The identified crime is a type of cybercrime known as internet fraud. Firstly, the fast-evolving technology has made internet fraud more advanced and complex since it is much simpler for fraudsters to confiscate someones credentials without physically appearing to them (Wexler, 2018). Second, the records on crime that are now accessible do not match the evolving nature of cybercrimes. This is because the criminal information systems have not documented any modifications, and the statistics are less effective due to underreporting of internet fraud. In order to develop methods to curb this internet fraud, reliable documentation is essential.
Social media networks and Internet of Things gadgets are two technology resources that could be used to delve into crime. Twitter and Instagram are two social media sites that the authorities can use to track down the culprits and make arrests. The investigator can examine these sites, and they can consistently discover a connection between the victim and the culprit. Additionally, information is kept on Internet of Things gadgets, which can be used to track a criminals online trail. As a result, this information is reviewed and incorporated into the probe to provide valuable insights on how the probe will proceed. However, the prosecutors can argue that this is a privacy violation, making it a risky sphere of operations (Jung & Park, 2018). These approaches are beneficial for investigations since they focus on outcomes. Crimes are resolved, and justice is served through the employment of these investigative tools. These techniques are trustworthy since they provide answers in situations with no other options.
First, it is challenging to investigate and prosecute such offenses due to their multijurisdictional nature. As investigations across jurisdictional lines become more difficult, most of these culprits manage to avoid detection. Second, there needs to be more advancement in the law and technology. This is because more complex cybercrimes cannot be convicted because of how quickly technology changes and the law was not prepared to address these shifts. This problem has two solutions extradition coming first. If the victims nation and the perpetrators homeland have an extradition agreement, repatriation is always possible (Brayne & Christin, 2020). This will guarantee that the culprit is apprehended and convicted. Second, changing the legislation to reflect current circumstances. This will ensure that the culprits are apprehended within the confines of the law and subject to their sentence.
The development of the Internet space leads to the emergence of many ethical issues. For example, how moral it is to use ad blockers, considering the fact that online advertising is necessary to pay for content that users get for free.
Discussion
Since many sites cannot stop showing ads, and thousands of users neither need nor like watching them, an ethical ad blocker was developed in 2015. It solves the problem by completely blocking access to every website that shows sponsored posts or videos (PBS Idea Channel, 2016). The extensions creator says that this way, the user doesnt experience ads, but they also dont leech free content (Meyer, 2015, para. 5). While this solution is not convenient, it is quite ethical and fair in relation to both users and content providers.
Further, when discussing the importance of algorithmic advertising technologies, one needs to notice that they help advertisers make sponsored content more targeted and individualized. Since the standardization of the rhythms of consumer demand is relatively effective on the Internet, advertisers now rely on the updated approach (PBS Idea Channel, 2016, 00:05:13-00:05:16). They analyze the received data about individual users and their search patterns, and then persons with similar interests see the same sets of advertisements (Kant, 2021). In this case, the ads are more likely to be effective.
Conclusion
Eventually, I believe that using ad blockers is necessary nowadays because most online ads are so irritating that they prevent users from accessing a websites content. As long as sponsored posts and videos continue popping up on the entire page, making it impossible to close them, ad blockers will be needed. However, I think that ad blocking can be turned off for sites where ads are unobtrusive or relevant, and such an approach will be ethical and mutually beneficial.
The internet and cell phones have grown pervasive in our lives in recent years, affecting the way we communicate, work, and socialize. This trend has been exacerbated by the COVID-19 epidemic, as individuals rely on digital technology to be connected and informed more than ever. While some contend that the internet and smartphones have improved human behavior and relationships, others argue that they have caused more issues than they have solved. In this essay, I analyze the arguments advanced by experts in five different publications in order to investigate the consequences of internet and smartphone use on human behavior and relationships during the COVID-19 epidemic.
Thesis
While most researchers believe that the internet and smartphones have had a substantial impact on human behavior and relationships, particularly during the COVID-19 epidemic, they disagree on whether these effects have been predominantly beneficial or detrimental. In this article, I argue that while the internet and smartphones provide essential benefits, such as expanded access to information and social connections, they may also be harmful to mental health, interpersonal communication, and societal values.
The Upside of Wasting Time Online
Goldsmith argues in Go Ahead: Waste Time on the Internet that internet browsing may boost creativity and productivity. He claims that digital technologies allow consumers to indulge in activities that would typically be deemed wasteful, such as skimming through social media feeds or viewing humorous videos online (Goldsmith, 2016). According to Goldsmith, these hobbies stimulate creative thinking and give a much-needed reprieve from the rigors of work and other commitments.
The Internet During the Pandemic: Better or Worse?
In Has Coronavirus Improved the Internet? Wortham investigates the internets involvement in the COVID-19 outbreak. She observes that the epidemic has brought to light both the advantages and disadvantages of digital technologies, as individuals have relied on the internet for everything from remote jobs to online learning and socializing (Wortham, 2020). Although noting that the internet has helped individuals stay connected during times of physical isolation, Wortham also expresses worry about the negative impacts of excessive screen time, particularly for those without consistent internet access.
How Smartphones Hijack Our Minds
Carr claims in How Smartphones Hijack Our Minds that cell phones and other digital gadgets are designed to attract and maintain our attention. He claims that our phones continual interruptions and notifications make it harder to focus on essential activities and add to emotions of worry and tension (Carr, 2017). Carr also discusses the possible negative consequences of social media, arguing that it may encourage a culture of comparison and rivalry, eroding our sense of self-worth.
Stop Googling. Lets Talk
In Stop Googling. Lets Talk. Turkle challenges the notion that digital technology can generate meaningful connections, arguing that face-to-face contact is necessary for developing authentic relationships. She claims that even when individuals are physically together, excessive smartphone use can contribute to feelings of loneliness and alienation (Turkle, 2015). Turkle believes that in order to create more significant relationships with others, individuals must make a conscious effort to put down their phones and participate in meaningful interactions.
Are We Really as Awful as We Act Online?
In Are We Really as Awful as We Act Online? Fuentes investigates the gap between online and honest behavior. She observes that individuals behave differently online than they do in person, frequently indulging in unpleasant or hostile conduct that they would never display in person (Fuentes, 2019). Fuentes believes that the internets anonymity and the absence of penalties for irresponsible activity add to this separation. She also emphasizes the possible negative consequences of social media, which may produce a toxic and hostile culture.
Analysis
The five publications discussed in this essay offer essential insights into the consequences of internet and smartphone use on human behavior and relationships. While some researchers stress the advantages of new technologies, others warn about their negative influence on mental health, interpersonal communication, and societal values. Goldsmiths case for squandering time on the internet may appear contradictory (2016). In other words, it emphasizes the potential benefits of digital technology for creativity and productivity. Worthams piece, on the other hand, offers a more nuanced approach (2020). More precisely, it is stressing how the COVID-19 epidemic has exposed both the positives and dangers of internet use. Carrs piece focuses on the possible negative impacts of smartphone use on concentration and mental health (2017). Turkles critique of digital technology emphasizes the necessity of face-to-face contact in developing meaningful connections (2015). Meanwhile Fuentes investigation of online behavior implies that the internets anonymity can lead to toxic online cultures (2019).
Overall, these studies indicate that the internet and cell phones may have both beneficial and harmful consequences on human behavior and relationships, particularly in the context of the COVID-19 pandemic. While these technologies can provide significant benefits, such as improved access to information and social connections, they can also have a negative impact on mental health, interpersonal interactions, and societal values. The advantages of modern technology are apparent, but we must be cognizant of their possible disadvantages. To gain the benefits of internet and smartphone use while reducing the negative impacts, we must find a happy medium that allows us to utilize these technologies in a healthy and productive manner. Setting limitations on screen time, being careful of our online activity, and emphasizing face-to-face conversation wherever feasible all contribute to this.
Conclusion
To summarize, the internet and smartphones have changed the way we communicate, work, and socialize, particularly during the COVID-19 epidemic. While academics agree that these technologies have had a substantial impact on human behavior and relationships, they disagree on whether these effects have been predominantly beneficial or harmful. According to my review of the five studies, these technologies have the potential to provide significant advantages. But, we must be aware of their possible downsides and strike a balance that allows us to use them in a healthy and productive manner.
A future study might look at the experiences of those who have successfully navigated the hurdles of digital technology to preserve good relationships and work routines to learn more about the effects of internet and smartphone use on human behavior and relationships. This study looks into the importance of digital literacy in encouraging healthy technology usage, as well as the possibility of technical advancements to mitigate the detrimental impacts of internet and smartphone use. We can create a society that optimizes the benefits of digital technology while reducing its possible negatives by continuing to investigate these complicated topics.
References
Carr, N. (2017). How Smartphones Hijack Our Minds. Wall Street Journal.
Fuentes, A. (2019). Are We Really as Awful as We Act Online? National Geographic.
Goldsmith, K. (2016). Op-Ed: Go ahead: Waste time on the Internet. Los Angeles Times.
Turkle, S. (2015). Stop Googling. Lets Talk. The New York Times.
Wortham, J. (2020). Has Coronavirus Made the Internet Better? The New York Times Magazine.
The internet is one of the most important marvels of the modern era. It has led to breakthroughs in communication and data transfer as well as information sharing that has helped humans make massive steps towards greater development. It is basically a world wide system of interconnected networks that utilize the TCP/IP protocol to allow data transfer. This has allowed websites to be built, messaging services to start and many more things that have become an integral part of life for many people around the world. Many commercial enterprises use the internet to spearhead their marketing campaigns while others such as Ebay are wholly dependent on the system for their revenue generation. Keeping in view the plethora of uses that the internet has been made to foster, the beginnings of the system emerge as somewhat of a startling revelation.
Localized networks of computer systems had been brought to use across major universities in the United States and other such big establishments prior to the internet. These highlighted the tremendous advantages that networking offered and can be said to be the precursor to the world wide system (Loughran 1-48). The United States military wanted to rival the apparent technological breakthroughs of the Soviets following their launch of successful satellite systems into space. This led to the foundation of the Advanced Research Projects Agency which contributed and fostered research into networked radar systems that spanned the United States in order to supplement defense requirements. One of the important personalities that got involved with the projects was ex-Harvard researcher Joseph Licklider who was instrumental in the SAGE project that had been initiated and also contributed by bringing in Lawrence Roberts to the team. Roberts had been involved in a comprehensive study of packet switching technology that was supported by the Air Force as being increasingly robust and efficient. Its significance was duly recognized and the beginnings of ARPANET were laid via two nodes connecting UCLA and SRI International in the state of California. As the success of packet switching came forth, such networks were replicated in Britain in the late 1970s while the connections further expanded to Australia, Hong Kong and across Europe and North America (Loughran 1-48).
The network first came to be referred to as the internet in 1974 on the back of increasing popularity. The next major step involved refinement of the protocols that were being operated on and make them more compatible to additional operating systems so as to increase the breadth of usage of the internet. The system found wider usage as it was opened to commercial enterprises in the year 1988 which saw a massive explosion in the number of users. In the following year, Internet Service Providers began to emerge in the United States providing dial-up access to the wide area network. The World Wide Web as we know it today emerged out of CERN in the 1990s which saw the internet gain an increasingly public face (Okin 156-200). By one estimate, the growth in the number of users was at a hundred percent in the nineties. This had its disadvantages in terms of load on the system as well as illegal usage which was attributed primarily to inept central administration and the open nature of the protocols. Business started to emerge increasingly over the internet with dot com companies emerging every where and issuing massive IPOs that led to the stock markets soaring. However, as the internet became common place and began to be understood more, these companies went bust which was a highlight in its history as it pointed to a more mature user base of the network system. Today there are over a billion users of the Internet and growing as the third world countries get more access (Okin 200-240).
There is increasing speculation as to where the internet will be headed from here on. Many developments are looked forward to. Most of them are based on the system becoming increasingly intelligent to allow ease of search and communication. One such growth is of the semantic web, whereby instead of getting a range of answers to search queries from the network, search engines are able to return a select few responses that meet the needs of the query (Zittrain 267). Another proposed development is of creating standard API that would allow ordinary hardware such as that found in homes to be able to connect to the internet. For example a washing machine could be automated and operated via internet for the ordinary household. Video communication has already taken on an increasing role but it can be said that the full potential of this technology is not employed yet and at some point in the future, it will become an integral part of communication via hand held devices to service the human need for social interaction with a visual element. Finally, social networking has emerged as a phenomenon because of the internet. However, its rapid growth points to increasing developments in that area as more and more of our social interactions and communication will be defined by the internet (Zittrain 280-300).
Bibliography
INTERNET USAGE STATISTICS. Internet World Stats.. Miniwatts Marketing Group, 2009. Web.
Loughran, Donna. Internet History Technology and you. New York: Raintree Steck Vaughn, 2003. 1-48. Print.
Okin, JR. The Internet revolution: the not-for-dummies guide to the history, technology, and use of the Internet. New York: Ironbound Press, 2005. 156-240. Print.
Zittrain, Jonathan. The Future of the Internet And How to Stop It. New York: Jonathan Zittrain, 2009. 243-309. Print.
The internet has revolutionized the way people live their lives on many fronts. With the introduction of communications occurring literally at the speed of light, new practices in modern living are evolving, such as e-commerce and e-finance, creating a much more interconnected world even as we remain physically quite far apart. People are finding it possible to do everything they need to do from their own desktop, including receiving the news, interacting with others, working, shopping, banking, trading and any number of other activities. The security of these activities is paramount if e-commerce is to thrive, an important factor in the economic health of the world, an ever-increasing concern given current events.
Despite the relative ease shoppers encounter as they enter an online retailer site, there are several negative factors that must be weighed before an actual purchase is made. As is reported by Steven Chucala (2004), there remain several online buyers who find themselves unpleasantly surprised with their experience on a variety of fronts. One of the primary dangers being confronted is the issue of identity theft and information mining being conducted on reputable as well as questionable sites. Until these issues had received some attention, buyers were recommended to make online purchases using more traditional modes of payment rather than through credit cards or online bank transfers. In more recent years, however, numerous security sites and software has been developed designed to assist retail clients build consumer confidence in making the more convenient credit card purchases over the internet, displaying small padlocks as a sign of trust or requiring specific security codes prior to accepting a payment through shopping cart technology. While it has become infinitely safer to make purchases online, shoppers are still cautioned to use care when entering personal information and in choosing retailers.
Although significant work has been done on the part of retailers to boost consumer confidence in the safety of making online purchases, there remains serious concern regarding the possibility of credit card theft and identity theft. While numerous systems have been put in place in an attempt to protect consumers from the ever-increasing sophistication of credit card fraud online, Matthew Richards (2006) reported that credit card not present (CNP) fraud combined with similar procedures by phone and mail cost consumers approximately $200 million in the first half of 2006, up from the figures available from the first half of 2004 in which this type of fraud amounted to approximately $140 million. This indicates that while safeguards are in place, they are not yet effective enough to completely prevent this type of crime. But to keep things in perspective, bear in mind that the value of online transactions is increasing at a faster rate than the amount stolen through CNP fraud which suggests that internet retailers and shoppers are managing to keep an increasing proportion of their transactions out of the fraudsters hands (Richards, 2006). Part of the reason this type of crime remains prevalent is due to the increased security systems available for vehicles make auto theft less attractive and falling prices on consumer goods such as electronics coupled with the rapidly growing market for online purchasing and the ease of setting up fraudulent alternative sites for purchasing.
Careful consumers can avoid some of these pitfalls, however, by taking a few precautions, such as double-checking website addresses on pages where credit card information is collected to be sure they are encoded with the https security code or display the locked padlock (Richards, 2006). Experts also recommend consumers use credit cards for purchases rather than debit cards as errors are easier to catch and additional safeguards can be built in. For example, credit card companies have assisted the verification process by providing user-specific passwords that must be entered online to prevent fraudulent charges. In addition, all charges made to a credit card will appear on a credit card statement each month, allowing consumers to check for any purchases that had not been authorized. Experts also recommend consumers who like to make purchases online should install and keep update a reputable anti-virus program as well as a firewall (Richards, 2006). Anti-virus programs prevent malicious software from infiltrating a machine and releasing encrypted identifying information, such as passwords, credit cards numbers and other valuable information to unknown third-parties all behind the scenes. Firewalls put up a virtual barrier wall designed to further protect this sensitive information from the internet. Many of these safeguards assist in the protection of online identity as well.
Like retail shopping, banking online has become relatively simple, consisting of easy-to-navigate menus and step-by-step processes. Given the nature of the business, banks take a few additional precautions to the login process before an individual is given access to an account, the industry standard 128-bit encryption is about as safe as you can get, its the same as you find when purchasing online through secure sites (Nickson, 2006). Just like many other aspects of business on the internet, the system is still not perfect.
Although many advances have been made to protect the identity of online bankers and traders as well as to secure their accounts and investments, online fraud continues to be a problem that places consumers money and investments at significant risk. (Francis & Gilmore, 2006). A great deal of these scams are perpetrated through what is commonly labeled phishing rather than technical glitches in the banking security systems, highlighting the need for online consumers to educate themselves in how best to protect their finances when conducting business online. In September 2003, the Federal Trade Commission reported that 9.9 million U.S. residents have been victims of identify theft during the past year, costing businesses and financial institutions $48 billion and consumers $5 billion in out-of-pocket expenses (Kay, 2004).
Phishing is not necessarily a new approach to fraud, but it has a new method of delivery, particularly in an online users email inbox. These messages are designed to give the impression that they come from legitimate businesses that the user is likely to have official business with. These businesses could be banks, such as Citibank, online organizations, such as eBay or PayPal, internet service providers or any number of online retailers. To complete this impression, the messages typically incorporate corporate logos and business-type formats that lend an extra measure of authenticity to the message. To gain the information criminals need to steal an identity or to gain access to online accounts, these letters usually indicate that the company featured is doing some sort of auditing or account checking procedure and requests the recipient of the letter to verify certain facts about their accounts, including account numbers, passwords, credit card numbers, social security numbers, date of birth or mothers maiden names in short, all of the information one would need to make a purchase without actually having a credit card in hand.
For many of these scams, an internet link is provided going to a similarly official-looking site that provides appropriate forms to be filled out by the consumer, thereby directly informing criminals of the information they have requested. Because these emails look so official, up to 20 percent of unsuspecting recipients may respond to them, resulting in financial losses, identity theft and other fraudulent activity against them (Kay, 2004). To avoid these types of problems, most companies, even before phishing became widely known among the general populace, had already adopted policies in which this information was not requested via email links to their websites. When identifying information is required, most companies will make the request that customers visit their web sites independently so as to assure secure connections.
While banks have little to no control over the rates at which online bankers use or update security features for their own personal computers or whether or not they respond to phishing messages arriving in their email boxes, it has been established that much can be done by these institutions to reduce the ability of criminals to create overlay sites for collecting the information they seek. The internet security firm Heise illustrated to several banks the relative ease with which someone with some knowledge and skill could overlay the websites of their institutions with rogue frames served from websites controlled and operated by the fraudsters. (Leyden, 2006). Frame spoofing attacks can be thwarted providing users are using up to date browser software, but the cross-site scripting attacks it demonstrated cant be addressed by client-side security updates, according to Heise. Both types of attacks require a modicum of skill to carry out, but are far from difficult (Leyden, 2006). Several of the high street banks did not have these same security risks, using a specific JavaScript code to ensure the frameset was valid regardless of the users browser generation, encouraging many of the at-risk banks to make changes quickly to ensure similar security for their customers. The eagerness with which many of these banks undertook the task of updating their security testifies to the interests of the banking community to ensure consumer confidence, yet the risks also highlight the importance of keeping consumers educated regarding what they can do on their own systems to ensure their personal online safety.
Based upon its level of use in current society, it is safe to say that the internet will become even more integrated into everyday life of individuals throughout the world in the years to come. Industries will continue to evolve as more and more people find means of living their lives in more integrated environments. However, as the internet gains in importance and evolves into more usable, user-defined structures, it will become more and more a target for criminals. However, increasing attention on security will ensure steady growth of internet banking and consumer purchasing.
References
Chucala, Steven. (October, 2004). Internet Buyer Beware. Soldiers Magazine.
Francis, Clare & Gilmore, Grainne. (2006). Online Banking Fraud on the Rise. Times Online. Web.
Our lives have become heavily reliant on the internet. We use it for everything from checking email to ordering food delivery services. It is a convenience that blurs our definition of safety. As adults, we have the ability and power to decide upon what types of websites we visit, whom we speak to, and how we conduct our cyberlives. The problem is that unsrcupolous individuals have found loopholes in the safety that we believed to be built into the internet. Phising sites and porn sites find a way into our systems and very often, open up our systems, both at home and at the office to potential hacker attacks and viruses. Considered the unknown frontier of the 21st century, we have come to realize that not all is well in the cyberworld and that we will very often need protection from it. The first line of defense? An internet filter.
Basically, an internet filter is a software program designed to block access to questionable websites and web content. By doing so, we protect our systems from experiencing any work disrupting scenarios and offers us a chance to safely surf the web without having to worry too much about internet security.
The most important use of the internet filter though, seems to be in blocking out questionable websites from the home computer that children have access to. Parents know that children are of a curious nature and do not think twice about clicking on various advertisments on the internet that they find interesting. More often than not, a child will click on a link that could take them into a pornography website. Once there, nobody can predict what could happen and what kind of people the child will meet.
Internet filters give parents a sense of control over their children in the only area of their lives where parents cannot get in, that is the internet. By installing the internet filter, a parent can help protect their children from pedophiles and other ill intentioned people who proliferate the web by pretending to be children. According to the National Institute on Media and Family, these sofware programs work in various ways to protect the child. Methods such as (a)Scanning sites and blocking those that contain specific words. (b)Blocking sites that are found to contain sexually explicit, violent or hateful material. (c) Limiting a childs search to a predefined set of sites or to sites that meet certain criteria. , all help to insure that children have a layer of security and protection even when their parents are not around to actually make sure they are safe.
However, there are still some people who do not advocate the use of internet filters. These are the people who believe that internet filters have connections with religious beliefs of over controlling parents. These are the people who do not understand that internet filters do not totally block ones internet access. Rather, as most adults have discovered, internet filters can be customized to meet your internet surfing needs.
Children tend to view internet filters are extensions of their parents trying to control their lives. This is a misconception fueled by parents lack of communication with their children. Once a parent chooses to install an internet filter, that parent must and should be willing to openly discuss the hazards of the internet with their children and explain that the filter is there to protect them, not hinder their enjoyment.
Internet filters were created for a reason. The threats posed by the unregulated internet websites and surfing habits are real and could have horrific consequences in real life. The need to protect onself is always of the foremost concern when entering into a world where everyone is a faceless stranger going by an avatar image and a concocted screen name. That is why it is important that we use internet filters during our daily computer use.
Bibliography / References
National Institute On Media And The Family. (2000). Internet filters: making web surfing safer for children. Web.
Stromberg, Jonathan. ( 2008). Why should I buy an internet filter?. Web.
Treating Pornography Addiction. (2006). The top internet filters. Web.
Young, Ricky. (2007). Bypassing internet filters at work should you risk it?. Associated Content. Web.
The aspects of digital democracy reveal the statement that the World Wide Web is the most tolerable sphere of relations. Originally, people are free to express their thoughts and considerations on the internet, and some researchers regard it as the way to control citizens, by letting them express all their moods in some unrestricted area. Originally, digital democracy is regarded as the process of governing local communities, and for the strict control of the moods and processes within the society, thus, e-democracy and digital democracy may be the effective control tool.
The aim of this paper is to research the matters of the internet, and the particular aspects of digital life, such as digital democracy, blogging, social networks and net neutrality in general, and compare the widely spread theoretic considerations on this aspect with the considerations by classical theorists like Marx, Engels, Nietzsche or Du Bois.
Internet as the Democratic Tool
The key aim of digital democracy as the control tool is to unite the most active citizens and participants of the discussion in a single place. Thus, blogs, communities, social networks, etc are the perfect tools for collecting the wide database of citizens. Surely, the government needs to apply certain efforts for maintaining the necessary democracy and freedom levels, thus, the government aims to develop publicly accessed platforms. Originally, as it is stated by Dizard (236):
Social networking and the internet, in general, is an emerging area for e-democracy, as well as related technological developments, such as argument maps and eventually, the semantic web. Those are seen as important stepping-stones in the maturation of free society. The social networking entry point, for example, is within the citizens environment, and the engagement is on the citizens terms. Proponents of e-government perceive government use of social networks as a medium to help the government act more like the public it serves.
The examples of such governmental networks are numerous. On the one hand, they are used for collecting the comments and opinions of the citizens, on the other hand, they may be used for tracing the IPs of the citizens, and locating the further we surfing of these users. This may be helpful for preventing terroristic activity, organized crime and other harmful affairs.
Global Networking from the Perspectives of Political Theory
Considering the theoretical aspects of internet activity (freedom of speech in general), it should be emphasized that even the most ancient concepts of democracy presupposed the existence of public places for expressing the political and social considerations of the citizens. Originally, these concepts were stated in Plutos republic and presupposed the opportunity for everyone to state his or her considerations, or dissatisfaction with the existing political regime. On the one hand, it was the freedom of speech; on the other hand, as it was stated by Machiavelli, this could be a trap, as the seeming freedom of speech could be the way of taking into consideration active citizens, for the further location of the centers of possible revolt.
Internet, from the perspective of political theory, is a powerful communication tool, which is used by numerous stratum of the population in various aims. Considering the statements by Marx, including neo-Marxism approaches, these factors of free internet communication promote the development of the global village concept. This Concept may be regarded as the feature of the entire digital global communication tendency. Thus, the concept of global village presupposes that the information is spread with immense speed along with the whole world, and, staying somewhere in John oGroats in northern Scotland, and follow the events in Cape Town, for instance. The Internet provides the opportunity of observing the entire world, and leave feedback on any event and process.
Originally, this concept is similar to Marxs concept of world revolution, and the followers of Marxism and neo-Marxism often regard the internet, and the concept of the global village as the important instrument for the proletariat revolution, as this would allow people to unite and coordinate their forces for the global revolution against the world capitalism and exploitation of the working class.
Additionally, it should be emphasized that the values of the traditional proletariat struggle may be explained by the necessity to unite the working class of the whole world. Thus, digital democracy provides people with such an opportunity, and the global village concept, which might be helpful for the world proletariat is the product of a capitalistic world.
As for the matters of globalization in general, these aspects are described neither by Nietzsche nor by Marx and Engels, let alone Du Bios. Nevertheless, Wallerstein, and his world-system analysis of neo-Marxist theory, emphasize the necessity of globalization for the unification of the efforts. Originally, the benefits of globalization are used by the Center States for exploiting the Periphery and Semi-Periphery states, nevertheless, the lower classes may unite for the joint efforts of becoming the centers of their own world-system regions.
Considering the political theory and the considerations by various political theorists, it should be emphasized that considerations by William Edward Burghardt Du Bois are the closest to the matters of digital democracy and democracy in general. Originally, as a civil rights activist, he claimed for the necessity of the citizens to express their opinions and moods openly for they could control the performance of the governments, and discuss their possible dissatisfactions. Moreover, the internet is often used as a tool of self-expression, as it provides freedom of communication and freedom of speech for everyone.
Additionally, the governments would have the opportunity of getting feedback from the people. Moreover, the hotbeds of political decease and terroristic activities could be found easier if people have a place to express their feelings and thoughts. He claimed nothing on the matters of communication technologies, nevertheless, it should be emphasized that the ICT are of high value for arranging and informing citizens.
These may be used for expanding and improving the active participation of the citizens in the social, political and economic life of a State, thus, encouraging the government to perform more active steps for governing the main spheres of State life. Additionally, the ICT offers citizens an opportunity to work out particular cultural codes and tendencies in order to present the joint reaction to the governments actions. Thus, in accordance with his considerations on the matters of democracy, the following statement by Du Bois should be emphasized (in Rudwick, 139):
We call these the seeds of Living Democracy. By Living Democracy we mean democracy as a way of life; democracy as a culture; democracy as a set of expectations and practices that become part of our blood, part of our instinct for how to behave. This is certainly a long-term understanding of social change, but its also one in which each of us can find a place for ourselves, no matter whether were a teacher, an engineer, a student, or a political figure. Each of us has a role to play in a Living Democracy; we do not have to be an officeholder to help create this culture.
The fact is that Du Bois was claiming on the matters of civil freedoms and opportunities. In addition, the given statement directly relates the aspects of the freedom of speech and the opportunities of free reaction of the citizens for the governmental actions. Considering the specification of the theory by Du Bois, it should be stated that the main focus of his considerations related to the aspects of race and ethnicity, as the epoch, he lived in, was featured by the extensive civil rights campaigns, associated with the discrimination of African American population in the USA. Thus, the possibility of expressing the thoughts and considerations was of particular importance and Du Bois would be glad to see the opportunities of the digital democracy.
Conclusion
The development of the cyber world has promoted the appearance of such aspects as digital democracy and the global village. On the one hand, these aspects are the products of the virtual world, on the other hand, these are the real tools of political activity and the instruments of controlling the processes and events in the world. In accordance with the theoretical considerations by Du Bois, digital democracy is an important tool for the development of the civil rights of the population. As for the global village, the followers of Marxist views would appreciate it as the tool of uniting the efforts of the world proletariat.
Works Cited
Dizard, Wilson. Digital Diplomacy: U.S. Foreign Policy in the Information Age. Westport, CT: Praeger, 2004.
Rudwick, Elliott M. W. E. B. Du Bois a Study in Minority Group Leadership. Philadelphia: University of Pennsylvania Press, 2006.
Internet is a remarkable technological advancement providing essential opportunities that can be employed in different sectors, including education, entertainment, communication, health care and socialization among others. In Western countries, the Internet is believed to have improved various aspects of society along with the foregoing perspectives.
Information resources
The Internet has guaranteed easy access to information because it has a well-organized and efficient database with diverse information on different issues. It is a virtual storage of data and facts from which details on any issue can be accessed, which include educational journal articles, trade exhibitions, government services, technical support and market information, just to mention but a few. With the search engines such as Yahoo, Google, and Ask, information can be retrieved easily by typing a single word, search query or a short phrase. Individuals can obtain a customized search that provides the most relevant information that suits their needs. This has facilitated learning in Western society. Students can conduct researches through the Internet and gather important information required in their studies. On the other hand, tutors use the Internet to access and obtain valuable information. Furthermore, Western societys literacy level has been elevated by the internet. Information provided on the Internet expose individuals to various issues thus, advancing their understanding of various subjects of importance. Distance learning and online education have been realized, which have significantly influenced learning as well as knowledge creation (Leung, 2010).
Communication
Internet presents the fastest, most efficient channel of communication. People can communicate online through instant messages and emails. They can communicate within a split second with individuals in far distances, which was impossible before the invention of the Internet. They can participate in interactive as well as personal communication through video conferencing and chat services. Internet-based discussion forums, blogging and social networking sites provide platforms for individuals expression. Establishing a global friendship has turned out to be an easy undertaking that has enabled sharing of political, cultural as well as religious beliefs. Further, people located in different areas can team up via the Internet. Additionally, they can share information, views, and professionals can work together from their remote locations. As Internet technology advances, Western society will continuously obtain superior benefits (Kraut, 2006).
Entertainment
Western society enjoys Internet-based entertainment. The versatile entertainment industry is integrated into the Internet, and individuals have unlimited access to free streaming media. Multimedia facilities and applications used along with the Internet have proved to be essential modes of entertainment. People can download movies, music and games or directly access them on their host websites. They can access information about the entertainment industry such as celebrities activities and performances as they occur through real-time streaming. In addition, promotional, educational and informative information is embedded in the entertainment channels. Thus, a particular Internet-based channel of entertainment serves several functions for Western society (Kraut, 2006).
Socialization
Socialization has become easy with the innovation of the Internet. Social networks such as Twitter and Facebook have significantly enhanced individuals interactions, especially amongst youth. It is possible to connect with many people through these media, which is almost impossible, and time-consuming in physical networking. In this sense, the Internet is an essential medium for bringing people with similar interests together. It also assists people to find and create friends, look for business as well as employment opportunities. Other aspects of socialization that the Internet aids include sharing of beliefs and customs between individuals of different cultural, political and religious backgrounds (Kraut, 2006).
Online Shopping
Life in Western societies is incredibly convenient owing to the use of the Internet in various aspects. Numerous Internet-based services allow individuals to perform various transactions online. They can transfer funds, book movie tickets, forfeit taxes, utility bills and pay for other services or products at the comfort of their homes. The Internet provides an appropriate procurement channel that reduces the time and effort used in transactions. It usually supports the pre-purchasing phase of the procurement process. Several benefits accrue both to the provider and the customer from the Internets use as a means of purchasing products and services. The Internet has facilitated supply chain improvements, cost reductions, enhanced customer relations or service and has reduced transaction costs in the Western countries. As a result, individuals have access to an extensive collection of services and products in which they can shop from any place and at any time. Besides, the Internet provides an array of customized services and ensures that instant information on products or services is readily available. Although there are concerns that information security and privacy impede purchases via the internet, most people in Western society rely on websites for online shopping or marketing. In general, Internet has actualized the concept of e-commerce in Western countries (Izquierdo-Yusta, 2011).
Conclusion
The internet has proved its worth in Western societies through the enhancement of communication, entertainment, socialization, online shopping and information resources. As indicated in the foregoing discussion, Internet has improved societys well-being in different aspects.
Reference List
Izquierdo-Yusta, A. (2011). Understanding the Effect of Internet Convenience on Intention to Purchase via the Internet. Journal of Marketing Development & Competitiveness, 5 (4), 32-50.
Kraut, R. E. (2006). Computers, phones, and the Internet: domesticating information technology. New York: Oxford University Press.
Leung, L. (2010). Effects of Internet Connectedness and Information Literacy on Quality of Life. Social Indicators Research, 98 (2), 273-290.
Internet of things (IoT) as a network of devices that are connected to each other by means of the Internet significantly affects the life of a modern person (Rowland, Goodman, Charlier, Light, & Lui, 2015). In a sense, its emergence has changed the peoples attitude towards searching, gathering, and perceiving information. Due to the fact that urban planning ultimately targets the experiences of urban dwellers, the internet of things and is vital to consider for a city designer.
Internet of Things in a Work of an Urban Planning Specialist
Practical applications of IoT are are plentiful. Sharing data, accessing them from multiple devices and the speed with which it can be done nowadays practically shapes the modern persons understanding of comfort (Rowland et al., 2015). That is what modern people became used to. Since urban planners main task is to design the environment in a way that maximizes each persons comfort without limiting the comfort of a society as a whole, the utilization of IoT in city solutions should be a new priority. As it was mentioned above, IoT changed the way people perceive information. Urban planner should adapt to those changes by designing the environment where information is present in way that can be easily accessible to people in a way they are accustomed to access it.
The simplest example of such design solutions is interactive city maps that are often located in transportation hubs. IoT has taught people to create, share, and otherwise interact with information rather than be passive observers. This fact partly explains why it can be hard for modern people to read the traditional maps and why they often resort to electronic ones on their devices. Having the knowledge of that, an urban planner has to acquire additional skills and build knowledge on modern solutions that strengthen the potential of people of acquiring, using, and sharing the information. Such skills encompass, for instance, increased attention to energy planning. Public places such as surface and underground transport stops given the increased need for charging devices can provide citizens with free USB charging devices powered by solar panels, such as they do in North Carolina (Davis, 2017).
Previously, there was no need for such public services as there was no demand for that and people that lived in the age of traditional computing did not feel the urge to stay online all the time. Now, items like Wi-Fi access in public places or even whole-city coverage solutions are added to the present agenda of an urban planner. Creation of a continuous space with internet access is becoming rather a necessity than just a handy addition. Therefore, the places we design seem to demand more emphasis on functionality and usability than on pure aesthetics.
Given all the above, my career path seems to be needing adjustments in terms of technical knowledge such as basics of electrical engineering that will enable me to understand how and where telecommunications are best placed. Additionally, as a professional I will need to stay alert for possible developments in popular mobile technologies to consider the possibilities of their use in my planning and design activities.
Conclusion
All in all, IoT has brought a major change to peoples attitudes and behaviors in cities. In modern times, mobile devices seem to be a dominating channel for acquiring information. These changes are to be processed and addressed by urban planning specialists in order to tailor the urban environment according to their needs. Given that, the knowledge of electrical engineering will become a valuable addition to my background.
References
Davis, C. (2017). NC state adds solar charging station at bus stop. Web.
Rowland, C., Goodman, E., Charlier, M., Light, A., & Lui, A. (2015). Designing connected products: UX for the consumer Internet of things. Sebastopol, CA: OReilly Media, Inc.
This paper explores seven articles on how the use of the internet has evolved and changed the social lives of Canadians. It examines Shaw and Gants (2002), Exploring Gap in Internet Use. It also examines Ipsos Canadian Interactive Reid Report on the usage of social networking sites and access to news online. Smartphones are also examined and the paper further provides a report by Hupp (2008) on the growth of smartphone and its manufacturers. Focus is laid upon the use of the internet in Canadian businesses and current affairs (Hupp, 2008), the cultural background and various internet activities engaged in by both the young and old generation together with the consumption of culture by older Canadians on the internet.
How the Usage of the Internet is changing Social Life in the modern day
Internet use has evolved over time and is currently embedded in the lives of many Canadians. Canadians can easily access the internet from any location, with the number standing at 86 percent ranking Canada among global leaders in internet use (Shaw, 2005). For the past five years, 80 percent of Canadians are able to access the internet from home. Presently, mobile internet access stands at 37 percent, which is a 32 percent increase from the year 2001. Almost a saturated number below 55 years have access to the internet and 47 percent enjoy mobile access. Those aged 55 years and above have a 68 percent internet access and 16 percent lack mobile internet access (Tepperman, 1991). This paper examines how internet usage has evolved in Canada.
Earlier studies focused on internet access but recent studies have focused on understanding how the Internet is used in the fields of business, current affairs, and social networking (Hupp, 2008). The heaviest internet users are the teenagers, followed by the youths, and then the adults. Studies show that a majority of teenagers engage in online games and social networking sites where they connect to their friends and relatives.
A huge number also engage in surfing the web for leisure. The youths that form the second highest users of internet mostly engage in social networking. The youths are also likely to visit the web in search of online jobs. They are also likely to read online news and participate in online political activities (Tepperman, 1991).
The percentage of the old generation accessing and using the internet has also increased significantly (Shaw & Gant, 2002). An analysis of the survey carried out in 2010 revealed a 60 percent internet use by persons between 65 and 74 years of age. 29 percent of those aged 75 years and above had also accessed the internet. A decade earlier, the only 10percent of the old generation engaged in the usage of the internet. Although the number of old accessing the internet is on the rise, the generational gap still remains in some areas of internet usage. Cultural aspects like music are less likely to be appreciated by the old.
According to the survey carried out in 2010, in a period of one week, 90 percent of individuals between ages 65 and 75 do not listen to music downloaded from the internet (Shaw & Gant, 2002). This group prefers to use the native methods, for example, listening to music the traditional way that is through the use of compatible diskettes. Half of the music listeners that prefer the use of CDs fall under the age of 45 years and above. At the same time, only 20 percent of those that are over 65 years of age do not prefer the same method.
Canadian Internet Use Survey (CIUS) data reveals that internet usage for personal reasons in 2007 was high among individuals aged 16 to 35; it stood at 93.1 percent and at 79.8 percent for individuals aged 35 to 50. It is also revealed in the 2007 survey than nearly 60.8 percent of the study population aged between 55 and 65 years use the internet to fulfill personal agendas. However only 28.8 percent of seniors aged 65 and above accessed the internet for the same reason (See Table 1 for more Information on Personal Internet Usage).
Table 1: Percentage of Internet Usage for Personal Reasons, Canada, 2007.
Age
% of Internet Usage for Personal reason
16 35
93.1%
35-50
79.8%
55-65
60.8%
65+
28.8%
The number of internet users has been growing rapidly in the recent past (Shaw, 2005). This is mainly due to various activities that can be achieved by the usage of the Internet. First of all, social networking has changed ways of communication among Canadians. Majority of online Canadians use social network sites, with a large portion of both young and old engaging in social networking. The social sites also provide a means of disseminating information. 62 percent of Canadians have accessed online social networks, which is an 11 percent increase since 2010.
It has been noted that 30 percent visit the site at least once a day, an increase from the 19 percent recorded back in 2010. When it comes to gender comparison, women are significantly more likely to visit social sites than men, with their percentage standing at 37 percent as compared to that of men which stands at 24 percent (Tepperman, 1991).
Of the people interviewed, 41percent often engage in online than offline communication. Facebook, a leading social site, has experienced a decline in facebook profiles down from 90 percent in 2010 to 86 percent. Significantly, there has been an increase in Twitter and LinkedIn profiles standing at 19 percent and 14 percent in 2011 vs. 10 percent and 9 percent in 2010, respectively. Half of online Canadians with a social networking profile have been using social networks for a period of at least three years. Fifty-six percent are happy with the level of privacy offered by their social network sites (See Table 2 for more information on Social Networking Trends in Internet Usage).
Table 2: Social Networking Trends in Internet Usage, Canada Ipsos Canadian Interactive Reid Report, 2011.
Activity
% of People in Social Networking Trends
Browsed Online Social Network
62%
Visiting social site at least once a day
30%
Women visiting social sites
37%
Men visiting social sites
24%
Happy with the level of Internet security
64%
Communicating more with people online than offline
41%
Canada has also seen an effective usage of the internet by the increasing number of smartphones among Canadians. Smartphone has their app store or market place where most social apps can be downloaded. The capability of social apps is as a result of the application programming Interface (API) that allows social sites to integrate with other third-party drives. This has enabled smartphone owners to download various plug-ins and applications that can access major social sites.
Currently, the most downloaded apps, especially for RIM, Android and the Apple smartphones, are Facebook apps, Twitter apps, Google apps, and LinkedIn apps that continue to increase social interactivity. In September 2011, a survey done by comScore MobiLens showed that 8 million people in Canada owned smartphones (Hupp, 2008). This is a representation of 40 percent of the mobile market in Canada. RIM had 35.8 percent of the market share. Apple was second at 30.1 percent. Android, a product of Google took the second runners up position followed by Symbian while Microsoft closed the list with a 3.2% market share (See Table 3 for more information on smartphones Platform).
Table 3: Top Smartphone Platforms, Total Canada Smartphone Subscribers Ages 13+, comScore MobiLens, 2011.
% Share of Smartphone subscribers
Total Smartphone Subscribers
100%
RIM
35.8%
Apple
30.1%
Google
25.0%
Symbian
4.2%
Microsoft
3.2%
Most news publishing companies have resorted to providing news feeds online as a supplement to the hard copies in the form of newspapers. Most Canadians can now access news via the available websites, subscribing for newsletters via emails, bookmarking news sites, and integrating RSS feed to their sites. In a report by Ipsos Canadian interactive Reid Report, 2011, 92 percent have sorted news from a computer. 66 percent of those who seek news online have visited a newspaper website. 23 percent stream and download TV news online. 23% percent read printed magazine on a website (see Table 4 for more information on Online news).
The third aspect is the use of emails. Emails have moved from being a traditional sending and receiving media to a highly integrated platform for providing other services. Most of the major players in emailing services have added more features to their mailing system. They offer a chat platform where people can engage in instant messaging. Some of the best known being the google talk, they can also stream video chats, provide weather information, for instance, Yahoo and display appropriate adverts by monitoring the browser history of the client. In a Canadian survey concerning digital marketing, 22 percent said that they responded to an email from organizations promoting products, services, or special offers (Bolliger, 2008).
Fourth is the use of Tablet Computers which has changed the social lifestyle of many Canadians. Tablet is one of the latest high-tech gadgets on the market and it is making a good penetration in Canada. They are convenient to carry and offer a relatively large screen compared to smartphones. Studies show that 7 percent of online Canadians currently own a tablet computer, 24 percent are likely to purchase one in the next 12 months, and 11 percent in the next six months (Griffis, 2006, p.2).
Different brands are in stiff competition, with the Apple iPad at 86 percent, followed by blackberry playbook at 61pecent, and the Samsung Galaxy at 27 percent. A greater percentage of women compared to men prefer the iPad (60 percent vs. 51 percent) while a greater percentage of men compared to women prefer the playbook (30% vs. 18%). Tablets change the social trends in terms of enabling the owners to easily access websites, read emails, visit social sites, view global trends, and even join online group Coupons (Griffis, 2006).
The internet has led to the facilitation of online research. Most research institutions have published online journals that can be easily accessed for research purposes. A research finding by Immigration status, Canada, 2007 showed that around 45 percent of Canadian Home Internet users engage in research on community events (Mathewson, 2000).
The above-outlined internet usage has completely changed the social lives of the majority of Canadians. A major victim being the social networking sites, which have led to the isolation of many Canadians as the number of users continues to grow. Evidence that support isolation of Canadians show that users of the internet spend more time alone. These people interact less with family, friends, relatives, and society. A major concern arises in time dedicated to internet usage, which substitutes time spent to establish real-world contact and relationships (Shaw & Gant, 2002). Friedman (1994) A study of the Canadian general social survey, 2005 report shows that internet users have less time to have an in-person contact as compared to the non-users.
In conclusion, the usage of the internet has changed the social lifestyle of many people. The Internet has brought about different ways of communication through instant messaging, emails, and video chats. This has broken away from the tradition of using postal offices and fax. The Internet has also brought about new ways of accessing journals, magazines, research papers, and newspapers. This has driven us off from the traditional libraries and hard copied newspapers.
References
Friedman, A. (1994). Microlog: Canadian Research Index/Index de Recherche du Canada. CD-ROM Professional, 7(1), 173. Web.
Griffis, J. (2006). Internet genealogy magazine on stands soon. News Gazette, p. C.2. Web.
Hupp, S. (2008). Canadian Business & Current Affairs (CBCA) Complete. Choice, 45(8), 1318. Web.
Mathewson, G. (2000). Internet changing way local residents spend their time: Final Edition. Observer, p. A.3. Web.
Shaw, G. (2005). Canada among global leaders on Internet. CanWest News, p. 1. Web.
Shaw, L., & Gant, L. (2002). Users divided? Exploring the gender gap in Internet use. Cyberpsychology & behavior: the impact of the Internet, multimedia and virtual reality on behavior and society, 5(6), 517 527. Web.
Tepperman, L. (1991). Canadian Social Trends. Canadian Journal of Sociology, 16(2), 221 223. Web.