SEARCH RESULTS

YOU WERE LOOKING FOR :Internet Pornography

Essays 601 - 630

Canada's EFL Studies

In fifteen pages this paper examines Canada's approaches to the instruction of English writing to students who are foreign born wi...

Printing Press and WWW Information Sharing

In five pages the inventions of the printing press and the Internet are contrasted and compared. There are 6 sources cited in the...

Internet Global Village and Author Marshall McLuhan

In six pages this paper examines the social predictions of author Marshall McLuhan and its impact in terms of contemporary society...

Cable TV - Trends

This 6 page paper discusses trends in the cable TV industry, in particular the interest in cable modem technology for Internet acc...

How American English Serves as a Tool in Globalization

In a research paper comprised of fifteen pages the effects of American English on globalization are discussed in terms of its stat...

Mass Media and the Presentation of Bilingual Education

The writer discusses the way in which the mass media presents bilingual education and how this presentation, which comes through T...

WWW History

1989 at CERN (European Laboratory for Particle Physics) in Geneva, Switzerland.(Berners-Lee, 1). It was at that time that a young ...

Uses of the Internet

In ten pages this paper discusses the uses of the Internet with various concepts and services described. Ten sources are cited in...

Future of the Internet

In fourteen pages this history of the Internet also considers its future applications and uses. There are 8 sources cited in the ...

Young Users of the Internet and Possible Dangers

In four pages this research paper discusses younger Internet users in a consideration of the positive and negative aspects of onli...

Addiction to the Internet

many therapists as well, are labeling acts of free will as diseases or disorders, in looking at the addiction paradigm, if accepte...

Internet Publishing

In fifteen pages this research paper discusses Internet site publishing from corporate and individual perspectives in a considerat...

Publishing and Applications That Are Intranet, Extranet, and Internet Based

We already see regular deployment being driven faster than we first anticipated" (Lange, 1997, p. 22). II. INTRANET-BASED APPLICA...

Dinty Moore The Emperor's Virtual Clothes The Naked Truth about Internet Subculture

The writer analyzes the Moore book using examples from the text and reveals the possible implications they have for today's techno...

Clifford Stoll's Silicon Snake Oil

In three pages Stoll's examination on how the Internet will expand social problems are discussed. There are two supporting source...

Results of Antisocial Survey and Internet Chatting

deeper, causing a vicious cycle to occur. II. EXECUTIVE SUMMARY There is no question that with the help of Internet chatti...

Censorship and the Internet

In six pages this paper examines political and social arguments pertaining to the issue of Internet censorship. Nine sources are ...

Unfairness and Censorship of the Internet

In seven pages this paper argues that the Communications Decency Act is unconstitutional in its unfair Internet censorship. Eight...

Communications Decency Act of 1996 and Internet Censorship

In six pages this essay compares two articles as they examine the issue of censoring the Internet with the Communications Decency ...

Internet Regulation and Civil Liberties

In nine pages this paper discusses legal regulation of the Internet in a consideration of the F.C.C., Communications Decency Act p...

National Information Infrastructure Developmental Importance

In eight pages this paper considers the lack of Internet organization in this analysis that examines the importanceof developing a...

NII Regulation

In ten pages this research paper discusses National Information Infrastructure government regulation support in a consideration of...

Security on the Internet and Cryptography

One of the most important solutions for Internet security is cryptography. This paper discusses use of encryption to enhance TCP/I...

Security on the Internet and Cryptography

One of the most important solutions for Internet security is cryptography. This paper discusses use of encryption to enhance TCP/I...

Policies, Management, Measures, and Threats Relating to Internet Security

In twelve pages Internet security is analyzed in a consideration of problems relating to threats, measures, management, and polici...

The Rise of Feminism On The Internet

This research paper examines the ways in which feminist ideology has utilized the Internet as a way of disseminating information o...

US Democracy and the Increasing Influence of the Internet

In fourteen pages this research paper discusses how the process of American democracy is being profoundly influenced by the Intern...

Internet and Political Campaigns

In five pages this paper examines the growing political importance of the Internet and considers how it was used during the presid...

A Computer History

In ten pages an overview that takes a nontechnical approach to computer history from ancient abacus and punched cards from ENIAC t...

The Uses of TCP/IP Protocol Today

their old SNA (systems network architecture) for crucial applications (Passmore, 1997) as real or potential hybridization of netwo...