Premium Essay

Internet Is a Double Edge Sword

In:

Submitted By alvink09
Words 850
Pages 4
Since its introduction to the public in 1986, the Internet has drastically changed the world. Within a short span of time, it has brought about a new evolution in the mode of networking; expanding from its users population from thousands to billions across the world. With the progression in time, the Internet has become a necessity, playing a major role in various human activities. Despite the Internet being an indispensable tool of human living, it can also be a double edge sword. The purpose of this essay is to examine how the internet brings about benefits which at the same time harm us. With endless factors available for discussion, this essay will focus on its impact on banking, politics and society to surface the double-edged nature of the Internet.
Physical transaction time and fear of theft are some of the common worries among the users of our traditional banking system. However, by incorporating the Internet with banking, all of these doubts can be removed with just one click of a button. Banking services are accessible in any location with internet connection. One no longer needs to adhere to the bank’s operating hours as it turns twenty-four hours. In addition, users can enjoy higher transaction efficiency through e-banking.
On the other hand, these advantages have unintentionally created a perfect landscape for lawlessness. Personal information is being exposed to virtual theft. These cybercriminals can cause various damages with little trace of evidence left. Furthermore, once the bank server fails, users are left helpless. In the worst case scenario where companies require immediate funding, this could result in extensive monetary losses. Thus the efficiency of Internet banking solely depends on the individual understanding of the particular internet function of each bank.
In the recent General and Presidential Elections, politicians and

Similar Documents

Premium Essay

The Positive Impact of Social Network in Today's Society

...have taken social networking for granted. Early Overview: The intention of this report is to provide a conceptual and informative context about the benefit and harmfulness of social networking in today’s society. We begin by exposing some of the benefits of social networking, for instance communication with relatives and family, business networking, advertising. Following this, we’ll go over the facts that cause harm to society through social networking such as sexual predators, identity theft, & health related issues. To conclude, based on different articles and general research, we’ll identify if social networking is beneficial or harmful to today’s society. Literature Review: After exploring different sources such as internet articles and magazines, I have found that social networking plays a very...

Words: 2170 - Pages: 9

Premium Essay

Social Network

...listened to suggestions from users and offered what users wanted, not what managers thought users wanted. By allowing users to customize their personal Facebook pages in virtually any way they wanted (as long as it is not considered inappropriate, threatening, or dangerous), Facebook quickly gained fans and users. They soon surpassed the success and level of users of Myspace. Knowing exactly what was done to surpass Myspace; Zuckerberg has kept Facebook in the disruptive technology mode. This keeps interest high, users happy, and the money rolling in. As long as Facebook stays on the cutting edge of disruptive technology, they should remain successful. However, disruptive technology lends itself to new entrants into the marketplace. Basically, new users can throw anything into the ring and try anything to start a new business. They have nothing to lose by running on the edge. Eventually one or more of these upstarts will hit upon an even more appealing version...

Words: 1050 - Pages: 5

Premium Essay

Dell Swot Analysis

...Dell SWOT Analysis Strengths: Dell is one of the world’s best and most known brands. The company has partnered with many corporations throughout many different industries. Dell has been able to accomplish this due to their reputation for building quality products at an affordable price. Dell continues to use the latest technology in all of their products, sells directly to the customer, and was among the first computing companies to offer next day, on site product service. Dell also strives to provide their customers excellent customer service both before and after a sale has been made. This enables the customer to get the exact product for their business or individual needs, as well as provide the proper support after the sale has been made. Another strength of Dell is they make all and assemble all of components in every computer giving them total command of their supply chain. Weakness: While Dell has many strengths as previously listed, they are not without their weaknesses. One major weakness is the company holds no proprietary technology. Dell has been unsuccessful in attracting the college student segment of the market. Dell’s sales revenue from educational institutions such as colleges only accounts for a merely 5% of the total. Due to Dell’s lack of brick and mortar stores, customer cannot go to retailers because Dell does not use distribution channels. Customers just can’t buy Dell as simply as other brands because each product is custom-built according to...

Words: 619 - Pages: 3

Premium Essay

Prostitution Without Borders: a High-Tech Human Trafficking in the 21st Century

...PROSTITUTION WITHOUT BORDERS: A High-Tech Human Trafficking in the 21st Century by: Ma. Bernadette B. Bautista As the world moves further into the 21st century, the society becomes more and more dependent on science and technology. Men had discovered technological innovations which brought about admirable effects like new approaches to industry, medicine, communication and information that facilitates the growth of virtual partnerships. With the emergence of new technologies, countries, regional economies, societies, and cultures have become integrated through a global network of communication, transportation, and trade. But as technology advances in time, it has brought about both positive and negative impact not only on individuals but on the society as well. Men had used new forms and new technologies to facilitate their illegal activities and one of which is the raging human trafficking. Human trafficking or trafficking in persons is defined in the 2000 United Nations Convention Against Transnational Crime as the recruitment, transportation, harboring or receipt of persons, by means of the threat or use of force or other forms of coercion, of abduction, of fraud, of deception, of the abuse of power or of a position of vulnerability or of the giving or receiving of payments or benefits to achieve the consent of a person having control over another person, for the purpose of exploitation. It has developed throughout the years. It includes labor exploitation...

Words: 1047 - Pages: 5

Free Essay

Intelligence Collections

...3 Cedric.l.smith@gmail.com Technology has systematically improved over the years. The advancement in computer systems and the information that’s readily available to all is unlimited. In 1980, computers were foreign to most households. Computer use grew in the 1990’s and in the 2000’s; more homes became equipped with them. There is no argument that technology has increased proficiency and overall productivity both personally and professionally. However, there is some ambiguity as well as concerns about the potential threat on personal privacy and national intelligence. The impact technology have on information collection is a double edge sword. The ethical decisions a collections officer make is mission driven and may often compromise personal morality. It’s a known fact that information sent via Internet access is public information. This very known fact isn’t directly truthful in all aspects. Public information can be retrieved from your computers and in some cases, authorization is required and in others it is not. Handbook of Surveillance Technologies (third edition) definition of a cookie is, a software marker or identifying piece of information that may potentially be accessed by other computer programs. By definition, personal information is already potentially compromised. Cookies can be disabled in order to safeguard private information however, technology has advanced itself pass the disabling control method. There is no law in place that prevents...

Words: 678 - Pages: 3

Free Essay

The Responsibility Project: No Phone Zone Day

...issue has compelled people to take a stand on April 30, 2010 to form an awareness day called No Phone Zone Day (No Phone Zone Day, 2010). The role of external social pressures in influencing organizational ethics Organizational ethics get external pressure from all places, and they can be positive and negative. Some types of positive roles are awareness and education. Some negative roles are peer pressure and promotion pressures. If you show people that there are consequences for the actions that they take, then they are more aware. Peer pressure is a double edges sword; it can either be positive or negative. If one person is doing something bad and nothing is happening to them the others will follow suit. But if you get several associates to follow the rules and show the right way to do things others may follow as well. Promotional pressure is pressure that comes from an outside source, such as, media and internet. A news story gets broadcast and it shows kids texting and driving to win a contest. Well then it is being portrayed as ok and therefore others will do it....

Words: 743 - Pages: 3

Premium Essay

Business Intelligence

...Paper on Business Intelligence (BI) Index of Topics covered 1 What is BI 2 Applications of BI 3 Common Functions of BI 4 Requirement & Challenges of BI Implementation 5 Best Practices of BI 6 Case Study 7 Conclusion What is BI: BI is a broad category of applications and technology for gathering, storing and providing access to data to help enterprises make better decisions. It can provide information of various “Information Assets” in an organization and how they interact with each other. These assets include Customer Databases, SCM Information, Personnel data, Manufacturing, Sales & Marketing Activity. Applications of BI: BI can be applied to MARCKM * Measurement - performance metrics, benchmarking etc., * Analytics - data mining, process mining, predictive modeling * Reporting - Data visualization, Executive Information System * Collaboraton - Data sharing & Electronic Data Interchange. * Knowledge Management - This leads to regulatory compliance and learning management The term was used by Gartner group in 1996, “..... Data analysis, reporting and query tools can help business users wade through a sea of data to synthesize valuable information from it - which today collectively fall into a category of BI.” Common Functions & Requirements of BI Common functions of BI are reporting, analytics, data mining, process mining, complex event processing and predictive analysis. Requirement &...

Words: 1444 - Pages: 6

Premium Essay

Swot Analysis of Dell Computers

...SWOT analysis of Dell Computers Corporation Student Name Institutional Affiliation Professor’s Name SWOT analysis of Dell Computers Corporation Dell is a privately owned American multinational computer technology which develops, sells and repairs computers and related products plus services. It was named after its great founder, Michael Dell. The company is best known for the innovations it made on the management of supply chain and electronic commerce, mostly the model for direct sales and configure to order approach which they used in management to deliver customer’s specifications of configured PCs. Dell is one of the leading computer manufacturers in the whole world and it has tremendously grown since its incorporation by Michael Dell. Dell currently dwells in an ever changing market with competitors who are challenging the company with unique and new products in the market place. Therefore SWOT analysis will provide a basis for crafting strategy that will take advantage of the company’s resources and at the same time benefiting from the opportunities and defending the company the threats to its successful operations (Michael Dell 2009). Strengths Majorly, the strength of Dell comes because of the Direct Model which is considered as one the greatest assets of the company. The Direct Model gives consumers a chance to customize their laptops since the market is becoming more educated and every individual needs a laptop that will meet their needs especially in terms of performance...

Words: 966 - Pages: 4

Premium Essay

Minimizing Working Capital

...u08a1 Essay – Minimizing Working Capital Using Internet resources or the Capella University Library, research and write an essay on the importance and challenges of minimizing working capital. Your paper should be 4–6 pages in length and include three outside references. Your writing should be well organized and clear. Writing structure, spelling, and grammar should be correct as well. How to improve better performance of Working Capital Management Read more: http://www.ukessays.com/essays/finance/how-to-improve-better-performance-of-working-capital-management-finance-essay.php#ixzz2E8PrJWkr http://www.studymode.com/essays/Working-Capital-408723.html http://blog.accountingcpd.net/2012/08/16/working-capital-optimisation-in-smes-part-iii/ http://www.termpaperwarehouse.com/essay-on/Working-Capital/53803 * http://www.termpaperwarehouse.com/essay-on/Minimizing-Working-Capital/30029 * http://www.ing-wholesalebanking.com/insights/assets/pdf/research/1482.pdf * http://smallbusiness.chron.com/effect-revenue-increase-working-capital-42574.html * Working Capital * In business accounting, working capital is a benchmark measure of your company's ability to meet its short-term obligations. It's calculated by taking your business' current assets and subtracting its current liabilities. Current assets are those that can or will be converted to cash in the next year. The major current assets are cash, accounts receivable and inventory. Current liabilities are obligations...

Words: 899 - Pages: 4

Free Essay

Information Technology Act

...so from day one. Technology, moving forward, and becoming more advanced and sophisticated, adds growing concern over the ethical integrity of that technology. In correlation with those concerns, the United States government implemented various acts to aid control in these concerns and combat unethical behavior. Given the number of implemented acts, this paper focuses on two specific sections: the Fair Credit Reporting Act of 1970, and the U.S. Patriot Act of 2001. The implementation of the Fair Credit Reporting Act of 1970 enabled each American to be on an even plane with credit opportunities. The government executed the U.S. Patriot Act in 2001, in part because of the atrocity of 9/11, to lessen terrorist activities by the use of the Internet and cyberspace. Fair Credit Reporting Act of 1970 The Fair Credit Reporting Act (FCRA) ordained to “protect consumers from the disclosure of inaccurate and arbitrary personal information held by consumer reporting agencies” (Consumer Privacy Guide (2001). The Fair Credit Reporting Act (1970). 2001). At the time when this act was established, American citizens were not viewed equally by credit facilities when attempting to purchase homes or vehicles. This act was a means of governing and guaranteeing equal opportunity and consideration for these loans. American consumers are rated on a numerical ranking for calculating his or her ability to repay any loan. This ranking is called the credit score and is based on past...

Words: 1036 - Pages: 5

Premium Essay

Mass Media

...Mass media refers to communication devices, which can be used to communicate and interact with a large number of audiences in different languages. Be it the pictorial messages of the early ages, or the high-technology media that are available today, one thing that we all agree upon, is that mass media are an inseparable part of our lives. Entertainment and media always go hand in hand, but in addition to the entertainment, mass media also remain to be an effective medium for communication, dissemination of information, advertising, marketing, and in general, for expressing and sharing views, opinions, and ideas. Mass media is a double-edged sword which means that there are positive as well as negative influences of media. Print Media Print media encompasses mass communication through printed material. It includes newspapers, magazines, booklets and brochures, house magazines, periodicals or newsletters, direct mailers, handbills or flyers, billboards, press releases, and books. Newspapers: Newspapers enjoyed the position of the most preferred medium to reach a wider audience until electronic communication emerged on the media scene. In the early days, newspapers were the only medium that masses at large depended on, for daily news. A newspaper carries all kinds of communication related to a variety of topics like politics, socialism, current affairs, entertainment, finance, stocks, etc. Apart from this, it also includes topics which are in lighter vein like cartoons,...

Words: 1440 - Pages: 6

Premium Essay

Network Security

...this exploitation, companies subject themselves to lawsuits from their own customers. These companies often are ignorant of the simple fact that they have been exploited until customers report the issues to these companies and corporations. Many times, more than thirty days goes by before someone alerts the company of a possible security breech. Cost of an electronic exploit can be greater than a million dollars per incident as reported by the FBI. This information is found in the FBI’s (Federal Bureau of Investigation) report of cyber threats in the United States. In order to help counterbalance this, smaller to midsized companies could spend less than $5,000 to harden their systems and operating systems to put a statefull firewall in place. As stated in this paper, these companies often lack the resources, materials and funds to do so. With the FBI report showing reported incidents, there are thousands of incidents that go unreported. Often these incidents are yet to be discovered. With this number of small to mid-size corporations ignoring or slowly implementing security measures, more and more electronic computer crimes are beginning to take place throughout the U.S. With extortion now moving into the digital age, many corporations do not report intrusions to law enforcement in order to avoid negative publicity. Reports of an intrusion could directly have a negative effect on the company’s sales and position in a global competitive market. Approximately 35% of...

Words: 2166 - Pages: 9

Premium Essay

Project Overview & Technology Organizational Needs Assessment

...Table of Contents Introduction 3 Technology Needs Assessment 3 Problem Statement 8 Project Goals 8 Project Objectives 8 Conclusion 9 References 10 Introduction Kurzweil predicts that “in 2009, while schools are still not on the cutting edge, the profound importance of the computer as a knowledge tool is widely recognized. Computers play a central role in all facets of education, as they do in other spheres of life” (Kurzweil, 1999, p. 276). It is now 2006 and Kurzweil’s prediction of the computer being widely recognized as a knowledge tool is ahead of schedule. It is also true that schools are far from being on the cutting edge. Some schools are better than others, but the computer is sorely lacking in the classroom. The writer’s organization is a proprietary art college in Central Florida. The school is part of a large corporation that oversees more than sixty schools across the United States. Thirty one of the schools are art colleges. The art colleges are leaders in using the computer in the classroom. The corporation takes pride in putting high end technology in front of students to produce commercial art work in the form of graphic design, interactive design, digital video and animation. Often students choose the proprietary art college over community college or state university because of the high end computer labs and other technology that the private school has on campus. Potential students see the technology as an added value worth paying...

Words: 1780 - Pages: 8

Premium Essay

Information Technology White Paper

...Tan Pham CSIA 303 Information Security White Paper Professor Gupta Information Security White Paper The internet and its technology have brought many advantages and disadvantages for information system of businesses, whether public or private. There is no denying that the business world will move further and further into the cyber world, where information are available just by a click of a finger. No matter how large of a scale a business is, private restaurant or large Banking Corporation, the truth is every single one of these business is at risk. Risk of losing trade secret and risk of losing employee’s confidential data are some of a few risks that a business must address. These risks originally come from sources calls vulnerabilities and threats. Vulnerabilities in plain definition are weaknesses of an information system. These weaknesses later can be translated and exploited by attackers, insider or outsider. These attackers are generally can be seen as threats. Businesses must find solutions to mitigate these threats by eliminating vulnerabilities of their system in order to reduce risk of their information and information system. Information security addresses the three following components: confidentiality, integrity and availability, which are the main goal for business toward protecting their information and information system. Confidentiality is basically to ensure no confidential data...

Words: 1157 - Pages: 5

Premium Essay

Network Security

...The internet and its technology have brought many advantages and disadvantages for information system of businesses, whether public or private. There is no denying that the business world will move further and further into the cyber world, where information are available just by a click of a finger. No matter how large of a scale a business is, private restaurant or large Banking Corporation, the truth is every single one of these business is at risk. Risk of losing trade secret and risk of losing employee’s confidential data are some of a few risks that a business must address. These risks originally come from sources calls vulnerabilities and threats. Vulnerabilities in plain definition are weaknesses of an information system. These weaknesses later can be translated and exploited by attackers, insider or outsider. These attackers are generally can be seen as threats. Businesses must find solutions to mitigate these threats by eliminating vulnerabilities of their system in order to reduce risk of their information and information system. Information security addresses the three following components: confidentiality, integrity and availability, which are the main goal for business toward protecting their information and information system. Confidentiality is basically to ensure no confidential data, such as customers’ data or trade secret, are acquired by unauthorized users. Example of large corporation such as Apple Inc. addresses the issue of confidentiality very seriously...

Words: 1132 - Pages: 5