Benefits of the Internet

Internet is needed in our day-to-day lives. Globally, the use of internet has become very popular especially in this modern century, where the technology has advanced in all aspects. It is even hard to imagine living in a world without internet, Activities all over would be chaotic to an extent of even affecting the global economy (Barron 112).

This is enough proof that the whole of humanity is directly related with the use of internet. According to several research done, it is evident that internet has both advantages and disadvantages. However, there are solutions to overcome the problems that may arise from the use of internet, or rather prevent those problems from occurring.

Communication is one of the main benefits received from using internet services. People in the whole world enjoy convenience in communication, entertainment is brought nearer to them, and they can now access the latest news through the internet.

Currently it the fastest means of passing information from one point to the other. Most of people prefer using emails to pass messages, as it is convenient and fast. One of the uniqueness of using internet to communicate is that, there are no barriers, as people can connect easily at any place and all the time (Berre 341).

Businesses have something to celebrate about, because the executives make use of the internet to pass their information as quick as possible. In the well established companies, the top management initiates the use of teleconference through the use of webcams, to conduct meetings with other executives when discussing crucial issues. Through the use of teleconference, companies are in a position to save money and time.

Through the use of the most recent website known as face book, social communication has become very popular. Most of people are using this website to keep in touch with their friends, as well as search for their old friends. For the people who lost contacts long time ago, a solution is now found through face book, as people can always reunite.

People chat on the net, and feel being part of one another by viewing the profile of one another, where the current activities of every person are indicated (Meersman 65). A big percentage of people in the world have proved to be users of this website, an indication that the whole world has been brought together by net.

As a result of having so many users of this social website, employers are putting job adverts in it, where they can get the best candidate for their vacancies. This has helped so many job seekers to secure some form of employment, hence promoting the global economy. Once an advert is put on net, the company or the individual responsible is so sure that, the information has reached the relevant people.

Entertainment is another major benefit of using internet. By just clicking to access the services of internet, there are so many movies available in you tube websites, which can be used for entertainment (Meersman 76). All television and radio programs can also be watched and viewed through the net respectively.

When employees are in the office doing their daily activities, they can on the other hand be listening to their favorite radio or television programs through their computer nets. There is no need of having radios and televisions in an office, as everything can be accessed through the net.

All types of movies meant for entertainment can be watched anywhere, at any time, as long as one is connected with internet. The era when people could only watch movies through television is past, and people now are embracing this change with much happiness, as there are no limitations to entertainment. When at home, in office, or when traveling one can have entertainment as he or she wishes through the use of net.

The use of internet in the banking sector has saved people the great agony of spending time in banking halls. Some years back, people could only access their money through visiting bank branches. In every banking hall, a long queue of clients waiting to be served was the issue every day. A client could spend much time on the queue waiting to be served (Berre 287). Nowadays, internet banking serves clients quickly through safe bank transactions.

The biggest percentages of banking services are offered through internet banking such as withdrawals, deposits, bill payments, and transfers. Internet banking is also very convenient to the clients, as it offers the services throughout the 24 hours. Any time of the day or night, a client can receive the services he or she requires from the bank.

International market has been greatly promoted by the use of internet. It is evident that, some people lack time to go shop for all the items they require. Most of people spend their daytime in offices, and evening hours are for them to have time with their families. Due to such challenges of having a tight schedule, most of people have turned to internet shopping, where one can buy everything he or she deserves through online.

Consumers prefer online shopping, as it saves much of their time and the prices are low compared to the actual prices at the stores. Business people have also found it relevant, as they display all their products and prices for their customers to have a wide range to choose from.

Educational sector has a lot to enjoy from the use of internet. Learners have an opportunity of getting useful materials from the net. Almost every subject has some important materials that can be found on the net.

Educators also prepare some course outlines, and distribute them to students through online. Students globally, find a good place to conference and collaborate with one another, as they share their learning experiences (Barron 106). Whatever the students learn from class, they then find all the relevant materials to handle their assignments and to advance their grades.

Through the use of electronic libraries, students all over the world have enjoyed the availability of educational materials. According to most of the research done, it is evident that some students are pursuing their bachelor or masters degrees through online programs offered by some higher institutions of learning. The education sector has advanced and developed a great deal, through the use internet.

In conclusion, everyone is enjoying the services of internet all over the world. Through easier communication, any sector has benefited in one way or another. The distance that has been a challenge to effective communication was eliminated by use of internet (Barron 115).

An open opportunity was created to all people to communicate, watch, and get entertained together with their friends and families. Internet offers cheap and fastest communication compared to other means of communication. It is the most reliable way of one to keep in touch with friends and family.

Works Cited

Barron, Ann. Technologies for education: a practical guide. New York: Libraries Unlimited, 2002.

Berre, Arne. Future Internet-FIS 2010: Third future internet symposium, Berlin, Germany. Michigan: Springer, 2010.

Meersman, Robert. On the move to meaningful internet systems. Benefits of internet (2009): 50-95.

Open Standards, Internet, and Free Software

The modern world is a highly computerized environment in which everything, or almost everything, can be found with the help of the Internet. Further on, the latter worldwide network allows computer users to enjoy the advantages of the Free Software accessible online. However, history shows that the situation could have developed in a completely different way, if the inventors of the ARPANET, and further the Internet, cooperated not with the publically but privately funded organizations. Many scholars Dravis (2003), Yamamoto (2008, p. 516), etc. believe that the growth of the Open Standards and the Internet as such would be endangered if private interests were involved.

The story itself began already in 1957 when the USSR sent its first artificial satellite Sputnik. This event impacted the wish of U.S. researchers to achieve a goal of equal or even greater importance. The Advanced Research Projects Agency was founded in pursuit of this goal in 1962 (Hauben, 2010). The 1960s were the time when computers, after being considered as mere calculating machines, became means of connecting people that used them. The work of the Advanced Research Projects Agency soon resulted in the creation of the so-called ARPANET, the predecessor of the modern Internet and the first computer network invented by humanity (Dravis, 2003; Hauben, 2010).

Further on, the Internet developed from ARPANET, and scholars like Clark and Lick, as cited by Hauben (2010), call this invention not a technological, but rather a human achievement. At the same time, the challenge of the Internet growth is viewed by the same scholars as already a purely technological issue imposed on the human beings working on the Inet development. The main advantages of the Internet are the open standards of using the TCP/IP Protocols and the Free Software available to any computer user without the need to pay royalties (Song, 2008; wheeler, 2007). Drawing from this, scholars like Hauben (2010) and Wheeler (2007) argue that the creation of the Internet in collaboration with a private company like AT&T would have adverse effects on the Internet growth and the development of its open standards.

Nowadays, the use of TCP/IP Protocols is free, and so is the of the licensed software that can be distributed through the Internet. This is possible due to the fact that the Internet was developed using the public funds, and if private company finance were involved, the situation would be different. First of all, the use of TCP/IP Protocols would be paid as the company owning rights for licensing would definitely make a profit of its sale. Second, the distribution of Free Software would hardly be possible as the company owning the rights for the Internet protocols would censor the content of the latter. Finally, all software users would have to pay royalties to software developers and the companies that have bought the rights for licensing the TCP/IP Protocols through which that software would be distributed.

So, Open Standards practiced in the modern Internet are vital for the growth of the web and for the development of the Free Software principle in it. One cannot ignore the fact that in case if private funding was the basis for Internet development, Open Standards would hardly be possible, as private Internet investors would aim at making a profit and returning the money they invested.

References

Dravis, Paul. Open Source Software. Infodev, 2003. Web.

Hauben, Michael. History of ARPANET. Behind the Net, 2010. Web.

Song, Steve. Open Standards  Its Not Just Good for the Internet. Many Possibilities, 2008. Web.

Wheeler, David. Why Open Source Software / Free Software (OSS/FS, FLOSS, or FOSS)? Look at the Numbers! FLOSS, 2007. Web.

Yamamoto, Toki. Estimation of the advanced TCP/IP algorithms for long distance collaboration. Fusion Engineering and Design 83:2 (2008): 516  519. Print.

Mobile Wireless Internet vs. Wi-Fi

Nowadays, people from developed countries cannot imagine their lives without mobile telephones with an Internet connection. Both mobile wireless Internet and Wi-Fi are intended to provide network services efficiently and fast enough to operate online without limitations. The following paper will compare and discuss the advantages and disadvantages of regular 3G and Wi-Fi connections to the World Wide Web.

Discussion

There are many controversies among people who use different methods of Internet connections on their mobile phones. Moreover, every user is right and gives reasonable arguments to argue his or her viewpoint. To identify the best connection method, it is essential to try each option mentioned above.

Wi-Fi

Wi-Fi is a network that requires electricity and a cable of a certain Internet provider that delivers the signal via a wireless modem. This method is prevalent today, and many families install such devices in their houses because it is very convenient to have the Internet available in every part of a house. Today, in the twenty-first-century, people need Wi-Fi not only for their laptops or personal computers (Ngo, 2016). It is estimated that an average American owns approximately six gadgets that allow him or her to visit various websites and search for information online (Mah, 2009). Therefore, Wi-Fi is a smart solution for a dwelling because its signal is stable, and the connection that modern routers deliver is high-speed.

However, the aforementioned method represents particular disadvantages that do not make it as efficient as a mobile wireless Internet connection in a plethora of situations. For instance, Wi-Fi is available only in private houses, cafes, subway stations, and other facilities and businesses that specialize in providing certain services to people. Since sometimes clients are obliged to wait for their orders to be processed for hours, different companies provide free Wi-Fi access to their customers due to their appreciation of peoples time.

Nevertheless, there are two more problems that this method might present. The first issue stems from a restricted number of people who are allowed to connect through one Wi-Fi point because some routers do not have enough power to process more than a set number of devices (Disadvantages of wireless networks, 2017). The last drawback implies passwords that owners of Wi-Fi connection points usually apply to their systems. This simple operation restricts other peoples access to a particular router. However, having an open connection might be illegal in some states. For instance, a stranger may stand near ones house and be connected to the nearest Wi-Fi signal to download something from a pirate website or hack various security systems. Although the stranger commits a crime, the host of an IP-address is legally responsible for all the actions through his or her router.

Mobile Wireless Internet

As it was mentioned above, almost every individual owns a mobile phone today, which is very instrumental in organizing ones schedule, having a connection with colleagues or family, and surfing the Internet (Tolstrup, 2015). Not so long ago, every impatient person would prefer to be connected to the Internet using Wi-Fi. However, the situation has changed, and the speed of mobile wireless connection became almost the same as the regular Internet. Therefore, people who are obliged to travel (to work or to educational institutions) every day or need constant access to the World Wide Web prefer using 3G.

The most obvious advantages of mobile wireless connections are in their convenience and accessibility from any part of a city. However, this method requires investment, as it is new to the worlds market of technologies. Therefore, every company that provides such services does not offer the most favorable terms of payments, so not all citizens can afford to use this method on a daily basis (Disadvantages of wireless networks, 2017). Nevertheless, it is always good to find some data quickly because todays world of new technologies requires people to check the authenticity of particular information because mass media do not hesitate to misinform their audiences lately.

Today, the majority of residents of the United States of America use the mobile wireless Internet because it lets people play their favorite games and applications that require a network connection. Moreover, a wide variety of different organizing programs need the Internet as well. Otherwise, they might not operate properly. In conclusion, it would be proper to compare the methods discussed above (3G and Wi-Fi) and identify the best one of them.

Comparison

The second option (mobile wireless Internet) was developed due to a plethora of users requests who wanted to stay online with their social network profiles when they were away from their homes. Although the technology of Wi-Fi is getting old, it remains popular till the present moment because wireless routers ability to connect several devices to the Internet at the same time is crucial for todays families or roommates (Mah, 2009). Nevertheless, 3G, 4G, and LTE are used more recently than any other type of connection. Therefore, mobile network functions remain the most popular, efficient, and useful option among their competitors.

Conclusion

Nowadays, Internet users do not download gigabytes of different files to their computers. Instead, people prefer to use their mobile phones and enjoy particular content online. Therefore, such networks as LTE, 3G, and 4G are more efficient and useful than a regular Wi-Fi connection. The world changes every second, and there is no doubt that even the most convenient connection method will be replaced with an improved technology someday.

References

(2017). Web.

Mah, P. (2009). Web.

Ngo, D. (2016). Web.

Tolstrup, M. (2015). Indoor radio planning: A practical guide for 2G, 3G, and 4G. Chichester, UK: Wiley-Blackwell.

DSL Technologies and Other Internet Networks

Frame tagging

Frame tagging is the process where packets of data are marked to aid in identification during communication. Identifiers are placed on the headers of the packets and this enables the switches on the network to correctly recognize the packet and be able to foreword it to the correct switch within the network (Flood 56). There is a situation where the packets get lost and it is in this situation that identification is needed in order to correctly identify the node.

VTP: This is a protocol that utilizes information acquired from virtual LANs in its domain and assists in the management of VLANs on a network-wide basis. The role of management includes the renaming of VLANs, addition, and deletion of VLANs. This protocol reduces and eases the task that was carried out by the network administrator. In the past, network administrators had to do this task manually and the result was a messy network that was difficult to update and manage if the network administrator was not in the office.

MPLS

Multiprotocol label switching is a technique that utilizes and employs labels in the identification of switches within a network to enable the transfer of data packets from one node to another. The similarity that this protocol has to a VLAN is that in both there is the identification of packets between the switches within the network to enable correct forwarding of packets to the correct nodes (Flood 102).

MPLS marks data packets with one or more labels that are later switched during the process of label lookup. This type of look-up is much faster than ordinary look-ups in the IP table. This enables the entry points and exit points of the data packets to be identified and hence forwarded correctly.

MPLS IS different from VLANs as it employs label lookup as opposed to A look-up of header identifiers in the IP table which is a technique employed by VLANs.

Frequency separation being used for ADSL services is between 1Mbps for uploads streams and up to 5 Mbps for download streams. ADSL uses Frequency Division multiplexing. Copper lines are used to transmit data at high speeds. This is through a digital subscriber line access multiplexer. When this multiplexing technique is employed, voice frequency signals are separated from data traffic. Traffic from the digital subscriber line is routed between the customers equipment and network provider. Electrical signal frequencies are multiplexed in the copper cable in order to achieve the high data rates that are experienced by subscribers. These frequencies are spaced by some specific amount in order to reduce any chances of interference (Flood, 70).

Comparisons between DSL versions (Flood, 95).

DSL Type Distance Limit

  • IDSL 18000 Feet
  • GLite 18000 Feet
  • HDSL 12000-18000 Feet
  • SDSL 12000 Feet
  • VDSL 3000-4500 Feet

Two-wire and four-wire transmission is transmission techniques that involve the use of a copper pair wire as a mode of transmitting signals. It is normal to see copper pairs in places where traditional phones were used. An Analog signal is conducted from one point to another during which it is multiplexed and modulated in order for the signal to reach the other side in the same form as it was transmitted. The received signal is then amplified to restore signal strength. Several techniques of noise cancellation are implemented such as echo cancellation (Flood, 90).

DSL technology is implemented using this mode of transmission as a splitter within DSL equipment can allow the signal to utilize low frequencies that are normally underutilized.

Pair gain is a method of maximizing the number of lines being used by customers by transmitting various signals in one twisted pair. This reduces the number of lines required to add more customers to one network. This method is not good for DSL as it involves copper wire as the mode of transmission and this cannot be used by DSL as the mode of transmission line and secondly, one pair gain line usually inputs 24 voice lines and multiplexes the lines to one, T1 where the voice channels are now transmitted to the exchange. One T1 is approximately 1.5Mbps and this has to be shared across all 24 lines. The max bandwidth that a voice channel can utilize is 56 Kbps

The case of Pair gain in Australia is that after being introduced by major telecommunication companies, DSL technologies could not reach the customers despite promises from the big companies about its implementation. This has forced the customers to either look for other solutions in order to benefit from the Internet. As discussed above, telecommunication companies had first reassured the customers that it was possible to enjoy ADSL services while still using Pair gain technology. Unfortunately, this has led to many frustrated customers and this issue has even been brought to the political arena with the ministers responsible for communication being criticized.

Works Cited

Flood, Jeremy. Telecommunication networks. London: Oxford publishers, 2007. Print.

Defamation on the Internet

Introduction

Owners of intellectual property have a duty to ensure that the commercialization of their property does not, in any way, conflict with the law. In the Information Technology sector, programmers should ensure that the programs they develop are in agreement with the provisions of the law and that they do not develop programs that will be used in illegal activities like hacking. Similarly, providers of internet services should ensure that the materials that they post on their websites are in agreement with the law. For instance, owners and operators of blogs, websites and social networks are partly liable for defamatory statements posted on their sites depending on their level of involvement in the creation of the defamatory information. This paper analyses the interconnection between the legal liability of owners of intellectual property and the use of the intellectual property by looking into internet service provision and defamation on the internet.

Cyberlibel

With the increased popularity of internet blogs and social networks, the rate of defamation on the internet has also increased. Defamation generally refers to false and negative representation of another persons character leading to a bad reputation. It takes two main forms: slander and libel. Slander is in form of spoken language while libel is written. The most common form of defamation on the internet is libel. This is because of the written evidence that blogs, websites and social networks provide to their users.

One of the factors that have facilitated the increase of cyberlibel cases is the ever-increasing popularity in the use of computers and the internet. The internet now gives services spanning virtually all realms of life. People use the internet to shop, to find news, to run business transactions, for entertainment etc. This implies that the internet is being accessed by a great number of people with various levels of awareness of the law. The effect of this is that some ignorant people may use the internet illegally by posting defamatory materials on the internet. Such information will be accessed by a lot of people and thus it will have adverse effects. This behavior should be strictly discouraged to ensure that technology is used to achieve the goals it is intended to achieve. In most cyberlibel cases, the defamed person has information on the sites that he/she can use to prove the offence. Once the person proves that he/she has been defamed, he/she is normally entitled to damages with liberality.

Owners of Blogs

Owners and operators of social networks and blogs have a moral and legal responsibility to control the kind of information posted on their sites. To some extent, they make have legal liability for defamation occurring in their sites. This is despite the fact that they normally have immunity from liability arising due to defamatory statements on their sites. The stated immunity applies if the owners of these intellectual properties (sites, blogs and social networks) were not actively involved in the posting of the defamatory statements. More about the immunity is explained in the CDA (Communications Decency Act). Contrarily, if the operators or owners of websites expressly ask for information which ultimately turns out to be defamatory, the aforementioned immunity will not apply (Cram, 2002, p. 3).

In light of the discussed issue, there is a great need for owners of internet blogs and operators of interactive websites to be very careful on their level of involvement in service delivery. This is because users can maliciously or otherwise post defamatory statements on the blogs and websites which may lead to liability on the side of the owner/operator. For instance, a defamatory profile created in a social networking site may lead to liability to owners or operators depending on the level of involvement of the operator in the creation of the profile. That is, if the operator/owner expressly asks for specific information which is prone to defamation, the aforementioned immunity will not apply and thus the operator/owner will be liable for the defamatory statements (Cram, 2002, p. 5).

Providers of internet services are also subject to a different type of liability; notice-based liability. This type of liability is responsible for the less regulative measures put in place by service providers to avoid the creation of defamatory materials on their sites. This is because if service providers struggle to identify defamatory materials and avoid the same on their websites, there will be stronger grounds for defending liability to defamation since there will be constant notices to materials that are likely to be defamatory. Internet service providers therefore have the responsibility of reducing their liability to defamation by striking a proper balance between regulation and precautionary non-regulation (Gomez, 2000, p. 1).

Liability of defamer

The defamer is the most obvious liable person in a defamation case. Just like in other defamation cases, the person who posts things that falsely damage a persons reputation is liable for such materials. However, it is normally difficult to identify the person who posted such materials and if the person is known, other questions may arise like questions regarding jurisdiction.

Although some jurisdictional issues may arise in cases where the defamer does not expect his/her postings to affect different jurisdictions, such cases favor the defamed. Thus a defamer who posts defamatory materials on the internet about a person in a different state will be charged in the victims state. However, some courts may reject personal jurisdictions based on the nature of the case. For instance, a Pennsylvania court declined to hear a case (Betting V Tostigan) about a New York defamer who had defamed a Pennsylvania complainant on a betting website. The court decided that, since the statements were directed at New York, Pennsylvania had no jurisdiction to handle the case.

Just like the providers of internet services, users of internet services are also given some immunity by the CDA (Communication Decency Act). Users who post defamatory materials on websites and blogs are thus immune from defamation suits since it is only the originator of the materials who should be held liable. This fact was enforced by the Supreme Court in California in the Barret v. Rosenthal case where the defendant was offered immunity since she was not the originator of the defamatory materials. This case raised a lot of concerns about the over-protectiveness of the CDA to defamation defendants (Hilden, 2006, p. 1).

Court Cases

An example of a case about defamation on the internet is the stated Barret v. Rosenthal case. The complainants were doctors dealing with frauds in the health sector. They had sued another operator of a different website who had posted materials on a newsgroup which she herself did not operate. The materials did not recognize the doctors as advocates of health ethics and they disparaged the professional competence that the defendants held. The case eventually narrowed to one material that was posted by the defendant on her newsgroup. The message had been received by the defendant from a private source and it had defamed the plaintiffs but the defendant went ahead and posted it. The court decided that the defendant was immune from a defamation case since the defamatory message had a different originator other than the defendant. In this case, the fairness of accusing the originator of the message since the originator was not responsible for the posting of the materials on the newsgroup (Hilden, 2006, p. 1).

Another example of a court case related to the above discussion is Carafano v. Metrosplash.com. In this case, the defendant operated the website matchmaker.com. The website was meant to make single people meet singles of the opposite sex and possibly start dating. This was facilitated by profiles of prospective single persons that were collected using a detailed questionnaire on the site. The plaintiff spotted a false profile about her that was created by an unknown user using the extensive questionnaire and thus she sued the company. It was ruled out that the creation of the detailed questionnaire by the company was an effort to actively participate in information development and thus the defendant had participated in creating the defamatory profile. In addition to that, the court stated that the fact that the defendant operated information provision services and thus the immunity provided by the CDA did not apply. This case evidences the fact that the immunity accorded to service providers and blog operators can be revoked depending on the level of activity of the service providers (Nicolas, 2007, p. 1).

The last example of a case on this subject is the Griffis v. Luban case. It is an example of how jurisdictional issues are solved in defamation cases. The court of appeal in Minnesota decided that the state of Alabama had the right to exercise jurisdiction in the case where a Minnesota resident had defamed an Alabama complainant on the internet. The defamation had targeted the plaintiffs professional profile in a newsgroup on the internet. The accused had posted several defamatory messages with the aforementioned intention to tarnish the professional abilities of the complainant. The Alabama court had awarded damages worth $ 25,000 to the complainant but she sought enforcement in Minnesota. The appellate of Minnesota court held on to the decision arrived at by the Alabaman court since the case was under Alabama jurisdiction. It was further added that since the defendant had the knowledge that the defamation was limited to Alabama and she expected to be sued there, it was within the jurisdiction of the Alabama court to handle this case (Hoffman, 2006, p. 1).

Analysis of the effects of the CDA

The set precedents on the CDA have made courts interpret the immunity to include people who republish defamatory information intentionally. The congress passed this law since the preexistent situation was worse. Before the CDA was enacted, hosts and operators of internet services used to ignore the messages that were posted on the sites that they hosted. They avoided looking at material on which there were complaints and thus they avoided editing the materials which could make them liable. The result was that the internet services they offered to their clients were uncontrolled and all kind of information was posted on them. It can thus be argued that, although the CDA has brought about some controversial issues, it was necessary to pass it since it brought some control to internet service provision (Hoffman, 2006, p. 1).

In passing the CDA, the Congress was intending to put some regulation on the kind of materials that are posted on websites and end the free-for-all (Hilden, 2006, p. 1) era. They thus structured the Act such that operators of websites will be able to handle defamation complaints by ensuring that they read content before deciding on whether to post it on their sites. This was intended to depend on whether the materials are in conformity with the rules o the site (Gomez, 2000, p. 1).

The idea of determining whether a post qualifies for de-posting may sound like some kind of censorship because the person determining whether to de-post is not part of the government. However, the censorship comes as a result of the function of the providers of internet services to edit material before posting it on their sites. The Congress thus wanted to phase out the online public forums in which people used to share all kinds of ideas. The power given to internet service providers to edit material before posting it on their site can be seen as an effort by the Congress to regulate the kind of information shared on the internet while at the same time promoting freedom of speech. In a nutshell, the CDA was a big step towards regulation of online information sharing and thus the congress should consider making the necessary amendments to this Act in order to close the loopholes it has left for internet defamers (Nicolas, 2007, p. 1).

Conclusion

The biggest challenge in the enforcement of defamation on the internet is the fact that it is usually difficult to prove to the authorities that the defendant is responsible for the postings. Once this challenge is overcome, the case can be easily solved and jurisdictional issues can be settled. Attorneys who have dealt with a number of Cyberlaw cases can predict the results of such a case with reasonable precision. On the other hand, if the defendant misses an attorney who can find evidence in such a case, the case will most probably fail due to lack of evidence.

With the ever increasing popularity in the use of technology and the World Wide Web, there have been several instances of misuse of these technologies. One of the ways in which technology is being misused is the discussed habitual posting of defamatory materials on the internet by users. Virtually all parties involved in provision of internet services are privy to ensuring that such materials are not posted on websites and blogs. Owners of such blogs should ensure that they are not actively involved in getting information which can possibly be defamatory from users since this way, they will be held liable for any defamatory materials posted on such sites. On the other hand, users have a moral duty to avoid the posting of malicious and defamatory statements.

Reference List

Cram, A. (2002). Injurious falsehood and defamation on the internet. Web.

Gomez, E. (2000). Defamation on the internet. Web.

Hilden, J. (2006). Defamation on the internet. Web.

Hoffman, I. (2006). Defamation on the internet. Web.

Nicolas, D. (2007). Defamation and Slander on the Internet. Web.

Are the Effects of the Digital World and Internet on Our Modern Life Style Negative or Positive?

How do you feel when your laptop requires repairing, your Internet connection is broken, and your iPhone is left at home? Such perspectives seem to be too dangerous for you? If it is so, you are a representative of a modern digital nation which lives in our digital world.

What are the main peculiarities of this world? Why do the representatives of the digital nation differ from the people of, for instance, the 1970th  1980th period? The information is the main concept of the digital world, and the value of the information technologies is the main peculiar feature of the digital nation. Today it is impossible to imagine our society without the Internet, mobile phones, and other technologies which give us the opportunity to access to the great amounts of the information at any place and at any time.

New conditions of life which depend on the development of the information technologies create a new pattern of the publics life style. It is possible to say that the effects of the digital world on our modern life style can be considered as predominantly negative because the progress of the information technologies involves the changes in the typical life style of many people, influences their activities, their consciousness, and relations with the other persons.

The debates on the influence of the Internet on the young peoples minds develop since the time when the Internet became such an ordinary part of our everyday life as the television.

Nevertheless, it was rather difficult to predict such an expansion of the Internet round the world and determining Web as the giant database or a library which can function as cinema, theatre, and museums at once. According to Adam Gopnik, the Internet is just a loud and unlimited library in which we now live  as if one went to sleep every night in the college stacks, surrounded by pamphlets and polemics and possibilities (Gopnik).

It is only several years ago researchers began to speak openly about such issues as the negative effects of the Internet on the publics minds and to develop the necessary investigations. The results of their researches accentuate the fact that every time when we use the Internet connection in order to find the necessary information or to participate in the virtual reality we experience the great impact which is provided by the information from the Internet.

This impact is considered as negative because our brains begin to function atypically in order to cope with a lot of the information of different kinds. This controversial information along with the discussion of many other provocative aspects is presented in the project created by Rachel Dretzin and Douglas Rushkoff which and known as Digital Nation (Digital Nation).

However, those processes which can be observed in our brains when we are involved in the virtual reality are still not examined properly, but those findings which are available to the public provide rather pessimistic perspectives on the question of the influence of the Internet on our minds, intelligence, and consciousness.

In his article The Information, Adam Gopnik also focuses on the fact that the Internet breaks down our capacity for reflective thought (Gopnik). Thus, a lot of the information which is offered in the Internet is given as the facts which do not stimulate the publics critical thinking. Moreover, people are always at risks to perceive the information which is not reliable without analyzing its main points and credibility.

The other aspect of the influence of the Internet on the publics minds is the special physical and moral state which is often the result of the everyday involvement in the virtual life. Thus, Adam Gopnik emphasizes the fact that many people when they describe their state while using the Internet are inclined to depict it in such words as disassociation and fragmentation and moreover, he states that life was once whole, continuous, stable; now it is fragmented, multi-part, shimmering around us, unstable and impossible to fix (Gopnik).

Paying attention to those effects which the Internet has on the peoples minds and consciousness, it is not surprising to accentuate the numerous facts of the publics addiction from the Internet. Today many young people choose to spend all their spare time in the virtual reality which provides them with virtual friends, a lot of emotions and feelings. The level of the social activity of those persons who spend their days in front of their laptops is low because almost all their interactions take place in the space of the Internet.

Are their any dangerous effects in such a behavior or we should not worry? Ben Turner concentrates on the psychologists investigations and concludes that there is a link between the disinterest in public participation in local and national affairs and the increase of instances of Internet addiction (Turner). The Internet addiction hides a lot of risks for young people which are connected with the character of their social interactions, real communication, and being aware of themselves as the part of the real society, bit not the virtual reality.

The Internet addiction can be considered as the abstract notion which will not be associated with us, but with somebody else. Nevertheless, according to the data from Digital Nation, today many young people in such a developed country as South Korea have to get rid of the Internet addiction (Digital Nation).

The Internet addiction is interdependent with the feeling of the catastrophic loneliness which is typical for those people who made the Internet the major part of their life. In spite of the fact they spend much time communicating online with the help of chats and social networks, the feeling of loneliness which is the result of the real communications lack is too painful for them. Many young people are inclined to check their e-mails and Facebook instead of communicating with the members of their family.

When they reject the real interactions with real emotions they create their own illusion of communication in the Internet. The Internet communication is effective for solving business matters, but it is rather unsuccessful for personal relations. Sharing interests in music and movie with our virtual friends, we become more and more distant from our relatives and real friends. In the most dangerous cases this situation can lead to the publics isolation.

To conclude, it is necessary to state that the rapid development of the digital world provides a lot of issues for our modern digital nation. To overcome all the provocative and controversial aspects of this process, it is significant to pay attention to the negative effects of the situation. It is impossible to imagine our life without the Internet, but it is possible to avoid the extremes in involving it in our life style.

Works Cited

. PBS Frontline. 2010. Video. Web.

Gopnik, Adam. . The New Yorker. 2011. Web.

Turner, Ben. The Internets Effect on Relationships: Detrimental or Beneficial? 2010. Web.

Network Security. Profound Use of the Internet

Introduction

Network security is an important concept of computer networks that is aimed at the prevention of network intrusion. The profound use of the internet in itself poses a threat of network intrusion by unauthorized hackers. One of the possible solutions towards the prevention of computer network intrusion is to subject the network under potential threats in order to evaluate the weak points (Fadia & Manu, 2007). Such approach usually involves ethical hacking which serves to evaluate the level computer security. Other approaches to avoid intrusion include the use of Defense-in depth strategy and the implementation of appropriate intrusion detection system (Clarke, 2010).

The objective behind the implemented Defense-in-depth strategy

This strategy is primarily an Information Assurance approach which involves layering the defense security platforms for the sole purpose of increasing protection against potential computer security attacks. The major purpose of the Defense in-depth approach to computer security is to delay the onset of the potential threat rather than prevent the hacker from breaking into the system. In order for the strategy to be effective, it must implement effective threat detection mechanisms and effective measures to counter the threats (Warren & Jay, 2002).

The defense in depth strategy basically deploys the use of protection mechanisms, layered procedures and information security policies that serve the sole purpose of enhancing the dependability of a computer network through the division of the defense into multiple layers. The mostly ignored common phenomenon by majority of organizations is that major security breaches are usually from within the organization rather than by outsiders. Defense in depth mechanism does not only delay the onset of the threats, but also provide avenues that could be used to detect potential threats and help an organization to take necessary control measures to contain the threat, thereby decreasing the consequences that associated with the computer network security breaches (Warren & Jay, 2002).

The underlying principle behind the functionality of the defense in depth strategy is that it creates multiple layers between the hacker and the organizations information; in the sense that the deeper the attacker attempts to gain access into the information system of the organization, the more difficult it becomes for the attacker to have access to the information. The multiple layer approach serves to prevent direct attack to the organizations network. Further more, the defense in depth approach offers natural platforms for the deployment of effective intrusion detection methods which could both be hardware oriented, software oriented or people oriented. In an ideal world, the implemented defense in depth strategy should be able to delay potential security breaches, and provide sufficient time so that the organization can respond to a threat, thereby decreasing its impacts, which could be in terms of cost, prevention of information theft and maintaining of the integrity of the information (Clarke, 2010).

Managing a secure network is an important concept of the defense in depth strategy. Implementing network security involves the three basic attributes of network security:

  • Access control; which involves monitoring the people on the network and the various network resources that are at their disposal.
  • Integrity; ensuring that the information network itself is reliable as a critical business requirement and potential threats should be address as early as possible.
  • Privacy; making sure that the network traffic is not accessible to every one.

The layers in defense in depth strategy

The first and the basic strategy in optimizing the security of an information network is physical security. Physical security simply implies that access to the hardware systems is limited to only the required personnel, for instance, the network servers should only be accessed by the network administrators. One effective way of implementing physical security is through the use of deadbolt locks and other approaches that attempt to limit the physical access to critical information system hardware. Logical access to the network should limited within the organization perimeters, regulatory requirements also need to be put in place so as to monitor the flow of information in the organizations network. Stringent policies regarding the disclosure of the organizations information should also be implemented (Fadia & Manu, 2007).

The second strategy in defense in depth approach is authentication. Authentication serves to limit access to actual information system of an organization. This is critical as most security breaches in the present information age usually involve the by pass of the authentication protocols in any information network. Authentication can be implemented through the use of controlled access by means of passwords which are secure and less prone to the hacking algorithms. Password security can be implemented through the use limited attempts, failure to which the information network detects such cases and relays such scenarios as potential security breaches (Warren & Jay, 2002).

Another critical strategy in the defense in depth strategy is the use of Intrusion Detection software (IDS) to monitor the network and the various activities that take place in the information network. The IDS serves to report malicious activities to the network management stations. Intrusion prevention basically involves the carrying out of intrusion detection and taking of necessary responsive measures to contain the threats. The IDS usually logs the information concerning the security breaches and reports them to the network management.

Another approach in fostering network security involves the use of appropriate firewall software. Firewalls serve also to monitor the activity of the network; the access from particular sites could be limited thereby increasing the security parameters of the information network.

Conclusion

The defense in depth strategy is a proactive strategy that attempts to foster information security from both internal and external network elements. Information security is a continuous and dynamic process due to the changing nature of the threats. This implies that information networks require constant vigilance in order to foster network security (Fadia & Manu, 2007).

References

Clarke, N. (2010). Computer Forensics. New York: IT Governance Ltd.

Fadia, A., & Manu, Z. (2007). Network Intrusion Alert An Ethical Hacking Guide to Intrusion Detection. New York: Cengage.

Warren, K. I., & Jay, H. (2002). Computer Forensics Incident Response Essentials. New York: Addison-Wesley.

The Development of the Internet

The internet is a worldwide network of computers linking thousands and thousands of computers all over the globe. It has turn out to be one of the quickest growing means of communication in the 21st century. The internet began as a U.S Defense Department Cold War trial during the 1960s (Ruthfield, 1995, para.1). The government was seeking for a method of conveying messages linking tanks and headquarters, so the Defense Advanced Research Projects Agency (DAPRA) developed a method of relaying signals from the combat zone to get to the main computer by means of radio signals and satellites.

J.C.R. Licklider of MIT suggested a way of linking computers in 1962, and relocated to DARPRA later in the same year to champion the efforts of developing it. Leornard Kleinrock of MIT and afterward UCLA built up the technique of packet switching. It is a way of dividing the information being sent into small independent packets which transport sufficient message to find its destination and channeling them out individually in the direction of the destination server. This was to act as a foundation for internet connection (Howe, 2009, para.1).

The packet switching theory developed by Kleinrock was verified in 1965 when Lawrence Roberts of MIT linked two different computers in Massachusetts and California by use of radio signals. Roberts relocated to DARPRA in 1966 and initiated his intentions in ARPANET. These visionary thinking individuals and other unnamed ones are the fathers of internet. The first person to use the internet was Charley Kline who in October 29, 1969 made an ARPANET link involving Stanford Research Institute, Los Angeles, and the University of California. The use of ARPANET grew rapidly from then.

In 1979, Tom Trustcott and Jim Ellis then students at Duke University, developed the Unix-to-Unix Protocol (UUCP) to transmit news and messages on a serial line. In 1979, the use of Usenet was adopted based on UUCP. Newsgroups then developed that functioned to exchange messages across the world. The use of internet got a major boost in the 1970s from the development of TCP/IP network protocol first suggested by Bob Kahn at BBN and later improved by Robert Kahn and Vinton Cerf of Stanford University during the decade. The Defense Department took it in 1980 and substituted it with the previous Network Control Protocol (NCP); it was globally adopted in 1983.

The word internet was accepted in the first Request for Comments (RFC) publication on the TCP network in 1974 as a short form for the word internetworking and both terms were used interchangeably (Cerf, et al., 1974). Generally, internet referred to any network making use of TCP/IP network. Around that time, ARPANET was connected with NSFNET in the 80s, and the word meant the name of the network, internet, signifying an enormous and worldwide TCP/IP network. Interest in worldwide network was aroused and software applications for it were made, the internet technology extended all over the world (Wiggins, 1994).

The TCP/IP network made it possible to use any present network facility, for example the IPSS X.25 network, to transmit internet traffic. In 1989, the European Laboratory for Particle Physics, commonly recognized as CERN, suggested the latest protocol for message circulation that made nets easier to use. This protocol, which in 1991 was adopted as the World Wide Web, was founded based on hypertext messaging.

References

Cerf, V. et al., 1974. Specification of internet transmission control program. Web.

Network Working Group. Web.

Howe, W., 2009. . Web.

McCrossan, J., 2000. Books and reading in the Lives of notable Americans: a biographical sourcebook. Westport: Greenwood Press.

Ruthfield, S., 1995. The Internets History and Development. Web.

Wiggins, W., 1994.The Internet for Everyone: A Guide for Users and Providers. New York: McGraw-Hill.

Using the Internet for Masters Programmes

Introduction

Much attention has been recently paid to the Internets advantages and risks for postgraduate studies. Nowadays, the Internet may allow users to access almost everywhere by a wireless network or even through numerous mobile Internet devices. Due to the convenience of this technology, people have greater flexibility in their studying or working. The services of the Internet include many functions such as email, websites, sales, chat rooms, and educational materials. Many students also like to search for information or background knowledge from the Internet. The instantaneous exchange of ideas and knowledge has made learners life easier. The Internet provides a large space that enables people who surf online to post or to publish their ideas and information online, and also allows an individual to plagiarize the knowledge and free information without self-noticing due to the lack of security controls. Because of the easy access and free up-to-date information on the Internet, a deep concern about students plagiarism appears.

Aims of the Paper

This paper aims to look critically at the advantages and disadvantages of the Internet for Masters students. First, the benefits of the Internet will be introduced at the beginning of the next section; secondly, we will focus on the risks of the Internet and the ideas on how to avoid plagiarism. Some suggestions will be drawn as a conclusion at the end of the final section. In this paper, we underline the positive effects for postgraduate students who should realize that the Internet is a fast and powerful tool that helps them to collect more information on their research as well as the importance of being strict on information quality control to avoid any plagiarism. This high-tech tool will provide students with assistance in case students can find the balance between the advantages and risks of the Internet sources in the chosen research areas.

Reasons of Plagiarism

According to Baruchson-Arbib and Yaari (2004), the Internet grants students access to vast amounts of information (p. 30). In a matter of a few seconds and a few keywords, learners can Google and find a variety of sources they want. The advantage of the Internet lies in the fact that it makes our life easier and more convenient. The invention of the Internet helped us avoid visits to the library to search for information or books we need when we are dealing with a paper or an assignment. On the other hand, the main risk of the Internet is the idea of plagiarism. Students could finish their assignments very quickly by copy and pasting the information they found. Talking about the risk of the Internet, Willems (2003) stated that the Internet has provided an opportunity for students to prepare their assignments in a quick and painless way with minimal effort and engagement. DeVoss and Rosati (2002) have pointed out some reasons why students enable themselves to use the Internet to plagiarize. In their opinion, students suffer because of plagiarism due to a lack of knowledge of how to use the Internet sources and what information is really reliable. It seems that some people might use the copy and paste function in the wrong way, and this is why the problem occurs.

How to Avoid Plagiarism

The necessity to avoid plagiarism is a big issue, still, a student might cause plagiarism accidentally from time to time. A good way to avoid plagiarism is to write down every reference cited in the reference list. It is better to write down the source first before using the quotes from the sources found. Writers should not copy any words down from the referencing sources unless they intend to cite the phrases correctly within their assignment. Secondly, it is obligatory to use quotation marks around the texts when we copy from a research text exactly the way the original author wrote them. It is necessary to remember to put the authors last name, year, and page number at the end of the citation. For example: (Krashen 1986:36). Chou (2010) mentions that paraphrasing of some of the quotes is encouraged in order to emphasize the respected thinkers, but DO remember to put the authors name and the page number. The last way makes someone else check your work or find a plagiarism checker, do the copy and paste function and submit to check your work, if you are describing an idea without acknowledging the author or listing any reference, it is a case of plagiarism.

Conclusion

To sum up, this paper was intended to describe the advantages and the disadvantages of using Internet sources for Masters assignments. It can be seen that the Internet has an advantage that is fast searching and access to different information. Still, there is a big problem connected to the possibility of plagiarism. From this paper, we could observe the limitations because of which students cannot use the Internet properly. There is no attention to the training programs with the help of which students may get an idea on how to use the Internet information. It is necessary to explain to all students how important the idea of intellectual property rights is. There are only a few researches dealing explicitly with how serious a problem could be if students plagiarize other writers works. No matter what reason causes a student to use other peoples ideas or knowledge, the act of plagiarism should make students gain valuable learning before using such amazing still provocative sources as the Internet. This is why it is better to focus on the strategies with the help of which students may improve their knowledge about the Internet.

Reference List

Baruchson-Arbib, S & Yaari, E 2004, Printed versus Internet plagiarism: a study of students perception, International Journal of Information Ethics, vol. 1, no. 06. pp. 29-35.

Chou, I C, 2010, Is plagiarism a culture product: the voice of a Chinese-speaking ELL student, Language Society and Culture, vol. 3, no. 31, pp. 37-41.

DeVoss, D & Rosati, A C, 2002, It wasnt me, was it? plagiarism and the web, Computers and Composition, vol. 19, no. 3, pp. 191-203.

Willems, H, 2003, Plagiarism @ your school library, Library Media Connection, vol. 21, no. 5, pp. 28-31.

Internet Resources: Choosing of Credible Website

When working with older adults it is important to consult various reputable sources which can help to assist these people. The Internet provides a great amount of information that can be also used as a source of knowledge. Besides, it is possible to give older adults some helpful links which they can use to find out more about their diseases, potential threats, and possible ways to escape these threats. However, it is essential to choose only credible websites.

For instance, can be very helpful for health or fitness professionals. In the first place, the website is sponsored by the government (the link contains the following symbols.gov). The website contains a lot of useful information which is presented in a very concise way.

The information provided is easily identifiable: there is the date of the last review, and there are names of the authors. More so, there are no advertisements. All these factors make the website credible. Besides, older adults can also use the website since it is easy to follow the information presented.

Another helpful website is sponsored by the government. The information presented is collected or reviewed by National Institute on Aging which makes the website credible. All articles and sets of data have the date of the last update. It is necessary to point out that health/fitness professionals can provide older adults with the link to this site. The information is clear and concise. It is easy to find answers to any question with the help of the website. There are also many helpful links to other reputable sources. The absence of advertisement is also a hint proving that the website is credible.

One more informative website is sponsored by the government. It contains a lot of helpful information concerning aging, related diseases, and their treatment and prevention. The data can be easily identified. There is no advertisement which is also good.

Thus, the website is credible and can be used safely. However, it is necessary to point out that the website is rather difficult to use. There are many links and some older adults will not be able to surf the website successfully. Therefore, the website will be helpful for professionals. When giving a link to older adults, it is necessary to give precise links to articles and sets of information that can be useful for this or that individual. In this case

When considering inappropriate websites it is possible to get a closer look at the following website. The website domain (.net) denotes that the website is a network infrastructure. The website cannot be regarded as credible because the information presented has only the date of publication, and no author name (or degree, or at least e-mail). Besides, there is quite a lot of advertisement. Therefore, the information provided should be double-checked before taking it into account.

Another website that should not be used when working with older adults. First, it is a commercial site (.com). There is quite a lot of advertisement. Despite the fact, that many articles are identifiable (there are names of the authors and dates of publication) the information should not be regarded as 100% credible. It is necessary to check whether the data are relevant by consulting other sources. Besides, the information is not presented concisely; it is difficult to follow it.

On balance, the Internet can be really helpful for health/fitness professionals and older adults, but before consulting any website (and providing links to older adults) it is essential to check whether it is a credible website.