ResearchPapers
On-line Term paper and Essay Support
Home » Research Paper Topics » Internet
Click on any of the term papers to read a brief synopsis of the research paper. The essay synopsis includes the number of pages and primary and secondary sources cited in the paper. Buy your example papers now.
In five pages Dell's corporate rise within the personal computer industry is assessed in terms of its ecommerce strategy. Four sources are cited in the bibliography.
Pages: 5
[ View Full Description ] [ Send Me The Paper ]
In seven pages this paper examines the surprising demise of the Pets.com online pet store in a consideration of what might have happened. Thirteen sources are cited in the bibliography.
Pages: 7
In six pages the web development application known as ColdFusion is examined. Three sources are cited in the bibliography.
Pages: 6
This paper examines the Internet employment recruitment opportunities from employees and companies alike in 6 pages. Seven sources are cited in the bibliography.
In fourteen pages this paper examines the Internet uses and development and then analyzes the corporate history of AOL and its dominance. Thirteen sources are listed in the bibliography.
Pages: 14
In five pages the ongoing debate as to whether or not the government should be permitted to censor the content of the Internet is examined from both sides. Three sources are cited in the bibliography.
In a paper consisting of seven pages Australian telecommunications are examined in terms of both rural as well as international perspectives to assess whether it can successfully cope with high data access demands and to what extent Internet connections are possible. Seven sources are cited in the bibliography.
In seven pages this paper explores a merger of three European manufacturing companies in a discussion of IT system needs with such topics as the Intranet and JIT system of inventory production featured. Eleven sources are cited in the bibliography.
In twenty two pages this paper discusses recruitment via the Internet in a consideration of strategy and competitive advantage. Thirteen sources are listed in the bibliography.
Pages: 22
In fifteen pages this paper examines Internet crime in a consideration of system security concerns and the threats posed by computer hacking. Fifteen sources are cited in the bibliography.
Pages: 15
A Travelstore.com case study is presented in seven pages and includes both challenges, opportunities, and success through information systems. Ten sourcees are listed in the bibliography.
In five pages inter cultural communication is the focus of this dicussion of relevant terms including technological advances, polychronic and monochronic time, and cultural temporality. Ten sources are cited in the bibliography.
This journalistic style article considers this topic in a report consisting of 6 pages. Five sources are cited in the bibliography.
In six pages a Toby Lester magazine article is the focus of this memo writing tutorial on the impact of the Internet upon privacy issues. There are no other sources cited.
This paper discusses the problems associated with regulating the Internet in 14 pages with individual users, ISP, national and global legislative bodies among the topics explored. Ten sources are cited in the bibliography.
This paper considers how to successfully design a corporate ecommerce website in an overview of ten pages that considers characteristics featured on the CD Now and Dell Computer Company websites. Eight sources are cited in the bibliography.
Pages: 10
In five pages two websites, http://www.g20-livraison.com and http://www.houra.fr are compared and contrasted. There are no other sources listed in the bibliography.
This paper discusses the online presence of the Levi Jean Company, levi.com. This five page paper has no additional sources listed in the bibliography.
In a paper consisting of twenty pages cyberterrorism is examined in a consideration of its types, frequency, and many features. Thirteen sources are cited in the bibliography.
Pages: 20
This paper looks at an article geared towards informing businesses of available opportunities in e-commerce. The author discusses the content and implications of the article. This five page paper has one source listed in the bibliography.
In eight pages this paper discusses Internet access and usage by Eastern European countries. Eight sources are cited in the bibliography.
Pages: 8
In five pages this paper discusses banking on the Internet as it relates to the United Kingdom in a consideration of social and consumer impact. Five sources are cited in the bibliography.
This paper examines a situation in which an e-commerce business is slowly declining in terms of profit and web traffic. The author includes recommendations for different marketing strategies and looks at what might have happened in each situation. This thirteen page paper has twenty-six sources listed in the bibliography.
Pages: 13
In sixteen pages this paper analyzes privacy from the perspective of philosophy. Twenty four sources are cited in the bibliography.
Pages: 16
In twelve pages a White Paper from 2000 that outlined Great Britain's proposed communications environmental changes is approached from an ecommerce perspective. Eight sources are cited in the bibliography.
Pages: 12
In six pages the Arpanet as presented in Robert L. Sanders' article is examined in terms of his presentation of technology and how it is perceived. Five sources are cited in the bibliography.
In five pages this paper examines how sources from the Internet should be cited when used as references.
In eighteen pages ebusiness and its ever changing state is examined. Seventeen sources are cited in the bibliography.
Pages: 18
This paper discusses how global communications have resulted in increasing international cultural exchanges in seven pages. Three sources are cited in the bibliography.
In five pages this report examined the negative social connotations associated with the Internet. Five sources are cited in the bibliography.
In six pages this essay presents a review of 3 articles regarding information technology privacy issues with such topics as regulations and ownership of information discussed. Three sources are cited in the bibliography.
In fifteen pages this is a continuation of the same titled paper that includes several charts including network and Gantt. Eighteen sources are cited in the bibliography.
In five pages this paper reviews the text on media executives or 'highwaymen' who profit through information superhighway usage. One source is listed in the bibliography.
In eight pages this paper discusses the Internet as a tool increasingly utilized by employers to recruit employees.
In six pages this paper compares how public relations services are performed in France and in the United States with the increased role of information technology among the topics discussed. Eight sources are cited in the bibliography.
In seven pages this paper discusses GIS information, data collection, storage, and retrieval, and CGI Internet access limitation. Fifteen sources are listed in the bibliography.
This paper considers how little in the way of computer knowledge is needed to use WebTV in eight pages. Seven sources are cited in the bibliography.
In eight pages this paper examines how the travel impulse is encouraged gy the Internet. Five sources are cited in the bibliography.
This paper critically reviews the Sierra Club's website in six pages. Four sources are cited in the bibliography.
In five pages this paper discusses how to market an online business service aggregate first to existing customers because of their Internet ease and emphasizing Internet security reliability. Five sources are cited in the bibliography.
In twelve pages cybersquatting is defined and discussed regarding such issues as trademark law, philosophical considerations, and recent cases. Ten sources are cited in the bibliography.
In twenty pages this paper examines the Internet's anonymous servers in terms of advantages and disadvantages and discusses relevant issues of security, privacy, and terrorism. P2P computing, funds circulation, cyberattacks and information access are examined. Eight sources are cited in the bibliography.
A paper providing an overview of seven e-commerce companies and their current success, as well as projected future requirements. The author discusses the recent fallout of dot-coms and the perception of e-commerce. This seven page paper has six sources listed in the bibliography.
A paper addressing various reasons why dot-com businesses failed for a period of time. The author presents data about the number of failures as well as reported reasons for failure. This six page paper has eight sources listed in the bibliography.
In six pages the differences in the way the World Wide Web presents information must be considered for a research standpoint with 3 sites regarding evolutionary versus creationist theories used to illustrate these distinctions. Three sources are cited in the bibliography.
In five pages this paper examines the contemporary social effects generated by the Internet with such issues as the law, data usage, commercial power, democracy, communication, and human interaction discussed. Eight sources are listed in the bibliography.
In seven pages the creation of an online community college course for high school seniors is examined in terms of considerations, marketing, and clarification regarding student understanding of college challenges. There is 1 source cited in the bibliography.
Three Medieval history internet websites are evaluated and examined in a research paper consisting of six pages with information quality, site ease of use and graphics discussed. Three sources are cited in the bibliography.
This 12 page paper explores business to business (B2B) transactions on the Internet, and argues that the potential is there for both great success and terrible failure. The writer uses Covisint as an example of a company that seems poised to achieve great success; it is described as a "global independent eBusiness exchange for the ...
This paper addresses the various threats to computers and sensitive information posed by viruses, hackers, and computer crashes. The author contends that firewalls are vital to any computer with an Internet connection. This five page paper has eight sources listed in the bibliography.
Enter your paper topic below: