Critique of Three Forms of Internet Communication
By: chrisjlijah3 • Essay • 1,971 Words • August 5, 2014 • 840 Views
Critique of Three Forms of Internet Communication
Critique of Three Forms of Internet Communication
GEN499: General Education Capstone
I clearly remember the first time I experienced the World Wide Web. I was an Airman in the Air Force and was tasked to transmit our office’s daily transactions to the squadron’s computer room using the internet. This technology was eye opening to a country boy from Iowa like myself. At this point in the Internet revolution, the world was just beginning to experience the Internet and many could only begin to imagine what the future might offer in day to day communications. Online newcomers like CompuServe and America Online were just beginning to show off their flashy new applications. Fast forward twenty-five years and Internet now provides a vast array of communication methods. In this paper, I will examine three methods of communication in the arena of social media security while searching for clues to determine the validity, and applicability of the messages. I will then discuss the influence of web-based information on global citizenship and multicultural understanding. Finally I will present three major factors that I feel are a requirement when considering an Internet source for inclusion in a research document.
Today’s social media alters our lives and institutions in a manner that we are only beginning to realize. In a recently published Forrester Forecast View report titled Forrester Research World Online Population Forecast (Global), 2012 To 2017 found that, “2.4 billion people across the world use the Internet on a regular basis i.e., at least once a month — from home, school, work, or any other location via a PC or a non-PC (mobile) Internet access device.” (Miglani, 2012) The report goes on to state, “Internet use is expected to grow to 3.5 billion users by 2017, representing nearly half of the 2017 expected overall world population of 7.4 billion.” The use of the internet and social media truly is a world-wide function and expands across all continents, nations and countries. As the forms of communication and numbers of users continue to multiply, so are the security risks involved with using this technology. Through an examination of three contemporary communication forums to share information: Blogs, Podcasts, and Videos, I will relay the common security threat message that each internet user must now adhere too.
Internet users now share their experiences, observations and opinions with a global audience as freely as one might have picked up the telephone and spoke a friend in the past. One of the most common methods now used is the podcast. The terms ‘podcast’ and ‘podcasting’ can be defined as, “A podcast is a digital media file that: plays audio (sound) or audio and vision (sound and something to view); with vision, the term ‘vodcast’ is sometimes used; is made available from a website; can be opened and/or downloaded (taken from the website offering it and placed on something of your own) and played on a computer; and/or is downloaded from a website to be played.” (Salmon, Edirisingha, Mobbs, 2011, pg 8) Kevin Haley, Director of Security Technology and Response for Symantec recently posted a podcast concerning the internet threats experienced during 2011. As the director of security for a leading provider of security software, Mr. Haley has a vested interest in informing the audience of potential threats and risks to their operating systems. As the audience is exposed to the information presented in this podcast, a win-win situation for the Symantec and the audience is revealed. Viewers become aware of updated threats and the necessity to use updated security and anti-virus scanners, while the company earns profits by selling software to mitigate the threats presented by the attackers. Mr. Haley emphasized during this podcast, attackers are shifting efforts to the social network arena. “Malware has skyrocketed to 5.5 billion attacks, doubling the assaults from 2010.”(Haley, 2012) As the vulnerabilities are reduced through security software, attackers are getting better at attacking the remaining voids. Social media applications such as Facebook permit viruses to be transmitted virally. Haley reports, “Scammers load virus and malware threats on short links like “Dis-Like” buttons, polls, and videos on Facebook, which when selected, load the virus or malware then posts to the victims Wall for friends and family to view and potentially perform the same act and spreading the malware and virus prolifically.”(Haley,2012) Not only do we have to protect our operating systems and devices that connect to the internet, we also have to be aware of the personal information and photo’s we post on social media.
In a recent blog on the NETWORKWORLD website, freelance writer