Here is the synopsis of our sample research paper on Working in Computer Information Systems. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
5 pages. This paper considers three different people working in the computer information systems industry. Their feelings about the rewards of their jobs, the drawbacks, and possible sacrifices that must be made are all discussed herein. Also gives some information as to texts that are considered most important to them in their line of work. Bibliography lists 3 sources.
Page Count:
5 pages (~225 words per page)
File: D0_JGAcisin.rtf
Buy This Term Paper »
 
Unformatted sample text from the term paper:
possible sacrifices that must be made are all discussed herein. Also gives some information as to texts that are considered most important to them in their line of work.
DATA MINING In todays security minded world and after the terrorist attacks that are happening everywhere, one important job in the computer information systems field is in that of
data mining. In his job Robert Tager does security data mining for a number of clients. This involves pulling up information about individuals. As Tager relates, it
is somewhat akin to be a private investigator via the Internet. One of his favorite books on the subject is Principles of Data Mining by Heikki Mannila, Padhraic Smyth,
and David J. Hand. His field is extremely interesting he claims, and it is also very thought provoking. He constantly has to look for ways to find out bits
and pieces of information about possibly dangerous people. In fact, the latest software for electronic profiling enables the user to collect intensive information from various sources through aggressive data
mining and artificial intelligence techniques. The problem as will be addressed herein is that while the technology is in place to collect this information on individuals, who is justified
in using it, and why? Seemingly any company wishing to do intense data scanning on consumers will be able to justify to their own satisfaction the use of privacy-invading
software tactics. The drawback to this job is that because of the data mining techniques employed by some airlines to label potential terrorists, one family was subjected to humiliating searches
at airports as software had labeled him and his family as potential terrorists. This was completely erroneous but because he frequently traveled to his native country, software had put
...