Integrated Professional Skills in the Digital Age: Internet Use Report

Verified

Added on  2023/01/19

|11
|3618
|65
Report
AI Summary
This report provides a comprehensive overview of internet usage in both business and society. It explores the positive aspects, such as data storage and communication, while also addressing the negative impacts like cybercrime and social media addiction. The report delves into the threats associated with internet use, including botnets, malware, phishing, and ransomware, and offers practical security and privacy measures to mitigate these risks. Furthermore, it examines the features and applications of communication providers like Microsoft and Oracle, comparing their suitability for different business needs. The report emphasizes the importance of responsible internet usage and the implementation of security protocols to protect data and ensure a safe online experience. The report concludes by highlighting the need for awareness and proactive measures to navigate the digital landscape effectively.
Document Page
Integrated professional
skill in the digital age
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
INTRODUCTION...........................................................................................................................1
Positive and negative use of internet...........................................................................................1
Measures of security and privacy while using internet...............................................................3
Communication providers features and applications..................................................................5
CONCLUSION................................................................................................................................7
REFERENCES................................................................................................................................8
Document Page
INTRODUCTION
Business sector and the society is using the internet on the large scale in fulfilling the
daily activities. Internet is used for promoting the products of the business and also for marketing
the product of the business. Microsoft and oracle are the unified organizations which are
discussed in the report. Threats while using the internet on the phone and computers are malware
and virus which will sabotage the system as well. Society is using the internet to update
themselves and using the internet for communicating effectively. The report consist of the
impacts of the internet on the society and business sector. It also includes the threats which are
faced while using the internet it is faced by the society and business sectors as well, and also the
precautionary measures while using the applications on the mobiles and also while using online
services as well.
Positive and negative use of internet
Technology is increasing in the country which is influencing in business sector and
society as well. Owners of the business are trying to use internet on the business but these
business man want to know the positive and negative use of the internet on the society.
Comparison is done on the basis of the use of the internet by the society and the business sector.
The use of internet are compared below:
Positive use of internet
Data storage and data revival – Internet is influencing the society in many ways, one of
the ways is data revival and data storage. People are using the internet and can store the files ,
these files are stored in the computers, pen drives, and hard disk as well. Data can also be
revived from the computers and pen drives as well. Cloud software is used by the business man
for storing the data and also for recollecting the data as well. This storage software are reducing
the cost of the company for storing the data in the ware houses.
Mobiles Communication is increasing between the people so through help of
technology mobiles are formed and the use of mobiles is increasing day by day. Mobiles can
store the data, contacts and help to communicate to one another through the messages, voice call.
And video calls. Through mobiles one can track the other one and mobiles are taking place of the
computers nowadays. Through the use of the society is using the applications in the phones,
these applications could be games, safety, and social media apps as well (Shakeel, and et.al.,
2018).
1
Document Page
Social media reviews – Through the internet one can give the reviews to the other
business and give feedback to the business by the ways of rating for reviews and give feedback
through the process of commenting in the comments section. Through the reviews from the
social media business can improvise the products according to the need of the customers. Social
media is also used for the companies for promoting the products and also for advertising the
products as well. Through the social media one would also get negative reviews and the
company would be prepared for these type of reviews.
Negative use of interent
Cyber crime – Through the use of internet the cyber crime is increasing in the country.
Criminal are using the technology for crime, in cyber crime one would use the hack the software
and the one would get all the details which are stored in the computers. The data stored could be
anything which includes the images, messages, and the bank account details as well, it harmful
for society and business. Nowadays money is digitally stored in the application so through the
use of hacking software one would use the money easily. Through the hacking bank accounts
could be emptied and it would take seconds for completing the process.
Social media – Through use of internet the use of social media is increasing on the large
level it includes the personal details as well. These details are used by the criminals which would
use the personal details and take the negative use of the details. People are uploading each and
every second details on the social media through the way of sharing the post. The details include
the personal details, photos and the phone numbers as well. Through the social media one is
connecting to the other people which are situated in other countries and which are unknown
these unknown person can be the criminals. Some people in the society and business are also
spreading the viruses for getting the details of the computers owners and through these one
would be use the personal details of another.
Loss of human touch – Through the use of social media one is not able to connect and
communicate with the family and friends. The relations are maintained through the way of the
social media. People who are using the internet has forgotten how to communicate and interact
with the family members as well. Every one in the public place is not communicating with the
one another, but they communicate to others through the social media (Sun, and et.al., 2018).
Games - Playing games online is addiction is the favorite pastime for the people which
includes children, adults and even old people as well. Through this addiction one cannot
2
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
complete the important work and one is wasting the time in playing the games online as well.
The internet is reason the main reason for increasing the cases of obesity because every one is
sitting and using the phones for playing the games online.
Use of the internet can be positive and negative as well. Internet is useful for the business
and society but use must be limited. People must be aware about the cyber crime which is
increasing in the country. People must implement the security soft wares which will protect the
data phones and computers as well. One must try to overcome the addiction of playing the games
online and using the social media (Telef 2016). These both the impacts have been compared on
the basis of the use of the internet by society and business.
Measures of security and privacy while using internet
Report is consisted of the precautionary measures for security and privacy of the society
and business sector. Threats of using the internet and the precautionary measures while using the
internet is provided below:
Threats of using the internet
Threats for business sectors
Botnets is undetected, these are the collection of the software robots which are creating
the arm to infect the computers. Through botnets one can send mails with the link of viruses
which will destroy the computer software. Botnets would spread the malware and also attack the
other systems of the computer as well. Distributed denial-of-service is a type of attack in which
it will sabotage the software and the websites as well. In some cases through these threat the
computer or system shut down completely. Multiple computers would be controlled by the
attackers and the attacker is using the weaknesses of the computer as well. One can install anti
virus soft wares for protecting the computers. The information on the computer include the
photos and messages which can be used by the attacker. One can install the Trojan horse for
overcoming the threat. Malware is the most important for damaging the computers, it includes
the virus, spyware, and worms. Malware can delete the files and take the data of the computers
as well. It would also send the emails without the permission and also control the computer as
well. These threats would be harmful for the business sector and it would affect the sales of
company.
Threats for society
3
Document Page
Pharming is the type of fraud which is done online, in these the URL entered is correct
and of original website but it is directly redirected to the fake website. In that way it can steal the
information and data entered on the website. Phishing is used by the criminals, it consists of the
fake emails and websites which are stealing personal and financial data from the internet.
Ransomware is the malware where it gives permission to access the computers which ask for
payment details for removing the restriction from the website. It is appeared in the way of emails
and attachments which consists of malware. Spam is the method in which information is
collected in the form of mails. It will consist of the mails which are not wanted and also consists
of the malware (Weber 2015). These threats are harmful for society and it would affect the life of
the people using the internet.
Security and privacy while using the internet
Basic precautions which are provided by the cyber security cell. The mails of the spam
and the phishing emails are spreading the malware in the computers, one must not try to open
these mails and delete it directly while using the internet. Do not double-click the links which are
given in the spam mails it will give access to the virus or hacking software. One must be updated
while using the computer and the internet. People must think before acting and implementing on
the decision because one click would also give access to the hack the system. Privacy setting is
important because it would invite the unknown virus and the malware in the system. Settings
must be updated time to time specially on the social media and phone applications as well. Social
media websites like face book and Instagram must be protected while using internet and services.
Blocking the cookies, one must block the cookies which appears while one is using the
websites. These cookies would track the details and the username and password of the
application as well. One must try to unlink the accounts and secure the connection which are
been provided on the internet. Antivirus must be installed in the computers for working
effectively (Kannan, and et.al.,). Stronger passwords are playing the vital role in privacy and
security of the account. Passwords of the accounts must be stronger and the virus might not steal
the data of the account while using the internet and services.. Passwords must consists of the
characters and the numbers and signs as well. Better browsing is important completing the work
effectively. So the computer must try to delete the cookies and the use safe and secured
connection for using the social media in the computers. One must secure the servers and the
clouds which is contains the data of the computers and the phoned as well. So computers and
4
Document Page
mobiles must be operated by the mobile data and the Wi-Fi of public places must not be used. In
some cases the authority needs to have the permission to access the data of the computers and the
phones while using the internet and services(O’Leary, and et.al., 2016.).
Through following the steps one would be able to work effectively on the internet. One
must follow the precautions for safe and secure internet. Antivirus is protecting the computer and
mobiles from every threat, so antivirus must be installed. One must use the safe and secure
connections for using the internet. Stronger passwords are protecting the data from the accounts
which includes personal and financial data as well.
Communication providers features and applications
Communication providers are one who are helping the people to run the communication
effectively. The report consist of the two communication providers which are Microsoft and
Oracle. These two unified communication providers are performing the work efficiently. Report
consists of comparison between the two communication providers which are compared on the
basis of the features, applications and suitability of the business.
Microsoft
Microsoft is a multinational company which is dealing in computer software and the
computers as well. Company is dealing in the software which are known as Microsoft office
software, Microsoft windows, web browser as well. The company also makes the electronics
items and computers parts as well (Jacobsson and Davidsson, 2015, ).
Microsoft office
Microsoft office is the software which is made the company Microsoft. It is used as the
client server software, which helps the company to fulfill the needs of the clients. The software
consist of the features and application which are updated by the company as per time and as per
the technologies (Glaser, and et.al., 2018.). These soft wares are already downloaded in the
Microsoft products and then it must be renewed for further updations. The products include the
versions which are updated with the latest technologies as per time. Applications in the soft
wares includes the word, excel, power point, outlook and one note. These applications have the
features which are consisted of the Microsoft software. Microsoft word includes a word
processor and with the document format. Microsoft excel consists of the spread sheet which is
helping to make the spreadsheet for the presentation. PowerPoint application consists of the
power point presentations which includes text, graphics and formatting as well. Outlook consists
5
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
of the messaging and mailing the scheduling as well. One note consist of the notes, drawings and
audio clippings as well. Publisher includes of designing the brochures and cards as well. Access
consists of the software tools which includes the development tools as well. These applications
are providing help to the society and the businesses ans well. These applications are also
available in the mobile apps and the applications also provide the factors which would also help
the people to fulfill the daily activities, it is increasing the suitability of the business. Due to use
of the applications in daily life people are suitable to use the technology and the applications, so
the company is going to gain more profits and achieve the long term goals. Company is
providing various applications and web services to the people for performing the daily activities
these services provided by the company are charged when these services are need to be updated.
Oracle
It is the multinational company which is dealing in the data base software and enterprise
soft wares. The company is also dealing in the database management systems, enterprise
resource planning soft wares and hard ware products. Services provided by the oracle are oracle
cloud, oracle consulting and oracle support. There is high competition in the market and the
biggest competitors of oracle is Sybase (Dröse, and et.al., 2015. ).
Oracle database
It is the data base which is produced by the company oracle and it is useful for the
business enterprises and not for the individual people. It is having the features to calculate and
store the data in the computers efficient. It consists of the online transaction process and the data
processing as well. There are various versions of the database and the initial version of database
is V2 which is updated as per the time and technology. The Latest version of data base is of the
19C and it consists of the features like stability and data guard as well. It provides the features
like performance and security to the data in the database. Security is must for the database
because it contains the data which is important for the business. The applications which are used
in the database software is application express and which consists of the other features and
wizards like web modules and SQL software as well. Through the application businesses have
the ability to create the advanced pages. Through the web modules the data of the company is
stored in these applications, these applications need to be updated time to time if not than it
would increase the risk of corrupting the data. These applications are increasing the suitability
for the business. The company is not consisted of the software and the business class is the only
6
Document Page
one to use the database because data base is of no use of the company. As the business is
increasing in the country the database is used by the businesses and the company also needs to
store data in the secured places (Çikrıkci 2016.). Through these factors the company would earn
the revenue and achieve the long term objectives as well.
These both the unified communication providers which are providing the software to the
people for helping them in daily activities. The Microsoft is dealing in the software and the
company would also increase the growth and revenue as well. These both the companies would
be able to achiever the objectives and be successful in the market. The oracle is providing the
database to the business sectors which includes the software as well.
CONCLUSION
The report is stating about the internet which is influencing the society and business.
Society is using the internet for communication and business man are implementing the business
in the business for increasing the sales. There are various threats which are affecting the society
through the way of internet. Threats like malware and virus are accessing the computers and the
mobiles. These threats gain access through the mails and the links which are opened by the
people accidentally. Threats include spam and cyber crime is increasing with the use of the
internet which are affecting the society and business sectors as well. Microsoft and oracle are
providing the software to the companies and society which are playing the role of unified
communication providers. Through these the people are communicating effectively with the
latest technology like video conferencing and many others. The report is making us aware about
the threats and use of the internet in the society and business as well.
7
Document Page
REFERENCES
Books and journals
Çikrıkci, Ö., 2016. The effect of internet use on well-being: Meta-analysis. Computers in Human
Behavior. 65. pp.560-566.
Corda, and et.al., 2015. Sharing or reselling NFC applications among mobile communications
devices. U.S. Patent 9.208.483.
Dröse, and et.al., 2015. Method and system for integrating real time communication features in
applications. U.S. Patent 9.083.770.
Glaser, and et.al., 2018. Is Social Media Use for Networking Positive or Negative? Offline Social
Capital and Internet Addiction as Mediators for the Relationship between Social Media
Use and Mental Health. New Zealand Journal of Psychology. 47(3). p.12.
Jacobsson, A. and Davidsson, P., 2015, December. Towards a model of privacy and security for
smart homes. In 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT) (pp. 727-
732). IEEE.
Kannan, and et.al., Microsoft Technology Licensing LLC, 2016. Extending digital personal
assistant action providers. U.S. Patent Application 14/676.603.
Marchant, and et.al., 2018. Correction: A systematic review of the relationship between internet
use, self-harm and suicidal behaviour in young people: The good, the bad and the
unknown. PloS one. 13(3). p.e0193937.
O’Leary, and et.al., 2016. Patients’ and healthcare providers’ perceptions of a mobile portal
application for hospitalized patients. BMC medical informatics and decision
making. 16(1). p.123.
8
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Shakeel, and et.al., 2018. Maintaining security and privacy in health care system using learning
based deep-Q-networks. Journal of medical systems. 42(10). p.186.
Sun, and et.al., 2018. Security and privacy in the medical internet of things: a review. Security
and Communication Networks, 2018.
Telef, B.B., 2016. Investigating the relationship among Internet Addiction, positive and negative
affects, and life satisfaction in Turkish adolescents. International Journal of Progressive
Education. 12(1). pp.128-135.
Weber, R.H., 2015. Internet of things: Privacy issues revisited. Computer Law & Security
Review. 31(5). pp.618-627.
ONLINE
Threats of internet for society and business [Online] Available through:
<https://scsonline.georgetown.edu/programs/masters-technology-management/resources/top-
threats-to-information-technology>
<https://communities.theiet.org/blogs/830/5982>
9
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]