Introduction The divide between our online- and physical social lives is shrinking by the day, the impact of online communications on our social lives is more profound than ever. Today social media sites like Facebook influence a large portion of our social life and with...
What is Online Identity Theft? Everyone is unique. We all have our own set of traits, DNA, and fingerprints. Each individual possesses their own unique characteristics, interests, and talents to make up a unique identity. Our identity combines all of these things into us. When...
Introduction Confirmation bias is the tendency of individuals to seek out, interpret, and remember information in a way that confirms their pre-existing beliefs while disregarding evidence that contradicts them. In the age of social media, this cognitive bias has become more pronounced due to the...
Abstract The Internet is a resource that connects people from all over the world. In most parts of the world, the internet is free. With free internet, however, there comes a price. A lot of data from the internet is stored onto a local server,...
The internet has become a useful and powerful tool for everyone. It allows people to communicate with each other anywhere in the world, however, there is a saying which says “all that glitters is not gold” unfortunately most people think the internet is a fairyland...
Introduction In the modern interconnected world, where the internet serves as both a conduit for information and a platform for social interaction, the issue of internet privacy has become paramount with the increase of new technology today. While the internet has revolutionized the way we communicate,...
The internet is one of the greatest things mankind has ever created. It allows everybody to access whatever information that they want to without any hesitation. It’s ability to teach, connect, and provide for people is unprecedented. This is all thanks to something called net...
When a person scrolls through professional websites, they notice logos. When a company is big enough, they may even have little cartoons on their website. A manager has to hire a graphic artist, or designer, to draw the logo. If one is an artist, this...
Although leaders allied to different political divides have publicly expressed differences in many policy matters, one of the most recent contention was witnessed in repealing the net neutrality rules introduced by the Obama administration just a few years back. Notably, Ajit Pai who is the...
In today’s society, there is not much that is more prevalent and utilized than the internet and its resources. The internet offers a wealth of information and an enormous number of opportunities for communication and interaction. This wealth of information raises a number of questions...
Internet
Net Neutrality
Security
Get a personalized essay in under 3 hours!
Expert-written essays crafted with your exact needs in mind
Many governments monitor the use of the Internet by their residents for various reasons, including protecting national security. Although this practice has raised many ethical concerns, such as the collection of data of citizens, it has been justified as a necessary evil in the interest...
The detail of global surveillance disclosures leaked by Edward Snowden casts doubts on the ethics of government surveillance. The abuse of surveillance will lead to the loss of personal privacy, affect people’s daily life and make government lose their credibility. Nevertheless, the data and information...
There comes a moment when you have to stand up for your sexuality and identity. In the movie Moonlight by Barry Jenkins, Chiron, the main character, is presented through the three stages of his life as a gay African American male living in Liberty City,...
The prominence of GIS and Remote Sensing has gained immense importance over the past few years, especially for environmental management. My primary motive to study Geographic Information Sciences (GISci) at Central Michigan University (CMU) engenders from the massive advances in GIS and Remote Sensing Technology...
Bitcoin has been hit the most by new rules and regulations coming up. It seemed like the odds were against the cryptocurrency since the beginning of 2018 after the virtual currency took a drastic fall through to $12,504. Thomas Glucksmann, head of APAC business development...
Computer Science amazes me as it encompasses logical and systematic workings to carry out tasks at a speed and efficiency beyond an individual’s ability. With its foundation in Mathematics and logic, I thoroughly enjoy the process of programming as it provides a constant challenge to...
Mette Eilstrup-Sangiovanni defines cyberwarfare as “deliberate and hostile use by a state of a cyber weapon with the intention of causing injury or death to persons, and/or to significantly disrupt, damage, or destroy another state’s strategic assets or critical national infrastructure.” (Eilstrup-Sangiovanni, 2018) What would...
Virus, malware, ransomware, phishing… What is all this? Where did it come from? Why do we even have this? In 1989, the birth of one of the deadliest and unwanted disease for a computer, the first worm was created by Robert Morris (Julian, Ted, and...
An incident is any event in an information system or network where the results are abnormal [1]. It can also be considered as a situation that differs from normal routine operations. There are numerous reasons can lead to an incident. However, according to the significance,...