Premium Essay

Internet Tracking Essay

In:

Submitted By Timeeh16
Words 1066
Pages 5
Tim Castillo
English 250/260
Oct. 6th 2013
Internet tracking essay Addiction happens when a person can’t stop doing something that they like. Even if they want to stop, they succumb to addiction, and it makes one want to do it again. On a scale of one to ten I would say my addiction level is a five. However compared to Ms. Stites, I would give myself a three. Ms. Stites is one of the most addicted persons I have ever heard of. Social media is fun and its good to connect with friends, but it shouldn’t be used to stalk others or find random people. I chose five because I don’t think that I am one to use too much technology. I’m average at best. The reason why I believe I’m average is because the most I do is play video games online, look at funny pictures on the internet, and use my phone. I do tend to spend most of my time on the games though. That’s the worst thing when it comes to addiction for me. I don’t think I could live without my video games. That’s my source of entertainment. I’m sure others would rather go to parties and concerts. If you put a controller in my hand, ill be good for the week. Our objective was to compare our selves to stites who is a crazy ten. Then compare myself to students in our class. The amount of internet usage I had was a total of fifty hours. I spent the whole week playing video games for thirty-five hours. I spent time on my computer for eight hours and looked at funny pictures for two hours on my phone. I have also Skyped on my phone for three hours and listened to my Pandora for two hours.
I usually play video games around the clock. When it comes to my video games I play whenever I can. I could play for hours if I didn’t have other things to do. When I compare myself to others in the class, I am still a five. Michelle played five hours in the week. I had thirty-five hours. She rated herself a three. I may not spend a lot

Similar Documents

Premium Essay

The Impact of Information Communication Technology

...ESSAY ON IMPACT OF C/T ON PERSONAL BUSINESS LIFE Conclusion Communications Impacts In the past the manual and verbal method of communication was the norm on all aspects of our lives. Communications mediums have changed beyond recognition with the advancement of Technology. In this essay I will provide an overview of three forms of Technology: Mobile Phone, the Internet, the E-Mail. I will also explain current development in C/T and discuss the role of legislation on the industry. Mobile Technology: Mobile Technology is the technology used for cellular communication. They come into use in 1990’s. When first introduced, it way a luxury item, today it is viewed as an essential to our existence. Old mobile technology consisted of a large handset, battery and signal difficulties and was very expensive. Since the start of this millennium a standard mobile device has gone. Today mobile are slim line, cheaper and can perform of many functions: Personal Mobile use: * To call * To Text * Camera functions * Games * Alarm * Email * Internet * Calendar * App Store Business use: * To communications with staff, customers/business partners Advantages of Mobile Technology: * 24/7/365 contact * Accessible at all time * Variety of services available via any mobile * Mobile Marketing reaches new and existing customers * Sending out special offers and tracking responses. * GPS in phone can help to...

Words: 867 - Pages: 4

Premium Essay

Aa Afaff

...Information Technology Essay Current online marketing strategies deliver immense benefits to the modern global firm by way of better market reach, cheap and convenient transaction possessing, multiple online payment options and real time consumer data management. Marked benefits are commonly discernible in the area of internet based business-to-business or B2B, and business-to-consumer or B2C e-commerce models. These online commerce models rely on digital marketing for their success, which in turn in essentially a remarkable success of information technology and data management techniques. However, the growth of digital marketing is getting severely affected by the misuse of technology by criminals and unscrupulous persons in various ways. Such misuse of technology encompasses identity theft, data loss and other data security breaches. Increasing information security breaches and cases of identity theft in recent times threaten the marketing of products and services either online or offline like never before. This paper attempts to understand issues and outcomes of identity theft, data loss and security breaches on the present and future global marketing environment by examining several secondary sources of information. 2. What is identity theft? We can help you to write your essay! Professional essay writers Our writers can help get your essay back on track, take a look at our services to learn more about how we can help. Essay Writing Service Essay Marking Service Place...

Words: 3128 - Pages: 13

Premium Essay

Analysis Of Stephen King's Essay 'Tracking Is An Assault On Liberty'

...anonymity is largely an illusion,” written by by Nicholas Carr in his essay called “Tracking is an Assault on Liberty.” I feel that having freedom to do whatever you want on the internet is a reason to be monitored in of itself because people are always doing mischievous things online and if they could be caught or flagged due to monitoring then it is not as horrible as it may seem. Such as companies using information that is gathered on the web to put out there what more people want. All the creeps that are looking into the deep parts of the web are noticed and looks suspicious It is a well known fact that people put themselves and their social lives out there with such things as Twitter,Instagram and even casual dating websites. When people have pictures of what they're eating or where they are, it is a way for anybody that sees the posts and now exactly what they are doing. When these such things are online it is surprising to me that people are shocked at the fact that they are not anonymous online. Companies also partake in info gathering such as Amazon, if you put a “Stephen King” novel in your wish list more results and recommendations will show up for you. This kind of monitoring can be considered as...

Words: 609 - Pages: 3

Premium Essay

Medcal Student

...Essay No. 1 February 9, 2003 Response to “FBI's Tracking of Muslims Raising Alarm with Some” Have Muslims been treated unfairly in this country? In an essay “FBI’s Tracking of Muslims Raising Alarm with Some,” posted on the Internet on October 6, 2002, Philip Shenon and David Johnston write about how FBI set a surveillance campaign to track young Muslim men they think have terrorist cells inside United States to assist Al-Qaeda. They monitor the suspects’ telephone calls, e-mail messages, Internet use, and their credit card charges. They also dare to monitor the suspects’ gathering places, including mosques. The surveillance program has helped the FBI to arrest dozen of young Muslims in western New York, in Detroit, in Seattle, and in Portland, Oregon since late summer. Philip Shenon and David Johnston, the authors of the article, say that the surveillance campaign is centered in the Detroit, Michigan area because the largest population of people of Arab descent lives there. In the article, the authors report that some Arab-Americans and Muslim groups are not happy with what is going on inside their communities. They have complained about the FBI’s unfair accusation that these young men have some connection with Al-Qaeda. In my opinion, the authors of the article have done a valuable thing to make people aware of these problems. I think that the FBI is not doing a great job. I don’t think it came with a right idea to solve this problem. The FBI’s effort to go after...

Words: 886 - Pages: 4

Premium Essay

Mg650 Managing Info. Tech. Enterprise

...ENTERPRISE TERM PAPER MARCH, 04 2015 TOPIC: INTERNET CHALLENGES TO PRIVACY Challenges is a way of testing your abilities in an interesting way, what I believe challenges always is a way of moving someone from one point to another or from one level to another. Challenges is a course of promoting our product and services. INTRODUCTION We use social media to electronically communicate with family, friends, customers, and business associates- using web sites for social networking and microblogging such as twitter, LinkedIn, face book, and Instagram. With social media you share and exchange information, ideas, pictures, and videos. The electronic communication strengthens both our personal and professional relationship and all these communications need privacy. Normally privacy can be define as the condition or quality of being private from the occurrence of others. In our days, internet has face different challenges to protect the privacy of its customers. Information passes in different computer systems before reaches the ending target. And every each systems is required to be monitored, capture, and store communications that go by through it. For example there are tiny files set down on a computer called cookies. When a user visits certain website it recognize the visitor. Cookies and other web monitoring tools closely track the activities of the web site visitors. Internet technology has posed new challenges for the protection of individual...

Words: 2199 - Pages: 9

Premium Essay

Juyh

...I am writing a short essay about two major topics of DHCP. The first topic would be explaining the benefits of using DHCP instead of a static addresses. The second topic is explaining why DHCP is a better option than using static addresses. DHCP is known as (Dynamically Host Configuration Protocol) that uses a client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other configurations information such as the subnet mask and default gateway. RFCs 2131 and 2132 define DHCP as an Internet Engineering Task Force (IETF) standard based on Bootstrap Protocol (BOOTP), a protocol which DHCP shares many operation details. DHCP allows hosts to obtain required TCP/IP configuration information from a DHCP server. Dynamically Host Configuration Protocol (DHCP) provides four key benefits to managing and maintaining a TCP/IP networks. Those four terms are centralized administration of IP configuration, Dynamic Host Configuration, Seamless IP host configuration, and Flexibility and Scalability. DHCP has reliable IP address configuration, which minimizes configuration errors caused by manual IP address configuration, such as address conflicts caused by the assignment of an IP address to more than one computer at the same time. DHCP also benefits in reducing network administration. DHCP reduce the network administration by using centralized and automated TCP/IP configuration. It has the ability to define the TCP/IP configurations from a central...

Words: 419 - Pages: 2

Premium Essay

Online Shopping

...Online shopping is a process where people can buy items over the Internet using web browers ? Nowadays online shopping is very popular People can buy everything : clothes , food, holidays by simply the click of mouse button. Moreover in Virtual Store is available to find more items then in shopping centres , without queses with better price . There are many advantages of shopping online . However the practice has limitations as well. This essay will describe advantages and disadvantages of online shopping in terms of time and cost. Firstly, majority of people have busy lives . Work , children home, school . Time is really important , that is why nobody wants waste it. Online shopping is good solution for them. For example shoppers can buy any item relaxing at home or any other location .You do not need to have a car ,traveling to buy something . Mobile phone ,tablet or computer with Internet conection and you can start your shopping .Customers do not have to spending time and energy in traffic , waiting long in lines. What is more online retailers operate 24 hours 7 days a week . What is mean you can shopping on your break between school and work . Moreover product will be sent to your door. However They need wait some days for delivery .In instance In- store shops you receive product immediately. Online stores need more time , retailers must send products to customers what is more then 1 day also can be longer time waiting if shipment is from another continent . ...

Words: 612 - Pages: 3

Free Essay

Security Monitoring

...Introduction [Writing suggestion: Avoid using "intro" or "introduction" if this is a subtitle. At the beginning of the essay, the following could be nothing else] One of the biggest concerns in today’s society relates to security in internal IT and e-commerce applications. Security is handled by passing and transactions between client browser and Internet server entering a secure site. The client browser is passed a public key by which transactions between client, and the web is encrypted. The process of monitoring security plays a vital function in any organization’s computer use both internally and externally. Security Organization Within a secure organization the business structure can cover a system of financial control, such as payroll, human resources, inventory, and general ledger vary the variety of agencies of the organization may be enhanced. Vulnerabilities in organizations will diminish, staff may be eliminated and so will duplications of work within departments, monetary information can stay secure, and most customer service may be better. Internal IT Internal IT is a beneficial service such as, compliance with federal and state laws, add valve to an organization’s internal control. Safeguarding the organization assets, and risk management just to name a few, mainly deals with computer applications monitors and manages employee’s activities, for instance it more of a help desk, side services, or a desk-side service infrastructure and application support...

Words: 663 - Pages: 3

Premium Essay

Blah

...********************************************************** http://www.onlinetech.com/resources/references/what-is-hipaa-compliance Technical safeguards require access control to allow only the authorized to access electronic protected health data. Access control includes using unique user IDs, an emergency access procedure, automatic log off and encryption and decryption. •Audit reports, or tracking logs, must be implemented to keep records of activity on hardware and software. This is especially useful to pinpoint the source or cause of any security violations. Technical policies should also cover integrity controls, or measures put in place to confirm that ePHI hasn’t been altered or destroyed. IT disaster recovery and offsite backup are key to ensure that any electronic media errors or failures can be quickly remedied and patient health information can be recovered accurately and intact. •Network, or transmission, security is the last technical safeguard required of HIPAA compliant hosts to protect against unauthorized public access of ePHI. This concerns all methods of transmitting data, whether it be email, Internet, or even over a private network, such as a private cloud. A supplemental act was passed in 2009 called The Health Information Technology for Economic and Clinical Health (HITECH) Act which supports the enforcement of HIPAA requirements by raising the...

Words: 329 - Pages: 2

Premium Essay

Compare And Contrast The Veldt And Technology

...innovation is extremely useful, especially to students. When a student is in need of quick facts for an essay or presentation, it’s only a search bar away. However, studies show that students “spent a third of their time searching non-academic sites - even though they knew that researchers were tracking their computer use.” (Kamenetz) Not only does the world have unlimited access to the rest of the world, humanity can be constantly entertained for hours on end. Media is constantly pumping out amazing music, videos, movies, podcasts, games, and stories for the world to see, supplying humanity with comedy and entertainment. With the astounding, stunning new items coming onto store shelves with new and improved phones, laptops, and speakers, come detriments and deprivation of something “real”. While having the world in a pocket, students get distracted by a text while in class. Children are holed up in a dark room watching YouTube rather than playing in the sun. Studies show that these cause symptoms of depression, anxiety, and addiction. This generation is addicted to the media. This generation isolates itself and feeds into a mindless video rather than doing homework. The children of this generation have been desensitized to nearly everything, all thanks to the media. Overall, technology is amazing and can extend human life, yet the Millenials love for YouTube and memes and the internet has caused the generation to be apathetic, dull, and lazy. The new technology that’s been invented...

Words: 639 - Pages: 3

Premium Essay

About Amazon.Com

...Myra B. Robles AMAZON.COM – WEBSITE AND AN ONLINE MARKET Amazon.com History Amazon.com is a Fortune 500 e-commerce company based in Seattle, WA. Amazon was one of the first big companies to sell goods over the Internet. The company was founded by Jeff Bezos in 1994, and launched in 1995. They started out as an online bookstore and then quickly diversified by adding other items, such as VHS tapes and DVDs, music CDs, software, video games, electronics, MP3s, clothing, furniture, toys and even food items. In 1999 Time Magazine named Bezos its 1999 Person of the Year. This was largely in recognition of the company's success in popularizing online shopping. Amazon.com Company Culture Amazon.com considers itself a completely customer centric company, which is reflected in their company values statement: * Customer Obsession: We start with the customer and work backwards. * Innovation: If you don't listen to your customers you will fail. But if you only listen to your customers you will also fail. * Bias for Action: We live in a time of unheralded revolution and insurmountable opportunity--provided we make every minute count. * Ownership: Ownership matters when you're building a great company. Owners think long-term, plead passionately for their projects and ideas, and are empowered to respectfully challenge decisions. * High Hiring Bar: When making a hiring decision we ask ourselves: "Will I admire this person? Will I learn from this person? Is this person...

Words: 1226 - Pages: 5

Premium Essay

Online Sales System (Dell)

...1.0 Introduction The report is aimed to investigate and identify the key element and the information system activities of the online sales system of Dell. In this system, customers are allowed to purchase electronic devices directly through the internet. First of all, let take a look on the some brief description about the company background and the system. 1.1 Company Background Dell Inc. is a world class e-commerce company that manufactures, sells, repairs and supports computers hardware and other related software and services. Dell does not own any direct stores instead the company is selling its products via online and other dealers or retailers like Wal-Mart and Best Buy. [1] Although the main business operation of Dell is in Round Rock, Texas, United State they have expanded to all the other places around the world with sizable manufacturing facilities in Austin, Texas; Limerick, Ireland; and Penang, Malaysia The founder of the company is Michael S. Dell. In 1 February 1984, Michael Dell founded a company called PC Limited with $1000 in his dorm. At that moment, he was a 19 years-old university student. [2] The company was selling IBM PC-compatible computers that equipped with stock components from various suppliers such as the processor from Intel. After he obtained $300,000 expansion capital from his family, he left the university to work full-time for his newly started business. He is the one who come out with the idea that sell directly to the consumer...

Words: 6368 - Pages: 26

Free Essay

Ecserr

...can help more chance of passing. This Application is applicable to all android phones, more valuable especially for under-employed, it takes some ideas and information about the facts of Civil service. The Civil service reviewer is one major problem for us to know how to review without a particular book of reviewer. 1.2 Background Of The Study One of the greatest challenges in most of the examinee today is to review without the particular book of reviewer in Civil service examination. This application will serve as a digital reviewer that you can take anywhere with you to refresh and enhance your knowledge regarding the exam. ECSERR can use whether offline or online. The offline purpose is to review without any access to internet and the online purpose is to know when, where, how and etc., the data about the Civil Service examinations to familiarized about the questions and to have an idea what Civil Service Examinations importance. 1.3 Conceptual Framework INPUT PROCESS OUTPUT * Set a time * Categorized subjects * Set a time * Categorized subjects * Displaying of Question * Running time and total score * Stop time * Displaying of Question * Running time and total score * Stop time * Show the total score * Record *...

Words: 4331 - Pages: 18

Premium Essay

Sterile Technology

...Farren and Gibb are correct when they say that the only things we can do about surveillance technologies is to get use to them. The advancement of the technology has come so far as to make it all but impossible to contain it. In a larger context this is because we depend on it in the first place. This dependence is encouraged by our own use of surveillance, tracking technologies and our voyeuristic desire to see ourselves and others. The need of these technologies in the commercial and governmental sectors is insatiable. The commercial aspect can be anything from security for your home to selling products on the internet. The desire for more information about consumers drives businesses to seek out more direct ways to target their customers and sell more products. This can be something as simple and personal as recommendations from websites such as Amazon, or Netflix (p. 42, Farren &ump; Gibb, 2007). Super markets use club/loyalty cards which provide discounts in exchange for tracking a person's or households purchases. All of these purchases are matched up to someones name and address. This information can than be cross checked with other records that can form an image of a person (p. 41, Farren &ump; Gibb, 2007) . This data can be sold or mined and reconfigured, it has even provided a tool to be used for political purposes. The political side of consumer purchases allow for direct targeting by political parties such as the Bush campaign in 2004 (p. 43, Farren &ump; Gibb, 2007)...

Words: 1670 - Pages: 7

Free Essay

The Issue of Online Data Reselling

...Organizational Ethics The Issue of Online Data Reselling In 1995 the percentage of the population that used Internet was 0.4 %, while in June 2012 that portion have grown with 30 %, amounting 34.4% of all human population. Current statistics are citing gigantic numbers of the quantity of data that users generate - 2 000 queries on Google and 48 hours of video uploaded every minute are just some of the examples of the humongous size of information created online. This data is valuable due to the increasing number of e-commerce businesses employing the Web as their main platform for exchanging goods for value. Moreover, online data has become a topic of interest for marketers, researches, advertisers and publishers trying to gather as much information as possible in order to improve target advertising and deliver tailored content to their clients. Hence the information of a single browsing user is highly demanded due to the fact that it can provide insights into different online behaviors and optimize online campaigns. In 2006, the EU calculated that the value of open data in Europe (i.e. releasing all government information for free) would be € 27 billion (Dekkers) that is € 55 per European citizen. With a valuation of around $ 100 billion, the value that Facebook holds in 2012 is roughly $ 120 (€ 90) per active member. (NY Times) Personal data online is tracked by cookies, which are small pieces of code placed on the browser that remember the user and its information with...

Words: 1745 - Pages: 7