In the past few decades, use of Internet has brought a revolution in almost all aspects of Human Life. The increased usage and adoption of Internet has effect on all spheres of life, key being (but not limited to) education, health services, financial, communication, retail, business model etc and thus has irreversible impact on growth and development of each individual whether directly or indirectly.
Other areas that needs to be considered and surely will have long lasting impact are social and moral (values) impact.
the practice of Internet has bring in many advantages including highly competitive environment, faster reach, ease of Information access leading to more value proposition.
But there is a great quote - "There are two sides of a coin" which is also reflecting in below saying:
"Every truth has two sides; it is as well to look at both, before we commit ourselves to either" – (Aesop, n.d)
Any advanced technology creates new threats as well as new potentials. The Internet offers enormous opportunities, which are being exploited by communities, and increasingly also by business enterprises. It also harbours risks to the privacy of personal data and communications, as marketers seek to profile their electronic customers, and governments seek to impose themselves on people they see as miscreants (Cyberspace Invades Personal Space, 1998). This paper describes the kinds of threats that exist and are emerging. On these lines this work will reflected on the disadvantages of Internet within the periphery of Information privacy.
Internet today plays a key role in every walk of life. Let us try to articulate the role of Internet in everyday life:
Briefly internet has been a revolutionizing phenomenon and part of play in every walk of life as represent in picture below highlighting the increased trend in Internet penetration.
Figure (a) – "Number of internet users 2005-2015 | Statistic", 2016
This graphical representation gives information on the total number of worldwide internet users from 2005 till 2015. As can be seen, the number of internet users worldwide has reached to 3.17 billion in 2015, up from around 1 billion in year 2005.
Another illustration of increased Internet trend is implied by the below statistics which shows that market capitalization of Internet based companies has increased from $16,752 (As of December 1995) to $2,415,867 (As of May, 2015).
Figure (b) – "Growth of Internet Companies | Morgan Stanley, Capital IQ, Bloomberg", 2015
The significance of privacy and usage of internet are co-related and have evolved time to time together in discussions around the topic. It is therefore not possible to accept or deny the notions about privacy without emphasizing Information security/ data protection considering the ways internet based applications, mobile penetration and online world has evolved.
Personal information or data of an individual comes in the periphery of private information. Examples include (but not limited to...) Name, Origin, date of birth, address, and gender. Also details like IP address of computer used by an individual, financial data, card details, and passwords are part of private information (Privacy and Information Technology, 2014).
Every individual has Private space and wants to retain it. Key aspects for Privacy include:
Below is a diagrammatic representation of the areas of privacy concern.
Figure (c) – "Area of privacy concern | CSI", 2016
Under this head we will analyse the impact of internet on Information Privacy.
Data transmitted over Internet is subject to various risks like:
the purpose of transfer
lead to financial or legal impact
Under all these circumstances of cases of data leakage or data theft over Internet, most important is the access to content to unauthorised authority which leads to an opportunity to intercept the message and thus leading to security breach and hence exposes the sender to risk.
Approach to deal with this threat can be that the message transmission may be based on sender/receiver confirmation. Also the data can be encrypted and then encrypted data can be passed over Internet. Decryption logic at receiver end can be used to get the actual message. This minimises the risk of data theft.
Internet has played role of double edged sword for Education domain. though it provides information and easy access to knowledge articles and subject area, in other way it also hampers the main purpose of Education to bring overall development in student so that they become responsible and qualified citizens for tomorrow.
With Internet around children expects instant reposes and gratification. The knowledge is easily available and Internet provides results instantly with no waiting or minimal effort (Lynch, 2008). In this situation as the know-how is easily obtained via Internet, children do not value the importance of concepts and thus their problem solving skills are not developed in long term. This is in concurrence with a great saying given below which implies that if something is achieved easily (without hard work) then the achievement is not valued.
“Nothing in the world is worth having or worth doing unless it means effort, pain, difficulty… “(Roosevelt, n.d)
Internet has eroded the traditional classroom culture and thus the Guru based methodology has been converted to a model where a there is no Guru (Teacher), rather an instructor who just server his clients (students). This vast variation in teaching pedagogy to Internet penetration has drastically reduced effectiveness of Education system.
Other negative impact of Internet on Education can be seen that the average attention span of teens today has reduced. the constant supply of information , entertainment leads to lost focus of student and thus they do lack the capability to do in-depth analysis of work problems. Internet also hampers by facilitating the wrong modes of assignments, work as children these days can easily access test, assignments over Internet thus defeating the purpose of education system.
Identity theft is a scenario where the information on the basis of which an individual is identified is acquired by an unauthorised person and is used in a way that the unauthorised person can act or operate as though they are same person. This is equivalent to steal a wallet or valuable item of a person. Internet has been a medium of this type of identity theft. Examples include Phishing websites, mail theft, getting details from online loan and application form etc.
Some internet based control can provide location details of an individual, which may be annoying and unpleasant for some who do not want to be social.
Other risks that Internet poses are like Spam [refer Appendix (c)], tracking IP address of a machine connected to internet and thus hacking to gain undue advantage of someone’s personal space or information.
Businesses have been impacted by Internet in invariable fashion in which key issues has been illegal file sharing through which one acquires individual copyright data. Additionally this violates the business ethics and these practises have been raised as concern in one or other form example copyright media such as music/ movies shared, illegal software downloaded from Internet etc
Below is an articulation of the negative impact of Internet in business:
Social relations are badly impacted by the use of gadgets based on internet. Today, social gathering have reduced drastically as Internet has taken up place for major mode of connections and communications. Children do not sit with Parents as they are most of the time hooked to gadgets and prefer to be involved in activities like connecting with friends on facebook, text messaging, chatting etc. Rarely they meet manually and get bonded to people around them, thus people these days are connected only virtually in virtual world. Below is a diagrammatic representation of statistics which reflects how teens are increasingly getting engaged in internet social networking sites.
Figure (d) – "Teen and adult use of social networking sites— change over time| The Pew Research Centre", 2013
This is one of the biggest problems created by growing usage of Internet. Internet is a curse because of which moral values are getting thin day by day in culture. Teens, instead of using Internet in productive manner are using it as source to discover adult content. Below is a diagrammatic presentation of the concerns from parents for online activity using internet:
Figure (e) – "Parental concern over child's online presence | Pew Research Centre”, 2013
Other factor that reflects the deterioration of moral values is that across all socioeconomic groups and geographic locations, teens are equally as likely to report lying about their age to gain access to websites and online accounts. This has been shown below with increasing children lying over Internet.
Figure (f) – "Lying about age, by age | Pew Internet Parent/Teen Privacy Survey" 2012
This loss in moral values due to Internet is irreparable and far more as compared to economic loss (which can be quantified in monetary terms).
Respecting a person's privacy is to acknowledge such a person's right to freedom and to recognize that individual as an autonomous human being.
The Internet provides a whole new set of specific ways in which people's privacy may be intruded upon, and adds new dimensions to existing problems. It necessitates the negotiation of a whole new set of balances among the various interests (). Internet based administrative practices, aided and abetted by information technologies, have dramatically increased the incidence of dataveillance [refer Appendix (d)], and created enormous threats to information privacy.
Privacy remains a critical element for individuals doing business or engaging online. While it is understandable there are distinctions between industry sectors and their privacy practices but still the gaps highlighted under the section "Impact Analysis on Privacy" can be catered by creating and adopting policies that covers the risks and issues identified. Individuals and consumers also have strong expectations in relation to areas of data breach notification and it is time that Regulations and policies resulting in control and responsibility are designed and put in practice, particularly in the area of social networking.
Aesop, Greek writer Aesop (620-564 BCE) in the fable “The Mule”.
Cyberspace Invades Personal Space by Roger Clarke, Visiting Fellow, Department of Computer Science, Australian National University.May/June 1998.
Number of internet users 2005-2015 | Statistic. (2016). Statista. Retrieved 5 June 2016June 2016.
Privacy and Information Technology by van den Hoven, Jeroen, Blaauw, Martijn, Pieters, Wolter and Warnier, Martijn, The Stanford Encyclopedia of Philosophy (Spring 2016 Edition), Edward N.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2017). Role Of Internet In Todayâ€™s World. Retrieved from https://myassignmenthelp.com/free-samples/role-of-internet-in-todays-world.
"Role Of Internet In Todayâ€™s World." My Assignment Help, 2017, https://myassignmenthelp.com/free-samples/role-of-internet-in-todays-world.
My Assignment Help (2017) Role Of Internet In Todayâ€™s World [Online]. Available from: https://myassignmenthelp.com/free-samples/role-of-internet-in-todays-world
[Accessed 19 January 2020].
My Assignment Help. 'Role Of Internet In Todayâ€™s World' (My Assignment Help, 2017) <https://myassignmenthelp.com/free-samples/role-of-internet-in-todays-world> accessed 19 January 2020.
My Assignment Help. Role Of Internet In Todayâ€™s World [Internet]. My Assignment Help. 2017 [cited 19 January 2020]. Available from: https://myassignmenthelp.com/free-samples/role-of-internet-in-todays-world.
MyAssignmenthelp.com delivers assignment help to millions of students of USA. We have in-house teams of assignment writers who are experts on wide ranges of subjects. We have appointed teams of native writers who provide assignment help to students in New York City and all over the USA. They are skilled assignment writers who successfully cater to search terms like do my assignment in the USA
Answer: Introduction In this report, the discussion is going to be done on the strategic information system of Westpac bank. Westpac bank is among the four major banks of Australia, with the headquarters located in the Sydney. The westpac bank has divided in two segments, bank associated with the institution and the bank associated with consumer. Not only in Australia, Westpac bank holds a good rank in New Zealand. The bank had formed a...Read More
Answers: 1: CIA of information security is commonly described as the triad of information security. Confidentiality, Integrity and Availability are denoted by the term CIA. It is a model of information security that helps in evaluating organisation’s information security. Confidentiality is defined as ensuring authorized person is accessing data. Unauthorised access should be blocked to ensure information security. Disclosure of importa...Read More
Answer: Introduction Ransom ware is a subset of the malicious software also known as malware invented from the cryptovirology which is designed to threaten the general public on account of stealing of data saved on either, computer or tablets. This software blocks the data of the person and the same is handed over to the person back once the money is received in the form of ransom . The consequences of not giving the ransom can be so bad t...Read More
Answer: The Quality Assurance (QA) process would primarily consist of four kinds of distinct stages. These stages are mainly responsible for the controlling of errors and information redundancy within the Business Information Modelling (BIM) Process. Scope Verification Meeting– After the assigning of the project, the Project Manager should request the scope of the project and a particular copy of the scoped documents. These documents ...Read More
Answer: Introduction This report aims to provide a detailed strategic analysis of the company, WesFarmers Limited. The essential analysis is completed with the help of PESTLE analysis, Porter’s Five Forces analysis and the threats and opportunities of the company is discussed. A detailed report of a discussion about the resources of the firm is discussed. The capabilities of the organisation is discussed and the capabilities are e...Read More
Just share your requirements and get customized solutions on time.
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
Not only helped me to understand the material but helped me out of a serious time crunch.
Thank you for the good write up. lecturer was satisfied with the essay. Thanks again for the prompt reply.
Thank you for putting together this project. I helped me to understand more in detail how elders would find healing.
I HAVE SUBMITTED THE ASSIGNMENTS AFTER ONE MONTH ONLY I HAVE THE RESULTS SO JUST WAITING FOR THAT AND AFTER THAT I WILL RESPONSE...