The main determination of this presentation is to understand the impact of internet interference in our daily life. The application of internet is not only restricted to the younger generations but also to the older generations as well. The application of internet have both positive and negative impacts on the society.
The issues related with the application of internet in our daily life activities are very much important regarding the implementation of the internet enabled devices as the risks can have a direct impact on the growth and productivity of the users of those systems. The application of the right way of internet is very much needed for maximum efficiency
The main concern of this paper is regarding the followings questions:
Why internet is so important?
What are the applications internet in our daily life?
What is the impact after using internet in our daily activities?
The different popular applications of internet are healthcare industry, construction industry, ICT industry, emails, social media applications, interactive games, traffic systems, different types of applications such as online railway vending system, electronic newspapers, education, job portals and e-commerce online shopping websites.
Cultural differences and depression is one of the major issues related to the enhanced application of internet.
Dependency on the automated systems are the other type of issue of this scenario.Unethical hacking is the other significant impact of the utilization of internet in our daily life activities as any type of changes in a process can cost us huge loss.Ignorance of the environmental aspects related to the use of internet is the other significant issue of this presentation.
As discussed by Wei et al. (2014), there are different types of privacy and security issues related to the application of internet in our daily life activities such as the compatibility issues such as API, data breaches and SaaS risks.
As discussed by Rittinghouse & Ransome (2016), the different risks associated data privacy are malware programs, unorganised data and injection attacks. Individuals are required to secure their systems from these issues in order to accomplish the desired results from their process.
As discussed by Cuzzocrea (2014), the application of internet in a business organisation should be bonded by specific rules and regulations which are needed to be followed so that professionalism is maintained in the working environments.
As suggested by Stojmenovic& Wen (2014) , the privacy and security issues are the most vital factors and have a negative of both the individual who is using those systems as well as it is very immoral from the perspective of the dedicated systems which are actively connected to the internet.
According to Ahmed & Hossain (2014), the usefulness of internet technology can be observed in the different inter based applications which are used for domestic purposes The qualitative analysis of this paper helps in understanding the issues related to the implementation of internet in our daily activities whereas quantitative data analysis is used for analysing the numerical type of data awhere the qualitative data analyses the brief explanation of the source data (Comer, 2018)
The quantitative analysis is conducted in a group discussion where a team was made to fil up a registration form having questions related to the emerging technologies and their innovation as well as the impact of internet in our daily activities The issues and challenges related to the use of the internet should be purposefully solved with the help of effective security measures. The different types of privacy issues related to the internet enabled systems should be running oh HTTPS server rather than the HTTP server (Pontes, Szabo & Griffiths, 2015). The issues related to the application of internet in traffic signals and healthcare industry should be subjected to rigorous testing schedules so that the error percentages are minimized to a huge extent.
From the above paper, it can be concluded that the application of internet is very much useful in all of our daily life activities. Huge amount of data can be easily accessed with the help of internet connections. Internet can also be used to enhance the business services of a business process. However it can be also found that issues and challenges can be effectively mitigated with the use of an effective plan, which needs to be seriously considered before the application of the internet enabled systems
Pontes, H. M., Szabo, A., & Griffiths, M. D. (2015). The impact of Internet-based specific activities on the perceptions of Internet addiction, quality of life, and excessive usage: A cross-sectional study. Addictive Behaviors Reports, 1, 19-25.
Comer, D. E. (2018). The Internet book: everything you need to know about computer networking and how the Internet works. Chapman and Hall/CRC.
Ahmed, M., & Hossain, M. A. (2014). Cloud computing and security issues in the cloud. International Journal of Network Security & Its Applications, 6(1), 25.
Stojmenovic, I., & Wen, S. (2014, September). The fog computing paradigm: Scenarios and security issues. In Computer Science and Information Systems (FedCSIS), 2014 Federated Conference on (pp. 1-8). IEEE.
Botta, C., Bertolino, M., Zeppa, G., & Cocolin, L. (2014). Technological exploitation of PDO cheese as carrier of putative probiotics from plant origin. In International Scientific Conference on Probiotics and Prebiotics IPC 2014 (pp. 6-186). PAMIDA Iternational Ltd..
Cuzzocrea, A. (2014, November). Privacy and security of big data: current challenges and future research perspectives. In Proceedings of the First International Workshop on Privacy and Secuirty of Big Data (pp. 45-47). ACM.
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation, management, and security. CRC press.
Wei, Q., Mukaida, M., Kirihara, K., Naitoh, Y., & Ishida, T. (2014). Thermoelectric power enhancement of PEDOT: PSS in high-humidity conditions. Applied Physics Express, 7(3), 031601.