...amount of teachers gathering information about what technology has done for students’ ability to learn. This research draws upon teachers of multiple states, ages, and grades. This case example shows how technology has negatively affected the cognitive function of students’ minds while involved at school.Has technology ruined our ability to communicate on a personal level? Sociology 111 Term Paper Taylor Sandusky December 9, 2015 INTRODUCTION Technology plays a large role in our communication skills. Almost everyone has observed someone tapping away at their cell phone on their way into the store, someone poking at computer keys in the corner of a coffee shop, or even the one student in class not paying any attention to the lesson and instead focusing on the Candy Crush game application running on his iPad. Today’s society is...
Words: 1127 - Pages: 5
...The source I have chosen is a medical article revealing statistics and the role of sexting in our society. The survey was conducted by a British anti-bullying organisation and the source written by an unknown author was published on October 15, 2014. The source was made for informing children of the danger that is involved in sexting and sharing explicit photos on social media. The source explains how big an impact sexting can have on young people’s lives. In the article, it shows that children see sexting as a part of a normal life which can be very shocking. Some parents don’t realize what their kids are up to on their social media profiles. In this survey the author reported the shocking results of sexting. it shows that almost half of those that have been affected by abuse on a smartphone app have lost their confidence and some going to the lengths of self-harming. The stakeholders (British anti...
Words: 684 - Pages: 3
...Research Proposal on RECENT TREND OF CYBER CRIME IN BANGLADESH : LAWS AND PRACTICES GOLAM RABBANI Student of LLM Roll 10119032 Department of Law Rajshahi University BANGLADESH E-mail: g.rabbani.law@gmail.com Recent Trend Of Cyber Crime In Bangladesh : Laws & Practices INTRODUCTION The development in information technology and electronic media especially from 1980`s onwards have given raised to a new variety of computer related crimes which are commonly called cyber-crime. The cyber-crime may be done by using computer only, but this crime may be done very easily by using internet. Cyber crime or computer crime refers to any crime that involves a computer and a networks. Some authorities feel that the term cyber-crime is misnomer as this term is nowhere defined in any statutes or act enacted by the Parliament. In a sense is radically different from the concept of conventional crime in so far as both include conduct whether act or omission which causes breach of law and therefore, it is punishable by the state. It is not surely said that, from when the cybercrime was started but in 1999 at Tywan a virus was attracted named CIH, made the topic of cyber-crime familiar to the whole world. In the present time people become more dependent on computer and internet, as result, we can’t not think our daily activities without this technological help. For this reason, some self-gainer people chose this technological way...
Words: 1924 - Pages: 8
...and goes on with the possible effects that might happen to Students when technology is being used extensively. On the later part of the chapter are the gathered related studies and articles done by various researchers. Foreign Literature Jessica White (2005) said that, technology has completely changed the scope of education in America. Most states require a technology aspect to their school improvements plans. They have embraced the idea that using technology in their classroom makes the subject anything from math to art-more accessible to many kinds of students. Educators, administrators, parents, and students are so well-versed in technology that it has become norm in even the most economically disadvantaged schools. She also stated that controversy exist about some students having access too much information. Some internet sites are not monitored by educational sources. Students who have not been taught the proper way to research on the internet might make a research hypothesis based on a website whose information is untrustworthy. Educators should be cautious and explain exactly what their expectations to their students are. Plagiarizing-detection software checks that students aren’t stealing information in using it as their own research. However, this software wasn’t available when much of the controversy first became an issue. According to the National School Boards Association (nsba.org) study (2006), technology has large impact on student’s achievement across the subject...
Words: 5065 - Pages: 21
...Technology Affecting Our Youth David Aldridge Baker College of Auburn Hills April 29, 2014 CONFIRMATION OF AUTHORSHIP: I certify that I am the author of this paper and any assistance I received in its preparation is fully acknowledged and disclosed in the paper. I have also cited any sources from which I used data, ideas, or words, either quoted directly or paraphrased. I also certify that this paper was prepared by me specifically for this course Last summer I was finally fed up with my 13 year old son wasting his whole summer vacation inside on the computer or Xbox, I told him to get his behind outside and play baseball, basketball or ride his bike! His response was, “who am I going to play with Dad? There is no one outside. All my friends are online, playing World of Warcraft.” I was astounded, mouth hanging wide open in disbelief, when I opened the door and it was like a ghost town, there were no children anywhere and I know there are a lot of kids in our neighborhood, I would see them walking to school or the bus stop every morning during school. Where were all the kids? They were inside on their computers, phones, iPad, or gaming consoles being antisocial and lazy or watching television. My only response was oh my God the biggest problem I had growing up was, do I want to play with the kids to the right or the kids to the left? Do we want to play basketball, baseball, go swimming or ride our bikes around the neighborhood? And for God sake be home...
Words: 1886 - Pages: 8
...Read the case study given below and answer the questions at the end of the case. Brand ambassador : employing real customers to get the word around. People love talking about things that make them happy - including their favorite products and brands. For example, if you really like an airline - they fly with flair and get you there at a reasonable price or you just love your recently acquired Sony camera - it is too good to keep the knowledge of the experience to yourself. In the old days, you would have chatted up these brands with a few friends and family members, but these days technology allows you to spread the word about products and brands experiences to thousands of other consumers. In response, Marketers are now working to harness the new found communications power of their everyday customers by turning them into influential brand ambassadors. Companies like Sony, Microsoft and McDonald's are now developing a new breed of brand ambassador programs that organize and multiply consumer to consumer interactions about their brands. These programs employ everyday consumers who are passionate about their products to act as part PR agents and part sales reps. MS-61 3 http://gyansagar.co.in Marketers select their brand ambassadors very carefully, based on customers' devotion to a brand and the size of their social circles. Once selected, the ambassadors are trained with real brand knowledge to go along with their passion for the brand. The ambassadors...
Words: 2720 - Pages: 11
...ways that ensure consideration and respect for your fellow humans. These commandments or rules need to be obeyed by everyone who utilizes the cyber space facility in order to maintain the tranquility of cyber world. However, not everyone concern about these rules as we seen nowadays. In order to prevent plague from spreading and become worse in future, we have to identified the root cause of the problem and define how to solve it. The first commandment explained that it is not ethical to harm another user by using computer and it is not limited to physical injuries but also harming or damaging other user data or files. It is unethical to create a programmed that deliberately allows someone to steal, copy, or gaining unauthorized access to others data. The waywardness to this commandment is the main reason why unethical behavior such as hacking, spamming, cyber bullying and phishing occurs in our society. The creation of computer viruses, which are purposely to harm useful computer program or interfere with the normal function of the computers, is unethical practice in cyber world ad...
Words: 3045 - Pages: 13
...ACKNOWLEDGEMENT This Term paper is made possible through the help and support from everyone, Including: parents, teachers, family, friends, and in essence, all sentient beings. Please allow us to dedicate our acknowledgment of gratitude toward the following significant advisors and contributors: First of all we would like to thanks the Almighty ALLAH, Who gave us the opportunity and strength to complete this paper successfully. Especially we would like to thank Mr. Asheek Mohammad Shimul for his support and encouragement. He advices us the topic of the term paper & allow us to acquire a new experiences as well as knowledge. Finally, we sincerely thank to our parents, families, and friends, who provided the advices. The making of this term paper would not be possible without their unconditional help. Table of content No of the topic | Name of the topic | 1 | Introduction | 2 | Usage of Internet | 3 | Modern Uses | 4 | Internet in Bangladesh | 5 | Current Trend | 6 | Research Purpose | 7 | Review of Literature | 8 | Hypothesis | 9 | Contradictory research | 10 | Method | 11 | Result | 12 | Discussion | 13 | Limitations | 14 | Source | Introduction: The Internet is a global network connecting millions of computers. More than 100 countries are linked into exchanges of data, news and opinions. According to internet World Stats, as of December 31, 2011 there was an estimated 2,267,233,742 Internet users worldwide. This represents...
Words: 4506 - Pages: 19
...Page 1 Stanley H. King Counseling Recommended Reading A COLLECTION OF TITLES RELATED TO THIS WORK: Many of these titles have been suggested by past Institute participants. Please let us know if there are resources that you have found useful in your life and work, and we will add to the list. Apter, Terri E. MYTH OF MATURITY: WHAT TEENAGERS NEED FROM PARENTS TO BECOME ADULTS. 2002 Brown, Lyn Mikel. GIRLFIGHTING: BETRAYAL AND REJECTION AMONG GIRLS. 2005 Cloke, Kenneth. MEDIATING DANGEROUSLY. 2001 Clydesdale, Tim. THE FIRST YEAR OUT: UNDERSTANDING AMERICAN TEENS AFTER HIGH SCHOOL. 2007 Crawford, Susan H. BEYOND DOLLS & GUNS: 101 WAYS TO HELP CHILDREN AVOID GENDER BIAS. 1995 Deak, JoAnn and Barker, Teresa. GIRLS WILL BE GIRLS: RAISING CONFIDENT AND COURAGEOUS DAUGHTERS. 2003 Deak, JoAnn. HOW GIRLS THRIVE: AN ESSENTIAL GUIDE FOR EDUCATORS (AND PARENTS). 2010 Dovidio, John F. and Gaertner, S. PREJUDICE, DISCRIMINATION, AND RACISM. 1986 Dweck, Carol. MINDSET: THE NEW PSYCHOLOGY OF SUCCESS. 2007 Elkind, David. ALL GROWN UP AND NO PLACE TO GO: TEENAGERS IN CRISIS. 1998 Elkind, David. HURRIED CHILD: GROWING UP TOO FAST TOO SOON. 2006 Germer, Christopher K. THE MINDFUL PATH TO SELF-COMPASSION: FREEING YOURSELF FROM DESTRUCTIVE THOUGHTS AND EMOTIONS. 2009 Gilligan, Carol. IN A DIFFERENT VOICE: PSYCHOLOGICAL THEORY AND WOMEN’S DEVELOPMENT. 1993 Gilligan, Carol, Nona P. Lyons, Trudy J. Hanmer (ed). MAKING CONNECTIONS: THE RELATIONAL WORLDS OF ADOLESCENT GIRLS AT...
Words: 1649 - Pages: 7
...Global Journal of Computer Science and Technology Interdisciplinary Volume 13 Issue 2 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172 & Print ISSN: 0975-4350 Ethical Issues in Computer use: A Study from Islamic Perspective By Abdul Kadar Muhammad Masum International Islamic University, Bangladesh Abstract - Computer users are continuously facing ethical challenges as society adopts new and increasingly complex tools and technologies. These ethical challenges can be managed by Islamic code of life. In this paper, we have studied and tried to identify, how computer affects the ethical issues of the society. In this regards, we have traced some highly related issues to the ethics of computer usage, namely – misuse of time, honesty and integrity, privacy, security, intellectual property right, and computer crime. We have also tried to explain these issues in the light of Qur’an and Hadith. At the end of this paper, we have also suggested some measures that can help in promoting proper use of computer facilities by the Muslim masses without compromising the Islamic principles. Keywords : islamic ethics, computer ethics, privacy, security, computer crime. GJCST-G Classification: K.8.m Ethical Issues in Computer use A Study from Islamic Perspective Strictly as per the compliance and regulations of: © 2013. Abdul Kadar Muhammad Masum. This is a research/review...
Words: 5242 - Pages: 21
...16 4. IMPACTS OF THE MOBILE PHONE ON HUMAN HEALTH 19 4.1 Positive Impacts on Human Health in The Past 19 4.2 Negative Impacts on Human Health in the Past 19 4.3 Positive Impacts on Human Health in the Present 20 4.4 Negative Impacts on Human Health in the Present 23 4.5 Positive Impacts on Human Health in the Future 26 4.6 Negative Impacts on Human Health in the Future 27 5. CONCLUSION 28 Works Cited 29 1.INTRODUCTION Mobile phones are spreading around the world faster than prior communication technologies including the television and the internet [1]. They have been adopted faster than any other technology ever introduced to human history [2]. According to the International Communication Union (ITU), from 2005 and 2009, the number of mobile phone subscribers doubled going from 34 subscribers for every 100 inhabitants to 68, respectively. Subscriptions continue to rise questions are raised, it is important to explore the society which consumes such a technology [3]. Mobile phones went from being mere voice communication devices to a technological wonder with endless capabilities. It is becoming increasingly complex in terms of the services offered [2]. They provides the users with internet access, sensors to monitor the user’s daily routines, social networking applications, access to emails, instant messaging and much more [2]. Analyze the social evolution of the mobile phone over...
Words: 9103 - Pages: 37
...History The potential for computer networking to facilitate newly improved forms of computer-mediated social interaction was suggested early on.[8] Efforts to support social networks via computer-mediated communication were made in many early online services, including Usenet[9], ARPANET, LISTSERV, and bulletin board services (BBS). Many prototypical features of social networking sites were also present in online services such as America Online, Prodigy, CompuServe, and The WELL[10]. Early social networking on the World Wide Web began in the form of generalized online communities such as Theglobe.com (1995),[11] Geocities (1994) and Tripod.com (1995). Many of these early communities focused on bringing people together to interact with each other through chat rooms, and encouraged users to share personal information and ideas via personal webpages by providing easy-to-use publishing tools and free or inexpensive webspace. Some communities - such as Classmates.com - took a different approach by simply having people link to each other via email addresses. In the late 1990s, user profiles became a central feature of social networking sites, allowing users to compile lists of "friends" and search for other users with similar interests. New social networking methods were developed by the end of the 1990s, and many sites began to develop more advanced features for users to find and manage friends.[12] This newer generation of social networking sites began to flourish with the emergence...
Words: 4310 - Pages: 18
...2013 How Technology and Social Media Control Children and Adolescents Incredibly many people look at their phones throughout the day to see if they have a text-message, email, notification from social media, missed calls, or simply just because it has become an addiction. Technology has been changing over the years, and new apps and newer upgrades for electronic devices are being developed. High tech is advancing at an incredible rate. Consider how technology has expanded and evolved in the last ten years. How to manage this new phenomenon was not taught to us as children because it did not exist. Many children and adolescents born in the 20th century cannot imagine their lives without TV, smart phones, computers, tablets, or iPods and many other devices; youth have technology surrounding them. As a result, many of the young people raised in the world of technology do not have the same level of emotional skills of those ten or more years ago. Adolescents and children depend on the Internet more than on themselves. They no longer have the same innovativeness. Obesity and cyber bulling has increased over the years. More suicides have occurred. Those who are exposed to violent video games, movies and TV programs have shown aggression. However, parents do not realize how those devices affect their child’s development. Social media already affects many adults; now think about how strongly modern technology affects toddlers and juveniles. High tech devices are damaging our brains more...
Words: 4206 - Pages: 17
...Cyberbullying Imagine coming home from school and sitting at the computer to get away from the stress of the day. Within a few minutes you're bombarded with messages like "You're ugly…We hate you…Why don't you make us all happy and end your miserable life". Welcome to a world too many teenagers are facing. A world where bullying no longer takes place in the hallways at school or on the way home. Bullying is now more likely to takes place in the murky, often anonymous world of the Internet. About a third (31%) of all students ages 12-14 have been bullied online according to a study by Opinion Research Corporation (2006). This research paper will examine some of the reasons for "cyberbullying," and what may be done about it. What is Cyberbullying? Bill Belsey, President of Bullying.org Canada says, "Cyberbullying involves the use of information and communication technologies such as e-mail, cell phone and pager text messages, instant messaging, defamatory personal Web sites, and defamatory online personal polling Web sites, to support deliberate, repeated, and hostile behavior by an individual or group that is intended to harm others". Nancy Willard, author of "An Educators Guide to Cyberbullying and Cyberthreats" breaks down cyberbullying into the following categories: -Flaming. Online fights using electronic messages with angry or vulgar language. -Harassment. Repeatedly sending nasty, mean, an insulting messages. -Denigration. "Dissing" someone online. Sending or posting...
Words: 4129 - Pages: 17
...Our updated Terms of Use will become effective on May 25, 2012. Find out more. Social networking service From Wikipedia, the free encyclopedia Jump to: navigation, search This article is about the type of service. For the concept of relationships between people, see Social network. For a list of services, see List of social networking websites. A social networking service is an online service, platform, or site that focuses on facilitating the building of social networks or social relations among people who, for example, share interests, activities, backgrounds, or real-life connections. A social network service consists of a representation of each user (often a profile), his/her social links, and a variety of additional services. Most social network services are web-based and provide means for users to interact over the Internet, such as e-mail and instant messaging. Online community services are sometimes considered as a social network service, though in a broader sense, social network service usually means an individual-centered service whereas online community services are group-centered. Social networking sites allow users to share ideas, activities, events, and interests within their individual networks. The main types of social networking services are those that contain category places (such as former school year or classmates), means to connect with friends (usually with self-description pages), and a recommendation system linked to trust. Popular methods now combine...
Words: 4293 - Pages: 18