How e-technologies have changed modern social life and how suppliers of such technologies have sought to overcome the threats and risks associated with these technologies.
Mobile, phone, radio and TV, is the most recent in a progression of technical innovation in relational correspondence, it combines the inventive highlights of its predecessors, for example, connecting great distance and broadly contacting crowds. Moreover, the Internet also has novel features, which are the most applicable, which are relative anonymity that is given to clients and there is an arrangement of group location in which other individuals meet with similar qualities and interests. We keep the internet in its historical setting, and after that inspect the impacts of the Internet use on the client's mental prosperity, individual relationship, social identity and group membership, work environment, and group contribution on the development and support. The confirmation brings up that these impacts are subject to special objectives, which associate with clients like self- expression, connection, or rivalry - like they collaborate with the special characteristics of internet communication in essential ways.
Effect of E-Technology on Social Life
In the last five years, the utilization of technology in the household use of an average family has increased significantly more than four hours. 80% of teenagers have at least one media working in e-technology. There is a wide multitasking related to media use (broadly utilized for texting and listening in to music on Mp3 players while doing homework, for instance). It is especially a case of worry that the utilization of TV in kids is expended. From 2004 to 2009, TV and video use are three to five hours for each day, which happens between the ages of 11 to 14 years, a basic period for the social improvement of kids. 24% of them used to chat with friends through messaging. 25% percent of friends used to communicate with each other using social media and 12% of them uses email.
A few people contend that technology assumes a positive role on society by giving alternatives to social collaboration and making companions on the web, in any case, through a "bulletin boards, chat room and many other services", Jean-Francois Coget and Yamaguchi Yutake wrote in their paper," There are lots of dangerous people who are looking for youth for fraud activities. The capacity to utilize each and every data known about somebody without the realizing that they are acting in a malicious activity at that point there is the possibility of being on the Internet while Coget and Yutake guaranteed that "Internet transparency, certainty, and It can expand the sentiment simplicity and solace in managing others. (Bargh & McKenna, 2004)
The Internet can likewise give openings by liberating individuals who are baffled to lead a social life in reality, "It is extremely unfortunate to make and keep up your online social connections.
Place Order For A Top Grade Assignment Now
We have some amazing discount offers running for the studentsPlace Your Order
E-Technology & Security
Threats and Solution
1. Cyberbullying: As indicated by Internetsafety101.org, 90 percent of young people taking an interest in web-based social networking have seen bullying, and 33% themselves are casualties of cyberbullying, web-based social networking and web-based games are the present virtual play area, and this is the place There is a considerable measure of digital threat. For instance, kids can be kidded via web-based networking media trades or, in internet diversions, they or their "player characters" can be subjected to continuous assault, the game must be changed into an inventive explorer in a mortifying test. (Pridgen, 2009)
Solution: Manufacturers and sellers today have implemented a new feature to overcome this problem and this feature is Kid Mode, whether its TV, Mobile or PC.
2. Malware and Bots: There are different sorts of malware in which there are interesting properties and attributes and among them, the virus is the most widely recognized kind of malware, and it is characterized as a malicious program that can execute itself and spread different projects or documents by contaminating them. A worm might be a sort of malware that can auto-imitate without a host program; Worm usually spread without the guidelines of any human contact or malware authors. Trojan Horse is also a part of malicious program family intended to show as an authentic program; Once actuated underneath establishment, Trojan can execute their vindictive errands. (Marinescu, et al., 2005)
Solution: To overcome this problem, manufacturer or sellers already have initiated a step toward installing System Security features in PC, Laptops, Mobile, Smart TV and many more products related to E-Technology.
3. A secure connection for checkout (SSL): Internet is also a form of E-Technology so there are lots of threats and vulnerabilities regarding financial transaction over the web or private communication. Very few people know that internet used to work on HTTP protocol to transmit data to the facilitating server from the client's program; its nature isn't safe to exchange the HTTP secure data, this is mainly because it doesn’t use to implement any kind of encryption in the data that is being transmitted. It keeps your eCommerce site clients helpless before hackers on a similar network, sniffing for the data being sent. It might CC information, passwords, and addresses.
Solution: HTTPS is the solution for this which uses SSL (Secure Socket Layer) which used to encrypt the data being communicated. (Das & Samdaria, 2014)
Available at: http://www.pewinternet.org/2015/04/09/teens-social-media-technology-2015/
Bargh, J. A. & McKenna, K. Y. A., 2004. The Internet and Social Life. Annual Review of Psychology, , 55(1), pp. 573-590.
Das, M. L. & Samdaria, N., 2014. On the security of SSL/TLS-enabled applications. Applied Computing and Informatics, , 10(), pp. 68-81.
Marinescu, A. M., Braverman, M. I. & Seinfeld, M. E., 2005. Method and system for protecting anti-malware programs. [Online]
Available at: http://freepatentsonline.com/7640583.html
[Accessed 27 3 2018].
Pridgen, B., 2009. Cyberbullying: Bullying in the Digital Age. Journal of the American Academy of Child and Adolescent Psychiatry, , 48(3), pp. 344-346.
U.S. Bureau of Labor Statistics, 2012. Information Security Analysts, Web Developers, and Computer Network Architects, on the Internet. U.S. Department of Labor.