Contribution of the Factors to the Internet Growth

The World Wide Web as it is today has witnessed myriad changes. It began as a closed resource only used for governments and large organisations until later when it was revolutionized and became an open resource for the whole world. The benefits the internet has brought forth are mind boggling particularly in the aspect of globalising the world. The possibilities accompanied with its robust growth are inexhaustible.

The internet has become the worlds richest resource of information making knowledge far more accessible at the touch of a button. This paper will look at a few factors and how they have each contributed to the immense growth of the internet. It will also look at scripting languages both one server side and one client side and discuss the different methods used to integrate multimedia features into various multimedia products such as websites and CD-ROMS.

Scripting languages are increasingly gaining popularity as a result of the emergence of web based applications on the internet. The World Wide Web market is exponentially moving towards the age of dynamic web content which is a great advancement compared to the static content that has been in existence for a long time.

Day in day out web gurus are busy developing new scripting languages which are more user friendly requiring very minimal or no programming prerequisite. This in turn has led into an explosion in the development of highly interactive web pages. Nonetheless scripting languages have a major loophole that developers have not been able to counter which has proved to be a major security breech that is encountered by majority of the internet users.

This is the ability of executable code to be unconsciously downloaded to a web browsers machine from the remotely located server and easily run on the browsers interpreter. This in turn results to issues of security where malicious characters use this loophole to get into peoples computers and steal valuable information (Whitcomb, Client and Server).

The integration of multimedia features into multimedia products on websites is perhaps one of the paramount achievements witnessed in web development. One therefore wonders how this has been achieved. This is where the concept of one server scripting language and one client scripting language kicks in.

The one side client environment solely plays the role of running scripts this is in essence a browser. The scripts (in form of source codes) are obtained from the web server over the internet and processed on the end users browser (Methods Used to Implement Client-side Scripts n.p). The client computers browser has to have the scripting language enabled for it to run. Various methods can be used in the implementation of client side code. These include;

  1. Integration of scripts in between a pair of script tags
  2. Can be stored in an external file that is singled out form the extension src which attributes a script tag.
  3. Can also be implemented within an event handler.
  4. Finally can be implemented in various URLs that use certain kind ofprotocols.

The one server side environment scripting language is run by the web server. When a user on the client server side sends a request it is fulfilled directly after the script is run of the web server thus generating dynamic HTML pages.

The generated HTML is then sent to the client browser as output.One server side scripting language is the wheel behind dynamic and interactive websites which are linked in with databases on the server (PHP Server Side Scripting Language n.p). It generates items from the database and sends to the client browser which is the displayed out by the browser as results.

The major advantage of one server side scripting is the unlimited ability to highly customise results based on the users requirements, access databases in form of queries and the unlimited access rights they poses. With the use of this different scripting languages integration of multimedia features into products has become a reality and with the advancement in scripting languages the internet in the near future is expected to have limitless functionalities embedded within it.

Having looked at how scripting languages work it is imperative to look into how modern scripting languages have further backed the transformation of the web. As explained earlier,modern scripting languages have been instrumental in the transformation of the web. Earlier scripting languages such as Perl are slowly fading awaydue to their limitation in functionality as well as their complexity levels.

Another major difference between modern and earlier scripting languages is the fact that the modern languages are easy to pick up and learn even for beginners as compared to earlier languages that were more structured with heavy code(Joan, Difference between Pearl and Python). This limits the users as not many people would easily understand them.

Earlier scripting languages used confusing keywords that more often than not do not conform to the task that the coder had in mind. This only served to confuse the more. Scripting languages in the earlier days were as complex as software development languages and thus took longer time to debug. This would mean that a programmer writing complex code would have to take a very long time in checking for errors. However modern languages have overcome this barrier.

As it has been shown modern scripting languages have in more ways than one proved to be advantageous in many ways thus propelling the growth of the internet. Other factors of modern scripting languages that have propagated this growth include (Advantages and Disadvantages of Scripting Language n.p);

  1. They require minimal programming experience to learn
  2. They allow programmers to perform intricate tasks relatively fast
  3. They provide room for simple editing within most text editors
  4. Provide room for the creation of very interactive web pages
  5. Code runs fast

The last part of this paper will chiefly focus on the importance of open source movement and its role in the development of the modern internet. Open source movement is an organisation that believe that human knowledge is for the world and should be shared among all free of charge.The issue of open source software has been one that has brought forth many mixed reactions from different groups of people.

Notwithstanding the idea of open source software has been a great motivator and a large catalyst in the advancement of the internet. Many advantages are associated with open source movement. The first easily perceivable benefit of this open source model of software is the fact that it is made available at minimised cost or free of charge in many cases(Gonzalez, Advantages of Open Source Software).. However this is not exclusive to open source kind of software as some companies provide proprietary software products at no cost.

The distinguishing factor between open source software and software that is provided at no fee is the fact that the source code for open source software is made publicly available and modification rights granted to anyone who would like to make changes unlike with proprietary software where only the developers can make changes to it.

The public availability of source code has ensured the limitless modification of software products. This in turn for enthusiasts as well as pro developers to be able to carry around code within different hardware under different modifications to enable the software survive different changing conditions. Thisfactor has by itself fuelled the growth of the World Wide Web to the levels that are witnessed today.

Another key advantage of open source software that has propelled the growth of the internet is the right to make improvements to code and redistribute. The fact that distribution rights cannot be revoked is an attractive package for developers worldwide. They are attracted by the fact that these rights are universal and they can have their idea spread out to the whole world.

The right to use software in whichever manner one pleases ensures that software attracts a large crowd of users. When a large user base is created it promulgates the creation of a market for the support and development of the software and in the long run attracts more and more developers. This encapsulation of many developers leads to quality products in the market and thus the user numbers keep increasing. This factor has been key in the growth of the World Wide Web over the years (Key Advantages of Open Source n.p).

Open source software is advantageous because of the fact that no single entity that determines the future which certain software will take. Say a certain company A relies on another company B for all its software upgrades. Incase something befalls B since they own all the rights to the software and thus it means that the production of the software ceases (Delaney, Cleg & Williams, The Advantages of Adopting Open Source Software).

In conclusion, this paper has tried to show the various factors have enhanced the growth of the World Wide Web. The reader gets to understand how scripting languages have propelled further the growth of the World Wide Web. The reader further gets an insight into how these various scripting languages have been slowly manipulated and exploited with time until developers are now able to translate multimedia functions into multimedia products simply by exploiting the use of these languages.

The paper has also given a great insight into how these scripting languages have developed over the years thus providing ample room creativity and opening up the field to more developers thus pushing forward growth. Finally the paper has been inestimable in helping the reader understand the various advantages that have come forth with open source software and how it has led to the revolutionising of the World Wide Web.

As the trends in the internet are clearly drawn out on the paper the internet in the near future is expected to witness explosive growth especially when it upgraded to ipV6 which will be an advancement of the current. This will allow more room for expansion and in turn lead to more and more exponential growth. The world should thus be prepared for a surprise when it comes to internet in the future.

Works Cited

Advantages and Disadvantages of Scripting Language. Client Side Scripting Features. Sqa.org, 2007. Web. N.d.

Delaney, Emmett. Clegg, Peter & Williams, Jason. The Advantages of Adopting Open Source Software. informIT, May 2005. Web.

Gonzalez, Barahona. Advantages of Open Source Software. Eu.conecta.it, May 2000. Web. N.d.

Joan, Ben. Differences between pearl and python. Differencebetween.net, n.d. Web.

Key Advantages of Open Source is Not Cost Savings. Computer economics, May 2005. Web.

Methods Used to Implement Client-side Scripts. Client side scripting features. Sqa.org, 2007. Web. N.d.

PHP Server-Side Scripting Language. University Information Technology Services. Indiana University, n.d. Web.

Whitcomb, Valerie. Client and Server Scripting in Web Pages. Msdn, July 1997. Web. Jan 1997.

Security Threats to Business: Is Internet a Safe Place?

Introduction

The original makers of the internet did not intend it to be a place where business transactions would take place. However, many businesses have turned to the internet as a means of conducting financial transactions and advertising given its ease of access. With money changing hands so easily over the internet, thieves are constantly coming up with ways of stealing crucial information like credit card numbers and other personal information.

Therefore, the big question remains; is the internet safe for any business transaction? It could be, but the involved parties must take all the necessary precautions to prevent internet fraud on its part as well as their customers.

Risks Involved There are numerous risks for business especially small ones that choose to transact online. One such risk is identity theft, this is the crime involved when a person steals anothers personal identification information be it their credit card number, social security number or their ATM PIN (Miller, 2008, p.3).

The stolen information can then be used against the victim as a means of blackmail, for industrial espionage or even to gain access to his or her financial accounts. Tactics used in executing identity theft are important to understand as they form the basis of creating adequate security while online.

They include phishing where one is mislead by genuine looking sites to give away personal information, Spyware which are small program hidden and running in the computer that gives away ones information and even hacking where the criminal hacks into your system and steals your information (Baskin & Piltzecker, 2006, p.80). The others are email interception and wi-fi data sniffing especially in public hotspots.

The other risk is tampering where the victim has his data compromised through various means such as viruses, worms, Trojans or even directly. This can be used by a competitor to destroy the reputation of the victim or simply gain advantage over him or her in business. In light of these risks, it is important to take necessary precautions to prevent internet fraud.

Solutions There are several precautions one can take to safeguard themselves against online attacks. For a business considering going online the first thing should be to understand their security concerns then come up with a security plan (Reuvid, 2005, p. 4). The next thing should be to ensure the computers are well protected using regularly updated anti-virus and anti-spyware programs.

In addition, having a firewall is essential in blocking most of the hackers and unwanted sites. Even though these might be expensive to implement a small to medium business cannot afford the loss that they prevent. Another precaution that cannot be overemphasized is the use of passwords, these should be long (about eight characters) and consist of numbers, lower and uppercase letters and special characters (Sinclair, 2007, p.264).

Dictionary words are insecure as programs exist to reveal such passwords. Finally, when browsing the internet: Do not follow links given in emails even if they seem genuine and do not download files and applications from suspicious websites. A security plan that takes all these precautions into considerations should be adhered to strictly.

Conclusion Online threats to businesses are a reality but also is the technology that has been developed to counter it. I think that since all businesses involve risks then there is no point being deterred from going online just because of the threats involved. Businesses need to develop a plausible security for the success of online transactions with limited risks.

Reference List

Baskin, B., & Piltzecker, T. (2006). Combating Spyware in the Enterprise. Rockland: Syngress Publishers.

Miller, M. (2008). Is It Safe?: Protecting Your Computer, Your Business, and Yourself Online. New York: Que Publishing.

Reuvid, J. (2005). The Secure Online Business Handbook:. London: Kogan Page Publishers.

Sinclair, J. T. (2007). EBay Business the Smart Way: Maximize your Profits on the Webs #1 Auction Site. New York: AMACOM publishers.

Authentication and Securing Personal Information in Untrusted Internet

Introduction

Personal computer users face diverse security consequences due to different malicious software such as spywares and root-kits in their current system usage, especially during internet transaction procedures. This report outlines the procedures for securing personal data through un-trusted internet as addressed by Mohammad Mannan during a security seminar. The presentation took place on February, 22nd 2011 at Concordia University also abbreviated CIISE (Concordia Institute of Information System and Engineering), located in a vibrant cosmopolitan setting in the city of Montreal, Quebec Canada. The Authentication and Securing Personal Information in an Un-trusted internet colloquium addressed drawbacks relating to computer and web usability. The session by Mannan mainly addressed semantic attacks for instance phishing, which has become a common in un-trusted host machines as well as through legitimate sites. Today most antivirus software suffers higher vulnerability than non-security software. The increase of untrustworthy environments in the web therefore leads to the question of whether there are measures or tools to control, improve and protect environments for the end-users. How can users continue to engage the online economic transactions safely?

Discussion

Mobile Password Authentication (MP-Auth)

The main way of improving security for the end user is by finding a realistic technology/model that clients can put into operation during valid or virtual global operations. The ability to verify veracity of usage as well as passwords generation and authentication of techniques are some of the mechanisms that can assist end-users to improve transactions security. Phishing and session interferences compromise procedures of authenticating integrity of sensitive data even when users practice the most convenient security measures. This is a real concession for user safety during virtual transactions. The intention of most web-based security practices is to provide protection to user, from complex phishing frauds during sensitive web transactions either through a secure PC or through compromised platforms. The security of personal information requires authentication and safeguarding of sensitive information such as application for online banking and other long-term codes/keys.

Mobile Password Authentication (MP-Auth) addresses this issue through use of simple mobile devices such as smart phones or PDA (Personal Digital Assistant) that combine with servers to generate random encryptions through use of the public key, to be relayed through venerable end-user machine terminals. The long-term password can therefore be applied as a single use password since it is concealed from potential phishing sites. The Mobile Password Authentication (MP-Auth) protocol therefore safeguards integrity of transactions through persisted confirmation and transparency to the mobile device in use, as opposed to the two-factor technique.

MP-Auth provides protection and privacy for users such as protecting their passwords against phishing and violation of integrity during transaction. On assumption that the mobile device in use is safe from malware attacks and all users can access correct public key from the bank, installation on the device must involve all targeted websites public keys. MP-Auth procedure thus involves a visit to an online banking website from a venerable personal computer, but the browser forwards authentication key prompt to the mobile device. The device in-turn encrypts the password using the websites public key (loaded at some stage during setup execution). The result (an encrypted password) is then forwarded to the financial site through browser of the venerable personal computer.

Suggestions

The MP-Auth procedure protects against phishing for the reason that spoofed sites are not able to decrypt information. The protocol also prevents pharming by concealing long-term secret information especially when users cache is under threat. Protection of transaction procedures are assured since it is easy for a mobile device to detect illegal transactions on the computer. The MP-Auth can easily fail due to overhead writes, involvement of large software and failure of measures to notify users on authentication status. Most attacks on MP-Auth thus occur due to existence of malware, re-use of passwords on different websites especially social sites, lack of Password hashing and submission of passwords during social browsing. In his presentation, Mannan (2011), malwares on personal devices are avoidable by virtualized Trusted Platform Module (vTPM), TCGs Mobile Phone Work Group or devices of less functionality or software (p.18). General user safety tips include keenness throughout confirmation of secure data transactions and use of devices that are free from malware during web transactions.

Mobile devices authentication depends highly on strength of user password. Use of other different options such as graphical (images or binary) instead of plain text may strengthen the password. Various platforms support password encryption through mobile devices such as the add-ons on browsers and current mobile applications such as android.

Conclusion

Common attacks by spy and malwares occur during installation of key-loggers (hardware and software) on personal computers. Today it is possible for phishing sites to install key-loggers on personal computers even when the general user does not direct explicit downloads or follow links to such sites. The main aim is to extract useful information such as usernames or passwords for accessing financial accounts. The malware have access to information when unsuspicious users keys in these long-term secret details on a typical personal machine to access online bank accounts. Current phishing attacks are also able to obtain information from computers that are free from malware by hijacking the domain identities. Safeguard of long-term passwords therefore require encryptions using mobile devices governed by the public key of a server. The long-term access information therefore require transformed to one-time passwords, which are not easily disclosed by key-loggers or phishing sites. This form of password authentication thus causes the personal computer to act as a mare bridge for interaction with websites since it encrypts data and only accesses temporary secret information such as passwords. Mobile devices are thus better since they have limited software compared to personal computers and provide security protocols that involve passwords authentication only.

Reference

Mannan, M. (2011). Authentication and Securing Personal Information in an Untrusted Internet: Security Seminar. Montreal, Quebec Canada: Concordia University.

The Childrens Online Privacy Protection Act (COPPA) and the Childrens Internet

Introduction

The Internet has provided people with unlimited access to information, but such a convenience also has a negative side. The use of materials available on the Internet, whether intended or unintended, can be harmful to children. Young users can be exposed to unpleasant or violent images or videos, and they can also become victims of cyberbullying. To protect children from inappropriate and offensive materials found on the Internet, COPPA and CIPA were introduced. While both acts have reasonable aims, they also contain some challenging elements, which makes it difficult to comply with them.

The Main Compliance Requirements for COPPA and CIPA

Both COPPA and CIPA impose obligations on administrators of websites and other online services that are used by children. According to COPPA, all website or online service operators collecting information from children under thirteen must include a privacy policy in order to protect childrens safety and privacy online (How to comply with Childrens Online Privacy Protection Act [COPPA], n.d.). COPPA cooperates with the Federal Trade Commission (FTC) to explain the major requirements for compliance. Such data as the full name, home or email address, phone number, or any other information that can put the childs privacy under threat, must be protected by administrators (How to comply with COPPA, n.d.).

CIPA has similar regulations, but it is focused on schools and libraries that have access to the Internet (Childrens Internet Protection Act (CIPA) [CIPA], 2017). To comply with CIPA, libraries and schools are expected to limit childrens access to inappropriate online materials and provide security and safety to youngsters while they are using chat rooms and emails (CIPA, 2017). Thus, both acts demand that childrens private information be protected and the possibility of viewing harmful content be restricted.

Similarities and Differences

While COPPA and CIPA have almost identical compliance requirements and some common features, the two acts are not the same. Both CIPA and COPPA were enacted in 2000 (CIPA, 2017; How to comply with COPPA, n.d.). Another major similarity is in the purpose of the two acts: they both aim at protecting children from inappropriate and violent online content. However, there is a difference in the acts definition of a minor. COPPA applies to children under thirteen (How to comply with COPPA, n.d.). Meanwhile, under CIPA, a minor is anyone under the age of 17 (Grama, 2015, p. 131). The need for two different acts appears due to their controlling separate spheres of Internet use: COPPA deals with commercial websites while CIPA manages schools and libraries.

One more divergent feature between the two acts is that they are governed by different commissions. COPPA is regulated by the FTC, and CIPA  by the Federal Communications Commission (FCC). The roles of the FTC include investigating complaints of websites which violate COPPA and imposing penalties for violations (Grama, 2015). Apart from that, the FTC offers a variety of tools helping website administrators to comply with the regulations. In its turn, the FCC regulates CIPAs work and instructs schools and libraries on the acts correct implementation. Thus, while the acts may seem very similar, there exist divergences which necessitate the existence of two different sets of regulations.

The Most Challenging Elements for Compliance

COPPA and CIPA pursue important goals, but their requirements are not easy for website and online services administrators to implement. Probably the most challenging aspect of complying with COPPA is the use of false data by children, particularly not being honest about their age. Since there is no opportunity to verify a users age, many minors deceive the system and obtain access to pornographic websites or other content that is not recommended for them.

In case of CIPA regulations, the problem is in the need for schools and libraries to hire additional personnel. CIPA requires the use of the technology protection measure (TPM) (Grama, 2015). This tool helps to filter the objectionable and visual content (Grama, 2015, p. 132). For successful installation and use of the TPM, libraries and schools need to hire people who could be responsible for these duties. Thus, compliance with CIPA may impose a financial burden on these institutions. Therefore, along with numerous benefits, both CIPA and COPPA impose some challenges on users.

The Protection of Different Ages

The reason why COPPA and CIPA protect different ages is that they focus on dissimilar objects of protection. COPPA deals with younger children because its major aim is to defend minors privacy and keep their personal data unavailable to dangerous websites and people (How to comply with COPPA, n.d.). Meanwhile, CIPA aims at restricting youngsters access to pornographic and violent materials (CIPA, 2017). Thus, a minor under COPPA is under the age of thirteen while the same definition under CIPA includes children under the age of seventeen.

Opposition to COPPA and CIPA and the Likelihood of Their Being Changed

Many parents, teachers, and public activists disagree with COPPA and CIPA regulations and express their opposition to the acts. Almost right after CIPAs introduction, the American Civil Liberties Union and the American Library Association sued the U.S. government. The organizations argued that CIPA violated the right to free speech (Grama, 2015). In particular, it was mentioned that minors were deprived of access to information on crucial subjects, such as breast cancer (Grama, 2015). Such restrictions led to peoples dissatisfaction with CIPA and COPPA.

Another negative aspect that raises opposition to COPPA and CIPA is the impossibility of controlling children in places other than home or a school library. For instance, as Schaffhauser (2017) remarks, teachers may use some materials which parents might deem inappropriate for their children. Thus, there are two kinds of opposition regarding CIPA and COPPA. The first one is focused on too many restrictions and the limitation of freedom.

The second one aims at spreading the regulations of COPPA and CIPA to more spheres of childrens communication and activity. Both aspects are crucial, and if more efforts are made to prove that CIPA restricts users freedom, it is highly likely that the acts will be altered. Indeed, too many restrictions may lead to childrens decision to obtain information from other sources, such as communicating with adults whose intentions may be much more harmful than using the Internet from home.

Conclusion

The Childrens Online Privacy Protection Act (COPPA) and the Childrens Internet Protection Act (CIPA) were developed with the purpose of safeguarding children from unpleasant, violent, or inappropriate online content. While both acts have a similar general goal, they have some specific features making them different. The age of children under each law and the sphere of acts influence are the main dissimilarities between CIPA and COPPA. Although protection acts benefit minors to a great extent, they also limit their freedom. Thus, it is necessary to revise the acts in order to meet the expectations of the majority and reach the best outcomes for children.

References

. (2017). Web.

Grama, J. L. (2015). Legal issues in information security (2nd ed.). Burlington, MA: Jones & Bartlett Learning.

How to comply with Childrens Online Privacy Protection Act. (n.d.). Web.

Schaffhauser, D. (2017). . The Journal. Web.

Internet Services, Connections, and Limitations

Packet switching

Packet switching is a digital communication approach that divides digital messages into distinct units called packets, which contain the header information that describes the address of origin and destination, any other information needed to control the message such as encryption and decryption methods. The packets use different paths to reach the destination whereby reassembling takes place. Routers are responsible for transmission in packet switching.

In addition, they deploy algorithms to determine the most appropriate for the packets depending on traffic and security. Packet switching are more advantageous to circuit switching because they are less costly and less wasteful; meaning they do not contain a lot of overhead data compared to circuit switching. Another advantage is that packet switching can deploy both connection-less oriented and connection oriented approaches to digital communication, this implies that there guarantee of security and faster delivery since the packets can follow the routes that are more secure and are experiencing less traffic.

Reasons for limited information sharing over the internet

The internet offers a vast source of information due to the fact that there are internet users are increasing on a daily basis. Despite this improvement, a number of factors such as privacy issues limit rich information sharing. Privacy issues entail concepts such as authentication and validation in order to have access to information on the internet. Rich information sharing is also limited due to security issues on the internet. Security is a major issue in peer-to-peer connections over the internet; as a result, people are putting into consideration security measures that serve to limit information sharing over the internet.

Limitations of the internet today

There are four major limitations associated with the current internet infrastructure. The first significant limitation is bandwidth limitations associated with insufficient capacity to meet the communication requirements in the backbones and switching centers. Insufficient bandwidth results to communication bottlenecks and the incapability to handle high data traffic of voice and video. The second significant limitation is Quality of Service (QoS) limitations resulting to latency issues and delays and no guaranteed in delivery of messages.

The third limitation of the current internet is language development limitations related to web development tools such as HTML, which are not efficient in the development of databases and online communication platforms. Tags used in web development tools are fixed and generic in nature. The fourth limitation associated with the current internet is Network architecture limitations related to ineffective topologies that are incapable of supporting communication to multiple users at the same time. In addition there are limitations of wired internet connections associated with the expensiveness of fiber-optic cables, distance issues in the normal Ethernet cables and cellular systems that are outdated.

Services currently available through the web

The first significant internet service is the electronic mail service, which facilitates communication over the internet via electronic text messages. Examples of e-mail services include yahoo, Gmail and Hotmail. The second service available on the internet is World Wide Web (www), which is a set of interlinked documents, found on the internet and is accessible using Uniform Resource locators (URLs). The third service available on the internet is the search engines, which offer faster search to any information on the internet.

Examples of search engines include Google, Bing and Yahoo search. Another internet service is Internet telephony, which facilitates the transmission of voice messages over the internet. Examples of telephony services include yahoo messenger and Windows Live messenger. The fifth internet service is web bases application, which internet users use to run applications without having them installed in their workstation. An example of web-based application is the Office Web Apps and Google Apps.

Another service available on the internet is online video teleconferencing, which facilitates video communication between multiple users. An example of teleconferencing service is the Cisco WebEx meeting center. The internet also provides internet radio and television services used to stream radio and TV content via the internet. Another service available on the internet is the instant messaging service, which provides real-time online chat between users in interconnected networks. An example of instant messaging service is the AOL instant messenger. The other internet services are Blogs, Wikis and Podcast services.

Internet connections used today

There are various methods used in setting up internet connections. They include the dial-up access, cable connection, internet via satellite, tier connection, DSL, ADSL 2+, optical cable and Internet 2. The significant difference between them is the transmission speeds. The dial up access is the most cheap and slowest internet access method having speeds of up to 56 Kbps. The cable connection provides internet connection via TV lines and can support a range of 512 Kbps to 20Mbps.

The satellite connection is uninterrupted and can support an average speed of 500Kbps. Tier carries are used as internet Backbone and their speeds vary according to the number of Individual channels.T1, T2 and T3 can support up to 64 Kbps. T4 and T5 can support up to 43 and 400 Mbps respectively. DSL uses telephone lines that can support a range of 128 Kbps to 8 Mbps depending on the category. Optic cable connection supports a speed that is greater than 1Gbps, which can transmit voice and video messages effectively.

The Internet2 is not common and provides the highest transmission speeds of about 100 Gbps. The most common internet connection trend in the recent times is the optical cable connection. Internet 2 is a recent approach and has not gained much popularity. Corporates and business organizations prefer using the Tier connection and DSL, while individuals roaming prefer using dial-up connection.

Critical Evaluation of Shame About the Internet

The passage by Andreas Kappes Shame about the Internet raises the theme of online harassment leading to the feeling of shame. The author believes that shame, compared to guilt, brings up negative feelings such as worthless and powerless that oftentimes give birth to anger, aggression, negation, and suicide attempts. Kappes highlights the double standards people implement towards others by judging and blaming their shortcomings and transgressions being intolerant to their fails. Undoubtedly, no human being can act, think, behave ideally, and a true tolerance towards others for their weaknesses should contain support and no judgment.

Social support and limitations with the help of laws are needed to maintain peace and balance, but public shaming creates undesirable pressure on human beings. Andreas Kappes proposes to focus on the actions themselves, their nature, and premises to figure out deeper motives and causes of the transgression and trying to develop ways of its solution. When we are acting inappropriately, instead of using double standards, we can become strong enough to admit the mistake and stay honest with ourselves and others. Public shaming, from my point of view, might have pros if it can be reduced with severity. Every man needs to comprehend the borders of actions, appropriate joking, and social communication inside which he can perform. When moral values are broken, the feedback from society can help humans balance and learn to enhance social skills and gain experience.

Though, public shaming is mostly causing harm to peoples self-esteem. It also induces the feeling of being privileged as those who are judging others initially place themselves higher. Some people, furthermore, believe that those who have access to wealth, power, or privilege must face once the consequences of their actions. However, it is hardly manageable to evaluate these peoples lives and the circumstances they were making the decisions in. I believe, a man should focus mostly on himself and the nature of his actions. Then, if no gossiping, rumors, and judgment were spreading around, the world would look unrecognizably different.

The Government Surveillance at Ensuring Acceptable Use of the Internet

Introduction

This paper explores the government surveillance and other control measures aimed at ensuring acceptable use of the internet. The paper assesses how different countries of the world can fix a balance between right to privacy and the importance of National Security. There are many reasons why governments should gear towards surveillance and control of ICT. However, the extent of, kind of control and the measures employed in control of ICT are a big raging debate.

Government Policing and Law Enforcement

Surveillance of ICT technologies shapes the way government exercises its roles of law administration, security and protection. Surveillance of these technologies enhances accountability between the government and its citizens. Information technology equipment, such as digital cameras and PDAs, complements surveillance ability of government agencies and reinforces security measures. This can strengthen government initiatives to minimize intrusion hence binding its citizen to the rule of law.

Frissen, contends that measures to control the cyberspace provide a new paradigm for stakeholders on issues of law enforcement and security. This paradigm may alter devolution of government roles.

For instance, social websites, which find greater application in the cyberspace, provide a unique opportunity for people to engage in public affairs of the government, and thus influence decision-making. Every government strives to keep under tight lid sensitive information especially regarding security to its people and property within its jurisdiction.

Governments Changing Privacy Pattern

ICT innovations that are continually being launched in the present society have huge ramifications on the privacy policy. The innovation enables complex and unobserved information collection and personal data profiling. This can be applied to classify target groups of individuals, and ease stalking of people.

The innovation can also be used in virtual space or real-time, modeled on amassed data. Hence, through these measures, the government can control and check its citizens more efficiently. However, this will mutilate the privacy privileges of an individual. Lack of effective measures by governments in controlling and monitoring the cyberspace may cause uprisings from its citizens through rapid exchange of rumors. A good example is what has been witnessed in Yemen, Libya, Tunisia, Syria and other Arab countries (Foreign Policy).

New Countervailing Controls

Various ICT technologies provide an opportunity to open up conventional systems of democratic participation in governance, and in creating new patterns of engaging citizens, advocacy groups and the society in general. Hence, these technologies can further government control by facilitating or providing more avenues through which the government checks, establishes and consolidates its power in the society. If left unchecked, social Medias and networks can potentially lead to revolutions.

This is because they are rather cheap, simple to use and provide rapid means to both formal and informal groups to organize themselves, design collective plans, achieve actions, and instill pressure on the government to look into their demands.

This is evidenced by the on-going revolutions in the Arab world (Foreign Policy). This influence is further surged by the use of mobile technologies, which grant the organization and advocacy groups activities in less time. As Graham and Wood (233) explain, the effects of government control of the cyberspace is that it may bind its citizens together, hence making it easier to govern.

Intelligent and Responsive Government

Government control of ICT contributes to responsiveness. This enhances stewardship, user centered oddity and framework sentience. Thus, government involvement in collection, process, storage and application of this information for security needs is important towards fulfilling its obligations of providing security for its citizens (Graham and Wood 236).

On the other hand, increasing government surveillance and control may create unnecessary tension and conflict in the society. Every person in the society is entitled to the right of privacy.

Therefore, surveillance by the governments on what an individual does on cyberspace may empower the society to amalgamate their forces in terms of protecting their privacy interests. Similarly, if the government does not live up to their promises and are not accountable for their actions such as; failed administration, corruption among other issues, surveillance and control of ICT will prove futile.

Balancing Rights of Privacy and National Security

According to Ball and Webster (97), ICT innovations such as social networks and knowledge management systems have stimulated shifts in privacy balance between governments and its citizens. This is in the sense that, ICT innovations simplify the effort to combine forces and safeguard privacy interests. Governments should differentiate the rights of privacy and national security issues (Ball 574).

For personal security purposes, governments have to institute regulation, which guide the extent to which an individuals data or information is acquired and used. Lack of consent from an individual amounts to an act of privacy infringement. However, balancing privacy and national security issues can be complex. Some governments find it necessary to trade privacy and national security by enhancing more surveillance and control (Ball 577). The need for National Security in most countries is superior to that of private privacy.

Some governments have come up with surveillance strategies whereby, in order to access private communications of individuals and stored information for security purposes, the governments have ensured that access points are incorporated in telecommunication devices and softwares.

Whereas this tends to serve the government interests, this has increased risks in ICT systems embraced by the public (Ball and Webster 121). Additionally, this completely compromises individual privacy because the government tends to abuse the service and increases the likelihood of third party access to individuals personal information.

Works Cited

Ball, Kirstie and Webster, Frank. The Intensification of Surveillance: Crime, Terrorism and Warfare in the Information Age. London: Pluto Press, 2003

Ball, Kirstie. Elements of surveillance: a new framework and future directions. 2002. Information, Communication and Society, (5), 4, pp. 573-590

Foreign Policy. Revolution in the Arab World. 2011. Web.

Frissen, Valerie. The Future of eGoverment; An Exploration of ICT-Driven Models of eGoverment for the EU in 2020. Web.

Graham, Stephen and Wood, David. Digitizing surveillance: Categorization, Space, Inequality. 2003. Critical Social Policy, (23), 2, pp 227-248.

Impact of Language on the Internet

Introduction

For the last two decades, there has been a tremendous change in as far as the local as well as global communication patterns of individuals are concerned. This is largely due to the inception of the Internet. Crystal (2001) notes, Previously, linguists have always recognized only the spoken and the written English (p. 7). This statement could have been considered true several years ago but currently, the advent of the Internet has brought with it what is popularly known nowadays as netspeak. Research points out that this new form of global communication pattern has a negative contribution to the grammatical position of the English language. Nevertheless, differences do however spring up with regard to the language of the internet, in comparison to the conventional language.

As Crystal (2002) has noted,  on the internet, as with traditional speaking and writing, the language that individuals produce is far exceeded by the language they receive; and the internet is a medium almost entirely dependent on reactions to written messages, awareness of audiences must hold a primary place in any discussion (p. 20.). According to Andrews (2002), This new version of language that bears a correlation to the internet is more of a linguistic vandalism, in which spelling of the English language turns out to be extremely superfluous, and the grammar is rapidly waning (P. 47). This research paper is therefore aimed at pointing out the effects of the Internet on the English language.

According to Crystal (2001), the world is on the verge of the largest ever language revolution, which shall in the long-term lead to a total transformation of language. It is not that hard to realize why such a transformation may be inevitable.

The World Wide Web is to a large extent dominated by materials of the English language.

Globalization too has extremely benefited from the rapid expansion of the World Wide Web, so that now the world is one global village. In addition, Crystal observes, The invention of the internet has created a platform from which several languages that have not been adequately represented within the internet will experience transformations occurring from adaptations imparted by the languages used within the internet (P. 26).

Rheingold (2001) further claims that many local languages have not adequately been represented within the internet (Rheingold 2000). As a result, the users whose cultures have been so underrepresented may exhibit distinctive adaptations and perceptions of the languages; in light of the Internet. From the perspective of the language, it is important to appreciate that the internet should not just be viewed as a tool for the technological revolution. Rather, the internet is also extremely social. With this in mind, language, based on its social inclinations, is, therefore, plays a key role in the technological revolution of the Internet.

The language of the internet

The language that is often utilized by the users of the internet is undergoing a transition and as Andrews (2002) notes, The yearning for an enhanced reliability, predictability, as well as familiarity amongst the internet users seems to impact on all the situations of the internet (p. 17). This includes even the issue of the language of the internet (Andrews 2002). The internet world is one in which people have attempted to overcome the shortcomings of a medium of communication that is electronically impaired by numerous distinctive ways.

Netspeak

According to Crystal (2002),  The term Netspeak is an alternative to Netlish, Weblish, Internet language, Cyberspeak, electronic discourse, electronic language, interactive written discourse, computer-mediated communication (CMC), and other more cumbersome locations (p. 19). Rheingold (2000) has also noted that netlish has been derived from the term English (p. 16). With an increase in the multilingualism of the internet, the term netlish appears to be experiencing a diminished importance (Rheingold 2000). On its part, electronic discourse stresses the elements of dialogue and interaction. Netspeak, as a name, bears a functional and concise meaning, especially bearing in mind that the term speak in this context entails both talking and writing. Besides, there are quite a several netspeak salient elements that are now finding their way outside of the communication channels that are computer-mediated Crystal (2001). This is even though the language of the internet has been around for just about two decades.

Impact that the internet has had on language

As can be seen, the internet is already playing a significant role in transforming language. The influence appears to target the vocabulary of the English language in particular, although graphology is also being affected, at least for several of the written versions (Crystal 2001). One great effect of netspeak on language is the killing of creativity through the use of symbols to express changes in context. This leads to the substitution of words and expressions that show mood and pitch by symbols. According to Crystal (2001), The wide variety and innovative English often expressed in channels that are computer-mediated, have tremendously developed as a result of their uses embracing their languages most creatively to tackle, with a view to tackling alterations in the prevailing circumstances (P. 22). For instance, the use of Smileys in the e-mail language came about following desire by people to replace a majority of the characteristics of speech such as the tone and pitch, with symbols instead. In this case, Smileys of happiness or sadness could be utilized. A majority of the other written languages have also not been spared by this kind of replacement, although questions still abound as to why other types of writing bear no Smileys.

Crystal (2001) opines that the answer to such questions may be found in the immediacy nature of a communication process that is computer-mediated. If we were to explore the conventional type of writing, we would realize that such style of writing is characterized by ample time to revise to clarify personal attributes, and also enabling the users or writers for that matter, to play around with the various English phrases. This means that netspeak helps communicators to quickly and simply express their feelings and attitude towards the subject in question without having to work on diction and sentence construction. As a result, this gives the communicators a remedy for their needs of immediacy. Through this, to tackle they avoid using creative sentence structures and diction to express themselves accurately.

That the internet is out to dictate how our language will be shaped is not in doubt. All the time, we hear the application of fundamental terms of the internet being applied by individuals, even to those that may not have a participative role in the field relatively to of the information technology.

Such words as multitasking (implying that a person is capable of handling more than one activity at a time), going offline (meaning to hold a private conversation), and being wired that is, being prepared to handle a task in hand), are not unusual during conversations. Nevertheless, Andrews believes that if we as a people are to truly comprehend how our language shall be influenced by the internet,  there is a need therefore for us to try and come into terms with the various language varieties that have thus far found their way onto the internet (p. 37). In line with this, it is also important that we assess the linguistic properties of the different languages used on the internet.

Bearing in mind that the internet has transformed the world into one global village, there is a need therefore to handle the linguistic diversity issues with the seriousness that they deserve.

This is important, as it enables us to handle the natural language that is contained within the internet (Andrews 2002 p. 39). The internet may have developed as a network that is based on English, but as of now, other types of languages appear to be expanding rapidly.

In terms of diversity in language, the internet appears to be experiencing a two-fold direction. First, there is a need to generate a huge content amount using other languages besides the English language. Should this trend be embraced, there is the danger of encountering challenges during the translation of the contents. Secondly, there is a growing trend that seeks to adopt the English language as the internet lingual Franca. On the other hand, there seem to arise two issues as far as this solution is concerned. First, seeing that most of the speakers of the English language the world over are not native language users (Crystal 2001), internet content writers are not in a position to make assumptions the assumption that most of the readers of their content writings shall comprehend the complex constructions of idioms, grammar, or even ordinary vocabulary.

Conversely, there is still the question of the type of English dialect that ought to be selected, even amongst the English native speakers. Rheingold (2000) observes, In the conventional world if the askers acquaintances cannot provide an answer, the asker is stymied. But with electronic communication, the asker has access to a much broader pool of information sources (p. 48). It is important to major infield creatively a single dialect so as to avoid misinterpretations that may occur. This comes as a result of slight variations that occur in the different dialects. The variations may end up changing the meaning of the word or phrase completely. For example, double negation could be appreciated in some regions but retain the meaning in its negative form while in other dialects, double negation could change the meaning of the phrase to positive. That is, I havent eaten anything could mean I have eaten everything in dialects that do not accept double negation.

Research questions

To facilitate this research, the following questions will be used as guidelines to help accurately bring out the impact of the internet on language use and the conclusion of the study. Will the flexibility and creativity of general communication be replaced due to the urgency of communication as exhibited in the case of netspeak? And, will the urgent need for communication and self-expression lead to total distortion of the English language? Such research questions call upon a more precise analysis of the question at hand. To investigate further into these inquiries, I find it crucial to better understand the extent to which the so-called netspeak distorts the originally configured English language. Even more, whether other languages prevail online depends on how accurately the English language conveys the contents and emotions of a foreign language.

Having thought that each individual differs from the Internets influence on the English Language, I ought to consider a survey on a sample group that represents the whole population.

The sample group will most likely represent whether Internet communication has brought about a prominent change in the language. Along the same line, the survey will further elaborate on assumptions about how strong a ground English has in Internet communication.

Work cited

Andrews, Jean. i-Net+ Guide to the Internet (Second edition). Boston: Thompson Learning, 2002. (p. 16-39).

Crystal, David. The Cambridge Encyclopedia of Language, (Second edition). Cambridge: Cambridge University Press, 1997. (p. 107- 125).

Crystal, David. Language and the Internet. Cambridge: Cambridge University Press, 2001. (P. 16- 48).

Graddoll, David. 1997. The Future of English? London: British Council. (p. 3-11).

Rheingold, Howard. 2000. The Virtual Community: Homesteading on the Electronic Frontier. (Revised edition). Cambridge (MA): MIT Press.(p. 22-48).

Impact of Language on the Internet

Introduction

For the last two decades, there has been a tremendous change in as far as the local as well as global communication patterns of individuals are concerned. This is largely due to the inception of the Internet. Crystal (2001) notes, Previously, linguists have always recognized only the spoken and the written English (p. 7). This statement could have been considered true several years ago but currently, the advent of the Internet has brought with it what is popularly known nowadays as netspeak. Research points out that this new form of global communication pattern has a negative contribution to the grammatical position of the English language. Nevertheless, differences do however spring up with regard to the language of the internet, in comparison to the conventional language.

As Crystal (2002) has noted,  on the internet, as with traditional speaking and writing, the language that individuals produce is far exceeded by the language they receive; and the internet is a medium almost entirely dependent on reactions to written messages, awareness of audiences must hold a primary place in any discussion (p. 20.). According to Andrews (2002), This new version of language that bears a correlation to the internet is more of a linguistic vandalism, in which spelling of the English language turns out to be extremely superfluous, and the grammar is rapidly waning (P. 47). This research paper is therefore aimed at pointing out the effects of the Internet on the English language.

According to Crystal (2001), the world is on the verge of the largest ever language revolution, which shall in the long-term lead to a total transformation of language. It is not that hard to realize why such a transformation may be inevitable.

The World Wide Web is to a large extent dominated by materials of the English language.

Globalization too has extremely benefited from the rapid expansion of the World Wide Web, so that now the world is one global village. In addition, Crystal observes, The invention of the internet has created a platform from which several languages that have not been adequately represented within the internet will experience transformations occurring from adaptations imparted by the languages used within the internet (P. 26).

Rheingold (2001) further claims that many local languages have not adequately been represented within the internet (Rheingold 2000). As a result, the users whose cultures have been so underrepresented may exhibit distinctive adaptations and perceptions of the languages; in light of the Internet. From the perspective of the language, it is important to appreciate that the internet should not just be viewed as a tool for the technological revolution. Rather, the internet is also extremely social. With this in mind, language, based on its social inclinations, is, therefore, plays a key role in the technological revolution of the Internet.

The language of the internet

The language that is often utilized by the users of the internet is undergoing a transition and as Andrews (2002) notes, The yearning for an enhanced reliability, predictability, as well as familiarity amongst the internet users seems to impact on all the situations of the internet (p. 17). This includes even the issue of the language of the internet (Andrews 2002). The internet world is one in which people have attempted to overcome the shortcomings of a medium of communication that is electronically impaired by numerous distinctive ways.

Netspeak

According to Crystal (2002),  The term Netspeak is an alternative to Netlish, Weblish, Internet language, Cyberspeak, electronic discourse, electronic language, interactive written discourse, computer-mediated communication (CMC), and other more cumbersome locations (p. 19). Rheingold (2000) has also noted that netlish has been derived from the term English (p. 16). With an increase in the multilingualism of the internet, the term netlish appears to be experiencing a diminished importance (Rheingold 2000). On its part, electronic discourse stresses the elements of dialogue and interaction. Netspeak, as a name, bears a functional and concise meaning, especially bearing in mind that the term speak in this context entails both talking and writing. Besides, there are quite a several netspeak salient elements that are now finding their way outside of the communication channels that are computer-mediated Crystal (2001). This is even though the language of the internet has been around for just about two decades.

Impact that the internet has had on language

As can be seen, the internet is already playing a significant role in transforming language. The influence appears to target the vocabulary of the English language in particular, although graphology is also being affected, at least for several of the written versions (Crystal 2001). One great effect of netspeak on language is the killing of creativity through the use of symbols to express changes in context. This leads to the substitution of words and expressions that show mood and pitch by symbols. According to Crystal (2001), The wide variety and innovative English often expressed in channels that are computer-mediated, have tremendously developed as a result of their uses embracing their languages most creatively to tackle, with a view to tackling alterations in the prevailing circumstances (P. 22). For instance, the use of Smileys in the e-mail language came about following desire by people to replace a majority of the characteristics of speech such as the tone and pitch, with symbols instead. In this case, Smileys of happiness or sadness could be utilized. A majority of the other written languages have also not been spared by this kind of replacement, although questions still abound as to why other types of writing bear no Smileys.

Crystal (2001) opines that the answer to such questions may be found in the immediacy nature of a communication process that is computer-mediated. If we were to explore the conventional type of writing, we would realize that such style of writing is characterized by ample time to revise to clarify personal attributes, and also enabling the users or writers for that matter, to play around with the various English phrases. This means that netspeak helps communicators to quickly and simply express their feelings and attitude towards the subject in question without having to work on diction and sentence construction. As a result, this gives the communicators a remedy for their needs of immediacy. Through this, to tackle they avoid using creative sentence structures and diction to express themselves accurately.

That the internet is out to dictate how our language will be shaped is not in doubt. All the time, we hear the application of fundamental terms of the internet being applied by individuals, even to those that may not have a participative role in the field relatively to of the information technology.

Such words as multitasking (implying that a person is capable of handling more than one activity at a time), going offline (meaning to hold a private conversation), and being wired that is, being prepared to handle a task in hand), are not unusual during conversations. Nevertheless, Andrews believes that if we as a people are to truly comprehend how our language shall be influenced by the internet,  there is a need therefore for us to try and come into terms with the various language varieties that have thus far found their way onto the internet (p. 37). In line with this, it is also important that we assess the linguistic properties of the different languages used on the internet.

Bearing in mind that the internet has transformed the world into one global village, there is a need therefore to handle the linguistic diversity issues with the seriousness that they deserve.

This is important, as it enables us to handle the natural language that is contained within the internet (Andrews 2002 p. 39). The internet may have developed as a network that is based on English, but as of now, other types of languages appear to be expanding rapidly.

In terms of diversity in language, the internet appears to be experiencing a two-fold direction. First, there is a need to generate a huge content amount using other languages besides the English language. Should this trend be embraced, there is the danger of encountering challenges during the translation of the contents. Secondly, there is a growing trend that seeks to adopt the English language as the internet lingual Franca. On the other hand, there seem to arise two issues as far as this solution is concerned. First, seeing that most of the speakers of the English language the world over are not native language users (Crystal 2001), internet content writers are not in a position to make assumptions the assumption that most of the readers of their content writings shall comprehend the complex constructions of idioms, grammar, or even ordinary vocabulary.

Conversely, there is still the question of the type of English dialect that ought to be selected, even amongst the English native speakers. Rheingold (2000) observes, In the conventional world if the askers acquaintances cannot provide an answer, the asker is stymied. But with electronic communication, the asker has access to a much broader pool of information sources (p. 48). It is important to major infield creatively a single dialect so as to avoid misinterpretations that may occur. This comes as a result of slight variations that occur in the different dialects. The variations may end up changing the meaning of the word or phrase completely. For example, double negation could be appreciated in some regions but retain the meaning in its negative form while in other dialects, double negation could change the meaning of the phrase to positive. That is, I havent eaten anything could mean I have eaten everything in dialects that do not accept double negation.

Research questions

To facilitate this research, the following questions will be used as guidelines to help accurately bring out the impact of the internet on language use and the conclusion of the study. Will the flexibility and creativity of general communication be replaced due to the urgency of communication as exhibited in the case of netspeak? And, will the urgent need for communication and self-expression lead to total distortion of the English language? Such research questions call upon a more precise analysis of the question at hand. To investigate further into these inquiries, I find it crucial to better understand the extent to which the so-called netspeak distorts the originally configured English language. Even more, whether other languages prevail online depends on how accurately the English language conveys the contents and emotions of a foreign language.

Having thought that each individual differs from the Internets influence on the English Language, I ought to consider a survey on a sample group that represents the whole population.

The sample group will most likely represent whether Internet communication has brought about a prominent change in the language. Along the same line, the survey will further elaborate on assumptions about how strong a ground English has in Internet communication.

Work cited

Andrews, Jean. i-Net+ Guide to the Internet (Second edition). Boston: Thompson Learning, 2002. (p. 16-39).

Crystal, David. The Cambridge Encyclopedia of Language, (Second edition). Cambridge: Cambridge University Press, 1997. (p. 107- 125).

Crystal, David. Language and the Internet. Cambridge: Cambridge University Press, 2001. (P. 16- 48).

Graddoll, David. 1997. The Future of English? London: British Council. (p. 3-11).

Rheingold, Howard. 2000. The Virtual Community: Homesteading on the Electronic Frontier. (Revised edition). Cambridge (MA): MIT Press.(p. 22-48).

Evaluating Internet Health Information

Introduction

The use of technology has made it possible for professionals from various fields to access relevant information from various sources. The use of modern technology for communication has made it possible for millions of people across the world to send, receive and share information within the shortest time possible. This has promoted efficiency in terms of production and generation of ideas among various departments in a given organization. The use of the internet has made it possible for people to access millions of information on almost all aspects of human life. This discussion is a critique of a website (www.healthline.com) in terms of the health information it offers to nurses.

The Websites Authority

This website was launched in 2005 with major offices in New York, India and San Francisco and serves people from all over the world. It commands a huge number of clients who visit in on a regular basis for essential ideas regarding health matters. It is rated among the top 15 health websites that offer essential ideas to people. Visitors that frequent this site are estimated to be more than twenty million every year. This is a clear sign that it is regarded as a useful site as far as human health issues are concerned.

Information Offered

This site offers relevant information to people who suffer various ailments and to nurses who seek knowledge on various issue of human life. It derives most of its information from qualified doctors and publications that are highly rated in the world (Melnyk 2010). It also offers essential information to about fifty four million visitors every month for the purpose of seeking ideas and information to be published.

Objectivity

The main objective of this site is to provide relevant information to millions of patients regarding possible solutions to their ailments. It also offers an insight into the causes of various human diseases and disorders. It provides essential information to millions of nurses on possible treatments and control of human diseases. It also helps patients to locate doctors who can handle their diseases (Cannon 2009). It also provides links to institutions that offer training on human health and gives visitors an opportunity to visit them and view their contents.

Navigating this website is as easy as following a visual map by any keen tourist. The website has the following icons that direct the visitor to relevant information; the home option directs the visitor to relevant information regarding this sites history, terms of service and contacts. The Health A-Z offers guidance to millions of health options to the viewer while the Healthy Living section guides visitors on how to eat and exercise in a healthy way. The site has other links to information required by visitors. This links are designed in a simple way that helps visitors to locate their areas of interest with ease (Burns 2012). It also has the search option that enable visitors to narrow their search easily in order to get to their choices faster.

Privacy and Security Policies

This site guarantees all viewers the highest degree of privacy to their information and does not disclose confidential details regarding the patients problems to the public. It offers secure options for patients to communicate with their doctors in private and arrange for their meeting. This site confirms that the contents offered are solely for the purpose of assisting nurses and patients to find possible solutions to diseases and ailments.

However, the contents offered do not serve as treatment procedures for patients suffering various diseases (Brown 2011). This means that even though they get their health related information from reliable sources they do not guarantee 100% perfection. This means that the information provided in this site is not reliable since human health is not an issue to be put to test by using their information in dealing with diseases (Maville 2012). Therefore, this means that the information offered is meant for general knowledge and visitors may apply them in their lives at their own risks.

Importance of Evaluating Health Information from Websites

Human beings are always seeking information from all available sources in order to ensue they have enough knowledge on how to deal with various challenging issues in life. However, nurses should ensure they treat all information obtained from websites with great caution. This is due to the fact that people have different reactions to different treatments and while some respond positively to certain medications others may experience harmful side effects that may lead to death (Polit 2009). Some information may have been posted without ensuring they are accurate and this may mislead any nurse who relies on these sites for knowledge on how to deal with health issues.

Conclusion

Nurses should ensure they read widely from any available sources to ensue they have all the relevant knowledge on how to deal with various diseases. The internet offers great information on human health regarding diseases and their possible cures. However, all information from this site should not be taken as gospel truth and nurses should evaluate them before making any decision.

References

Brown, J. (2011). Evidence-Based Practice for Nurses: Appraisal and Application Research. Massachusetts: Jones and Bartlett Learning.

Burns, N. (2012). Understanding Nursing Research: Building an Evidence Based Practice. Philadelphia: Saunders Publishers.

Cannon, S. (2009). Introduction to Nursing Research: Incorporating Evidence Based Practice. Massachusetts: Jones and Bartlett Learning.

Maville, J. (2012). Health Promotion in Nursing with Premium Website Printed Access Card. New York: Delmar Cengage Learning.

Melnyk, B. (2010). Evidence-Based Practice in Nursing and Healthcare: A Guide to Best Practice. New York: Lippincott Williams and Wilkins.

Polit, D. (2009).The Essentials of Nursing Research: Appraising Evidence-Based Practice. Philadelphia: Saunders Publishers.