term papers essays reports college students research papers
term papers research papers reports book essays thesis term papers research papers on research topics and term paper examples for college students email us for help w/ research papers and term papers home page for help w/ college level research papers and college-level term papers
Don't Copy Our Research Papers
term papers research papers college students
all research papers on-file are still only /page +free bibliography!
same day delivery via email or fax!
 
.

Papers On Internet & Related Issues
Page 15 of 173

Previous 6 Items Next 6 Items

“The Matrix” as a Dystopia: Fears, Anxieties and Tendencies in Today’s Society as Depicted in a Futuristic Vision
[ send me this paper ]
This is a 5 page paper discussing the film “The Matrix” as a dystopia. The 1999 Wachowski brothers’ film “The Matrix” reflects the most severe fears and anxieties within today’s society in regards to a futuristic world as a “dystopia”. Opposite of More’s idealistic world portrayed in his work “Utopia”, the literary term “dystopia” refers to a “bad place”. Since the industrial revolution and more recently the computer and information revolution, society’s fears of possible negative results from growing technological achievements have been reflected in literature and cinema. While currently cyber-technology, that which is related to the computer world and artificial intelligence, is being promoted as a positive element within society in that humans are able to access free information and share information on a global scale, the film “The Matrix” portrays more so that element not promoted within technological circles, that is, the negative and de-humanizing aspects of cyber-technology which robs human of their individuality from a physical and mental perspective and uses humans for the proliferation and eventual dominance of artificial intelligence. Bibliography lists 3 sources.
Filename: TJMatrx1.rtf

“Who Owns Information”: A Review of the Premises of Author Anne Wells Branscomb
[ send me this paper ]
A 10 page review of the need for improved information management and protection. Utilizes the work of noted policy analyst Anne Wells Branscomb to illustrate the fact that the management of information has become considerably more complex in the last few generations. The miracles of modern technology have resulted in easy access to all types of information which at one time were accessible only to a few privileged individuals. The author asserts that in today’s economically driven environment our private information is often even viewed as a commodity and sold to the highest bidder. Everything from our social security numbers, to our phone numbers, to our medical records are at risk. Some is even open in many cases to the prying eyes of the public. This paper addresses the evolutionary trend toward information marketing and public access to information and outlines recommendations as to what provisions should be put in place to ensure information privacy. No additional sources are listed.
Filename: PPinfoOw.rtf

"Chicken" Porn on the Internet
[ send me this paper ]
This 6 page paper discusses child pornography on the Internet. It examines the psychological effects on the child, as well as reviewing the issue of free speech - harm none based on the opinion of John Stuart Mill. Bibliography lists 7 sources.
Filename: BBcporn.doc

"Cyber Reader" by Victor Vitanza
[ send me this paper ]
5 pages in length. The anthology Cyber Reader edited by Victor Vitanza gives the reader some keen insight on what technology has made available through the internet and the rapid changes that accompany it. This paper focuses on the psychic and social consequences of the internet as a medium of change. Bibliography lists 1 source.
Filename: JGAcyber.wps

"Internet and Computer Law: Cases-Comments-Questions": A Discussion of the Principles Illuminated by Authors Peter B. Maggs, John T. Soma, and James A. Sprowl
[ send me this paper ]
A 12 page discussion of the ease with which private and proprietary information can be unscrupulously gleaned from the multitude of computerized digitized files which exist in the contemporary world. The laws which exist for the purpose of protecting our privacy and the ownership of intellectual property have proven to be a little real benefit. The case law outlined by Maggs, Soma, and Sprowl is used as a springboard in this paper to discuss several independent examples of where information privacy becomes an issue and the measures that can be taken to protect that privacy. Bibliography lists 3 sources.
Filename: PPlwComp.rtf

2Oth Century Computer Graphic Designs
[ send me this paper ]
This 30 page paper considers the nature of graphic design in 20th century, the approaches to developing graphic design and the way the focus on design has changed in recent years through the introduction of WEB design and the use in advertising and marketing. Bibliography lists 20 sources.
Filename: MHgraphi.wps


Page 15 of 173
<< more 11  12  13  14  15  16  17  18  19  20  more >>

Previous 6 Items Next 6 Items

 .
Try finding it by keyword! 
Enter a phrase here:


25,000+ Quality Research Papers & Reports -  Examples to Cite In Term Papers

term papers research papers essays reports thesis college level students college-level term papers



Sell Papers & Essays From YOUR Web Site and Earn Money!
CLICK HERE TO BECOME OUR AFFILIATE!