Computers And The Internet Essays (Examples)

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 7 (2040 words) Sources: 5 Document Type:Research Paper Document #:12891464

… numerous risks or threats to the owner/possessor of the information. Cyber espionage is carried out through various exploitation methods or techniques on individual computers, networks or the internet. Some of these techniques or methods include the use of malicious software and computer viruses like Trojan horses and spyware. This practice basically ……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Technocrime And Insider Trading

Pages: 1 (348 words) Sources: 2 Document Type:question answer Document #:15149634

… is technocrime and what are its principal defining elements?
Technocrime is defined as a type of crime which is not simply facilitated by computers and technology, but which could only take place through the existence of computers. Examples include hacking into computer system to embezzle money, pranks such as malware and viruses, seizing hold of computer systems through ransomware for ……

References

Reference

Insider trading. (2019). Cornell Law School Legal Information Institute. Retrieved from:

https://www.law.cornell.edu/wex/insider_trading

Kelly, M. (2030). Technocrime: Forms and examples. Study.com. Retrieved from:

 https://study.com/academy/lesson/technocrime-forms-examples.html 

Studyspark

Study Document Study Document

Virtual Learning Solutions For English As Second Language Students

Pages: 11 (3230 words) Sources: 10 Document Type:Research Paper Document #:70086670

… learning experience.
Technology and ESLs
Virtual worlds are not the only way for students to gain from technology. Simply being able to use computers in the classroom can help ESLs (Ybarra & Green, 2013). Computer assisted instruction has been found to enhance the learning experience by giving … by giving students the opportunity to practice in a more engaging way. Given the fact that most learners today are used to having computers in their lives, they enjoy being given the autonomy, responsibility and freedom to have computers as part of their basic education in the classroom. Beetham and Sharpe (2013) show that it improves their scores across the board, too: … to engage with a lesson at their own pace, increases their motivation to engage as an active learner since most students enjoy using computers, and it broadens their access to learning materials (Keengwe & Hussein, 2014). They are……

References

References

Alvarez-Marinelli, H., Blanco, M., Lara-Alecio, R., Irby, B. J., Tong, F., Stanley, K., & Fan, Y. (2016). Computer assisted English language learning in Costa Rican elementary schools: an experimental study. Computer Assisted Language Learning, 29(1), 103-126.

Beetham, H., & Sharpe, R. (Eds.). (2013). Rethinking pedagogy for a digital age: Designing for 21st century learning. NY: Routledge.

Cassady, J. C., Smith, L. L., & Thomas, C. L. (2017). Supporting emergent literacy for English language learners with computer?assisted instruction. Journal of Research in Reading.

Jiang, H., Tang, M., Peng, X., & Liu, X. (2018). Learning design and technology through social networks for high school students in China. International Journal of Technology and Design Education, 28(1), 189-206.

Kahai, S. S., Carroll, E., & Jestice, R. (2007). Team collaboration in virtual worlds. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 38(4), 61-68.

Kasapo?lu-Akyol, P. (2010). Using educational technology tools to improve language and communication skills of ESL students. Novitas-Royal, 4(2).

Meskill, G., & Mossop, J. (2003). Technologies use with learners of ESL in New Your State: Preliminary report. Retrieved from  https://www.albany.edu/lap/Papers/technology%20use.htm 

Park, J. Y. (2011). Design education online: Learning delivery and evaluation. International Journal of Art & Design Education, 30(2), 176-187.

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 16 (4895 words) Sources: 24 Document Type:Case Study Document #:27491269

… and in modern warfare. Cyberspace has developed into a crucial component of modern warfare as adversaries continue to exploit the potential of the internet to carry out their activities. Cyberspace is used in the operational level and strategic level of modern warfare. At the strategic level, cyberspace … involves illegitimate possession of personal, sensitive, classified or proprietary information. Cyber espionage is carried out through various exploitation methods or techniques on individual computers, networks or the internet. It incorporates intentional activities to infiltrate or penetrate computer systems/networks used by a rival to obtain information within or transmitted through these networks … adversaries intercept what is said and planned. Such surveillance always result in processing and exploitation of huge volumes of communications transmitted on the internet. Therefore, electronic surveillance has provided an avenue for transformation of conventional state-sponsored surveillance and espionage. [4: Ibid., 3]
Lotrionte (2015) provide a different ……

References

Bibliography

Ablon, L. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” RAND Corporation, March 2018.  https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf 

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Manufacturing Systems In Automotive Industry

Pages: 12 (3647 words) Sources: 16 Document Type:Research Paper Document #:87931381

… to guarantee that the equipment continues operating. Also, automation within the automotive alludes to the usage of control systems, for instance, robotics and computers, as well as information technologies for dealing with various procedures and machinery within an industry to supplant a human being (Groover, 2007).
In ……

References

References

Boone, L. E., Kurtz, D. L., & Khan, M. H. (2009). Contemporary business. Hoboken: John Wiley & Sons.

Chui, M., George, K., Manyika, J., Miremadi, M. (September 2017). Human + machine: A new era of automation in manufacturing. McKinsey & Company.

Deng, W., Luo, Q. (2012). Advanced Technology for Manufacturing Systems and Industry. New York: Pearson.

Groover, M. P. (2007). Fundamentals of modern manufacturing: materials processes, and systems. John Wiley & Sons.

HR Cloud. (2020). HR Automation - The Future of Human Resource Process Management. Retrieved from:  https://kissflow.com/hr-process/ 

Joshi, V., Adhikari, M. S., Patel, R., Singh, R., Gehlot, A. (2018). Industrial Automation: Learn the current and leading-edge research on SCADA Automation. New Delhi: Pearson.

Krar, S. F., & Gill, A. (2003). Exploring advanced manufacturing technologies. Industrial Press, Inc.

Ladet, P., & Vernadat, F. (Eds.). (2013). Integrated manufacturing systems engineering. Springer.

Studyspark

Study Document Study Document

Shortages Of Health Care Providers

Pages: 7 (2037 words) Sources: 8 Document Type:Essay Document #:32789324

… health care providers and improve access to care by allowing care providers to communicate with and monitor patients from long distances using the internet. Instead of having patients come in to facilities and endure long wait times and lead to facilities being overrun, telemedicine can eliminate space … system overall, the more of an impact individual nurses can have on a greater extent of the population. Through telemedicine anyone with an internet connection can gain access to the care they require, can be monitored, or can meet with health care providers to go over options, ……

References

References

Clemmer, T. P. (1995). The role of medical informatics in telemedicine. Journal of Medical Systems, 19(1), 47-58.

Demiris, G. (2003). Integration of telemedicine in graduate medical informatics education. Journal of the American Medical Informatics Association, 10(4), 310-314.

Foster, M., & Sethares, K. (2017). Current strategies to implement informatics into the nursing curriculum: an integrative review. J Nurs Inform, 21(3).

Haddad, L. M., & Toney-Butler, T. J. (2019). Nursing shortage. In StatPearls [Internet]. StatPearls Publishing.

Hasbrouck, L. (2016). Strengthening local health department informatics capacity through advocacy, education, and workforce development. Journal of Public Health Management and Practice, 22(Suppl 6), S3.

IOM. (2010). The future of nursing. Retrieved from  http://nacns.org/wp-content/uploads/2016/11/5-IOM-Report.pdf 

O’Brien, J. (2003). How nurse practitioners obtained provider status: Lessons for pharmacists. American Journal of Health-System Pharmacy, 60(22), 2301-2307.

Snavely, T. M. (2016). A brief economic analysis of the looming nursing shortage in the United States. Nursing Economics, 34(2), 98-101.

Studyspark

Study Document Study Document

Future Changes And Challenges Within The Elderly Population

Pages: 8 (2481 words) Sources: 6 Document Type:Term Paper Document #:55013992

… like every other population in the world today, can benefit from changes that have occurred in the world thanks to technological revolutions. The internet, for instance, has allowed a virtual world to emerge that rivals the real world in terms of social opportunities. News spreads instantly thanks … has allowed a virtual world to emerge that rivals the real world in terms of social opportunities. News spreads instantly thanks to the internet, and people can communicate with one another and retrieve information more easily today than at any point in human history. Technology can thus ……

References

References

Aging and Disability Services. (2013). Promote Healthy Aging. Retrieved from http://www.agingkingcounty.org/healthy_aging.htm 

Baker, T. A. (2014). The importance of aging studies: Understanding the influence of diversity and culture. Age Culture Humanities: An Interdisciplinary Journal (1). Retrieved from  http://ageculturehumanities.org/WP/the-importance-of-aging-studies-understanding-the-influence-of-diversity-and-culture/ 

Banks, M. R., Willoughby, L. M., & Banks, W. A. (2008). Animal-assisted therapy and loneliness in nursing homes: use of robotic versus living dogs. Journal of the American Medical Directors Association, 9(3), 173-177.

Brojeni, S. A., Ilali, E. S., Taraghi, Z., & Mousavinasab, N. (2019). Lifestyle and its related factors in elderly. Journal of Nursing and Midwifery Sciences, 6(1), 32.

Cornwell, E. Y., & Waite, L. J. (2009). Measuring social isolation among older adults using multiple indicators from the NSHAP study. Journals of Gerontology Series B: Psychological Sciences and Social Sciences, 64(suppl_1), i38-i46.

Landeiro, F., Barrows, P., Musson, E. N., Gray, A. M., & Leal, J. (2017). Reducing social isolation and loneliness in older people: a systematic review protocol. BMJ Open, 7(5), e013778.

Liu, S. J., Lin, C. J., Chen, Y. M., & Huang, X. Y. (2007). The effects of reminiscence group therapy on self-esteem, depression, loneliness and life satisfaction of elderly people living alone. Mid-Taiwan Journal of Medicine, 12(3), 133-142.

Moore, E. G., & Rosenberg, M. W. (2001). Canada's elderly population: the challenges of diversity. Canadian Geographer, 45(1), 145.

Studyspark

Study Document Study Document

Social Media And Its Effects On Girls

Pages: 12 (3470 words) Sources: 3 Document Type:Essay Document #:56099073

… no debate that such usage has increased significantly over the past several years. Indeed, according to the most recent estimates, the number of internet users increased by nearly 300 million new users (an increase of about 7%) in January 2020 compared to a January 2019, bringing the … about 7%) in January 2020 compared to a January 2019, bringing the global total to around 4.54 billion people (Kemp 2020). Of these internet users, approximately 3.80 billion are also regular social media users and these numbers continue to grow (Kemp).
Throughout the mid-20th century, American parents … comparison to the amount of time that the average young person spends online at present. In fact, current estimates indicate that the average internet user already spends nearly 7 full hours online each day, meaning that young people in the United States are investing about 100 days … online (Kemp). More to the……

References

Works Cited

Ali, S. (2018). “Social Media Usage among Teenage Girls in Rawalpindi and Islamabad.” Global Media Journal, vol. 16, p. 31.

Chukwuere, Joshua Ebere and Chukwuere, Precious. (2017, December). Cyberbullying of female students: An exploration of literature study. Gender & Behaviour, vol. 13, no. 4, pp. 9983-9991.

Goodwin, Robin, Palgi,Yuval, Osnat, Lavenda, Yaira, Hamama-Raz and Ben-Ezra, Menachem. (2015), “Association between Media Use, Acute Stress Disorder and Psychological Distress.” Psychotherapy and Psychosomatics, vol. 84, no. 4, pp. 253-254

Granello, Paul F. and Zyromski, Brett. (2018, September-August). “Developing a Comprehensive School Suicide Prevention Program.” Professional School Counseling, vol. 22, no. 1, pp. 37-42.

Hutchinson, Tracy S. (2020, April 19). Ten things mentally strong people do during a pandemic. Psychology Today. [online] available: https://www.psychologytoday.com/us/blog/the-pulse-mental-health/202004/10-things-mentally-strong-people-do-during-pandemic.

Kemp. Simon. (2020, January). “Digital 2020.” We Are Social. [online] available: https://wearesocial.com/blog/2020/01/digital-2020-3-8-billion-people-use-social-media.

Redden, Crystal V. (2018, December). “The Media\\\\\\\\\\\\'s Influence on Female Relational Aggression and Its Implications for Schools.” Canadian Journal of Education, vol. 36, no. 4, pp. 374-381.

Reinberg, Steven. (2019, August 14). “Here\\\\\\\\\\\\'s How Too Much Social Media Can Harm Girls.” WebMD. [online] available: https://www.webmd.com/mental-health/news/20190814/ heres-how-too-much-social-media-can-harm-girls#1.

Studyspark

Study Document Study Document

The Transformation Of The US Into Oceania

Pages: 9 (2807 words) Sources: 7 Document Type:Essay Document #:33502677

… use it in ways that are violative of the spirit if not the letter of the law, and the proliferation of the so-called internet of Things has introduced yet more ways that individual privacy can be violated. The purpose of this paper is to provide a review … privacy. For instance, one industry analyst emphasizes that, “With developments in technological security capability, employers can now monitor their employees’ activity on their computers and other company-provided electronic devices” (Ethical issues facing businesses, 2020, para. 3). In fact, fully two-thirds (66%) of American companies currently monitor their … other company-provided electronic devices” (Ethical issues facing businesses, 2020, para. 3). In fact, fully two-thirds (66%) of American companies currently monitor their employees internet activity, and…[break]…a blind eye to violations of corporate policy or efforts by consumers or other companies to defraud them, but it is to ……

References

References

Black’s law dictionary. (1990). St. Paul, MN: West Publishing Company.

Cantor, M. D. (2006, Summer). No information about me without me: Technology, privacy, and home monitoring. Generations, 30(2), 49-55.

Ethical issues facing businesses. (2020). Florida Tech. Retrieved from https://www.floridatech online.com/blog/business/the-5-biggest-ethical-issues-facing-businesses/.

Haslag, C. (2018, Fall). Technology or privacy: Should you really have to choose only one? Missouri Law Review, 83(4), 1027-1033.

Karn, R. (2019). The biggest threat to data security? Humans, of course. The Privacy Advisor. Retrieved from  https://iapp.org/news/a/the-biggest-threat-to-data-security-humans-of-course/ .

Sharma, P. (2017, June). Organizational culture as a predictor of job satisfaction: The role of age and gender. Journal of Contemporary Management Issues, 22(1), 35-40.

Taslitz, A. E. (2009, Spring). The Fourth Amendment in the twenty-first century: Technology, privacy, and human emotions. Law and Contemporary Problems, 65(2), 125-131.

Studyspark

Study Document Study Document

Enhancing Communication Migration From 4G To 5G

Pages: 6 (1692 words) Document Type:Essay Document #:96575438

… the projection is that the current 4G technologies will be at their limit very soon, thus the need for 5G network.
Currently, the internet has become more concentrated, and especially with the emergence of the internet of Things (IoT). This means that Communication is not just limited to the typical person-to-person Communication, but it also involves devices-2-device Communication. The ……

References

References

Alkhazaali, N.H., 2017. Mobile Communication through 5G Technology (Challenges and Requirements). International Journal of Communications, Network and System Sciences, 10(05), p.202.

Gandotra, P., and Jha, R.K., 2016. Device-to-device communication in cellular networks: A survey. Journal of Network and Computer Applications, 71, pp.99-117.

Penttinen, Jyrki T. J., et al. 2019. "Deployment," in 5G Explained: Security and Deployment of Advanced Mobile Communications, Wiley, pp.271-291

Shen, Xuemin. "Device-to-device communication in 5G cellular networks." IEEE Network 29, no. 2 (2015): 2-3.

Tehrani, M.N., Uysal, M., and Yanikomeroglu, H., 2014. Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions. IEEE Communications Magazine, 52(5), pp.86-92.

Zhang, A., and Lin, X., 2017. Security-aware and privacy-preserving D2D communications in 5G. IEEE Network, 31(4), pp.70-77.

Join thousands of other students and

"spark your studies".