student report writing - help with Internet & Related Issues
 

Select any report below!
All documents are available for SAME DAY DELIVERY via YOUR choice of e-mail or fax for only
$/pg plus FREE bibliography!
Make your selection... 

Papers On Internet & Related Issues
Page 8 of 87

[Previous] [Next]

“The Matrix” as a Dystopia: Fears, Anxieties and Tendencies in Today’s Society as Depicted in a Futuristic Vision
[ send me this report ]
This is a 5 page paper discussing the film “The Matrix” as a dystopia. The 1999 Wachowski brothers’ film “The Matrix” reflects the most severe fears and anxieties within today’s society in regards to a futuristic world as a “dystopia”. Opposite of More’s idealistic world portrayed in his work “Utopia”, the literary term “dystopia” refers to a “bad place”. Since the industrial revolution and more recently the computer and information revolution, society’s fears of possible negative results from growing technological achievements have been reflected in literature and cinema. While currently cyber-technology, that which is related to the computer world and artificial intelligence, is being promoted as a positive element within society in that humans are able to access free information and share information on a global scale, the film “The Matrix” portrays more so that element not promoted within technological circles, that is, the negative and de-humanizing aspects of cyber-technology which robs human of their individuality from a physical and mental perspective and uses humans for the proliferation and eventual dominance of artificial intelligence. Bibliography lists 3 sources.
Filename: TJMatrx1.rtf

“Who Owns Information”: A Review of the Premises of Author Anne Wells Branscomb
[ send me this report ]
A 10 page review of the need for improved information management and protection. Utilizes the work of noted policy analyst Anne Wells Branscomb to illustrate the fact that the management of information has become considerably more complex in the last few generations. The miracles of modern technology have resulted in easy access to all types of information which at one time were accessible only to a few privileged individuals. The author asserts that in today’s economically driven environment our private information is often even viewed as a commodity and sold to the highest bidder. Everything from our social security numbers, to our phone numbers, to our medical records are at risk. Some is even open in many cases to the prying eyes of the public. This paper addresses the evolutionary trend toward information marketing and public access to information and outlines recommendations as to what provisions should be put in place to ensure information privacy. No additional sources are listed.
Filename: PPinfoOw.rtf

"Chicken" Porn on the Internet
[ send me this report ]
This 6 page paper discusses child pornography on the Internet. It examines the psychological effects on the child, as well as reviewing the issue of free speech - harm none based on the opinion of John Stuart Mill. Bibliography lists 7 sources.
Filename: BBcporn.doc

"Cyber Reader" by Victor Vitanza
[ send me this report ]
5 pages in length. The anthology Cyber Reader edited by Victor Vitanza gives the reader some keen insight on what technology has made available through the internet and the rapid changes that accompany it. This paper focuses on the psychic and social consequences of the internet as a medium of change. Bibliography lists 1 source.
Filename: JGAcyber.wps

"Internet and Computer Law: Cases-Comments-Questions": A Discussion of the Principles Illuminated by Authors Peter B. Maggs, John T. Soma, and James A. Sprowl
[ send me this report ]
A 12 page discussion of the ease with which private and proprietary information can be unscrupulously gleaned from the multitude of computerized digitized files which exist in the contemporary world. The laws which exist for the purpose of protecting our privacy and the ownership of intellectual property have proven to be a little real benefit. The case law outlined by Maggs, Soma, and Sprowl is used as a springboard in this paper to discuss several independent examples of where information privacy becomes an issue and the measures that can be taken to protect that privacy. Bibliography lists 3 sources.
Filename: PPlwComp.rtf

2Oth Century Computer Graphic Designs
[ send me this report ]
This 30 page paper considers the nature of graphic design in 20th century, the approaches to developing graphic design and the way the focus on design has changed in recent years through the introduction of WEB design and the use in advertising and marketing. Bibliography lists 20 sources.
Filename: MHgraphi.wps

802.11 Technology
[ send me this report ]
This 16 page paper considers the 802.11 set of protocols looking at the use of the technology in general as well as 802.11a, 802.11b and 802.11g individually looking at their relative advantages and disadvantages. The paper then considers the dangers of using these in terms of security and where the technology may lead on the future. The bibliography cites 16 sources.
Filename: TE80211g.rtf

888.com
[ send me this report ]
This 5 page paper examines the online gambling and casino company 888.com and considers the strategy of the company using Porters Five Forces model, which looks at existing competition, new entrants, customers and suppliers and substitutes. The bibliography cites 8 sources.
Filename: TE888com.rtf

A Look at Congress and the Internet
[ send me this report ]
This 3 page paper looks at the first four chapters of the book Congress and the Internet that highlights the views of various politicians. How Congress has changed as a result of the advent of the net is the focus of this paper. No additional sources cited.
Filename: SA312net.rtf

A Case for Outlawing Virtual Pornography
[ send me this report ]
An 8 page discussion of the impacts of virtual pornography on society. The writer emphasizes that while the issue of Internet regulation is highly controversial, pornography on the World Wide Web should definitely be outlawed if for no other reason than its impacts on the most vulnerable members of our society, our children. Bibliography lists 13 sources.
Filename: PPpornRg.rtf

A Comparison between Three Personal Firewalls
[ send me this report ]
This 5 page paper considers three easily available firewalls; BlackICE Defender, Zone Alarm and Sygate Personal Firewall. The writer compares aspects such as price, features, ease of use and general strengths and weaknesses. The writer then makes a preference choice and outlines how it may be installed on a small network. The bibliography cites 8 sources.
Filename: TEfirewl.wps

A Comparison of B2B, B2C and C2C
[ send me this report ]
This 7 page paper examines these three prototypes with the use of companies as examples. Intel, Eddie Bauer and eBay web sites are the ones used. Bibliography lists 5 sources.
Filename: SA5052C.rtf


Page 8 of 87
1  2  3  4  5  6  7  8  9  10  more >>

[Previous] [Next]

Can't find anything related to
YOUR report topic?

CLICK HERE for our special,
custom research department instead
!


 

 
  Student-Report-Writing.Com All research papers are owned by Student-Report-Writing.Com and are the property of the corporation and our contracted writers. Students who use our service are responsible not only for writing their own papers, but also for citing Student-Report-Writing.Com as a source when doing so.


Sell Papers & Essays From YOUR Web Site and Earn Money!
CLICK HERE TO BECOME OUR AFFILIATE!