Internet Essay Examples and Topics

Microsoft Internet Marketing Strategies and Competitive Advantage

Introduction Internet technology inspired a business and commerce revolution not witnessed before. Once used for military purposes, internet communication nowadays provides an important platform for business to business, and business to customer interaction. Company websites have become primary tools where potential customers source for information on particular corporate products before making the actual purchase. Besides, […]

Ethics in Computing

In any given setup, an acceptable code of conduct is always emphasized. Many people and entities have become victims of unethical computer use; this thread comes fro people with ill motives. This vice has lately exposed the internet users to unprecedented mischievous tricks of cyber criminals. The act has created various problems, controversies and is […]

Written Communication & Critical Analysis Marion Enterprise

Problem Statement Data is important to manufacturing companies like Marion Enterprise. It is necessary in critical areas of the business such as human resource, production and the organization’s inventory. Data is useless without consistent updates. The research problem is to investigate office ergonomics of the data entry center in this organization. The other issues that […]

A Case Study of the iTrust Security Issue

Introduction Information management is one of the most important parts of any organization. To ensure continuity of an organization, proper record keeping should be encouraged. In addition, proper documentation and record keeping of events, personnel information among other things in an organization ensures that the entity is assured of accountability (Raggad, 2010). Effective record keeping, […]

Google Does No Evil

Introduction There is an overtly politicization of Google and its functions. Google and its search engine have absolutely changed people’s way of thinking. Google’s search engine has enabled efficiency and immediacy of everything. Whether it is a difficult word, a research topic, a difficult subject, a social or emotional issue, Google’s search engine has answers […]

Security Recommendations for Accounts and Passwords

Introduction Security is a very important issue in computer systems and most organizations dedicate significant resources in securing their systems. Easttom (2006) observes that protecting the system’s perimeters from external attacks and installing antivirus software and anti-spyware does not complete the securing efforts. Proper configuration of the machines is necessary for the network to be […]

Emerging IT-Related Technology’s Ethical Issues

The 21st century is marked by the development of information technology (IT) and the emergence of IT-related technologies. The growth of the internet as a platform for development, coupled with advances in technology has resulted in a slew of ethical dilemmas from individual and organizational levels. Subsequently, organizations have been compelled to ensure a balance […]

Web Design for Selling Self-Published Books

Introduction This is a report about a Web site design for selling self-published books. The site provides various books in various aspects of healthy living. Users can download the e-book at a fee. Many writers have resorted to self-publishing and there is a growing demand for an online business to sell such books. Selling digital […]

Facebook: An Indispensable Social Networking Tool

Facebook has come under attack owing to rising cases of privacy issues and its negative influence on people. Critics argue that Facebook’s management is not doing enough to protect people’s privacy and personal information. In addition, it has been criticized for turning people into machine-like beings. Many young people have turned to Facebook for companionship […]

Spamming Is More Acceptable Way of Sales Practice than Cold Calling

Introduction and thesis statement The digitization of information and communication technologies (ICT), the global extension of ICT-supported networks, services and applications, fixed and mobile phones, the World Wide Web (WWW) and the internet have opened the diverse ways for a wide range of ICT related growth and initiatives (Lagraña 5). The internet has altered the […]

Internal and External Security for The Holiday Inn Online Reservation System

Introduction A hotel reservation system is an online method of booking hotel rooms; the people booking the rooms, who in most cases are travelers and tourists, normally do so by means of an online security system to protect their financial information and other private details. Online reservations have a number of benefits: they save travellers […]

Steam Digital Software Distribution System

Introduction Steam is a digital distribution company that engages in the sale and distribution of online gaming content. The company works by buying online digital gaming content from small software game developers and selling the content through larger business franchises (Valve Corporation, 2013). Steam’s digital marketing platform mainly works through a software distribution system. This […]

PC Networking Troubleshooting

Purpose The aim of this project is to give a guideline on network troubleshooting. The project attempts to illustrate how the guide will help the PC support team comprehend the basics and eliminate the work load for the network administrator, save time and money for remote campuses. In essence, the PC support technician will be […]

Privacy Policy: An Organizational Comparison

Introduction Businesses are conventionally required to reassure their clientele how they will use the personal information that clients are expected to disclose to the enterprise at the beginning of their association. This is the essence of privacy policy. With the advent of the information age and the endless advancement of informational technology, it has become […]

E-mail and IM Delivery Solution Analysis from Team Discussion

Introduction Summary Currently, most organizations get into various applications through which they get to deliver or even obtain information from their clients and supply information to stakeholders who have direct or indirect contacts with the organization in question. Internal stakeholders are quite crucial to an organization as quite a significant proportion of them are the […]

Web Presence Creation

Introduction To drive the position about the relevance of a web presence home let us consider purchases of vehicles in the US prior to 1995 (Schneider, 2009). During this era the process of buying a car was often snared by aggressive sales personnel with ‘no haggling’ policies taking the pole position. The result was many […]

Project Color™ by The Home Depot

Application Overview Project Color™ The application helps the user to complete the paint job without any additional efforts. According to the description, it “allows you to see, match, or find the perfect color for your interior or exterior paint or stain project” (“Project Color™” par. 1). Key features of the app and overall impression Project Color™ […]

Concept of Steganography in Society

Introduction Cheddad, Condell, Curran and Kevitt (2010) allege, “Steganography refers to the art of covered or hidden writing” (p. 752). The primary objective of steganography is surreptitious communication to conceal a message from unauthorized parties. Steganography is different from cryptography, which is an art of hidden writing that aims at ensuring that a third party […]

Salesforce Solutions

Abstract This article seeks to outline viable backup solutions provided for Salesforce.com. It also considers a ‘Practicable Backup Plan’ and employs it to evaluate the backup strategies with intent to confirm if they are credible. Over and above that, the paper lists strategic steps on how to assimilate Salesforce Backup frameworks into micro-organisations for data […]

“Web site credibility: Why do people believe what they believe?” by Marie Iding, Martha Crosby, Brent Auernheimer and Barbara Klemm

The Internet has already entered the life of people. Having a great amount of different information, it supplies people with knowledge in different spheres. It is not necessary nowadays to go to the library or to look for some information in books. The only thing people should do is to type a question and wait […]

Observance, Privacy and Law

It is important for social media users to realize that social networks are not fully concerned with the probability of misuse of their personal information. Social media sites release personal information to the market without the permission of users. They use the personal information of their customers without their consent, which is illegal as stipulated […]

Internet Filtering: Debating the Positives & Negatives

Presently, it is evident that the Internet has achieved momentous growth and now surround children and teenagers in the modern household (Livingstone & Helsper 2008), but concerns about unhealthy use of this invention continue to hit world headlines with heightened vigour. These concerns have elicited debate on the viability of Internet filtering to not only […]

Torrents / File Sharing Defend or Argue Against

Internet has created many opportunities and abilities for people to communicate and share information. File sharing is now a popular way to download files from all over the world. Many people believe it to be a violation of legal rights, as it allows downloading and watching movies, listening to music, sharing games and use of […]

Censorship on the Internet

Abstract The internet was founded on the philosophy of openness and its inventors hoped to provide a means through which information could be shared freely among participants. However, it has grown to become a heavily restricted medium with some form of censorship being implemented everywhere and severe censorship in a few places. This paper highlights […]

Internet Filtering

Many people fear the idea of filtering for the fact that it can be used to withhold vital information necessary for gauging the accountability of governments. However, that is not the case, since filtering the internet helps in harboring criminal activities. This is because security is important to everyone and every government has the responsibility […]

History of Cyber Terrorism

Introduction This research paper will discuss cyber terrorism, how it is created, the threats it poses in the society, and the best ways internet users can avoid it. This paper will also include some of the most famous cyber terrorism attacks. Terrorism refers to the calculated use of violence against civilians in order to attain […]

Can the Internet Provide a Forum for Rational Political Debate?

Introduction The Internet remains one of mankind’s most remarkable inventions in history, particularly in the area of communication. It probably ranks as high as the discovery of television and radio, both of which were invented much earlier. As people continue to marvel at the great capability of the Internet due to its extensive reach that […]

IT Security in Google

The Google’s New Privacy Policy is just an attempt to ensure high-level security of an individual’s data and improvement in the search field. For instance, the data searches on Google are linked to other websites such as You Tube. This only shows that Google is tracking people’s activities over the internet. At present, people share […]

Cyber attacks: the UK and China

Introduction Background information In the 21st century, most countries are focused towards becoming a part of the global economy. Consequently, one of the aspects that governments are concerned about touches on world trade. In a bid to position themselves in the global market, governments are increasingly investing in logistic and supply chain infrastructures such as […]

Analysis: Domain Name System (DNS) and DNS tunneling

Abstract This paper provides a detailed discussion of Domain Name System (DNS) and DNS tunneling including the DNS tunneling framework, and DNS encoding mechanisms. Furthermore, works on the evaluation of DNS tunneling tools, and tunneling through Wi-Fi are discussed in detail. Finally,clear presentations of negative and positive aspects on DNS tunneling are detailed in the […]

Ethical Issues Surrounding Social Networking Sites

Introduction The ways in which people communicate and interact with each other have changed greatly with the emergence of new technology. Cyberspace is fast becoming the new way through which people meet and interact with each other and even share details that are personal or otherwise. Over the last couple of years, social networks have […]

Techniques for Detecting, Preventing or Mitigating DoS or Distributed DoS attacks

Introduction The internet has become part of the daily lives of people throughout the world. Some services such as banking, transportation, and healthcare are heavily dependent on it. According to Patrikakis, Masikos, and Zouraraki (2004), the internet is an intricate system of computers that are linked with the intention of creating an easy communication platform. […]

Inspiring Creative Webdesign

Introduction Introductory Statements This is a report that seeks to make recommendation relating to a website. The report will consider Purdue University. In this light, Purdue University Student Association has designed a website. The website has been designed to meet the demands of student organization. However, the present website is unsatisfactory. Therefore, the student body […]

Legal and Ethical Issues in IT

The modern world depends on technology in a major way. The dominance of technology in day-to-day activities has made it necessary for stakeholders to formulate rules that govern this technology. Advancements in information technology come with various legal and ethical issues that are relevant to the current environment. When these issues are adequately addressed, they […]

The History of Internet and Internet Security

Introduction The internet has turn out to be part of our lives that is easy to forget the inventors who had a vision of what worldwide networking could grow to be and toiled to make it ensue. According to a research done, the internet, which started as a minuscule and restricted community, is now diverse […]

Innovative & Emerging Technologies: Leveraging Social Media

Introduction to the Readings There are many ways of how technologies can be used to improve the quality of a human life. People believe that the concept of technology should be associated with something new. However, the idea of the technological worth is as old as a human society because technology refers to a kind […]

The Internet as the Heart of Modern Civilization

Introduction Modern technologies have led to the development of the internet. The internet is currently important because it has resulted in enormous changes in the way human beings exchange ideas, communicate, shop, and even work. The internet has made the world a very small village thereby promoting economic development and information broadcasting. The use of […]

Who Should be Allowed to Filter the Internet?

Filtering, also known as screening, censoring and blocking, is the permission or restriction to release or distribute items based on a laid down criteria (Kluver & Banerjee, 2005). Content filters try to limit access to internet content by scanning pixels. Filtering is typically done by use of technological tools, software or hardware, which are intended […]

Interconnecting the Network of Networks

Introduction The global telecommunications trend has witnessed a gradual shift from the traditional practice where national telecommunications service providers formed a monopoly both on the international and national markets. This traditional system is referred to as “network of networks”. The modern practice, however, has witnessed change whereby system integrators have been formed to offer services […]

Network management: principles and practice

Introduction The need for saving time and providing learning materials for the organization’s members has necessitate the adoption of an online learning system that will enable members to remotely study without necessarily gathering in central location. They system will be developed by a yet to be identified technology firm that will work closely with the […]

Privacy and Security in Social Media

Introduction Over the past century, the invention of the computer and the subsequent creation of the internet have been among the major accomplishments in terms of communication advancements. These two entities have been used extensively to revolutionize the world in regard to information processing and communication strategies. One of the areas that have recorded significant […]

Wireless Communication Technologies and Issues

Wireless communication is among the recent technologies that have been developed. According to Deal (2008), wireless network is computer network that is connected without the use of cables. It has made internet accessible to individuals in all locations hence the problem of internet access has been solved. On the other hand, wired network has limitations […]

Social media and ethics

Executive Summary This report presents a synthetic study on ethical issues in social media. Social media is an emerging media that has revolutionized the sharing of information taking it to a different level. It is being deployed in various areas to bring unfathomable profits. One of the major areas where it has being used is […]

Cryptography

Introduction Cryptography signifies that which is concealed or hidden. It is writing or a description in a brief manner that secretly conveys a particular intelligence or words that we may wish to communicate. Cryptography may be used as a form of clandestine communication. The art of cryptography is a legitimate form of communication that is […]

Conceptual Exegesis of Web Production: A Cocktail Website

Introduction Media is considered to be one of the most crucial issues of current culture. There are a number of people from different parts of the world, who cannot imagine this life without exciting media projects. As a rule, media production aims at entertaining, informing, exchanging of services, etc. People benefit a lot from media […]

The relationship between form and content

The significance of web publishing platform The relationship between form and content has been affected by the advent of the Internet and the growth of Web publishing platforms. The Internet tool has grown to include almost all educational, informative and entertainment resources. With the spread of extremely high-speed Internet connections and programs, the tool provides […]

Qualitative Data Analysis Exercise

A mobile phone company employee took part in an interview on October 20, 2008 at Geelong in response to the research project: excessive mobile phone bills, young people and the relevant corporate social responsibility of the telecommunications industry in Australia. The paper analyses qualitatively the information provided by the interviewee. Therefore, based on the analysis, […]

Interconnection Between the Lives of Human Beings and the Internet

Introduction The interconnection between the lives of human beings and the internet is not only complex and intertwined but also a cause of concern today. With easy access to information, questions are being raised on the impact of this trend and whether the moral fabric of the society is under any threat. This paper addresses […]

Summary of the Article: “Stalking the Wily Hacker” by Clifford Stoll

Communication is a central pillar driving organizational performance at various levels. It holds the capacity to paralyze or propel execution of activities as it facilitates conveyance of basic information that appertains to enhancing productivity. Evidently, information, understanding and awareness of diverse issues form the lifeblood of corporations with strong growth aspirations. Communication contributes to exemplary […]

Data Communication and Networking

At present computers exist in most offices and several homes. Hence there is a call for sharing information and programs amid diverse computers. With the development of data communication services the interaction amid computers has augmented, therefore extending the supremacy of computers outside the computer room. At present a user operating from one place can […]

Web and Networking: Trends in the convergence of wireless networks

Network convergence or media convergence simply refers to a process whereby numerous modes of communication are integrated into a single network or medium, to offer convenience and flexibility of communication between various infrastructures. In other words, this refers to the integration of various media components into common interfaces within single components or devices, for efficient […]

Ethicality in Information Technology

Though the development of information technology gives capabilities to manipulate information, it has consequently led to legal battles and ethical issues to individuals and companies. To avoid these are designed significant frameworks that consider issues of morality as pertaining to privacy of information, environmental aspects; how agents should carry themselves in the info-sphere, information life-cycle; […]

Impact Digitization and Convergence on Internet

Introduction The internet is the most recent fundamental media in the contemporary society, which entirely relies on web browsers. The establishment of the web in the year 1989 was a triggered by the massive development of social sciences, as a result of increased urge to share accumulated knowledge among scholars and researchers. According to Baym […]

The Internet Radio: A Critical Discussion

The rapid convergence of technology over the last decade or so has, in broad yet subtle ways, changed the paradigm of radio broadcasting. Today, more than ever before, radio broadcasts are progressively more available not only from dedicated terrestrial platforms employing the traditional AM and FM bandwidth, but also from a multiplicity of satellite, cable […]

The Impact of the Internet in Culture and Daily Habits

Ever since its popularization in the mid-1990s the internet has brought about a huge impact on our everyday lives and has already become part of our culture. It has been a primary source of information, communication, business opportunities and entertainment thus it has continued to grown in the modern era of science and technology (clickz.com). […]

ITM501 SLP 1

A web browser is a piece of software that requests, decodes and then presents the files that constitute internet pages. “Without doubt Microsoft’s Internet Explorer and Mozilla’s Firefox are by far the frequently used browsers, but there are most certainly at least 50 to 70 others that are readily available for public use, and nearly […]

Ethic and Contemporary Issues in Multimedia and IT

Professional code of conduct as well as ethics is important in an individual’s way of live and work. This is of great importance to the world of technology that includes multimedia and information technology sectors. The Multimedia and IT field in the recent years have shown great improvement due to advancement in internet through the […]

How could Wireless Communications be made more secure?

Introduction Wireless communication is by far the most widely spread and fastest growing sector of the communication industry. It has mesmerized our civilization to a great extent. According to Brian Fling, “The telephone is undoubtedly one of the greatest inventions of mankind. It revolutionized communications, enabling us to reach across great distances and share thoughts, […]

Debate about Real ID in the New Media

Certainly, the urgency of the debate of anonymity versus real ID is on the current agenda because, on the one hand, introducing real names online makes users more responsible for posting comments and photos. On the other hand, disclosing real names can threaten the privacy of the user, causing problems in a real life. Therefore, […]

Advantages of Anonymity in New Media World

Anonymity services have become quite popular with the emergence of the World Wide Web. In particular, anonymity software services allow users to conceal their real names. Concealing real information on the Internet because it is helpful for users who are willing to know that the site they surf remain anonymous for the Internet provider. Such […]

Push Versus Pull Technology

The internet is a very complex communication platform. The current form of the internet is the product of multiple innovations from various people. The internet still has many technological gaps despite its current complex form. Therefore, the number of business applications as well as the tools and protocols that guide the operations of the internet […]

Internet Connections through LED Bulbs and Light Waves (Li-Fi)

Design in relation to technology refers to the study involving the construction of man-made objects used to solve human needs. The devices designed must always meet the set scientific standards. The Li-Fi project is a design that was done by a group of Chinese scientists who succeeded to produce internet signals which were sent exclusively […]

New media technologies, ICTs, convergence and digitisation

Introduction The modern economic development is largely dependent on the investments in new media technologies. New media technologies, ICTs, convergence, and digitisation are seen as the new engines of economic growth for many countries from the perspectives of labour transactions and trade. The digitisation together with technological convergence era have marked a new era for […]

Click, and Facebook revises privacy by Tim Dick

The text is Click, and Facebook revises privacy by Tim Dick. The article discusses the issue of privacy on the Internet taking Facebook as a bright example of how your interests and activity can be revealed to other users of this global social network. According to Veer (2010), privacy concerns exist among all people that […]

Privacy on the Internet: A Critical Analysis

Introduction Today, more than ever before, the Internet has become an important constituent of our every day routine as more and more individuals use countless services offered on the World Wide Web. Indeed, extant literature demonstrates that the Internet has over the years evolved from a basic communication application to an interconnected highway of information […]

IT and Society Ethical Debates Concerning Information Privacy

With the advent of a XXI century technological breakthrough, people seem to have another bunch of ethical issues to face. On the one hand, the significance of progress cannot be denied, and the invention of Web 2.0 is not to be underrated. Looking back at the times when there was no Internet, one can hardly […]

Extranet and B2B E-Commerce for Business

Executive Summary Top Breadz, a Sydney-based industrial bread and pastry manufacturer assigned our team to investigate how Business–to–Business (B2B) e-commerce solutions might benefit the company to reach its goals, namely, to increase sales by the retail outlets, to increase revenues by entering new markets or increasing market share, and to reduce operating costs. In regards […]

Internet security policy

Introduction Since its inception, the Internet has experienced threats in its underlying communications network and nodes, protocols, network administration as well as host systems. These threats have repeatedly been located in the security mechanisms of the hosts (Doddrell, 1995, Highland, 1996), examples being the capacity to obtain unauthorized private access, and the aptitude to gain […]

Legal Aspect of IT

Ethical Aspect of Using Information on the Internet One of the ethical dilemmas that the internet users face is the need to protect the information received from unauthorised people. Mostly, comments posted online could threaten personal security or reputation, a situation that creates the need to protect the identity of the person disclosing such information […]

Ethical and Social Implications of Human Dependency on Online Social Networking

As witnessed in the recent years, online social networking (herein referred to as OSN), which takes place on such network sites as Twitter, LinkedIn, Facebook and MySpace, have emerged as a major aspect of contemporary human society. Out of the various social networking sites available today, Facebook continues to maintain its position at the top. […]

IT for Users in Organizations

Introduction Advances in IT have revolutionized the way business is conducted in many organizations. Producers and consumers can now access a variety of goods and services from anywhere in the world without the constraints of geographical locations or time zones( Leavilt, 2009). One Of the major legal issues stemming from application of Information and technology […]

Cheating In the Internet

Introduction Internet cheating can take many forms due to the advanced technology. The presence of ecommerce has increased the number of fraudulent deals in the internet. Prior to establishment and utilization of internet technology for commercial purposes, cheating on the internet involved social crime. However, with the increasing number of transactions in the internet, fraudsters […]

Social Aspects of Information Technology

Executive Summary This is part one of a report that was prepared with reference to week eight of the activity that involved creating a social network. The activity was centered on the marketing of a clothing fashion brand through a group page created on Facebook. This report details the step-by-step procedure of creating the social […]

Telecommunication Project: Bluetooth

Bluetooth is a new technology, which is being adopted at a global scale in a rapid rate. This technology provides innovative and unique services to groups of workers or professional workers while using portable devices. As such, the rapid developments in this technology will lead to a replacement of clumsy wires and ensure that automatic […]

The Role of the Internet in Business

The introduction Some basic points While discussing the role of the Internet in business, some fundamentals on computer use must be considered. First of all, it is necessary to point out that computer technologies have inevitably changed people’s mode of life. In our days the new technological devices provide people with numerous opportunities. The thesis […]

Efficiency and Collaboration

Introduction It is common knowledge that information is power. This arises due to the fact that access to the right information at the right time is critical for making business decisions (Stair & Reynolds, 2011). For this reason this information needs to be delivered to the right person at the right time with the minimal […]

Technology and Life Standard

The twentieth century shall be remembered for the emergence of various technological breakthroughs that have had a dramatic impact on the social, political, and economic sectors. Although it has not been an easy ride, different stakeholders have done a commendable job in helping to achieve these technological achievements. Some of the major technological achievements of […]

Effects of Internet use in Society

The internet has both positive and negative effects on society. It has an impact on adults, teenagers, children and the elderly. One needs to understand how the internet affects education, economy, socialization and entertainment in society. The internet has an impact on how people work, communicate, learn and trade. Therefore, the internet creates a learned […]

Websites Mock Up

The development of the innovative technologies has changed the marketing strategies. There is hardly a company which does not offer its services via the Internet. Additionally, many people understand that the Internet is the convenient place where everything may be easily found. However, it is important to organize the Internet website in the correct order […]

High Performance Network

The network The current network comprising of category 5 cable could essentially be enhanced through technical upgrading of the infrastructure. Through the installation of a different cable quality, the entire system could become upgraded and increase the network speed. The system upgrade could include replacing the current cables with enhanced versions of network cables. Category […]

Microsoft Share Point

Introduction Microsoft SharePoint has done a lot in improving the efficiency of businesses. Before its introduction into the business industry, business people wasted a lot of resources hiring people to manage their information. Getting these services cost the businesses a lot of money as they needed to hire many people. The reason why the businesses […]

Current and emerging technology in the Internet Technology

Abstract Mobile computing provides significant benefits for organizations that choose to integrate the technology into their fixed organizational information system. This is necessitated through the combination of communication systems, software, and portable computer hardware which are interconnected with non mobile organizational systems distanced from the fixed workplace (Yuliang, 1998). Being a resourceful technology can be […]

The future of large face-to-face meetings with regards to information technology

The field of information technology is one of the fastest growing innovations in the world. Among the many innovations is the advent of the internet, which has brought many changes in to our society today among them being virtual-meeting technologies, digital document processing and telecommunication advances. New technology tools such as the email, intranet, fax, […]

OPSEC and Site Security

OPSEC is the acronym for operations security, an exercise that secures vital defense data from potential enemy units and whether this information can compromise own position hence leading to serious breaches in security. Consequently, OPSEC establishes countermeasures to prevent such occurrences thus protecting vital US overseas or domestic operations and security. To guard against breaches […]

The Differences between the Chinese Guanxi (Connections) and Australian’s

Introduction Guanxi is Chinese word that means relationships, any kind of relationships. In the business culture, it simply refers to the network relationships that exist among business partners that cooperate and support each other. Guanxi networks are borne of the Chinese mentality that could be understood as “you scratch my back, I’ll scratch yours.” 1 […]

Proposal for Car Rental Software

Introduction In Abu Dhabi, like in most other developed cities, car rental is a thriving business. With modernization, technology has found its way into the business, especially in the form of computer usage in the assignment of cars to clients and in the tracking of the vehicles when the hand-over is complete. This proposal is […]

New Media Technologies and Its Role in the Perception of the Internet

Introduction The way consumers access information, news and communicate has been greatly changed by the emergence of web 2.0 technologies which incorporate user-generated content and streamlined web design. New media technologies have enhanced users’ active role in communication and information and changed people’s perception of the internet. The new media involve the convergence of media […]

The Impact of the National Broadband Network in Australia

Global digital economy is a rapidly growing arena in the 21st century. To foster global competitiveness, nations have ventured into ICT. Several countries have prioritized the establishment of a wide ICT infrastructure to give comparative global advantage (Curtis 2003). Investors have been agitating the laying of the infrastructure; they argue that it will induce more […]

Telecom Services Providers Industry in UK

Introduction The telecom industry in UK provides information and communication services such as voice and data delivery. The industry has realized significant growth in the last three decades and is currently at its maturity stage (Streel, 2010, pp. 210-260). The industry is completely deregulated following the implementation of the 2003 Communication Act. Consequently, many firms […]

Internet should be free from all government control

Introduction The debate on whether governments should censor internet usage has raised much criticism as it has drawn support. The role of government, as well as government agencies, has come under spotlight in the recent past over what has been seen as infringement of freedom of speech by censoring internet content (Reporters without Borders 4). […]

Information technology in people’s lives

The 20th century saw the emergence of the Information Age. Beginning in the late 1980s information technology (IT) began to dominate the lives of people, especially those in the Western world. This was made possible by two major technological breakthroughs: the invention of the personal computer and the creation of the Internet or World-Wide-Web. These […]

Comparison between Google and Wolfram Alpha

Introduction The year 2011 marks the eleventh year in which the number of web pages passed the two billion mark (Glossbrenner & Glossbrenner ix). There are still many millions of web pages that are being created on a daily basis. The availability of many web pages creates a complex situation whereby one may find themselves […]

Internet Files Sharing

Introduction File sharing over the internet ought to be free. File sharing over the internet encompasses distribution and/or provision of access to the information that has been digitally stored. Examples include e-books, documents, multimedia, and computer programs. The file sharing is usually done through computer networks, peer-to-peer networking, hyperlinked documents that are web-based and other […]

Management of Information Security and Control

Abstract Information is a very important ingredient of any organization. This is because no business can operate without it. In the current business environment whereby the computer has interconnected businesses and transactions are no longer carried out through paperwork, information system has become a very important part of an organization. Therefore the management of information […]

A Discussion on Net Neutrality

At its simplest, net neutrality is the principle that internet service providers and governments may not discriminate between diverse types of content, sites, platforms, and other kinds of applications that are accessed via online protocols. As such, the principle insinuates that no restrictions should be placed between users by either the government or internet providers, […]

The Internet is a Powerful Force

In Nicholas Carr’s book, What the internet is doing to our brains, he describes the impact the internet has brought to our capacity to concentrate and think deeply. Carr simply suggests that the internet has changed the way we use our working memory. His argument was that we rely too much on the superficial internet […]

Ethical Issues in Network Regulation

People always care about their privacy. They write love postcards, discuss various themes through phones and e-mail, plan their lives, criticize some things and some people, and truly believe that their ideas and their thoughts cannot be eavesdropped by someone. Adams, Bocher, and Gordon say that in the United States, privacy protection is a somewhat […]

Privacy and Safety on the Internet

This paper deals with the issue of safeguarding privacy on the internet. It outlines safety policies to follow when disseminating or allowing personal private data to be used. Further, the paper the paper considers ethical principles or conduct individuals should develop in order to promote their personal security and their information on the internet. In […]

Improper Internet Use at Work

Introduction In today’s fast paced environment, Internet service has become an integral part of an organization. Access to internet is given to all the employees, some use it properly but some try to take advantage of this facility, leading to improper use of internet. Use of Internet by employees is allowed and encouraged where in […]

BlackBerry Vs Radio

Thesis Statement This paper will review the ideas of other authors on multitasking when using given technological devices. It will be based on observations drawn from how people try to switch from different technological devices either to keep in touch with peers, listen to music or follow certain programs on TV. Due to changes in […]