SEARCH RESULTS

YOU WERE LOOKING FOR :Cyber Bullying

Essays 91 - 102

Cyber Security and Government System Protection

and bright, as being clever. Yet, hackers are engaging in serious crimes. Ordinary hackers aside--both white hats and black hats...

Cyber Cafe Life and Media Imperialism

the world for, at least, the past thirty to forty years. Their particular focus, as well as a number of other studies have paid sp...

Computer Viruses 'Cyber Ethics' and Personal Responsibility

illegal activity. Most agree that there is a definite distinction between "cracking" and "hacking". Although the term "cracking" ...

Digital And Psychological Profiling Of Cyber Crime

still in its infancy; only in the recent past have inroads been made in overcoming the boundaries inherent to such undesirable tec...

The Use of Group Therapy in Addressing School Bullying

in the presence of bullying activities (Young, 1998). It is not uncommon for schools to take a crisis intervention approa...

Stephen Jay Gould's Bully for Brontosaurus

books, and view the publishing arm of their diversified empire as but one more item for the ultimate balance"(Gould 157). Apparent...

IT Forensics: Digital Evidence

reason than the tangible factor inherent to typical sites. The extent to which tangible investigations are inherently valuable to...

The Computer In Criminalistics

connect him or her to a particular cyber crime. Indeed, policing tactics have vastly improved over the years to include such aspe...

Reciprocity Of Prejudice

United States? The level of subjectivity inherent to this type of broad-brushed operation cast the LAPD in a very awkward and ina...

Organizational Health

at work at some point during their work, this has supported research by earlier studies by researcher such as Heinz Leyman and Sta...

Expanding into Small Towns: A Different Strategy for Wal-Mart

is not the presence or direct action of Wal-Mart, but rather its effect on the local economy combined with its pattern of predator...

Computer Equipment Confiscation for Crime Investigation and an August 1999 Article in the Cyber Law Journal of the New York Times

clear in the Richtel article(8-27-99), are the simple facts that the federal officials who confiscate computers in cases where som...