Analysis of Internet Usage for Business and Societal Impact

Verified

Added on  2023/01/19

|11
|3002
|32
Report
AI Summary
This individual report delves into the multifaceted impact of the internet on both business and society. It begins by exploring the positive aspects, such as enhanced communication and business promotion, while also acknowledging the negative consequences, including the spread of misinformation and ethical concerns. The report then identifies various threats faced by organizations and individuals, including Trojan horses, hacking, viruses, and spyware, and offers precautionary measures to mitigate these risks, such as strong passwords, cautious email practices, and regular data backups. Furthermore, the report provides a comparative analysis of two communication providers, 8x8 and Microsoft, examining their features, applications, and suitability for business needs. The report concludes by emphasizing the importance of responsible internet usage and the need for ongoing awareness of potential threats and security measures.
Document Page
INDIVIDUAL REPORT
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
INTRODUCTION...........................................................................................................................1
Positive and negative use of internet for business and society...............................................1
Threats faced by the organization and society while using the internet.................................3
Two different communication providers................................................................................4
CONCLUSION................................................................................................................................6
REFERENCES................................................................................................................................8
Document Page
INTRODUCTION
Internet is used by society and business sectors which includes emails and web browsing
and online services. Internet is increasing the standard of living of the people in the society.
Unified communication providers are providing services to the company and society as well.
These communication providers are compared in the report on the basis of features applications
and suitability for business. 8X8 is the famous communication provider company. 8X8 company
headquarter are based in the San Jose, CA, USA. Vikram verma is the CEO of the 8x8. It was
founded in the 1987 by Dr, Chi-Shin Wang and Dr Y,W. Singh formerly. These providers are
providing the services in the form of software which are used by the society and the company.
Report consist of the positive and negative use of internet for society and business sector. It also
consists of the threats for business and threats for society while using the internet. Precautionary
measures while using the internet for business and society as well. All these questions in the
report are discussed below through which one will be aware about the internet.
Positive and negative use of internet for business and society
Internet is the most common tool which is used by people in society and also many
business are now using internet to raise their productivity. Internet is being used in the form of
social media and also in the form of surfing over the internet. The use of internet is compared on
the basis of positive and negative use of internet (Mok., Jorm and Pirkis., 2015).
Social media is an effective way to communicate effectively. Society can use the internet
to communicate with the friends, family and relatives. It is also used by the business for
promoting the products and for marketing of the business online. In some case society and
business are not using the internet in ethical ways. They are using the internet for spreading the
rumors and also not use the networking sistes for effective communication. This is also harmful
for business because negative reviews are posted online and these would ruin the image of the
company (Erturk., 2017).
Communication is important for daily life, due to internet and social media one would
be able to communicate effectively. Through the help of internet people in society are connected
to each other through video calls. The organization is also using the internet for communicating
effectively with the clients and through the use of video calls. There is lack of communication
between the people with the personal touch. Communication is always done in the form of chats
and messages. Due to lack of personal touch people are not forming strong relations with the
1
Document Page
relatives and families as well. In businesses the interviews are also conducted through the online
video calls. Communication is one of the function of the management it is act of conveying
meanings from one entity or group to another through the use of mutually understood signs ,
design , logo and semiotic rules the communication scientific study is divided into three
information theory, communication studies , bio semiotics., the channel of the communication
can be visual , auditory or biochemical etc (Precautions while using the internet, 2019).
Every human in the world is connecting with each other through the use of internet.
Through connecting with the internet one would be able to connect to the world and explore
themselves. People sitting in other countries would not be able to connect with the people which
are in other country. These would reduce the gap between the people and also increase the social
communication between the people in the society. Business are also increased because business
is able to connect to the people of other countries and also export the product to the other
countries and run business online effectively. In some cases, people are connecting to other
people in the world and cheated by those people (Erturk., 2017).
Society and business sector is exploring the world with the help of internet and the
society is using the internet for research work through which one would be able to perform the
task efficiently. Surfing on internet is creating awareness among the people which are not able to
perform effectively. The people in the society which are using the internet are also exploring
themselves by siting in one place. People are doing the research work but sometimes it is
harmful. In some case people which are using the internet for research in wrong topic this would
pass the negative effect on the society and business sector as well.
Security and privacy is increasing as per the time and technology and also as per the use
of the internet. Use of internet is important for daily life but the people are also looking after the
precautions while using the internet. Society and business sector both are increasing as per the
time and also the technology as well. In some cases, society and businessman are not aware
about the precautionary measures which would be safe while using the internet. These measures
must be known to every people in the society and the business sector as well.
Intelligence is tested through the use of the internet. The people which are using the
internet are able to utilize the skills and also utilize the internet in performing the work
efficiently. In some cases people are only dependent on internet for completion of the work.
These people are not using their brains while working, they are reacting like the robots and these
2
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
people are fully dependent on internet for every task. The people which are living in the society
have to perform the task with the help of the internet but use of Internet must be limited
(Iyoob and Modh., 2017). Internet is profitable for companies but also cause difficulty to many
firms. Increasing fraud activities create problems for organization due to which enterprise fails to
retain its consumers in business internet (Berger., Denner and Roeglinger, 2018)..
Threats faced by the organization and society while using the internet
Threats for business sector while using the internet.
Trojan horse is a threat. It contains the code through which attacker can grant the access
to data and use the data of the computers and laptops. These are spread in the computers through
the help of the emails and it is also spreading through the help of false advertisements which are
in the used while using the Internet in the computers. That one click is giving the access to the
attacker to use the details of the computer
(Bagdey and et.al., 2017).
Hacking of the computers is done through the help of the spams mails and the links
which are provided in the mails. Organization is storing all the data of the company and
employee in the software , through the hacking of the software the attacker would find the access
to use the data of the company and the employee in any manner. Spam mails and blank messages
are giving the access to the attacker to use the data provided. Details of the organizations can be
provided to the competitors and also the details of the projects are stored in the computers which
can be provided to anyone.
Dos attacks are performed by the machines while using the internet. Ddos attacks is
distributed Daniel of service attack, it is launched from various computers which would also
harm the computers which are connected to them or within the range.
Threats for society while using the internet
Virus is the common threat which would be found in the laptops and the individual
computers as well. Viruses are the part of the software but these viruses enter the computer
thought the emails attachments and also while using the internet websites as well. Through the
virus in the computers one would not be able to use the software accurately. Virus would also
corrupt the data of the computers and the laptop as well. It would steal the data like the
passwords which includes the personal data of the user.
3
Document Page
Spyware is the software which are helping the attacker to track the data and the history of
the browsing which would show the advertisements and the popups while using the internet.
Majority of the computers of the society are affected by the spyware because these computers
usually do not install the antivirus which would not protect the computers from the spyware
while using the internet (Jo and et.al., 2018).
Computer worms are part of the malware programs which would spread from one to
another computer while using the internet. These worms could infect the computers and the data
of the computers as well. These worms are not harming the computers as other threats are
harming the computers while using the internet. Computer worms are spread through the
software problems in the computers (Li and et.al., 2018).
Precautionary measures while using the internet
Organizations and societies must use the precautions while using the internet. User
whether of office or an individual form society must not open the mails which are received from
the strangers. These mails are attached with the links which can destroy the computer and data
on the computer within a click, so one must download the antivirus which is detecting the virus
on the computer (Threats for using the internet, 2019). While using the internet one must have
strong passwords and must also change these passwords from time to time. These passwords
must not be discussed with anyone, password must consist of the lowercase characters and upper
case characters as well. While using the internet one must not click on the strange links which
would invite the malware and that would spread in the computers. One must educate the people
which are using the internet, because the people are also not aware about the threats of the
internet. People of the internet must have to look the measures which are provided by the cyber
security cell and the companies which are providing the internet has to follow the guidelines of
the cyber security law. One must back up the data regularly which would prevent the data from
the threats like malware and virus as well. One must do the backup of the data of the computer, if
it is not done than it would also encrypt the data of the computer (Medina and et.al., 2019).
Two different communication providers
The report is stating that it wants the comparison between two communication providers
on the basis of the features, applications and suitability of the business. These both the
companies are 8x8 and Microsoft. Microsoft is dealing on the computer software and 8x8 is
dealing in the cloud communications.
4
Document Page
Basis 8x8 Microsoft
Features The company is dealing in the
cloud communications and hosted
contact centers as well.
Microsoft is dealing in the software
which are used on the computers
and personal computers as well.
Features of the Microsoft consist of
output reports in PDF format and
use, ready templates for regular
users to make and publish data ,a
user friendly features tell me for
assistance , allows user building and
publishing web database
effortlessly, allows developers to
create custom solutions using VBA
code, hide/ show option for ribbon.
Applications The company is preparing the
software of cloud communication
and the hosted contact centers.
The company is improvising the
product according to the need of
the customers and the technology
used while doing business. The
company produced the x87
floating-point processor which
was improvised as the time and
the processor was including the
microprocessors as well.
Company is also dealing in the
providing video phones services
to the customers.
Microsoft is providing the
applications like Microsoft word,
excel, power point and outlook as
well this software has their own
specifications which will help the
user to perform the work efficiently.
These applications are updated
according to the time and the
technology which would also
include the need of the customer.
Microsoft office is the software
which was launched by the
company and this software includes
the applications like word excel and
power point as well (Mok., Jorm
and Pirkis., 2015). The applications
5
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
are also provided in the computers
and mobiles as well.
Suitability of business This application helps 8x8 to
unified connection, they do urgent
meetings on the video call, and
they are having high-grade
cooperation instrument for the
business organization. Good
appropriate for all different types
of the business doesn't matter
about the size of the business
either it is small or large all people
can use the all business related
activities and facilities (Rha and
et.al., 2015).
The communication provider that is
Microsoft support the organization
for the future growth of the
business. It is very suitable platform
because of its advance features easy
format many firms use this
application. It helps in performing
all written task in appropriate
manner.
The comparison is done between both the companies 8x8 and Microsoft. (Wu and et.al.,
2015).
CONCLUSION
On the basis of the above report it is concluded that it provides a knowledge related to the
internet or skills in the digital age, it also provide a detail study of the use of the internet buy the
business enterprise and the people in the world. From the report prepared above the negative and
the positive use of the internet is discussed. It states that the use of the internet beneficial for the
society and the organization but excess use of internet is not beneficial for the internet. Limited
use of internet is including the use of the internet, through social media and surfing must be
controlled. There are various threats while using the internet and people are not aware about the
precautionary measures while using the internet. The society and the organizations are facing the
threats like virus, Trojan horse and spyware. These threats must be controlled and these threats
are controlled by using the antivirus in the computers and also everyone must be aware about the
6
Document Page
precautionary measures while using the internet effectively. There are two unified
communication providers which are providing the software and also improvising this software
according to the need of the customers. These soft wares have specific features which are
attracting the society and organizations towards the company.
7
Document Page
REFERENCES
Books and journals
Bagdey, P and et.al., 2017. Pattern of internet use among college going adolescent students in
Nagpur city: A cross sectional study. International Journal of Medical Science and Public
Health. 6(5). pp.901-907.
Berger, S., Denner, M.S. and Roeglinger, M., 2018. The Nature of Digital Technologies-
Development of a Multi-Layer Taxonomy. Nature. 11. pp.28-2018.
Erturk, E., 2017. An incremental model for cloud adoption: Based on a study of regional
organizations. TEM Journal, 6(4). pp.868-876.
Iyoob, I. and Modh, M.M., International Business Machines Corp, 2017. Implementing
comparison of cloud service provider package offerings. U.S. Patent 9,818,127.
Jo, S.J and et.al., 2018. The Internet Game Use‐Elicited Symptom Screen proved to be a valid
tool for adolescents aged 10–19 years. Acta Paediatrica. 107(3). pp.511-516.
Li, J and et.al., 2018. Semantic multi-agent system to assist business integration: An application
on supplier selection for shipbuilding yards. Computers in Industry. 96. pp.10-26.
Medina, M.M and et.al., 2019. Disclosure of HIV Serostatus and Pre-exposure Prophylaxis Use
on Internet Hookup Sites Among Men Who have Sex with Men. AIDS and Behavio.
23(7). pp.1681-1688.
Mok, K., Jorm, A.F. and Pirkis, J., 2015. Suicide-related Internet use: A review. Australian &
New Zealand Journal of Psychiatry. 49(8). pp.697-705.
Rha, J.Y and et.al., 2015. Perception and Reality, Their Intertwined Relationship: Is Consumers’
Use of the Internet Affected By Their Attitude Towards It?. ACR Asia-Pacific
Advances.
Wu, D and et.al., 2015. Cloud-based design and manufacturing: A new paradigm in digital
manufacturing and design innovation. Computer-Aided Design. 59. pp.1-14.
ONLINE
Precautions while using the internet. 2019. [online] Available through:
<https://us.norton.com/internetsecurity-how-to-5-ways-you-can-help-yourself-stay-
secure-online.html>
Threats for using the internet. 2019. [online] Available through:
<https://securitytrails.com/blog/top-10-common-network-security-threats-explained>
8
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
9
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]