Research paper topics, free example research papers
Free research papers and essays on topics related to: technology review
- 10 results found, view research papers on page:
- Air Traffic Strike - 4,375 words
Air Traffic Strike The Pressures of PATCO: Strikes and Stress in the 1980s By Rebecca Pels -------------------------------------------------- ---------------------- Note on electronic format: you can access any citation by clicking on the note number. In order to leave citations and return to the main text of the document, press the Back key on your viewer. -------------------------------------------------- ---------------------- On August 3, 1981 almost 13,000 air traffic controllers went on strike after months of negotiations with the federal government. During the contract talks, Robert Poli, president of the Professional Air Traffic Controllers Association (PATCO), explained the union's th ...
Related: strike, traffic, traffic control, traffic controllers, aviation safety
- Computer Crime - 1,406 words
... s seen in the $50-million-plus losses in the MCI case, a far greater threat to businesses than hackers are disgruntled and financially struggling employees. As internal theft from retail stores has always been many times greater in volume than theft from shoplifters, robbers, and burglars, theft by employees armed with inside information and computer access is and will continue to be a much larger problem than intrusion by hackers, crackers, and terrorists combined. By the turn of the century, 80% of Americans will process information as a major part of their employment, according to a United Way study. In addition, the future portends new and brighter for-profit invasion of business com ...
Related: computer crime, computer security, crime, personal values, first century
- Computer Hacker - 1,626 words
Computer Hacker Laws must be passed to address the increase in the number and types of computer crimes. Over the last twenty years, a technological revolution has occurred as computers are now an essential element of today's society. Large computers are used to track reservations for the airline industry, process billions of dollars for banks, manufacture products for industry, and conduct major transactions for businesses because more and more people now have computers at home and at the office. People commit computer crimes because of society's declining ethical standards more than any economic need. According to experts, gender is the only bias. The profile of today's non-professional thi ...
Related: computer crime, computer games, computer program, computer security, computer system, computer world, hacker
- Ethical Management Of Email Privacy - 1,027 words
... her job it was her responsibility to install an e-mail system and train 700 employees to create messages on their personal computers and send them over the network to their fellow workers. Shoars assured employuees that their E-mail communications would be totally private as she herself had been so assured. Later, however, Shoars discovered that her supervisor, the manager of the mainframe that received, stored and routed the messages was in fact copying and reading the employee's e-mail. When Shoars complained she was fired which resulted in her taking her employer to court. A class action suit was also filed on behalf of all the employees whose e-mail had been opened. The judge dismis ...
Related: email, ethical, ethical behavior, ethical issue, management, privacy, privacy issues
- Genetics - 2,024 words
... gument in the Western societies is that parents who have large families want a mixture of sons and daughters, and most patients attending sex/gender selection clinics already have children of the same sex/gender and seek another of the opposite. Once a male child has been born, parents are less concerned about the sex/gender of any later siblings. Statham et al (1993) conducted a survey of British women and was asked in the early stages of pregnancy if they minded what the sex/gender of their baby would be. Fifty eight percent said no and among those who expressed a strong preference six percent wanted a boy and an equal percentage wanted a girl. There was also only a hint of male bias i ...
Related: genetic disease, genetic engineering, genetic information, genetic screening, genetics, human genetics
- Mrs Brew 13 May 1996 Intelligent Design Of The Universe The Search For Knowledge About The Origin Of Humanity Is As Old As It - 1,061 words
... reation of the universe not an accident, but "the existence of human life is something for which the entire universe appears to have been intricately fine-tuned from the start"(28). This principle is based on universal constants such as Planck's constant and the gravitational constant. It started out as a list of coincidences, but as the list grew the more it appeared as if the universe had been designed for humanity to exist(29). The second law of thermodynamics has been extensively studied by scientists and people as another proof of creation. The second law of thermodynamics can be stated: "The thermodynamic principle which governs the behavior of systems is that, as they are moved aw ...
Related: brew, humanity, intelligent, intelligent design, origin, universe
- Nuclear Power - 1,415 words
Nuclear Power Most of the world's electricity is generated by either thermal or hydroelectric power plants. Thermal power plants use fuel to boil water which makes steam. The steam turns turbines that generate electricity. Hydroelectric power plants use the great force of rushing water from a dam or a waterfall to turn the turbines. The majority of thermal power plants burn fossil fuels because thermal power plants are cheaper to maintain and have to meet less of the governments requirements compared to nuclear power plants. Fossil fuels are coal and oil. The downfall of using fossil fuels is that they are limited. Fossil fuels are developed from the remains of plants and animals that died m ...
Related: nuclear, nuclear power, nuclear waste, power plants, public health
- Overpopulation - 1,338 words
Overpopulation "The battle to feed all of humanity is over. In the 1970s the world will undergo famines-hundreds of millions of people are going to starve to death in spite of any crash programs embarked upon now. At this late date nothing can prevent a substantial increase in the world death rate, although many lives could be saved through dramatic programs to "stretch?the carrying capacity of the earth by increasing food production. But these programs will only provide a stay of execution unless they are accompanied by determined and successful efforts at population control.? These words, from Dr. Paul R. Ehrlichs book The Population Bomb, predicted a grim future for the world of 1968 when ...
Related: overpopulation, life expectancy, technology review, national security, holm
- The Vast Cyberfrontier Is Being Threatend With Censorship From The Government - 1,233 words
... nternet.25 Only nine out of 11,000 Web pages contained anything obscene yet Time still said, "There's an awful lot of porn online."26 "[Cyberspace] is a safe space in which to explore the forbidden and taboo. It offers the possibility for genuine, unembarrassed conversations about accurate as well as fantasy images of sex," said Carlin Meyer, a professor at New York Law School.27 "It is clearly a violation of free speech and it's a violation of the rights of adults to communicate with each other," House speaker Newt Gingrich shared.28 In a Time/CNN poll conducted by Yakelovich Partners, 1000 people were involved and 42% were for FCC-like control over sexual content on the computer networ ...
Related: censorship, library journal, free speech, school library, laziness
- Title Of Paper : Software Piracy : A Worldwide Problem - 1,016 words
... ributed in order to speed economic development (Weisband 30). The Software Publishers Association and its sister company the Business Software Alliance have succeeded where the US government has failed. The SPA handles cases in the US, while the BSA works in over thirty foreign countries. In cooperation with local law enforcement, these two organizations have attacked individual companies with moderate success (Weisband 31). The toughest obstacle the BSA faces is trying to get local governments to make copyright laws and to get local law enforcement to cooperate in investigations. The BSA has to rely on diplomatic threats in countries like China and Thailand where the governments are tot ...
Related: business software, piracy, pirated software, software, software piracy, worldwide
- 10 results found, view research papers on page: