Research paper topics, free example research papers

Free research papers and essays on topics related to: electronic surveillance

  • 15 results found, view research papers on page:
  • 1
  • Electronic Surveillance In The Workplace - 285 words
    Electronic Surveillance In The Workplace In 1957, a Coach and an athlete met at the University of Oregon, and together they went on to establish the most successful athletic footwear company in the world. Bill Bowerman and Phil Knight are these founders. The history of Nike can be split up into sections of three decades. From 1961 to 1971, Knight decided that dealing Tiger, a Japanese company, would break up the World domination in athletic shoes by Germany. He traveled to Japan and met with the executives for Tiger. When asked what company he represented, Knight, caught off guard, uttered the words Blue Ribbon Sports, giving birth to the forerunner of Nike. Soon the revenue on the company b ...
    Related: electronic surveillance, surveillance, workplace, blue ribbon, japanese company
  • Computer Science Government Intervention Of The Internet During The Past Decade, Our Society Has Become Based Solely On The A - 1,514 words
    ... ns of encoding data so that only someone with the proper "key" can decode it. "Why do you need PGP (encryption)? It's personal. It's private. And it's no one's business but yours. You may be planning a political campaign, discussing our taxes, or having an illicit affair. Or you may be doing something that you feel shouldn't be illegal, but is. Whatever it is, you don't want your private electronic mail (E-mail) or confidential documents read by anyone else. There's nothing wrong with asserting your privacy. Privacy is as apple-pie as the Constitution. Perhaps you think your E-mail is legitimate enough that encryption is unwarranted. If you really are a law-abiding citizen with nothing t ...
    Related: computer science, government intervention, intervention, science, solely, u.s. government
  • Control Of Internet - 1,523 words
    ... the proper "key" can decode it. "Why do you need" encryption? "It's personal. It's private. And it's no one's business but yours" (Laberis). You may be planning a political campaign, discussing our taxes, or having an illicit affair. Or you may be doing something that you feel shouldn't be illegal, but it is. Whatever it is, you don't want your private electronic mail or confidential documents read by anyone else. There's nothing wrong with asserting your privacy. Perhaps you are not really concerned about encrypting your e-mail because you believe that you have nothing to hide. I mean you havent broken the law in any way, right? Well then why not just write letters on postcards instead ...
    Related: online available, data encryption, the intended, bystander, decoding
  • Email Privacy Rights In Business - 2,215 words
    E-Mail Privacy Rights In Business E-Mail Privacy Rights In Business E-Mail Privacy Rights in Business I. Abstract How far we have come in such a small time. When you think that the personal computer was invented in the early 1980's and by the end of the millennium, several households have two PC's, it is an astonishing growth rate. And, when you consider business, I can look around the office and see that a lot of the cubicles contain more than one PC. It is astonishing to me that such an item has taken control over the information technology arena like personal computers. Consider, however, the items that go along with personal computers: printers; modems; telephone lines for your modem; sc ...
    Related: email, employee privacy, legal rights, privacy, privacy protection, privacy rights, right to privacy
  • Evolution Of Labor Unions - 884 words
    Evolution Of Labor Unions What is clearly evident is that the working people of America have had to unite in struggle to achieve the gains that they have accumulated during this century. Improvements did not come easily. Organizing unions, winning the right to representation, using the collective bargaining process as the core of their activities, struggling against bias and discrimination, the working men and women of America have built a trade union movement of formidable proportions. Labor in America has correctly been described as a stabilizing force in the national economy and a bulwark of our democratic society. Furthermore, the gains that unions have been able to achieve have brought ...
    Related: american labor, evolution, labor, labor law, labor movement, labor union, labor unions
  • Government And Internet - 1,510 words
    ... ta so that only someone with the proper "key" can decode it. "Why do you need PGP (encryption)? It's personal. It's private. And it's no one's business but yours. You may be planning a political campaign, discussing our taxes, or having an illicit affair. Or you may be doing something that you feel shouldn't be illegal, but is. Whatever it is, you don't want your private electronic mail (E-mail) or confidential documents read by anyone else. There's nothing wrong with asserting your privacy. Privacy is as apple-pie as the Constitution. Perhaps you think your E-mail is legitimate enough that encryption is unwarranted. If you really are a law-abiding citizen with nothing to hide, then why ...
    Related: u.s. government, electronic mail, mass communication, data encryption, enclosed
  • Government Intervention Of The Internet - 1,517 words
    ... ion is a means of encoding data so that only someone with the proper"key" can decode it. "Why do you need PGP (encryption)? It's personal. It's private. And it's no one's business but yours. You may be planning a political campaign, discussing our taxes, or having an illicit affair. Or you may be doing something that you feel shouldn't be illegal, but is. Whatever it is, you don't want your private electronic mail (E-mail) or confidential documents read by anyone else. There's nothing wrong with asserting your privacy. Privacy is as apple-pie as the Constitution. Perhaps you think your E-mail is legitimate enough that encryption is unwarranted. If you really are a law-abiding citizen wit ...
    Related: government intervention, intervention, u.s. government, digital age, political organizations
  • Government Intervention Of The Internet - 1,512 words
    ... oding data so that only someone with the proper "key" can decode it. "Why do you need PGP (encryption)? It's personal. It's private. And it's no one's business but yours. You may be planning a political campaign, discussing our taxes, or having an illicit affair. Or you may be doing something that you feel shouldn't be illegal, but is. Whatever it is, you don't want your private electronic mail (E-mail) or confidential documents read by anyone else. There's nothing wrong with asserting your privacy. Privacy is as apple-pie as the Constitution. Perhaps you think your E-mail is legitimate enough that encryption is unwarranted. If you really are a law-abiding citizen with nothing to hide, t ...
    Related: government intervention, intervention, u.s. government, mass communication, in another country
  • Government Intervention Of The Internet - 1,512 words
    ... oding data so that only someone with the proper "key" can decode it. "Why do you need PGP (encryption)? It's personal. It's private. And it's no one's business but yours. You may be planning a political campaign, discussing our taxes, or having an illicit affair. Or you may be doing something that you feel shouldn't be illegal, but is. Whatever it is, you don't want your private electronic mail (E-mail) or confidential documents read by anyone else. There's nothing wrong with asserting your privacy. Privacy is as apple-pie as the Constitution. Perhaps you think your E-mail is legitimate enough that encryption is unwarranted. If you really are a law-abiding citizen with nothing to hide, t ...
    Related: government intervention, intervention, u.s. government, world wide, digital age
  • Government Intervention Of The Internet - 1,517 words
    ... Encryption is a means of encoding data so that only someone with the proper "key" can decode it. "Why do you need PGP (encryption)? It's personal. It's private. And it's no one's business but yours. You may be planning a political campaign, discussing our taxes, or having an illicit affair. Or you may be doing something that you feel shouldn't be illegal, but is. Whatever it is, you don't want your private electronic mail (E-mail) or confidential documents read by anyone else. There's nothing wrong with asserting your privacy. Privacy is as apple-pie as the Constitution. Perhaps you think your E-mail is legitimate enough that encryption is unwarranted. If you really are a law-abiding ci ...
    Related: government intervention, intervention, u.s. government, mass communication, political organizations
  • Government Intervention On The Internet - 1,528 words
    ... n is a means of encoding data so that only someone with the proper key can decode it. Why do you need encryption? It's personal. It's private. And it's no one's business but yours (Laberis). You may be planning a political campaign, discussing our taxes, or having an illicit affair. Or you may be doing something that you feel shouldn't be illegal, but it is. Whatever it is, you don't want your private electronic mail or confidential documents read by anyone else. There's nothing wrong with asserting your privacy. Perhaps you are not really concerned about encrypting your e-mail because you believe that you have nothing to hide. I mean you havent broken the law in any way, right? Well the ...
    Related: government intervention, intervention, u.s. government, ordinary people, freedom of speech
  • Police Corruption - 1,774 words
    Police Corruption Police Corruption Introduction: What is Corruption Corruption can be defined as the misuse of public power for private or personal profit. Corruption can be by people many different ways. One cannot assume that corruption always means the same thing or has the same impact on society (Goldstein). There are two very different types of corruption. The first type occurs where services or contracts are provided according to rule. The second is when transactions are against the rule. In the first type, an officer is receiving private gain illegally for doing something that he or she is ordinarily required to do by law. In the second type, the bribe is paid to obtain services that ...
    Related: corruption, police, police brutality, police chief, police corruption, police misconduct, police officer
  • Privacy: Katz Vs United States - 1,155 words
    Privacy: Katz Vs. United States Katz V. The United States The petitioner Mr. Katz was arrested for illegal gambling, he had been gambling over a public phone. The FBI attached an electronic recorder onto the outside of the public phone booth. The state courts claimed this to be legal because the recording device was on the outside of the phone and the FBI never entered the booth. The Supreme Court Ruled in the favor of Katz. They stated that the Fourth Amendment allowed for the protection of a person and not just a person's property against illegal searches. The Fourth Amendment written in 1791 states, The right of the people to be secure in their persons, houses, papers, and effects, agains ...
    Related: katz, works cited, york macmillan, legal issues, describing
  • The Watergate Affair - 1,574 words
    The Watergate Affair The Watergate affair was the most significant scandal in United States governmental history. Watergate is defined as a scandal involving abuse of power by public officials, violation of the public trust, and attempted obstruction of justice. The Watergate scandal is named after the building complex in Washington D.C., which was the site of the illegal activities that took place in 1972. In this essay I will explain what Watergate was, a few of the key players (many too numerous to mention), and the end result of the people involved. Watergate all started on June 17, 1972 when five men attempted to break in to the Democratic national headquarters in Washingtons Watergate ...
    Related: affair, watergate, watergate affair, watergate scandal, united states government
  • Y2k Computer Problem - 1,242 words
    Y2k Computer Problem The year 2000 is just around the corner. As some people look forward to a new and brighter millenium, others prophesize about the Second Coming, or the apocalypse. While these prophecies may be ignored by many, they might not be too far off base. The year 2000 may not bring an end to the physical world; however, it may cause great havoc to the world's computing industry. The year 2000 problem (or "Y2K" as it is often referred to) is not really a bug or virus, but is a computer industry mistake. Personal computers (PCs), mainframes, and software are not designed or programmed to compute a future year ending in double zeros ("00"). This is going to be a costly "fix" for th ...
    Related: computer industry, computer world, personal computer, business world, electronic surveillance
  • 15 results found, view research papers on page:
  • 1