...The internet is a system of networks to provide information and resources across the world. The internet gives endless options of resources and information that could be used in various ways. Even though the internet is convenient and necessary, there is little security on the web. The internet is dangerous and provides little security for the people who go on it. There are so many ways that someone could be harmed from using the internet. Some of these dangers can be prevented while others are unstoppable. There are pedophiles, as well as hackers that use the World Wide Web to get what they want, since there is little security to stop them. Novice level hackers can be stopped by spyware installed on a computer to prevent low level viruses. However, someone faking their identity on the internet is unstoppable because there is no way of seeing if they are telling the truth. Social media is one dangerous component of the internet that has little security. Sites such as Facebook, Twitter, and Instagram are all public. This means that all the information that is posted on this website can be seen by anyone who is able to go online. Once a profile is created on one these websites, they are automatically created as public accounts. The person creating these websites would need to manually make their accounts private. Most users would not know to do this and anything they put on their accounts can be viewed by anyone. Additionally, anything that is put on the internet is permanently...
Words: 1537 - Pages: 7
...I will analyze how the vision, mission, and values that guide my business’s strategic direction. I will evaluate how the business addresses customers’ needs and critique how they achieve competitive advantage. Mission and Vision Statement Mr. D’s Cyber Café, unlike similar café’s, will provide a unique atmosphere for communication and entertainment though the use of high speed Internet. Mr. D’s Cyber Café is the answer to the public’s demand for easy access for communication and large volume of information found on the Internet, affordable cost for entertainment and in such a way that will not leave them socially, economically, or politically isolated. Mr. D’s Cyber Café is to provide the community with a safe, social, educational, and entertaining atmosphere for people of all ages through the use of worldwide communication. The vision statement for Mr. D’s Cyber Café is as follows. To become the leading Internet Cyber Café in the Lincoln County region with a commitment to meet or even exceeds the customers’ needs and satisfaction. Mr. D’s Cyber Café aims to be the safest and most trusted Internet Cyber Café in Lincoln County. Guiding...
Words: 1293 - Pages: 6
...Statement of the Problem This study was conducted to find out what are the impacts of social media to the social skills of the selected high school students of HSL-Braille College. Particularly, this study aims to answer the following questions: 1. What are the profiles of the respondents in terms of? 1. Age? 2. Gender? 3. Socio-economic status 4. Educational Background 2. What are the reasons why the selected high school students of HSL-Braille College wants social media? 3. How does a social medium affect the social skills of the respondents? Hypotheses Ho: Social media has no significant impact to the social skills of the selected high school students of HSL-Braille College school year 2013-2014. Hi social media has significant impact to the social skills of the selected high school students of HSL-Braille College school year 2013-2014. Scope and Limitation of the study This study was conducted to determine the impact of social media to the social Skills of the selected high school students. The respondents of this study are the Selected high school students of HSL-Braille College school year 2013-2014. HSL-Braille College 26c Durian extension pag-asa st. zone 1, signal village taguig city Telefax no. 541-7137 e-mail:hslbraillecollege04@yahoo.com Social Media: its impact to the physical and mental health of the selected high school students of...
Words: 1352 - Pages: 6
...June 2012 Many large decentralized systems rely on information propagation to ensure their proper function. We examine a common scenario in which only participants that are aware of the information can compete for some reward, and thus informed participants have an incentive {\em not} to propagate information to others. One recent example in which such tension arises is the 2009 DARPA Network Challenge (finding red balloons). We focus on another prominent example: Bitcoin, a decentralized electronic currency system. Bitcoin represents a radical new approach to monetary systems. It has been getting a large amount of public attention over the last year, both in policy discussions and in the popular press \cite{NY11,technology-review}. Its cryptographic fundamentals have largely held up even as its usage has become increasingly widespread. We find, however, that it exhibits a fundamental problem of a different nature, based on how its incentives are structured. We propose a modification to the protocol that can eliminate this problem. Bitcoin relies on a peer-to-peer network to track transactions that are performed with the currency. For this purpose, every transaction a node learns about should be transmitted to its neighbors in the network. As the protocol is currently defined and implemented, it does not provide an incentive for nodes to broadcast transactions they are aware of. In fact, it provides an incentive not to do so. Our solution is to augment the protocol with...
Words: 323 - Pages: 2
...E-Commerce Commerce over the Internet is Relatable Safe Insert Name Insert Grade Course Insert Tutor’s Name 23 November 2010 Outline Introduction This section defines the term internet commerce and gives a brief overview of its history. Requirements for E-commerce It gives some of the major requirements involved in starting up an E-business. This includes; 1. Online store- for processing or transactions, and making purchases 2. Website- for marketing products 3. Secure interface- for preventing unauthorized people from accessing critical information Benefits of E-commerce This section gives some of the benefits and opportunities accrued to a business involved in E-commerce. They are; 1. Large number of potential customers- A large number of people rely on the internet thus they are likely to access information pertaining a particular product 2. Timeliness- transactions are facilitated quickly and customers get their products on time 3. Reduced marketing cost- requires very minimal marketing costs as compared to direct marketing 4. Reduced communication cost- communication is done online which is a bit cheaper than use of mobile phones or mails Limitation and challenges This part of the research paper gives some of the disadvantages associated with E-commerce 1. Limitation on the type of product- not all products can be sold over the internet because some require huge shipping...
Words: 3226 - Pages: 13
...email and have their employees use email is that it’s a most convenient way to get in touch with someone, instead of sending a bunch of letters you can select multiple groups of people at once, and you can send attachments such as pictures, documents, and other files. Depending on the type of organization they may want to limit the use of email for the employees since email can also be used for personal needs. When an employee uses email for personal use then productivity within the organization will also drop. This also can lead to employees sending out confidential information, potentially embarrassing company e-mails and trade secrets. The path of an email is meant to go directly from the sender to the receiver but can be sent over the internet to other sources and be obtained by hackers and unintended individuals either intentionally or by unintentional means so using private networks are a widely used method to avoid this from happening as much as...
Words: 258 - Pages: 2
...states as well as Spain and Uganda. The role of social media in these uprisising has been dubbed the “Twitter revoulitons.” Does social media, really deserve all those accolades? Revoultions have been overthrowing oppressive governments long before web 2.0. Iranians in overthrew the Shah in 1979, Filipinos overthrew President Marcos in 1986, and the Communist bloc in Eastern Europe crumbled one after another in 1989. This paper will explore the phenomenon of social media nad its role in promoting and prompting progressive political change, particularly in countries with oppressive leaders. Social media has been defined as “a group of internet based applications that build on the ideological and technological foundations of Web 2.0, which allows the creation and exchange of user-generated content”. (Kaplan) “Web 2.0” is the name for internet platforms which allow for interactive participation by users thereof. It may be contrasted with Web 1.0 platforms, which simply provide content to users, without giving them the opportunity to interact with or modify that information online. This content is all considered user generated content. The OECd has specified there criteria for content to be classified as “user generated”: it should be available on a publicly accessible wegsite or aon a social networking site that is available to a select group; it entails a mininmal amount of creative effort, and it is “created outside of professional routines and practices”. This definition...
Words: 1429 - Pages: 6
...Project 3 – Internet Research Name Institution Search Engines | Directories | Meta-search Engines | Databases | Bing URL:www.bing.com | Snap.com | KAYAK | Altis | Duck duck go URL: www.duckduck go.com | MSN.com | BLINGO | eevl | AskURL:www.ask.com | Lycos | HOTBOT | Gesource | YippyURL:www.yippy.com | Yahoo! | INFO.COM | Humbul | WebopediaURL:www.webopedia.com | AOL Search | EXCITE | SOSIG | The following reports are related to cyber ethics: Sudi, V. (2011, March 25). Safer internet: Cyber Ethics. Retrieved Nov 11, 2013, from http://cyberethics.info/cyethics1/ Marshall University. (2011, Feb 11). Information Security: Cyber Ethics. Retrieved from Nov 11, 2013, from http://www.marshall.edu/infosec/resources/cyber-security-tips-newsletter/cyber-ethics/ Marshall University. (2011, Feb 11). Information Security: Cyber Ethics. Retrieved from Nov 11, 2013, from http://www.marshall.edu/infosec/resources/cyber-security-tips-newsletter/cyber-ethics/ The Web page above displays information about what entails cyber ethics. The information relayed in the site is relevant to the reader in the sense that it cautions them to use the internet safely and responsibly while conducting themselves online. It intended to inform the general public or the internet users to learn the need of navigating safely on the internet. In the broader sense the user is being informed on the basics that they should be aware of in the event they access the internet. The reader is...
Words: 803 - Pages: 4
...changed on how we use the internet. Google is well known for being one of the best internet search engines to grace our world today. Along with that Google has been a part of the mobile technology world since the introduction of Android phones and has been the best friend for many for wanting to know something in a hurry. Naturally as the mobile demand grows Google will want to be a part of that market share. Google’s attempt to buy into the wireless spectrum was part of Google’s idea of bringing the internet to everyone everywhere. Google knew that the large key players such as AT&T and Verizon, although doing their best to provide internet access to rural areas Google could do it better because it has so much more money to invest in the research and development to succeed. The interview by Marguerite Reardon with Chris Saca, head of special initiatives for Google he explains why Google is so interested in the 700 MHz spectrum: Q: Why is Google so interested in the upcoming 700MHz auction? Sacca: The 700MHz spectrum auction represents the last big chance that the United States has to create an opportunity for meaningful change in access to the Internet for the broadest set of people possible. But why is Google, in particular, interested in this spectrum? Sacca: I think it's consistent with our company mission statement and consistent with our history of interaction with users. We have fought hard on a number of fronts to make the Internet as available as possible...
Words: 794 - Pages: 4
...Internet and Society Shaneil Drummond Indian River State College PSY 2012 Professor Greene March 21, 2010 1,020 Words Abstract This essay will explain the usage of the internet and how society deals with it. The world known idea of suicide and cyber bullying have taken over the internet. The articles used to complete this essay are very informative about the person you may be on the internet versus the person you really are. Internet addiction is a well know idea but not a fully developed research. This essay also includes how the internet can create social vampires in society. Not knowing how to interact in real life but a internet sensation otherwise. The internet has become a worldwide phenomenon where everyone has access to almost everything on the web. The books and articles available online about the internet and the different views and ways to use it has help many people realize that the internet is not all that it is cracked up to be. An article illustrates the addiction people have had with the internet over the past decade and how it has impact adolescents and young adults. “Internet users can be considered addicted if he or she scores high on six criteria” (Brown, & Blinka, .2012, p382). The six criteria they mention were...
Words: 1038 - Pages: 5
...about themselves on the internet. Users are able to create their individual profile and to communicate with friends or new people. It's popular because it helps people meet others with similar interests and similar tastes. It creates virtual communities among people who want to connect with each other, but might never meet without the mediation of the networking site. 2. Why was Orkut so successful in Brazil? What caused problems later? Google was already well known and had very good reputation in Brazil. Besides, it served a Brazilian market gap with its social networking site, which attracted the extremely community-oriented Brazilians. Orkut was also popular because it was brilliantly marketed. Managers used known cultural attractions like the name of a popular yoghurt drink, the colors of the Brazilian Football World Cup team, and such to make the site attractive. Orkut had problems with their internet security. The site was abused by some users who turned it into a meeting place for illegal activities, such as child pornography and drug dealing. The company did not control such users and did not even react when other users complained. Google even resisted requests from Brazilian legal authorities to share information, when the courts were investigating users committing serious crimes. Orkut was not able to negotiate with the Brazilian law in an appropriate way. The company failed to understand that Brazilian law does not protect internet privacy as strictly as...
Words: 713 - Pages: 3
...What the Heck has Internet Done to Our Brains? Section I: Introduction and Context Imagine going back in time and staying there permanently. Out of all the things that will be missed, there is no doubt that the one thing would be technology. The Shallows: What Internet is Doing to Our Brains is nonfiction book written by Nicholas Carr who asserts and cautions the effects that internet has on everyone to this day and even more so in the future. People nowadays can communicate with people all around the world using many different types of communications such as social networking sites, cell phones, emails, etc. Carr brings in many different scientific research as well as a couple of personal experiences to show the great change in technology and the internet. The author chose to write The Shallows from an epiphany he had realized, “It (his brain) was hungry. It was demanding to be fed by the net feed...I wanted to check email, click links, do some googling. I wanted to be connected” (Carr 16). The way that technology has changed and developed the internet has made Carr want to stress the fact that although technology is very useful, it can be very harmful to peoples’ brain in a way that it affects a person’s deeper level of thinking. Section II:The Author’s Background Nicholas Carr is a columnist, member of the Encyclopedia Britannica's editorial board of advisors, as well as an executive editor. Carr writes about technology, culture, and economics which have made his books...
Words: 2517 - Pages: 11
..."A term used to describe the discrepancy between people who have access to and the resources to use new information and communication tools, such as the Internet, and people who do not have the resources and access to the technology. The term also describes the discrepancy between those who have the skills, knowledge and abilities to use the technologies and those who do not. The digital divide can exist between those living in rural areas and those living in urban areas, between the educated and uneducated, between economic classes, and on a global scale between more and less industrially developed nations (webopedia.com) ." I guess from my opinion I am still stuck on the digital divide process also. In the area that I live it is very low income and at least 90 percent of the parents are using the government to pay their child care. This speaks volume for the need of computers in this town. I talk with many parents on where to go on the internet to find a job and almost all of them tell me that they don’t have a computer. Then I suggest they go to the library and now I learned that the library only have four computers. When I look around this town I see why most people have not progress to better living. Since you and I know that it takes a computer most of the time to find a job, because no one want to use paper application anymore. The web is the maximum advancement of knowledge in my lifetime the of destroyer applications for the computer. Believe it or not there...
Words: 850 - Pages: 4
...the Internet, the E-Mail. I will also explain current development in C/T and discuss the role of legislation on the industry. Mobile Technology: Mobile Technology is the technology used for cellular communication. They come into use in 1990’s. When first introduced, it way a luxury item, today it is viewed as an essential to our existence. Old mobile technology consisted of a large handset, battery and signal difficulties and was very expensive. Since the start of this millennium a standard mobile device has gone. Today mobile are slim line, cheaper and can perform of many functions: Personal Mobile use: * To call * To Text * Camera functions * Games * Alarm * Email * Internet * Calendar * App Store Business use: * To communications with staff, customers/business partners Advantages of Mobile Technology: * 24/7/365 contact * Accessible at all time * Variety of services available via any mobile * Mobile Marketing reaches new and existing customers * Sending out special offers and tracking responses. * GPS in phone can help to locate hard-to-find places and be on time for appointments. Disadvantages: * No escape from its demands * Health risks * Bullying * Hacking problems * Costs * Lack of information control * Privacy issues * Safety issues This completes my overview of mobile Technology. For the purposes of this essay: Internet The Internet is a...
Words: 867 - Pages: 4
...Week Three Student Guide This week’s topics cover collaboration tools and Internet technologies and their use in meeting business goals. Reviewing some of the chapter one readings will help you with the other chapters. You will become familiar with Internet terminology, such as B2B, B2C, B2G, Web 2.0, and Social CRM. Knowledge of collaboration tools can make you very marketable as a business manager, because many companies use these tools in their team work. This week covers using these collaboration tools to improve communication as well as document sharing. Internet and Collaboration Tools OBJECTIVE: Determine how and when to use Internet technologies in business. Resources: Ch. 1 & 8 of MIS Essentials Content • Ch. 1: The Importance of MIS o Q1: Why is Introduction to MIS the Most Important Class in the Business School? o Q2: What is an Information System? o Q3: What is MIS? o Q4: Why is the Difference Between Information Technology and Information Systems Important to You? o Q5: What is Your Role in IS Security? • Ch. 8: E-Commerce, Web 2.0, and Social Networking o Q1: What Types of Interorganizational Systems Exist? o Q2: How do Companies use E-Commerce? o Q3: Why is Web 2.0 Important to Business? o Q4: How Does Social Capital Benefit You and Organizations? o Q5: How Does Social CRM Empower Customers? OBJECTIVE: Determine collaboration tool needs based on business function. Resources: Chapter Extension 2 of MIS Essentials, Article...
Words: 404 - Pages: 2