Positive and Negative Use of Internet for Business and Society
Verified
Added on 2023/01/19
|11
|3002
|32
AI Summary
This report discusses the positive and negative use of internet for business and society, including the threats faced and precautionary measures. It also compares two communication providers.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
INDIVIDUAL REPORT
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents INTRODUCTION...........................................................................................................................1 Positive and negative use of internet for business and society...............................................1 Threats faced by the organization and society while using the internet.................................3 Two different communication providers................................................................................4 CONCLUSION................................................................................................................................6 REFERENCES................................................................................................................................8
INTRODUCTION Internet is used by society and business sectors which includes emails and web browsing and online services. Internet is increasing the standard of living of the people in the society. Unified communication providers are providing services to the company and society as well. These communication providers are compared in the report on the basis of features applications and suitability forbusiness. 8X8 is the famous communication provider company. 8X8 company headquarter are based in the San Jose, CA, USA. Vikram verma is the CEO of the 8x8. It was founded in the 1987 by Dr, Chi-Shin Wang and Dr Y,W. Singh formerly. These providers are providing the services in the form of software which are used by the society and the company. Report consist of the positive and negative use of internet for society and business sector. It also consists of the threats for business and threats for society while using the internet. Precautionary measures while using the internet for business and society as well. All these questions in the report are discussed below through which one will be aware about the internet. Positive and negative use of internet for business and society Internet is the most common tool which is used by people in society and also many business are now using internet to raise their productivity. Internet is being used in the form of social media and also in the form of surfing over the internet. The use of internet is compared on the basis of positive andnegative use of internet (Mok., Jorm and Pirkis., 2015). Social mediais an effective way to communicate effectively. Society can use the internet to communicate with the friends, family and relatives. It is also used by the business for promoting the products and for marketing of the business online. In some case society and business are not using the internet in ethical ways. They are using the internet for spreading the rumors and also not use the networking sistes for effective communication. This is also harmful for business because negative reviews are posted online and these would ruin the image of the company (Erturk., 2017). Communicationis important for daily life, due to internet and social media one would be able to communicate effectively. Through the help of internet people in society are connected to each other through video calls. The organization is also using the internet for communicating effectively with the clients and through the use of video calls. There is lack of communication between the people with the personal touch. Communication is always done in the form of chats and messages. Due to lack of personal touch people are not forming strong relations with the 1
relatives and families as well. In businesses the interviews are also conducted through the online video calls. Communication is one of the function of the management it is act of conveying meanings from one entity or group to another through the use of mutually understood signs , design , logo and semiotic rules the communication scientific study is divided into three information theory, communication studies , bio semiotics., the channel of the communication can be visual , auditory or biochemical etc (Precautions while using the internet, 2019). Every human in the world isconnectingwith each other through the use of internet. Through connecting with the internet one would be able to connect to the world and explore themselves. People sitting in other countries would not be able to connect with the people which are in other country. These would reduce the gap between the people and also increase the social communication between the people in the society. Business are also increased because business is able to connect to the people of other countries and also export the product to the other countries and run business online effectively. In some cases, people are connecting to other people in the world and cheated by those people(Erturk., 2017). Society and business sector is exploring the world with the help of internet and the society is using the internet forresearch workthrough which one would be able to perform the task efficiently. Surfing on internet is creating awareness among the people which are not able to perform effectively. The people in the society which are using the internet are also exploring themselves by siting in one place. People are doing the research work but sometimes it is harmful. In some case people which are using the internet for research in wrong topic this would pass the negative effect on the society and business sector as well. Security and privacy is increasing as per the time and technology and also as per the use of the internet. Use of internet is important for daily life but the people are also looking after the precautions while using the internet. Society and business sector both are increasing as per the time and also the technology as well. In some cases, society and businessman are not aware about the precautionary measures which would be safe while using the internet. These measures must be known to every people in the society and the business sector as well. Intelligence is tested through the use of the internet. The people which are using the internet are able to utilize the skills and also utilize the internet in performing the work efficiently. In some cases people are only dependent on internet for completion of the work. These people are not using their brains while working, they are reacting like the robots and these 2
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
people are fully dependent on internet for every task. The people which are living in the society have to perform the task with the help of the internet but use of Internet must be limited (Iyoob and Modh., 2017). Internet is profitable for companies but also cause difficulty to many firms. Increasing fraud activities create problems for organization due to which enterprise fails to retain its consumers in business internet(Berger., Denner and Roeglinger, 2018).. Threats faced by the organization and society while using the internet Threats for business sector while using the internet. Trojan horse is a threat. It contains the code through which attacker can grant the access to data and use the data of the computers and laptops. These are spread in the computers through the help of the emails and it is also spreading through the help of false advertisements which are in the used while using the Internet in the computers. That one click is giving the access to the attacker to use the details of the computer (Bagdey and et.al., 2017). Hacking of the computers is done through the help of the spams mails and the links which are provided in the mails. Organization is storing all the data of the company and employee in the software , through the hacking of the software the attacker would find the access to use the data of the company and the employee in any manner. Spam mails and blank messages are giving the access to the attacker to use the data provided. Details of the organizations can be provided to the competitors and also the details of the projects are stored in the computers which can be provided to anyone. Dos attacks are performed by the machines while using the internet. Ddos attacks is distributed Daniel of service attack, it is launchedfrom various computers which would also harm the computers which are connected to them or within the range. Threats for society while using the internet Virus is the common threat which would be found in the laptops and the individual computers as well. Viruses are the part of the software but these viruses enter the computer thought the emails attachments and also while using the internet websites as well. Through the virus in the computers one would not be able to use the software accurately. Virus would also corrupt the data of the computers and the laptop as well. It would steal the data like the passwords which includes the personal data of the user. 3
Spyware is the software which are helping the attacker to track the data and the history of the browsing which would show the advertisements and the popups while using the internet. Majority of the computers of the society are affected by the spyware because these computers usually do not install the antivirus which would not protect the computers from the spyware while using the internet(Jo and et.al., 2018). Computer worms are part of the malware programs which would spread from one to another computer while using the internet. These worms could infect the computers and the data of the computers as well. These worms are not harming the computers as other threats are harming the computers while using the internet. Computer worms are spread through the software problems in the computers(Li and et.al., 2018). Precautionary measures while using the internet Organizations and societies must use the precautions while using the internet. User whether of office or an individual form society must not open the mails which are received from the strangers. These mails are attached with the links which can destroy the computer and data on the computer within a click, so one must download the antivirus which is detecting the virus on the computer (Threats for using the internet, 2019). While using the internet one must have strong passwords and must also change these passwords from time to time. These passwords must not be discussed with anyone, password must consist of the lowercase characters and upper case characters as well.While using the internet one must not click on the strange links which would invite the malware and that would spread in the computers. One must educate the people which are using the internet, because the people are also not aware about the threats of the internet. People of the internet must have to look the measures which are provided by the cyber security cell and the companies which are providing the internet has to follow the guidelines of the cyber security law. One must back up the data regularly which would prevent the data from the threats like malware and virus as well. One must do the backup of the data of the computer, if it is not done than it would also encrypt the data of the computer(Medina and et.al., 2019). Two different communication providers The report is stating that it wants the comparison between two communication providers on the basis of the features, applications and suitability of the business. These both the companies are 8x8 and Microsoft. Microsoft is dealing on the computer software and 8x8 is dealing in the cloud communications. 4
Basis8x8Microsoft FeaturesThecompanyisdealinginthe cloud communications and hosted contact centers as well. Microsoft is dealing in the software which are used on the computers andpersonalcomputersaswell. Features of the Microsoft consist of output reports in PDF format and use,readytemplatesforregular usersto make and publish data ,a user friendly features tell me for assistance , allows user building and publishingwebdatabase effortlessly,allows developers to create custom solutions using VBA code, hide/ show option for ribbon. ApplicationsThecompanyispreparingthe software of cloud communication andthehostedcontactcenters. The company is improvising the product according to the need of the customers and the technology usedwhiledoingbusiness. The companyproducedthex87 floating-pointprocessorwhich was improvised as the time and the processor was including the microprocessorsaswell. Company is also dealing in the providing video phones services to the customers. Microsoftisprovidingthe applicationslikeMicrosoftword, excel, power point and outlook as wellthissoftwarehastheirown specifications which will help the user to perform the work efficiently. Theseapplicationsareupdated accordingtothetimeandthe technologywhichwouldalso include the need of the customer. Microsoftofficeisthesoftware whichwaslaunchedbythe company and this software includes the applications like word excel and power point as well(Mok., Jorm and Pirkis., 2015). The applications 5
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
are also provided in the computers and mobiles as well. Suitability of businessThisapplicationhelps8x8to unified connection, they do urgent meetings on the video call, and theyarehavinghigh-grade cooperationinstrumentforthe businessorganization.Good appropriate for all different types ofthebusinessdoesn'tmatter aboutthesizeofthebusiness either it is small or large all people can use the all business related activities and facilities(Rha and et.al., 2015). The communication provider that is Microsoftsupport the organization forthefuturegrowthofthe business. It is very suitable platform because of its advance features easy formatmanyfirmsusethis application. It helps in performing allwrittentaskinappropriate manner. The comparison is done between both the companies 8x8 and Microsoft.(Wu and et.al., 2015). CONCLUSION On the basis of the above report it is concluded that it provides a knowledge related to the internet or skills in the digital age, it also provide a detail study of the use of the internet buy the business enterprise and the people in the world. From the report prepared above the negative and the positive use of the internet is discussed. It states that the use of the internet beneficial for the society and the organization but excess use of internet is not beneficial for the internet. Limited use of internet is including the use of the internet, through social media and surfing must be controlled. There are various threats while using the internet and people are not aware about the precautionary measures while using the internet. The society and the organizations are facing the threats like virus, Trojan horse and spyware. These threats must be controlled and these threats are controlled by using the antivirus in the computers and also everyone must be aware about the 6
precautionarymeasureswhileusingtheinterneteffectively.Therearetwounified communication providers which are providing the software and also improvising this software according to the need of the customers. These soft wares have specific features which are attracting the society and organizations towards the company. 7
REFERENCES Books and journals Bagdey, P and et.al., 2017. Pattern of internet use among college going adolescent students in Nagpur city: A cross sectional study.International Journal of Medical Science and Public Health.6(5). pp.901-907. Berger, S., Denner, M.S. and Roeglinger, M., 2018. The Nature of Digital Technologies- Development of a Multi-Layer Taxonomy.Nature.11.pp.28-2018. Erturk, E., 2017. An incremental model for cloud adoption: Based on a study of regional organizations.TEM Journal,6(4). pp.868-876. Iyoob,I.andModh,M.M.,InternationalBusinessMachinesCorp,2017.Implementing comparison of cloud service provider package offerings. U.S. Patent 9,818,127. Jo, S.J and et.al., 2018. The Internet Game Use‐Elicited Symptom Screen proved to be a valid tool for adolescents aged 10–19 years.Acta Paediatrica.107(3). pp.511-516. Li, J and et.al., 2018. Semantic multi-agent system to assist business integration: An application on supplier selection for shipbuilding yards.Computers in Industry.96.pp.10-26. Medina, M.M and et.al., 2019. Disclosure of HIV Serostatus and Pre-exposure Prophylaxis Use on Internet Hookup Sites Among Men Who have Sex with Men.AIDS and Behavio. 23(7). pp.1681-1688. Mok, K., Jorm, A.F. and Pirkis, J., 2015. Suicide-related Internet use: A review.Australian & New Zealand Journal of Psychiatry.49(8). pp.697-705. Rha, J.Y and et.al., 2015. Perception and Reality, Their Intertwined Relationship: Is Consumers’ UseoftheInternetAffectedByTheirAttitudeTowardsIt?.ACRAsia-Pacific Advances. Wu, D and et.al., 2015. Cloud-based design and manufacturing: A new paradigm in digital manufacturing and design innovation.Computer-Aided Design. 59. pp.1-14. ONLINE Precautionswhileusingtheinternet.2019.[online]Availablethrough: <https://us.norton.com/internetsecurity-how-to-5-ways-you-can-help-yourself-stay- secure-online.html> Threatsforusingtheinternet.2019.[online]Availablethrough: <https://securitytrails.com/blog/top-10-common-network-security-threats-explained> 8
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser