Javascript is disabled. Please enable it for better working experience.
4,896,000Research-based Topics
2,943,921 VALUED MEMBERS

The importance of academic research is highlighted by all media outlets

Internet

Internet is the application of scientific knowledge and information to various activities aimed towards solving a problem. Get the latest information about the introduction of new technologies and their applications in real life with Researchomatic’s most informative and content-rich sample essays.

Researchomatic

has the World's largest database of Internet topics that help Students, Researchers & Teachers develop multiple academic product

Top 3 Technology Topics

Ways In Which The Internet Has Changed Political Interactions Globally



Ways in Which the Internet Has Changed Political Interactions Globally

Ways in Which the Internet Has Changed Political Interactions Globally

Introduction

The use of internet has become very common in today’s world and internet has its influence in almost every field. With the advancement of technology and internet, as predicted earlier internet has also influenced political interactions and has led to an effective and less time consuming system. E-democracy is the new term introduced with indicates the use of internet in influencing political debates and agendas and socio-political behavior. It is also argued that the use of internet in politics would revive the political structure and enhance it.

Discussion

It can be said without any doubts that many changes are occurring in several political fronts. Political candidates are introducing campaigns while utilizing the internet technology for example weblogs. The usefulness of internet in politics cannot be denied as it has helped in gaining grassroots support.

This evolution has introduced many new communication trends that are very cost-effective, innovative and engaging (Kalathil, 2002). Many suggest that the use of social networks for example, Facebook and twitter etc, can help the government to engage with the citizens directly and get direct feedback. As internet enables the political groups to interact with the citizens directly, this assists them in getting awareness about the issues and problems faced by the public, as it helps in reaching out to larger audiences. This has also become quite evident from the green movement in Iran, as it proved the efficiency and the usefulness of new technologies in organizing resistance and breaking censors on information.

The use of internet in political interactions has played a vital role in knowing the consensus and the opinions of the minority, as it reached out to a larger audience. This helps in knowing the rights of the minority groups which are often suppressed due to their discrimination in the public. An example of this can be the web portal Localocracy as this provides the government officials, citizens and journalists with a platform to exchange ideas and learn more about the local community. This provides the citizens to address issues which are often ignored or considered irrelevant. This also helps the minorities to give suggest and present their queries due to the option of anonymous comments.

This has played an important role in creating the awareness about political campaigns, as internet sources are global and do not limit to a specific group of people. With its universal and global accessibility, it helps political groups to create awareness regarding their campaigns. With the options of visual representation and online chats for queries, internet portals have helped many political parties. Many people prefer reading about campaign online due to clarity, as they can go over the information in details and analyze the written information.

Internet has also encouraged many people to become more interested in politics, as it makes it easily accessible. Recently there has also been an invention of a Smartphone App, which also caters to the similar situation (Davy, ...

Internet Addiction

INTERNET ADDICTION

Internet Addiction

Internet Addiction

Introduction

The internet is a global communication network connecting millions of online users. The revolutionary technology began in 1960s as an experiment in the United States Department of Defense. Today’s Internet is, without a doubt, a completely new and modern information and communication network popularly known as the cyberspace. In order to be familiar with the challenges and opportunities offered by the Internet, it is imperative to be familiar wit the origin of this revolutionary technology that completely transformed the way we work, communicate and perform our routine activities.

The origin of modern day ‘network of networks’ was named ARPANET, which was designed and developed to support military research into the area of computer communication. Since its inception, the development of ARPANET was mainly based on a key assumption that the computer network was unreliable and any traffic sent through this network was considered as ‘best effort’ delivery.

Definition

The Oxford Dictionary (April, 2010) defines the internet in the following word:

“A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.”

Despite the numerous benefits of the Internet, there are also some disadvantages associated with the technology. These disadvantages mainly emerged from the ways we use the Internet today. This paper aims at discussing what is popularly known as the “Internet addiction” and its effects on a person’s health.

Discussion

Statistics released by The Office for National Statistics (ONS) in 2010 showed that more than 30 million adult residents of the United Kingdom (60 percent of the total population) accessed the Internet on almost daily basis. Continuing advances in the communication technology on a rapid scale allows more people than ever before to use the Internet more extensively for both work and social and personal purposes. Undertaking research and communication that has been a time consuming activity sometimes ago, now just take a fraction of the time that was usually taken by these endeavours before the Internet access was not limited.

The rapid increase in use of online social networking hubs such as Facebook, Myspace, etc. is growing in popularity with more than 40 percent of the total Internet users using these social networking websites, online chat rooms and posting on blogs. Research further reveals that majority of online users who perform this activity belong to the age group of 16 to 24.

As with almost everything we experience in our lives, there can not be only positive without the presence of negative. Same is the case with the Internet. Internet addiction disorder is the general term that is widely used to explain the excessive use of computer and the Interne, which, at some stage in one’s life, starts interfering with and affecting his or her daily life. Although Internet addiction is, until now, not formally recognised as a disease or clinical disorder, an increasing body effort in terms of scientific research and scholarly studies attempt to establish Internet addiction as one of the public health concerns with large number of research scholars and ...

Redesigning Of Internet



Redesigning of Internet

Redesigning of Internet

The Internet which is common today was designed nearly 30 years ago, at that time the network road was not outlined to accommodate the amount of traffic that now uses the internet, but it grew rapidly over the years, so the internet supporting networks have continued to develop and grow. The problems that develop from the basic internet design are intense. As the internet provides commercial development and amazing innovation, it is nearly impossible to monitor and control the traffic that uses the internet. Many security problems are resulted because of this.

We see no possibility of a basic redesigning of the internet in the immediate future. At the same time, we believe that researches for the alternative architecture of the network is very important to inform the rapid improvements into the existing design of network that will be required in the coming years. Even though if the basic redesigning of the internet is not possible, it might still be the possibility that particular concerns about security are best tackled at the network level (Zittrain, 2008). On the other hand this approach will be against the end to end standard.

Content filtering is the most common application of the end to end theory. Here it can be argued that the clarity of the standard has already been ruined by the intrusions of the policy makers. For instance, the Government has imposed this regulation that all ISPs that offer broadband connectivity should implement systems for blocking access to child abuse websites and images. Many Internet service providers already offer this service of blocking the access. In other words internet service providers are not required to filter out those images that are considered to be child abuse images; they just take a websites list from reliable source and block direct access to them.

In the prior section we have discussed about the content blocking and sharing. However, the discussion veils the fact that content is not clearly definable. All information that travels through internet is fragmented into data packets. In other words it is all zeros and ones that is passed through the internet, whether any image of child abuse, any virus or any other statement of politics (Rubinstein, 2009). This has intense implications for private internet security. This means that proper security measures like filtering of content are required to be executed at the end points of the network.

In addition to this we have seen more often that hackers attacking the internet network are becoming more and more specialized and organized. They have adopted various means for hacking the internet such as they make use of emails to launch intensely destructive viruses. These attacks to the internet network are now going both up and down throughout the layers. These attacks on the one hand are exploiting vulnerabilities within the application layer where as on the other hand going down by means of operating system towards drivers, and then into chips and some other hardware supporting the entire ...