Thursday, January 30, 2020

The Internet and its Impact on Society Essay Example for Free

The Internet and its Impact on Society Essay The internet has its roots in the space program. When the Soviet Union launched the Sputnik satellite, President Eisenhower formed the Advanced Research Projects Agency. (ARPA). The mission of this agency was to assist the dominance of the United States in technology that would assist the military. By 1968, packets had been developed to facilitate data transfer. These packets are hard to intercept and decode, since the total message is split up among many packets. These packets could travel several different routes, so if one route became unavailable, possibly from a nuclear attack, then the message could still reach its destination via another route. This technology was named Packet Switching Networking (Marsh 2007, p. 1). In 1969 the Department of Defense formed ARPANET. The purpose of this network was to research the upcoming possibilities. The first node was located at the University of California – Los Angeles, with nodes installed shortly afterward at Stanford, the University of California – Santa Barbara, and at the University of Utah. Thus in 1969, there were a total of four nodes on this network. This is considered the birth of the internet (Marsh 2007, p. 2). The 1970s was a landmark decade for the internet. Email was first created in 1971. By now, there were 15 nodes and 23 hosts on the ARPANET. In 1973, the first international node was established on ARPANET at the University College of London. Both Ethernet protocols and File Transfer Protocols (FTP) were developed. The commercial version of ARPANET, named Telenet, was placed in operation in 1974 as the first packet service for the public. In 1975, Queen Elizabeth sent her first Email (Marsh 2007, p. 3). By 1984, there were over 1,000 hosts on the internet. The concept of the Domain Server Name (DNS) was introduced, so that instead of a series of numbers, the user could remember a name of the host. The number of hosts exploded in the late 1980s. By 1986, there were 5,000   hosts. The number increased to 280,000 in 1987 and 100,000 in 1989. In 1991 CERN released the World Wide Web (WWW), and by 1993 the number of hosts had increased to 2,000,000 (Marsh 2007, p. 3). Commercialization of the internet began in the mid 1990s. Shopping malls, the US Senate and House of Representatives, and banks had all joined the internet revolution. By 1997 there were 19.5 million hosts and over 1 million WWW sites (Marsh 2007, p. 7). This extremely rapid growth was at times unregulated. Indeed, the growth outpaced society’s ability to deal with the impact that this technology was going to have. For all the benefit that the information age has provided, there are just as many pitfalls. The dominance of this one technological beast in the world today has made the globe much smaller than aviation ever did. The continued expansion of the internet has brought to the forefront many different ethical questions. These can be grouped into some fairly broad categories. First, there is the criminal element that utilizes the internet for criminal profiteering, exploitation, and hacking. Second, the extreme amount of information available makes research both easier and easily subject to dishonesty. Plagiarism has always been an issue in the academic world. Now with virtually millions of academic articles available at a keystroke, it has never been easier. Thirdly, Corporate America has utilized the internet for bulk mailing, unwanted pop-up advertisements, and other basically annoying retail behavior. They also utilize the internet for corporate spying, invasive employee monitoring, and other questionable activities. Lastly, the internet has provided an environment for pornography, intimate contact, and other ethically questionable behavior. The criminal element of our society has latched onto the internet. With thousands of transactions posted through the internet each hour, identity theft is common. In identity theft, the   perpetrator steals the identity in order to commit some other crime. Most often, this new crime is fraud. The criminal either intercepts the information or, more likely, convinces the individual to provide the information through the email. If the criminal is disguised as a legitimate business, then the activity is called Phishing. The criminal will take the personal information he has received and either open new credit card and other transaction accounts or simply steal out of the account numbers he has received from the unsuspecting victim. The victim may not even realize the theft occurred for months (Arnold 2000, p. 1-8). While identity theft is a property crime, other criminals use the internet to prey on children. The will communicate with younger children in chat rooms, often posing as a child themselves. Commonly, these pedophiles will attempt to lure these children into meeting them somewhere, like the mall. When they meet the children, they then have the opportunity to molest, kidnap, or otherwise harm them. Hacking was seen at one time as harmless fun. Now hackers can cause thousands of dollars worth of damage including lost income, cost to fix the damage done, and loss of customers. Infected computers cause havoc all over the network. Hackers are prosecuted when they are caught, but the methods that they use make identification difficult. There are no easy solutions to the criminal use of the internet. The best defense against identity theft is education. Educating the public on why they should not give there password, social security numbers, and addresses to those they do not know is a start. There are already laws against this. Better and more public enforcement may have an effect. Encryption of data being transmitted over the internet is another way to secure it. This is already being done by the financial institutions and the government, but other businesses could improve their security by encrypting all personal data. Protecting children against internet predators is best done through educating the parents on the use and control of the internet. In our society today, children are left to there own devices more than they were a generation ago. Parents must monitor their children’s use of the internet. Blocking software is available that will prevent children from accessing dangerous areas. Hackers will always be a part of the internet scene. Virus software, like Norton, helps. Again, education is the key. Internet users should only download from trusted sources. Better education on email use is also needed. If no one opened email they did not recognize, computer viruses, phishing, and other scams would be severely reduced. The scholastic integrity has suffered because of the amount of downloadable information and misinformation that is available. Plagiarism has been an issue since universities opened. Now, however, it is everywhere. Students can easily download someone else’s work and claim it as their own. Researches can claim ownership of other people’s research. The detection and prevention of plagiarism is a major issue for higher education. Like internet crime, there is no real absolute solution for plagiarism. Universities have instigated severe penalties, including expulsion, for those who are caught. This type of deterrence will have some effect. Web sites such as www.turnitin.com offer plagiarism detection. If students know that their papers will be checked, they are going to be less likely to commit the act. However, nothing is going to prevent some plagiarism. Education, again, would be beneficial to those who commit unintentional plagiarism, but for those who knowingly do it when they know the risks, education is not going to have an effect. Bulk emailing, or spam, is a very large issue. Corporate America spends lots of money both generating and preventing spam emails. These are a problem because they can tie up server resources, Ethernet gateways, and personal computers. Spam can also harbor viruses that can damage computer systems. Pop-up ads are not only intrusive, they can be damaging. Ads from competitors can appear, without the original business owner’s knowledge, on commercial websites. An example would be a Chevy ad popping up while a person was browsing a ford web site. These ads may be displayed hours later. Along with this, these companies will store files on the user’s hard drive, sometimes without their knowledge, to track what web sites they browse. Tighter regulation on corporate behavior is needed. Unfortunately, the individual states have little they can due since the vast majority of internet traffic crosses state boundaries. Therefore, this type of regulation must come from the Federal Government. Regulations requiring business to notify the user before they store a file on their computer, regulating trespassing pop-up ads, and regulating unwanted Spam are either needed or the enforcement must be better. The issue of pornography is an old one. With the internet, porn is easily accessible. With the free speech guarantees that we enjoy, adult pornography is hard to regulate. Even public libraries have had to face the free speech vs. good for society issue. Like other internet issues, there are no sure answers. Software and hardware that regulates what sites are visited is one way to attempt to keep adult sites in the hands of adults only. But just like â€Å"R† rated movies, kids will find a way to â€Å"sneak in†. The internet has changed our society and has shrunk the world. It happened faster than our society was able to cope. Now we stand in awe looking into a world that we indeed created that has to a real extent got out of hand. The only way to control this monster is through education, enforcement of laws, and stiffer penalties for those who violate these laws. References Arnold, Tom. (2000). Internet Identity Theft. Software Industry Association Marsh, David (2007). History of the Internet. Retrieved June 2, 2007 from NetValley Web site: http://www.netvalley.com/archives/mirrors/davemarsh-timeline-1.htm

Wednesday, January 22, 2020

The Effects Of The Various States Of Consciousness On Behavior Essay

Consciousness is the state or condition of being conscious. A sense of one's personal or collective identity, especially the complex of attitudes, beliefs, and sensitivities held by or considered characteristic of an individual or a group. There are several different stages of consciousness. Waking consciousness, altered states of consciousness and sleep.   Ã‚  Ã‚  Ã‚  Ã‚  Waking consciousness is the mental state that includes moving and thinking, along with anything else done while we are awake and alert. Behavior during this period is as normal as it can be. Although behavior can differ from person to person, although most people go through the relatively same behavioral patterns. While awake, people go through feelings of happiness, depression, anger, and boredom, to name a few. These feelings can cause people to do different things and act differently than normal. For instance, happiness, caused by having something give them pleasure in some way, can cause people to smile more or be more kind to other people, like doing other things for people just to be nice, or giving presents and gifts to people. Depression is caused by bad, non-pleasurable things happening to you. While depressed, people may become distanced from their family and friends, not want to interact with other people, and even, in severe cases, hurt themselves and/or others, and even commit suicide. Many things cause anger and aggression also. They can be caused by the interaction with other people like family and peers, but also frustration, hot weather, physical pain, and even noise. While angry pe ople may act overly aggressive, lash out at others, even loved ones, and also commit violent acts. Being bored can also cause people to act differently. While bored people may do things like act and think hastily and also commit crimes in hopes of satisfying their urge for fun and pleasure. All these feelings have different causes but most include interaction with people, television and different chemical balances and imbalances within the a person’s body.   Ã‚  Ã‚  Ã‚  Ã‚  Another type of consciousness is altered consciousness. There are many different types of altered consciousness. Daydreaming is one form of this type of consciousness. Daydreaming is when, due to boredom or mental fatigue, a person enters a dream-like state while awake. While not necessarily ba... ...rcoleptic are persistently tired and fatigued and experience loss of muscle tone. This loss of muscle tone can cause brief paralysis of functions and even for a standing person to fall to the ground. This disorder can effect a person’s behavior negatively because of the difficulty in conducting everyday activities with the fear of possibly losing consciousness or falling and getting severely injured. It is also harder to lead a normal sex life because the sudden sleep and loss of muscle tone can cause a person to become embarrassed to be close to someone or a person to be frustrated with their partners disorder.   Ã‚  Ã‚  Ã‚  Ã‚  In conclusion, the three states of consciousness can effect behavior in many different ways, whether it be positive or negative. Behavior is an important part of life although getting enough sleep and avoiding drug abuse can help, there are different things that can also effect people’s behavior in waking consciousness. Relationships with other people like friends and family can make a person have a lot of feelings like anger and happiness, and even television can also effect a person’s behavior by violent show’s making people more aggressive.

Tuesday, January 14, 2020

Avon Products Essay

After five straights years of ten percent plus growth and twenty-five percent operating profit growth under CEO Andrea Jung, the company suddenly began losing profits. One of the main reasons of this lost was the fast growth of Avon that couldn’t be supported by its employees. As with many growing organizations the structure, people and processes that were right for a $5 billion company were not necessarily a good fit for a ten billion dollar company (Goldsmith & Carter, 2010, p. 2). There were weaknesses that hurt the effectiveness of the employees at the talent management practices. Decisions on talent movement, promotions, and other key talent activities were often influenced as much by individual knowledge and emotion as by objective facts. Neither managers nor Associates have any idea about how the talent practices work. Even the HR department wasn’t sufficient to answer basic questions that might be asked by managers like â€Å"What will happen to me if I don’t do this? † (Goldsmith & Carter, 2010). Thus, changing at the talent management practices was a necessity for the company in order to increase the operation profits. The change theory typified in Avon Products case study is the 360 degree assessment process along with performance management and succession planning this would deliver the expected results if they were consistently and flawlessly executed. They used this method to build talent practices that were easy to implement. The proposed talent management model was integrated business and human resources strategy, talent management processes, organizational culture, provides a systemic approach, and results in having talented leaders and individuals available to accomplish the mission of the organization. One of the most simple and powerful changes was to bring transparency to every talent practice. Avon’s 360 degree assessment process was hardly a model of transparency when the turnaround began. The new team leader requested copies of each VP’s 360 degree assessment due to understand common behavioral strengths and weaknesses. A new, much simpler 360 was designed and implemented that explicitly stated that proper managerial and leadership behaviors were critical for a leader’s success at Avon. Helping to make the transition to transparency easier, the new 360 assessments and report differed from typical tools that rate the participants on proficiency in various areas. The type of evaluation information that was collected was from complex to simple, from egalitarian to differentiated, from episodic to disciplined, from meaningless to consequential, from opaque to transparent, from emotional to factual and from meaningless to consequential. Leaders know what is required to be successful, how to measure the situation, how HR and management can assist them, and the consequences of higher and lower performance. They know their performance rating, their potential ratings and how they can change each of those. They actively differentiated levels of Avon talent and provided each level with the appropriate experience. Their highest potential leaders understand how management feels about them, and they see a commensurate investment. Their lower performing leaders get the attention they need (Silzer & Dowell, 2010). Managers do the right thing for their associates both because the barriers have been lower than what they previously built and because management helped them with value added tools and information. Processes began to happen on schedule and consistently around the world. Talent decisions are made with an additional layer of qualitative and quantitative information drawn from across many different leader experiences. Leaders know that they must build talent the Avon way for both their short and long term success. When the turnaround began, no global process for understanding or acting on associate engagement issues existed. Select regions or department made efforts of varying effectiveness, but there was no integrated focus on consistent measurement and improvement of engagement (Silzer & Dowell 2010). In designing the engagement process, management applied the same three questions: the business benefit, the simple path, to adding additional value. Management accepted the substantial research that showed a correlation, and some causation between increasing engagement and increasing various business metrics. There were two goals established around simplicity. One goal was to understand as much of what drove engagement as possible, while asking the least number of questions. The second goals were to write the questions as simple as possible, so that if managers needed to improve the score on a question, their options for action would be relatively obvious. Management was confident that if managers took the right actions to improve their engagement results, not only would the next year’s scores increase, but the business would benefit from the incremental improvement. The challenge was to determine and imply communicate to the managers what the right actions were. Management with the assistance of a research team developed a statistical equation model that would become the engine to produce the answers. The statistical equation model allowed them to understand the power of each engagement dimension, for example, immediate manager, empowerment, senior management, to increase engagement, and to express that power in an easy to understand statement (Goldsmith & Carter, 2010). Avon’s mission is focused on six core aspirations the company continually strives to achieve. They are leader in global beauty, building a unique portfolio of beauty and related brands, striving to surpass competitors in quality, innovation, and value, and elevating Avon’s image to become the world’s trusted beauty company. Empower their employees to achieve economic independence by offering a superior earning opportunity as well as recognition, service and support, making it easy and rewarding to be affiliated with Avon. Deliver superior returns to shareholders by pursuing new growth opportunities while maintaining a commitment to be a responsible, ethical company and a global corporate citizen that is held as a model of success (Avon Products Inc. , 2012). Avon Products Inc. is the world largest direct seller right now. The changes in 2006 set the stage for renewed growth by enabling them to be faster and nimbler, but since then the business has grown significantly and become increasingly complex.

Monday, January 6, 2020

Essay about Securing Our Country The Department of...

1.) The major laws and regulations that direct the operations of the Department of Homeland Security are as follows; the Homeland Security Act of 2002, Intelligence Reform and Terrorism Prevention Act of 2004, and the Implementing Recommendations of the 9/11 Commission Act of 2007. The Homeland Security Act of 2002 was introduced after the September 11, 2001 attacks and mailing of anthrax. It was signed into law by then President George W. Bush in November 2002. It created both the United States Department of Homeland Security and the cabinet-level position of Secretary of Homeland Security ¹. The Acts first responsibility was to prevent terrorist attacks in the United States. The Intelligence Reform and Terrorism Prevention Act of 2004†¦show more content†¦The Act formally authorized the establishment of the National Bio-surveillance Integration Center ³. Regulations that direct the operations of DHS are Title 6 of the Code of Federal Regulation; Part 7, 25, and 29. Pa rt 7 Classified National Security Information ensures that information within the Department of Homeland Security in relation to the national security is classified, safeguarded, and declassified4. Our democratic principles require that the American people be informed of the activities of their Government. Part 25 The Regulations to Support Anti-Terrorism by Fostering Effective Technologies also known as the Safety Act provides important legal liability protections for providers of Qualified Anti-terrorism Technologies, whether they are products of services5. The goal of the Safety Act is to encourage the development and deployment of new and innovative anti-terrorism products and services by providing liability protections. Part 29 Protected Critical Infrastructure Information implements sections 211 through 215 of the Homeland Security Act of 2002 (HSA) through the establishment of uniform procedures for the receipt, care, and storage of Critical Infrastructure Information. Consis tent with the statutory mission of DHS to prevent terrorist attacks within the United States and reduce the vulnerability of the United States to terrorism, DHS will encourage the voluntary submission of CII by safeguarding and protecting that informationShow MoreRelatedEssay on The Department of Homeland Security 1208 Words   |  5 Pagesto discuss the plan that the Department of Homeland Security has set forth for the years of 2012-2016. This plan outlines the entire vision of the department to essentially accomplish their missions and goals. The plan consists of missions varying from border security to cyber security. We must not forget the men and women on the front line working hard to ultimately secure and provide safety for the United States of America. The Department of Homeland Security National Strategic Plan was createdRead MoreTerrorism And The Acts Of Terrorists867 Words   |  4 Pageshave exacerbated tremendously over the past few years. This is largely due to the fact that terrorist groups are now more active in more countries than 9/11 (Bullock et al., 2013). Due to the growth of terrorist organizations and attacks, the United States is faced with new challenges. The challenges include: securing the United States from terrorism, homeland security growth and the possibility of another devastating terrorist attack. Even though these are challenges that are bound to affect the UnitedRead MoreThe Transportation Service Administration Directorate1734 Words   |  7 Pagesfor the Transportation Service Administration directorate, which is a directorate under the department of homeland security. The main purpose of this directorate is to ensure the safety of the United States’ transport infrastructure. The main objectiv e of this paper is to analyze the objectives of the TSA and determine whether they are in alignment with the objectives of the department of homeland security. This ensures that the directorate works towards achieving the overall goal of the DHS as stipulatedRead MoreRole Of The Department Of Homeland Security1659 Words   |  7 Pagesintelligence capacity. Our citizens demanded a strong response that would prevent any future terrorist threat. President Bush created the Department of Homeland Security as the key agency responsible for all anti-terrorism activities to protect our homeland. Government officials and law makers introduced anti-terrorism laws and measures to allow key intelligence and counterterrorism agencies to protect us from terror. Outlining the role of the Department of Homeland Security depicts how this agencyRead MoreThe Differences Between Homeland Security And Homeland Defense1432 Words   |  6 Pagesdiscussing the difference between Homeland Security and Homeland Defense. I will be discussing the different roles that each department handles, which include each departments missions, tasks, duties, responsibilities, operations and other various issues that separate the two. I will also address the responsibilities of both homeland security and Homeland Defense that are shared between the two. Then I will use this information to provide my own description of Homeland Security. In the second half of thisRead MoreHomeland Security And The Security1435 Words   |  6 PagesDifferences The idea of securing the nation’s borders and securing the safety of the citizens has been a major topic since the beginning of the nation’s existence. There have always been means and procedures for it but it was never defined to the point it is today. The Homeland Security Department is a fairly new program which is constantly improving and adjusting in accordance to the threats that may arise. In the attempt to secure the United States, homeland security has become paramount and aRead MoreBorder Security1320 Words   |  6 PagesRunning head: Has Technology Improved Border Security Operations 1 Border Security Technology HAS TECHNOLOGY IMPROVED BORDER SECURITY OPERATIONS 2 Border Security Technology Border security is paramount to the security of the United States of America. There are 7,000 miles of land border with Canada and Mexico as wellRead MoreThe Strategic Challenges Of Homeland Security1564 Words   |  7 PagesThe six strategic challenges that the Department of Homeland Security has identified as â€Å"†¦prevailing challenges that pose the most strategically significant risk† are: terrorism, cyber terrorism, nuclear terrorism, biological concerns, transnational criminal organizations, as well as natural hazards (Department of Homeland Security. 2014). These six challenges all pose a threat to the safety of the homeland and because of that the Department of Homeland Security (DHS has to issue a review to CongressRead MoreTerrorism : A Global Issue Essay1749 Words   |  7 PagesAngela Brown Professor Miller English 112 13 Sept 2015 Terrorism Many of us will embrace our loved ones before leaving our homes to start a hectic workday. As we hug our children and kiss our spouses goodbye, the thought of losing them, or our lives to acts of terrorism, is typically not one to cross our minds. On September 11, 2001, this mere thought became the reality for many families. The eleventh of September will forever be remembered as the date a terrorist organization, known as al-QaedaRead MoreDevelopments Of Securing The Nation s Ports788 Words   |  4 PagesDevelopments in securing the nation’s ports have occurred since September 11, 2001: According to American Association of Ports Authorities (n. d) the United States is served by some 360 commercial ports that provide approximately 3,200 cargo and passenger handling facilities and there are more than 150 deep draft seaports under the jurisdiction of 126 public seaport agencies located along the Atlantic, Pacific, Gulf and Great Lakes coasts, as well as in Alaska, Hawaii, Puerto Rico, Guam, and the