Internet Essays (Examples)

Studyspark

Study Document Study Document

Internet Influence On Adolescents

Pages: 5 (1568 words) Sources: 6 Document Type:Essay Document #:37510468

How Internet Addiction Impacts Teens Health
Introduction
The hypothesis of this study is that the Internet influence on adolescence can be negative in terms of mental, social and emotional health if Internet engagement is not moderated.
This research is important because more and more studies are showing that teenagers are getting addicted to technology, to … communication skills needed for the real world. Thus, they are unable to develop real world relationships and support networks, and instead rely on Internet-based relationships, which are superficial and not sufficient for real sociality.
Adolescents are the primary population affected by Internet and social media addictions—but these addictions can last into adulthood.
The traditional thoughts on the topic are that social media and the Internet are new media and teens turn to them because their peers are there and they can communicate and share information on these virtual … share information on these virtual……

References

References

Agarwal, A. K., Verma, A., & Agarwal, M. (2017). Internet victimization and depression among adolescents, 14(3), 60-62.

Cheung, J. C. S., Chan, K. H. W., Lui, Y. W., Tsui, M. S., & Chan, C. (2018). Psychological well-being and adolescents’ internet addiction: A school-based cross-sectional study in Hong Kong. Child and Adolescent Social Work Journal, 35(5), 477-487.

Festinger, D. S., Dugosh, K. L., Clements, N., Flynn, A. B., Falco, M., McLellan, A. T.,& Arria, A. M. (2016). Use of the internet to obtain drugs without a prescription among treatment-involved adolescents and young adults. Journal of child & adolescent substance abuse, 25(5), 480-486.

Görzig, A. (2016). Adolescents’ viewing of suicide-related web content and psychological problems: Differentiating the roles of cyberbullying involvement. Cyberpsychology, Behavior, and Social Networking, 19(8), 502-509.

Law, Y. M. (2019). Family factors and internet addiction among junior secondary school students in Hong Kong. Hong Kong Polytechnic University, Doctoral Dissertation.

Sajeev Kumar, P., Prasad, N., Raj, Z., & Abraham, A. (2015). Internet addiction and substance use disorders in adolescent students-a cross sectional study. J. Int. Med. Dent, 2, 172-179.

Studyspark

Study Document Study Document

Culture Formation In The Internet Age

Pages: 3 (1044 words) Sources: 5 Document Type:Essay Document #:46746942

Online Access and Culture
Access to the Internet has been linked to a number of different influences over culture. As a new means of communication, the Internet has transformed how culture is disseminated around the world, but it has also had a significant influence on how culture is created. All … online access to culture is far-reaching, and there are few touchpoints of culture that have not been subject to the influence of the Internet. Yet, there is often a temptation to oversimplify the influence that the Internet has had on culture, and cultures. This paper will provide an overview of some of the most important among the complex interactions between … among the complex interactions between online access and culture.
Autonomy
One of the major themes in the discussion of the influence of the Internet on culture is the outcome of greater autonomy. The Internet has become the world’s……

References

References

Bauer, J., Berne, M. & Maitland, C. (2002) Internet access in the European Union and in the United States. Telematics and Information. Vol. 19 (2) 117-137.

Castells, M. (2019) The impact of the Internet on society: A global perspective. Open Mind BBVA. Retrieved February 10, 2020 from  https://www.bbvaopenmind.com/en/articles/the-impact-of-the-internet-on-society-a-global-perspective/ 

DiMaggio, P. (2014) The Internet and cultural industries. MIT Technology Review. Retrieved February 10, 2020 from  https://www.technologyreview.com/s/531341/the-internet-and-the-cultural-industries/ 

Huizer, E., Shah, S., Arroyo, J., Okorafor, U. & MacKinnon, R. (2017) A brave new world: How the Internet affects societies. Chatham House. Retrieved February 11, 2020 from  https://www.internetsociety.org/wp-content/uploads/2017/08/MeetingSummary.BraveNewWorld.pdf 

Voiskounsky, A. (1998) Internet: Culture diversity and unification. Proceedings on Cultural Attitudes Towards Communication and Technology. Retrieved February 11, 2020 from  https://www.it.murdoch.edu.au/catac/catac98/pdf/07_voiskounsky.pdf 

Studyspark

Study Document Study Document

Privacy In Social Networks Regarding Machine Learning

Pages: 8 (2537 words) Sources: 10 Document Type:Research Paper Document #:98311751

… social media. One reason it is needed is, as Oh et al. (2016) show, there is no such thing as privacy on the Internet, and AI is being developed to collect as much data on what is out there as possible. The implications for one’s privacy are … 19). Their protocol as a result is 1100- 1300× faster that previous protocols developed by engineers to protect end users’ privacy in an Internet environment where scanning algorithms and constantly looking for data on users to develop their own profiles. Their protocol acts as a wall between … profiles. Their protocol acts as a wall between the user…[break]…which the problem is likely ever to be solved once and for all. The Internet has opened up a world of coding that in a state of constant revolution.
The recommendations based on these findings are for legislation ……

References

References

Balle, B., Gascón, A., Ohrimenko, O., Raykova, M., Schoppmmann, P., & Troncoso, C. (2019, November). PPML\\\\\\\\\\\\'19: Privacy Preserving Machine Learning. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (pp. 2717-2718). ACM.

Bilogrevic, I., Huguenin, K., Agir, B., Jadliwala, M., Gazaki, M., & Hubaux, J. P. (2016). A machine-learning based approach to privacy-aware information-sharing in mobile social networks. Pervasive and Mobile Computing, 25, 125-142.

Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H. B., Patel, S., ... & Seth, K. (2017, October). Practical secure aggregation for privacy-preserving machine learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 1175-1191). ACM.

Hunt, T., Song, C., Shokri, R., Shmatikov, V., & Witchel, E. (2018). Chiron: Privacy-preserving machine learning as a service. arXiv preprint arXiv:1803.05961.

Lindsey, N. (2019). New Research Study Shows That Social Media Privacy Might Not Be Possible. Retrieved from https://www.cpomagazine.com/data-privacy/new-research-study-shows-that-social-media-privacy-might-not-be-possible/

Mohassel, P., & Zhang, Y. (2017, May). Secureml: A system for scalable privacy-preserving machine learning. In 2017 IEEE Symposium on Security and Privacy (SP) (pp. 19-38). IEEE.

Mooney, S. J., & Pejaver, V. (2018). Big data in public health: terminology, machine learning, and privacy. Annual review of public health, 39, 95-112.

Oh, S. J., Benenson, R., Fritz, M., & Schiele, B. (2016, October). Faceless person recognition: Privacy implications in social media. In European Conference on Computer Vision (pp. 19-35). Springer, Cham.

Studyspark

Study Document Study Document

Barriers That Prevent Implementation Of IoT Within Small Businesses

Pages: 18 (5252 words) Sources: 37 Document Type:Case Study Document #:25628514

… timely and informed answers to a series of guiding research questions and subquestions to identify the risks and barriers that are associated with Internet of Things implementations. These types of studies are important today because the Internet of Things is changing the manner in which companies of all sizes and types operate their businesses, and current trends indicate that these … manner in which companies of all sizes and types operate their businesses, and current trends indicate that these implementations are increasing exponentially. The Internet of Things allows conventional computer-based networks to incorporate data collected from everyday objects to provide real-time analyses and new applications for these technologies … day. Indeed, there are already more mobile devices in use around the world than there are people, and most authorities agree that the Internet of Things deployments will continue to increase well into the foreseeable future. Chapter one of the……

References

References

Ahamed, J., & Rajan, A.V. (2016). Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 1-5.

Aishah, S., Sahandi, R., Prakoonwit, S., & Khan, W. (2019). Big data and IoT opportunities for small and medium-sized enterprises (SMEs). In Handbook of Research on Big data and the IoT. doi: 10.4018/978-1-5225-7432-3.ch005

An, N. & Wang, J. (2018, October). Research and practice on innovative methods of ideological and political education for college student. Educational Sciences Theory and Practice, 18(5), 2386-2391.

Banham, R. (2016, July-August). IoT complexity: As the Internet of Things expands, the risks-and questions of liability-become more complicated. Risk Management, 63(6), 39-44.

Bhardwaj, A., Subramanyam, G. V., Avasthi, V. & Sastry, H. (2016). Review of solutions for securing end user data over cloud applications. International Journal of Advanced Computer Research, 6(27), 2277-2291.

Bok, H. (2014, September). An empirical study on factors influencing Internet advertising effects. Advances in Management, 7(9), 6-9.

Business.com. (2018). Disaster preparedness for small businesses. Business.com, September 26. Retrieved from  https://www.business.com/articles/business-disaster-prep/ .

Cass, J. (2019). Internet of Things: What it is, how it works, examples and more. Just Creative. Retrieved from  https://justcreative.com/2018/11/19/internet-of-things-explained/ .

Studyspark

Study Document Study Document

Trading Classroom Authority For Online Community

Pages: 3 (1036 words) Sources: 4 Document Type:Research Paper Document #:29778738

Should Teachers Allow Students Access to Internet in Classrooms
Why Kids in Classrooms Today Do Not Need Any More Wild West in Them: “Trading Classroom Authority for Online Community” is … Do Not Need Any More Wild West in Them: “Trading Classroom Authority for Online Community” is a Bad Idea
As Rorabaugh notes, the Internet has evolved from a once “primitive” place to a kind of digital Wild West. To maneuver one’s way through the digital world, one … and Domhardt et al. all point out, children cannot succeed—academically or professionally—without developing grit, resilience, and determination. Rorabaugh’s argument is that bringing the Internet into the classroom and allowing students to engage in self-directed learning can help to build that grit, resilience and determination as it allows … on the journey for answers. Rorabaugh states that it encourages active participation rather than passive reception of information from a teacher. With the……

References

Works Cited

Domhardt, Matthias, et al. \\\\\\\\\\\\"Resilience in survivors of child sexual abuse: A systematic review of the literature.\\\\\\\\\\\\" Trauma, Violence, & Abuse 16.4 (2015): 476-493.

Perkins-Gough, Deborah. \\\\\\\\\\\\"The significance of grit: A conversation with Angela Lee Duckworth.\\\\\\\\\\\\" Educational Leadership 71.1 (2013): 14-20.

Rorabaugh, Pete. “Trading Classroom Authority for Online Community.” Hybrid Pedagogy, 5 Jan 2012.  https://hybridpedagogy.org/trading-classroom-authority-for-online-community/ 

Tough, Paul. How children succeed: Grit, curiosity, and the hidden power of character. Houghton Mifflin Harcourt, 2012.

Studyspark

Study Document Study Document

What Is Cybercrime And How To Deter It

Pages: 7 (2243 words) Sources: 5 Document Type:Research Paper Document #:58559500

What is Cybercrime?
Definition of Cybercrime
Cybercrime is any criminal activity that is conducted using computers or the Internet. As today’s digital natives have the most experience with computers, cybercriminals tend to be of the Millennial generation—i.e., born after 1980. They are … code, understand computer systems and networks, know how to navigate databases, access data storage, get past firewalls, exploit cloud computing services, control the Internet of Things and more. They
How Cybercrime Has Evolved over Time
Computers and the rise of the Internet ushered in the era of cybercrime. IBM’s first computer arrived in the 1950s, but it was an enormous machine—and cybercrime did not really … allow for a virtual anonymity to be obtained and allow criminals to commit crimes from virtually anywhere in the world thanks to the Internet. They do not even have to be in the same country but can send viruses or ransomware……

References

References

Computer Hope. (2019). When was the first computer invented? Retrieved from  https://www.computerhope.com/issues/ch000984.htm 

Crane, C. (2019). 33 alarming cybercrime statistics you should know in 2019. Retrieved from  https://www.thesslstore.com/blog/33-alarming-cybercrime-statistics-you-should-know/ 

Schjølberg, Stein. (2017). The History of Cybercrime (1976-2016). Books on Demand.

Statista. (2020). Global digital population. Retrieved from  https://www.statista.com/statistics/617136/digital-population-worldwide/ 

Taylor, R. W., Fritsch, E. J., Liederbach, J., Saylor, M. R., & Tafoya, W. L. (2019). Cyber crime and cyber terrorism. NY, NY: Pearson.

Studyspark

Study Document Study Document

The Cost Effectiveness In Cloud Computing Within An Accounting Organization

Pages: 15 (4615 words) Sources: 15 Document Type:Research Paper Document #:23416384

… data and information storages, various services, data centers, in addition to different constituents for data networking, all of which are connected over the internet and provide the same kinds of services and functionalities as the infrastructure physically situated within the corporate premises. Fitting examples of the extensive ……

References

References

Bauer, E., & Adams, R. (2015). Reliability and availability of cloud computing. Hoboken: John Wiley & Sons.

Chang, W. Y., Abu-Amara, H., & Sanford, J. F. (2018). Transforming enterprise cloud services. New York: Springer Science & Business Media.

Chang, V. (Ed.). (2015). Delivery and adoption of cloud computing Services in Contemporary Organizations. IGI Global.

Hsien, W. F., Yang, C. C., & Hwang, M. S. (2016). A Survey of Public Auditing for Secure Data Storage in Cloud Computing. IJ Network Security, 18(1), 133-142.

Jamsa, K. (2016). Cloud computing. New York: Jones & Bartlett Publishers.

Maguire, M., & Delahunt, B. (2017). Doing a thematic analysis: A practical, step-by-step guide for learning and teaching scholars. AISHE-J: The All Ireland Journal of Teaching and Learning in Higher Education, 9(3).

Mehmood, R., Katib, S. S. I., & Chlamtac, I. (2020). Smart Infrastructure and Applications. New York: Springer International Publishing.

Prabhu, C. S. R. (2015). E-governance: concepts and case studies. New Delhi: PHI Learning Pvt. Ltd.

Studyspark

Study Document Study Document

Cloud Computing And Cost Effectiveness

Pages: 5 (1591 words) Sources: 5 Document Type:Annotated Bibliography Document #:36737117

… associated with enforcing these systems and applications within their own IT divisions.
Attaran, M. (2017). Cloud Computing Technology: Leveraging the Power of the Internet to Improve Business Performance. Journal of International Technology and Information Management, 26(1), 112 – 137.
In recent times, cloud computing has emanated as ……

References

References

Attaran, M. (2017). Cloud Computing Technology: Leveraging the Power of the Internet to Improve Business Performance. Journal of International Technology and Information Management, 26(1), 112 – 137.

Carcary, M., Doherty, E., & Conway, G. (2015). The adoption of cloud computing by Irish SMEs- an exploratory study. Electronic Journal of Information Systems Evaluation, 17(1), 3.

Elmonem, M. A. A., Nasr, E. S., & Geith, M. H. (2016). Benefits and challenges of cloud ERP systems–A systematic literature review. Future Computing and Informatics Journal, 1(1-2), 1-9.

Shankar, K. (2016). Effectiveness of Cloud Computing in Global Business. Journal of Applied Management-Jidnyasa, 8(1), 66-73.

Xue, C. T. S., & Xin, F. T. W. (2016). Benefits and challenges of the adoption of cloud computing in business. International Journal on Cloud Computing: Services and Architecture, 6(6), 01-15.

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 6 (1662 words) Sources: 8 Document Type:Research Paper Document #:11946972

… to the owner/possessor of the information. Cyber espionage is carried out through various exploitation methods or techniques on individual computers, networks or the Internet. Some of these techniques or methods include the use of malicious software and computer viruses like Trojan horses and spyware. This practice basically ……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).

Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).

Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017.  https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 7 (2040 words) Sources: 5 Document Type:Research Paper Document #:12891464

… to the owner/possessor of the information. Cyber espionage is carried out through various exploitation methods or techniques on individual computers, networks or the Internet. Some of these techniques or methods include the use of malicious software and computer viruses like Trojan horses and spyware. This practice basically ……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).

Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).

Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017.  https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf " target="_blank" REL="NOFOLLOW">

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".