / Term Papers & More Term Papers - Assistance !Term Paper Assistance -- HOME PAGE !


E-Mail Us at [email protected].


Copyright © 2002 The Paper Store Enterprises, Inc. 
All research papers are owned by The Paper Store Enterprises, Inc. and are the property of the corporation and our contracted writers. Our work is designed only to assist students in the preparation of their own work. Students who use our service are responsible not only for writing their own papers, 
but also for citing The Paper Store as a source when doing so.