Implications Of Internet Usage Assesment

Verified

Added on  2022/08/17

|9
|1808
|16
AI Summary
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: IMPLICATIONS OF INTERNET USAGE
Implications of Internet Usage
Name of the Student
Name of the University
Author’s Note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
IMPLICATIONS OF INTERNET USAGE
Table of Contents
1. Introduction............................................................................................................................2
2. Discussion..............................................................................................................................2
2.1 Implications of Internet Usage in a SMB.........................................................................2
2.2 Proper Data Protection for Intellectual Property in terms of Cyber Security..................4
2.3 Third Party Vendors, Cloud Technology and Different Technology Trends..................5
3. Conclusion..............................................................................................................................6
References..................................................................................................................................7
Document Page
2
IMPLICATIONS OF INTERNET USAGE
1. Introduction
Internet usage refers to the proper measurement of the data amount used by a user for
a definite period of time. The Internet is considered as the easiest and the most significant
method for any business to get connected with various clients and customers (Elmaghraby &
Losavio, 2014). The small and medium businesses or SMBs eventually get the scope for
obtaining customers’ data and hence creating different marketing strategies on the basis of
the overall analysis. The following paper outlines a brief discussion on usage of the Internet
on small and medium businesses after proper analysis of different implications like social
media, VPN usage and many more.
2. Discussion
2.1 Implications of Internet Usage in a SMB
The Internet could be referred to as one of the most valuable business productivity
tools for any SMB. The employees could easily utilize the Internet and the organizational
management could eventually monitor these employees regarding their working progress and
better communication (Singer & Friedman, 2014). A major implication of such Internet usage
in a SMB includes better accessibility of the data. The user does not face any issue while
accessing the data and hence it is quite popular and safe for all such businesses (Buczak &
Guven, 2015). Moreover, with the help of Internet usage, the user is able enter easily in the
business and the user could even start his or her start-ups or new businesses.
The implications of this internet use include several significant aspects, after inclusion
of cyber security are as follows:
i) Basic Web Presence: The web presence is one of the major implication of Internet
use in a SMB as it is the major collection of different Web files over a specific subject, which
Document Page
3
IMPLICATIONS OF INTERNET USAGE
involves a starting file, known as home page (Gupta, Agrawal & Yamaguchi, 2016). The
organization comprises of a single address, which are provided for their visitors.
ii) Online Shopping: Another significant and important implication of Internet use in
a SMB is online shopping. It is the activity or action for buying goods or services over the
Internet. It is the most basic form of e commerce that enables the clients to directly consume
these goods and services from any particular seller with the help of a web browser. These
clients can also search for a product of their interest after visiting the web site of the retailer
directly after searching amongst the alternative vendors with a shopping search engine for
displaying the similar product’s availability.
iii) Vendor Unique Portals and Vendor Specific Portals: The SMB is also able to
obtain subsequent solutions in their vendor portal for high volume transactional business to
business enterprises (Dua & Du, 2016). As a result, with these vendor portals, they are able to
handle maximum vendors with lesser time and even encourage vendor self services. The
prospective vendors can provide on-boarding of vendors for getting accurate information.
iv) IoT: Another significant implication of Internet use in a SMB is IoT or internet of
things. It is the core system of different interrelated computing devices for the purpose of
transferring data over a network without involvement of any type of interaction. The SMB is
able to gain proper communications and automation and control of their usage of Internet.
v) Social Media: The SMB would be able to gain access to different social media
sites and social networking with this Internet usage and hence the company would be
benefitted.
vi) VPN Uses: Moreover, the SMB gets opportunity for VPN to enable in creation of
a safe and secured link to another network on the Internet (Abawajy, 2014). These could be
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
IMPLICATIONS OF INTERNET USAGE
used for accessing region restricted websites and ensuring a secured browsing activity of the
business.
2.2 Proper Data Protection for Intellectual Property in terms of Cyber Security
With the involvement of cyber security, the organization is also able to protect its
confidential data and information related to intellectual properties. These intellectual
properties are being protected by certain laws and hence patents, trademarks and copyright
are kept on high security. The patent holder could easily take up legal action against any
specific individual, who is copying the patented invention, discovery as well as design
(Buczak & Guven, 2015). The SMB would be able to utilize similar design, process and
product without any type of risk. It would reduce the chance of security risks and threats.
Data protection of IP can be brought with few steps of cyber security and these steps are as
follows:
i) Registering IP: The IPs are needed to be registered properly, so that the data are
safe and secured.
ii) Registering Business and Domain Names: The domain and business names are
also needed to be registered properly, for ensuring that the confidential data are not theft or
lost, under any circumstance.
iii) Creation of Confidentiality or Non-Disclosure Contracts: Different non-
disclosure and confidentiality contracts are required to be created, so that any employee or
staff in the SMB does not get the scope to steal data of the IPs (Dua & Du, 2016).
iv) Implementation of Security Measures: Various security measures like firewall
and antivirus programs are needed to be implemented for securing the data of IPs.
Document Page
5
IMPLICATIONS OF INTERNET USAGE
2.3 Third Party Vendors, Cloud Technology and Different Technology Trends
The other SMBs even utilize their respective web site for the core purpose of
conducting the entire business online. Some of the most significant benefits of this Internet
usage in a SMB include global accessibility, irrespective of location and time, improvised
client services through proper flexibility, cost savings, fast product delivery, increased
professionalism, effective opportunities for managing the business from any location in the
world and many more (Ben-Asher & Gonzalez, 2015). There are some of the most significant
and important implications of such usage of Internet in a SMB. With the help of Internet
usage, it would be quite easier for the small and medium sized business to ensure
development of the business in the most efficient manner, after getting proper tools of
marketing and even powerful communication.
The businesses have the ability to customize their products and services easily for
ensuring that there is an increment in the profit. The SMB is able to include third party
vendors in their business and ensure that their products and services are absolutely safe and
secured. With the help of secured Internet use, the vendor gets the opportunity to get access
to the system (Cherdantseva et al., 2016). As a result, it is needed to ensure that the data to be
used by them, cannot be theft or stolen under any circumstance.
Moreover, the cloud technology is also enhanced and the security is prevailed without
much complexity with the help of Internet use. Hence, high flexibility and scalability would
be present for better access of data, irrespective of time and location. Internet allows the SMB
for securing remote access to every remote employee (Dua & Du, 2016). Apart from these
implications, internet use in a SMB is also responsible for involving the latest technology
trends of artificial intelligence, 5G data networks, blockchain technology, computerized
vision, autonomous driving and many more. These technology trends are also responsible for
Document Page
6
IMPLICATIONS OF INTERNET USAGE
leading the future cyber world and hence these are needed to be protected, so that data is not
lost under any circumstance.
3. Conclusion
Therefore, from this above discussion, a conclusion could be drawn that a small and
medium business is utilizing high speed Internet through effective usage of e commerce
business models, Internet banking and digital marketing. The organizations eventually get
better customer data and is able to establish their business online and hence reaching to
maximum of the clients in all over the world. The above provided paper has properly outlined
a detailed analysis of the implications of the Internet usage with subsequent details.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
IMPLICATIONS OF INTERNET USAGE
References
Abawajy, J. (2014). User preference of cyber security awareness delivery
methods. Behaviour & Information Technology, 33(3), 237-248.
Ben-Asher, N., & Gonzalez, C. (2015). Effects of cyber security knowledge on attack
detection. Computers in Human Behavior, 48, 51-61.
Buczak, A. L., & Guven, E. (2015). A survey of data mining and machine learning methods
for cyber security intrusion detection. IEEE Communications surveys &
tutorials, 18(2), 1153-1176.
Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H., & Stoddart, K.
(2016). A review of cyber security risk assessment methods for SCADA
systems. Computers & security, 56, 1-27.
Dua, S., & Du, X. (2016). Data mining and machine learning in cybersecurity. Auerbach
Publications.
Elmaghraby, A. S., & Losavio, M. M. (2014). Cyber security challenges in Smart Cities:
Safety, security and privacy. Journal of advanced research, 5(4), 491-497.
Gupta, B., Agrawal, D. P., & Yamaguchi, S. (Eds.). (2016). Handbook of research on
modern cryptographic solutions for computer and cyber security. IGI global.
Singer, P. W., & Friedman, A. (2014). Cybersecurity: What everyone needs to know. oup usa.
Document Page
8
IMPLICATIONS OF INTERNET USAGE
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]