Uses And Abuses Of Mobile Phone

Page 31 of 50 - About 500 Essays
  • Premium Essay

    Internet

    EU 7th Framework Programme for RTD European Commission I nform ati on S oc i et y and M ed ia Europe Direct is a service to help you find answers to your questions about the European Union New freephone number * 00 800 6 7 8 9 10 11 Certain mobile telephone operators do not allow access to 00800 numbers or these calls may be billed. In certain cases, these calls may be chargeable from telephone boxes or hotels. «The views expressed are those of the authors and not necessarily those of the

    Words: 66329 - Pages: 266

  • Premium Essay

    The Threat Within

    secure global sourcing hub, and also to promote data protection in the country. For more information about DSCI or this report, please contact: Data Security Council of India Niryat Bhawan, 3rd Floor Rao Tula Ram Marg New Delhi – 110057 India Phone: +91-11-26155070 Fax: +91-11-26155072 Email: info@dsci.in Foreword Insider threats originate from within the organisation. The trusted employees, contractors, partners and suppliers are the source of these attacks. Some of them are as trusted

    Words: 7525 - Pages: 31

  • Premium Essay

    The Impact of Facebook Addiction on Academic Performanceof Filipino Students

    The Impact of Facebook Addiction on Academic Performance of Filipino Students Mart Anthony D. dela Peña Comm2 – C2 Mrs. Noemi Agner March 15, 2012 The Impact of Facebook Addiction on Academic Performance of Filipino Students Thesis Statement: Although Facebook has offered various benefits to the Philippine society, its addiction has become a major problem on the academic performance of Filipino students. Outline: I. The History of Facebook II. Facebook as a Social

    Words: 3571 - Pages: 15

  • Premium Essay

    A Study on Gender-Based Violence

    ABSTRACT Despite women are of higher status socially in many countries than before, it is found that domestic violence against women is still a universal problem. This paper will explore the phenomenon gender-based violence in Hong Kong as compared to the global situation. An extensive literature review was conducted to explore the existing theories and risk factors associated with domestic violence. A qualitative study of women victims was then undertaken to gain further insight on the

    Words: 5204 - Pages: 21

  • Premium Essay

    Internet Privacy Policy Violations and Regulations. Social Media Context.

    WARSAW SCHOOL OF ECONOMICS Internet privacy policy: violations and regulations. Social media context Natalia Wójcik Index number: 51149 1 TABLE OF CONTENT 1. Introduction………………………………………………………………………….3 2. Theoretical background…………………………………………………………...4 3. E-commerce and e-marketing influence on privacy violations…………….5 4. Social networking, Web 2.0……………………………………………………….7 5. Social media privacy policy………………………………………………………8 6. Privacy policy concerns based on a particular social

    Words: 6024 - Pages: 25

  • Free Essay

    Iot and Beacons

    the system outputs required insights. In this work, we explore the idea of being able to predict sensitive attributes associated with the database given that the adversary would have access to a few quasi-identifiers associated with the database. We use inversion attack as the theoretical foundation for our attack, and implement the same for our database. We experiment this attack for di↵erent variants of classification algorithms, like classification tree and regression tree. We follow it up with

    Words: 5223 - Pages: 21

  • Free Essay

    Assignment

    Cyber and Traditional Bullying Victimization as a Risk Factor for Mental Health Problems and Suicidal Ideation in Adolescents Rienke Bannink1, Suzanne Broeren1, Petra M. van de Looij – Jansen2, Frouwkje G. de Waart2, Hein Raat1* 1 Department of Public Health, Erasmus University Medical Center Rotterdam, Rotterdam, the Netherlands, 2 Municipal Public Health Service Rotterdam area, Rotterdam, the Netherlands Abstract Purpose: To examine whether traditional and cyber bullying victimization were

    Words: 6925 - Pages: 28

  • Free Essay

    Ecash

    Journal of Electronic Commerce Research, VOL. 5, NO.4, 2004 USING E-CASH IN THE NEW ECONOMY: AN ECONOMIC ANALYSIS OF MICROPAYMENT SYSTEMS Michelle Baddeley Gonville & Caius College and Faculty of Economics and Politics, Cambridge, UK mb150@cam.ac.uk ABSTRACT The growth of electronic commerce is dependent upon the emergence of effective electronic payment systems. Whilst payments for large purchases can be made relatively easily using credit/debit cards, small-scale electronic commerce

    Words: 11078 - Pages: 45

  • Premium Essay

    Acceptable Internet Use Policies

    an Acceptable Internet Use Policy for Business William E. Boyle Point Park University Abstract This paper will argue that an Acceptable Internet Use Policy, combined with effective network monitoring and policy enforcement is an essential requirement for businesses to protect business assets and resources. It discusses the potential loss to business from employee misuse of internet access and the danger from external sources. Necessity of an Acceptable Internet Use Policy for Business

    Words: 2537 - Pages: 11

  • Free Essay

    Pyc4802 Tutorial Letter

    PYC4802/101/0/2015 Tutorial letter 101/0/2015 Psychopathology PYC4802 Year module Department of Psychology IMPORTANT INFORMATION: This tutorial letter contains important information about your module. CONTENTS Page 1. INTRODUCTION ..................................................................................................... 3 1.1 Turorial material ....................................................................................................... 4 2.

    Words: 20674 - Pages: 83

Page   1 28 29 30 31 32 33 34 35 50