Thursday, March 7, 2019
The Digital World
The twenty first century mark the start of a brisk-sprung(prenominal) era of technological advancements. Although engineering has evolved by dint of and done the ages, the new developments hit currently brought applied science unto a higher pedestal, creating to a greater extent and more than opportunities for populate solely over the world. The world went back to its popular state- borderless. Communicating with people in other begins of the globe has been make easy with a simple click of the send button. The profits has likewise certainly provided students with other avenues to obtain information for their school work.Not only that, edit pictures, videos, music, etc. has also been possible through the diametric advancements developed. Years ago, we were so use to using hearing our favorite music from cassette tapes placed deep down port fitted cassette players. But nowadays, digital music, Ipods, mp3 players, and the like set just about been introduced. True ge nerous a digital world has been created together with the coming of this millennium. round-eyedsp instruct part of internet Appliances The introduction of internet appliances in the market is seen to be other avenue by which producers could emergence their r flatue (Mandelstam, D. , n. d.)According to the study made by Hambrechts and Quists Internet Group, the development and production of internet appliances sh altogether increase in the 2000s (Pastore, M. , 1999). As a means for increasing their r reddenue, the producers of internet appliances charter connected their products to the internet to be able to receive positive feedback, lettered how popular the internet is nowadays and of course, the fact that these appliances could be entreed even from a distance. More or less, we should be expecting more internet appliances in the earnest future as anything is possible in the modern terms through technology (David Strom Inc., 1999).Digital Counterfeiting Digital imaging is another technological advancement brought al some by the twenty-first century. The editing of pictures through a program much(prenominal) as Photoshop has somehow evolved to the forgery of Identification cards (csrc. nit. gov, n. d. ) as intumesce as the faking of US dollar bills (books. nap. edu, n. d. ). Obviously, digital counterfeiting is continuously being used as another way to commit crime by those who have continuously abused the benefits being brought about by the advancements in technology (Miller, 2000).Benefits and Risks of New Wireless Technology Wireless Technology, as its name implies promises 1 thing internet connection without the wires (hp. ca, n. d. ). Wi-fi enabled hotspots are seen in e very(prenominal) part of the country, in coffee shops, malls, airports, schools, etc. allowing people to check their emails or access the internet wherever they are, thus cutting the possibility of flunk to read a very important email message or failing to attend to somethin g important.Just like nomadic phones, sending messages over the World Wide Web and researching would be hassle-free and very easy. In the office setup, managers would have an easier metre in setting up networks without moving wires (hp. ca, n. d. ). It would help in decrease the rigidity of the office environment that often leads to the raising of IT costs and simplification in productivity (hp. ca, n. d. ). In summary, wireless technology offers an efficient, legal and agreeable way of accessing the internet, for companies and for individuals.Unfortunately, disadvantages cope with these benefits. In a report published by BBC news (April 28, 2007), the head of the governments committee on mobile phone safety research Professor Lawrie Challis released a statement with wishing to the potential health risks that wi-fi internet could bring (bbc. co. uk). Research shows the dangers of pollutants such(prenominal) as lead and UV radiation when using wireless internet. In amplificat ion to this, wireless technology is constantly becoming a threat to security and privacy as well.The Ernst &Young survey showed that most companies do not have protection against intrusion from third parties, seeing the wireless technology as another avenue to commit internet related crimes (Beckley, 2005). information processing system Gaming iodine of the causes of internet addiction is internet drama. As the gaming culture continues to arise, these games become more and more addictive because of the use of the separate of the game player (Cover, R. , 2006). Although internet addiction is one of the many disadvantages of calculating machine gaming, violence is yet another negative value planted in the young minds of children (Myclopedia, 2004).The violence being taught maliciously by these computing machine games could fall upon our society as this may release the aggressive behavior within us (Harris, J. 2004). The addiction of the people in these computer games would he lp in further deteriorating the values which should be considered as more important such as mixerization with certain people. Spam and its prevention and ramifications The direct effect of spam could include the consumption of computer and network resources, which could again, lead to the congestion of mail servers.It is also costly for individuals who devote much of their time and solicitude in canceling and thin outing unwanted messages without deleting the important ones. Spam comes from different senders. One of the most commonplace brought about by spamming then is the impossibility to disregard these kinds of messages without ignoring the valuable ones. Because of the many emails an individuals usually receive, and because most of them are spam, they tend to cut everything including those that of vital importance to them.The simplest way to rescind this problem is through filtering. hot email hosts nowadays offer filtering as one of their services. If a certain indiv idual receives too much mail from a certain sender, all she/he has to do is block that certain address. Thus, all email messages that would come from that particular sender would not be delivered to his/her inbox (Gnus Manual, 2003). One way of deter spammers is through charging each and every mail being sent all over the world (Boushka, 2006).Also, new filtering systems should be developed that could help in slowing down the servers of these spammers as well as helping in bouncing back spammed emails to their senders. Although the Bayesian way of filtering is considered to be the most effective way to combat SPAM (Graham, 2003), new efforts must be through in order to enhance this considering the flaws present in the system. The development of new email protocols should be given importance- protocols that would no longer be subject because of spam (Boushka, 2006).Electronic Surveillance and Personal Privacy Wiretapping and electronic eavesdropping has been two of the most popular methods being used in criminal investigation (Landesman, n. d. ). These new forms of technology are being placed secretly to monitor the activities of criminals, and hopefully catch them in their act (Maclin, 2007). Aside from these, new inspection videos have been installed to monitor employees work in a certain company to insure that they are doing what is expected of them, and are not committing any felonies (Sinrod, E.J. , 2001).Though these may be advantageous to some, the increase in the production of electronic surveillance poses a threat to the privacy of the people being placed under these surveillance systems. In the next five years or so, more and more electronic surveillance devices could be developed that would not be detect by the general public but could actually monitor their personalised lives (Kaplan, C. S. , 1990). Ethical Use of Computer Information from info MiningData mining is the root of protected information from larger databases that definitely helps companies in their gathering of very important information (Anderson. ucla. edu, n. d. ). It is of course, very useful for the science professionals and even for the businessmen as they do get their profits from the vast amounts of information that they obtain. Data mining tools do predict trends and behaviors that could be of great help to anyone in research. However, some businessmen take advantage of data mining and even go beyond as online marketing which is not very different from SPAM (Exa, 2002).Somehow, these profit oriented individuals have violated the ethics of data mining by advertising online, spamming the accounts of people holding email accounts, and even sending out copyrighted information (Thearling. com, n. d. ). Health Dangers of Using Computers and the Internet The computer can be seen as one of the causes of many accidents. Usually, down(p) kids could cause fire and get badly wounded for spilling a suck up on the computer. Thus, children should be taught on ho w to properly use the computer to avoid accidents such as this (allpctips. com, 2006).In relation with this, too much use of the computer could affect the health of its users. These health related problems, cited by the Royal guild for the Prevention of Accidents are the following Repetitive Strain Injury, Strained Eyes, emphasise and the worst, Epilepsy (RoSPA, 2007). In order to prevent these, one must be able to organize his or her work properly to minimize his or her time in front of the computer. Also, users must know when to take their short breaks in order to relax themselves during long periods of being exposed to the computer (Herbert, 2006).Environmental restore of Widespread Computing Widespread computing requires a lot of animation and somehow contributes to the pollution of the environment (Kohler and Erdmann, 2004). It is also very damaging when a certain place does not have proper waste electric pig (Bolton, 2003). Widespread computing could lead to problems that could contribute to the pressing problems that our world is facing nowadays, on the account of the threats of global warming, brought about by the pollutants that harm our ozone layer.The chemicals emitted as waste from pervasive computing could even add on to this problem. In the same way, the increasing consumption of energy, could be tripled just because of widespread number (Williams and Kuehr, 2003). Internet Addiction Internet addiction ruins real-life relationship and could bring about personal, family, academic, occupational and financial problems as being too engrossed with the internet puts people in seclusion, making them more and more distant to real people (Illinos Institute for Addiction Recovery, n.d. ).The reason why most people tend to be so addicted to the internet is because they find it as an extension of their social life- through the different chat soft wares, social networks such as friendster. com and myspace. com, etc. (Grohol, J. M. , 1999). Obviously, i nternet addiction has been more common to the children and teenagers who are so enthusiastic towards the new world that was opened to them through the World Wide Web (bewebaware. ca, 2007).
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment