SEARCH RESULTS

YOU WERE LOOKING FOR :Computer Age and Privacy Issues

Essays 31 - 60

Patient Privacy Issue and HIV Testing at Home

In seven pages this paper examines the issue of patient privacy as one of the topics involved in the controversial HIV home testin...

Legal Issues in Education

the US courts in regards to public schools : The authority of the public educational system finds its origin within a "constitutio...

The Ownership of Information

This 9 page paper examines the question of who owns information, as well as the ethics of using information just because it is ava...

Internet Right to Privacy and Communications Policy

In five pages the various privacy issues that pertain to the Internet are examined in terms of the communication issues and concer...

Ethical Standards/Multicultural College Classroom

the class discussion that evolved form this assignment, the students expressed their "surprise at their varied backgrounds," as we...

Overview of Dell Computer Corporation

In eight pages the computer industry with emphasis upon Dell Computer Corporation is the focus of this examination that includes s...

Tactics to Minimize Computer Crimes

'Cracking' and 'hacking' are among the topics discussed in this examination of computer systems and unauthorized access consisting...

Office Setting and Computer Technology Installation

In seven pages this paper discusses office decision making regarding computer technology installing in terms of computer type, app...

Ethics and Computers in the Workplace

problems is usually a human misuse of information and technology (1). Still, as new technologies unfold, specific ethical questio...

"Internet and Computer Law: Cases-Comments-Questions": A Discussion of the Principles Illuminated by Authors Peter B. Maggs, John T. Soma, and James A. Sprowl

and Computer Law: Cases-Comments-Questions", a casebook compiled by authors Peter B. Maggs, John T. Soma, and James A. Sprowl, out...

Retail Stores Seek Too Much Information

their power to not only attract new customers but retain the ones they get. It is their intentions to build a relationship with th...

Patient Privacy and Health Care Ethics - An Organizational Study

Florida cancer center, one can successfully examine how organizational structure and governance, as well as an organizations cultu...

Redefining Privacy in Social Networks

century, certain technologies have become an ubiquitous aspect of modern life. Chief among these technologies is that of social ne...

Digital Age and the Effects of Privacy Threats

to information management, it has also ushered in many concerns about information privacy. Indeed, individual expectations of pri...

PATIENT PRIVACY AND SECURITY SYSTEMS

This 8-page paper discusses the importance of patient privacy and how a patient privacy plan to can be developed and implemented. ...

Drug Testing and the Invasion of Privacy

Pre-trial drug testing applies to those accused of federal crimes. The theory...

Internet vs. Privacy up to Individual Tastes

individuals cannot act for everyone. For this reason, Internet child pornography laws were passed because children are more vulner...

Consumer Privacy, Data Protection, and the Digital Age

In ten pages this paper discusses the compromising of consumer privacy that can occur as a result of the Internet in a considerati...

Privacy Rights and Medical Records

In five pages this paper examines electronic medical record keeping and the violation of privacy that has resulted in a considerat...

Encryption Program 'Pretty Good Privacy'

In seven pages this paper discusses the email privacy protection offered by the encryption program 'Pretty Good Privacy.' Seven s...

Injuries Related to Computer Work

How might one tell if a condition is work-related? In determining whether or not an MSD is related to work, it is important to exa...

An Overview of Tablet Computers

Tablet computers are becoming increasingly popular. The writer gives a broad overview of the technology, starting by defining the...

Investigating Computer Fraud

This paper discusses the field of computer forensics, what it is, what investigators do, detection tools, cyberslacking, chain of ...

Apple Computers' Struggle Against Microsoft.

A paper that addresses the problems faced by Apple Computers, Inc. The author contends that Apple computers main competition, Mic...

Saudi Arabia and the Exporting of Computers

In thirteen pages this paper considers Acme Computer's decision making process involving a cautious approach to exporting computer...

Computer Evolution from Mainframe to Distributed Systems

has been the most long-standing and still carries one of the worlds most recognizable names. Early History of the Industry...

HCI Practitioner Overview

In six pages usability testing and a practitioner of human computer interaction are discussed in this overview that includes histo...

Saudi Arabia and the Exportation of Computers

resellers with some direct sales to individuals. Increasingly, direct sales primarily result from Internet exposure. Acme ...

Computers in Classrooms

To raise test scores? To make children computer-literate? 2. Which software is best used for the different objectives, for English...

Choosing a Computer

programs at later stages in the course, such as for analysis of results from primary research. There is also the need to be able ...