StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Internet Abuse Detection - Essay Example

Cite this document
Summary
The paper "Internet Abuse Detection" states that the article gives a clear background of the widespread use of computers by companies to communicate with suppliers, clients but there has emerged internet abuse at the workplace in terms of using the internet for personal reasons…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98% of users find it useful
Internet Abuse Detection
Read Text Preview

Extract of sample "Internet Abuse Detection"

The article then develops the basis for the study as a determination of the effectiveness of text mining techniques for detecting Web-based Internet abuse at the workplace as well as the accuracy and efficiency of some techniques compared to others. This makes the reader have a comprehensive understanding of the article and how it will be organized making it a good and excellent article in terms of idea development. The article then reviews the literature on internet abuse, approach and text mining techniques, empirical findings and results and the last part presented is the managerial implications and future research directions as envisaged by the authors.

The article is organized in a manner to give the reader a clear understanding of the needs for the research, findings, and conclusions made as well as further research recommendations. The authors give a clear exposition of the literature on internet abuse to bring the reader up to speed on the research undertaken on internet abuse in the workplace. There are three major categories of literature reviewed by the authors including measures to prevent internet abuse behaviour, measurements of evaluating the behaviour and factors that augment the behaviour as well as the monitoring and blocking of employees internet usage.

The main approach taken by the study is the detection of web-based abuse through the text mining approach excluding non-web-based abuse and e-mail abuse as a means to complement the existing techniques. The authors give a clear exposition to the reader of the methods of classification, data collection methods and preparation as well as the design taken to ensure the results reached are quality and supported by evidence. After the results are analyzed using standard regression, standard deviations, Chi-test, and F-test, the conclusions and recommendations are presented at the end of the article.

The analysis is in-depth to allow the reader to comprehend the steps taken to reach the conclusions made at the end of the article. The article makes conclusions including that text categorization is a promising approach for detecting internet abuse at the workplace as it yields accurate automatic classifiers of 99% accuracy in classification. This is a higher accuracy compared to the 80% accuracy of commercial filtering products. The article also concludes that the effectiveness of technical solutions to solve internet abuse in the workplace can be augmented using management solutions in terms of policy formulation on internet use and the management may use filtering tools as a means to solve internet abuse at the workplace.

Through these conclusions, the article gives a clear exposition of the measures through which the management can benefit through using the text mining approach in the detection of internet use at the workplace. The article does an excellent work of giving recommendations for further research to augment the use and understanding of measures to detect internet abuse at the workplace. Future research is proposed on the comparison of the approach presented in this study and commercial filtering products as well as the ability to make continuous updates to classifiers. The other area is further research is to find out other measures to combine various techniques for better performance and evaluation of internet abuse detection at the workplace. 

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Mining Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Mining Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/business/1630817-mining
(Mining Essay Example | Topics and Well Written Essays - 500 Words)
Mining Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/business/1630817-mining.
“Mining Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/business/1630817-mining.
  • Cited: 0 times

CHECK THESE SAMPLES OF Internet Abuse Detection

Analyzing and contrasting data mining based network intrusion detection

The need for security has spawned in the design of firewalls, cryptography, authentication and many different intrusion detection systems.... Among these security tools, network intrusion detection systems hold the potential to become a tool against computer crime.... In this age of the Information Revolution, there are obvious advantages that can be reaped from the vast and ever growing internet Community of the web: 24/7 connectivity; robust e-commerce that simplified business transactions and operations; erasure of geographical separation and distance; and access to a multitude of modern means of communications....
48 Pages (12000 words) Thesis

Effect of Childhood Sexual Abuse Within Institutions

Research has shown that childhood sexual abuse interferes with the child's education as well as her general growth and development.... The research suggests that sexual abuse can cause psychological, social, sexual as well as physical problems to the abused child.... The research reveals that Sexual abuse effects on children and youth can be evident in emotional, physical and behavioural ways.... This research paper attempts to identify the type and forms of child sexual abuse cases in the study areas and then determine the causes of child sexual abuse in schools in UK....
31 Pages (7750 words) Literature review

The Issue of Elder Abuse

Elder abuse Author's Name Institutional Affiliation Abstract This document deals with the issue of elder abuse and reflects on the various concerns of the victims, by answering the questions posed by the case scenario of Ms Sanders and the son, Simon.... Keywords: Elder, abuse, Health Status, Vulnerability, Risk Factors, Stress, Abusers, Victims, Caregivers Why is Ms Sanders vulnerable to elderly abuse?... According to Kim and Geistfeld, social support, cognitive ability and health status are a combination of factors that suggest elder vulnerability to abuse (n....
3 Pages (750 words) Essay

Effects of Child Sexual Abuse

The essay "Effects of Child Sexual abuse" focuses on the critical, and multifaceted analysis of the major issues concerning the effects of child sexual abuse.... One of the worst and saddest occurrences in childhood is sexual abuse and the resultant trauma.... While Child sexual abuse remains illegal in all countries, it has also been almost impossible to eradicate it.... Child sexual abuse is not something momentary that could be forgotten immediately....
18 Pages (4500 words) Essay

The State Removing Children from Their Parents

Mistreatment or oppression of a child less than 18 years (minor), by parents, relatives, caretaker, or somebody who is with the child, is called child abuse.... Mistreatment can be mental or physical torture, or sexual abuse.... Mistreatment comes as emotional abuse also.... All these results in severe child abuse issues.... They may have to undergo physical and mental abuse and even big assaults also....
10 Pages (2500 words) Essay

Do abuse children become criminals

he author then enjoyed the difficulties and challenges that came with the research as he learned much from the experience and was able to deepen his understanding regarding abuse.... One of the main issues is how the victims of abuse suffer from the shock and gruesome experiences.... It is not only the concern of the author but the society as a whole as all citizens are prone to abuse.... he author decided then to write about the topic of abused children as he saw those cases on the news presented in different forms of media such as television and internet....
4 Pages (1000 words) Essay

Human Rights

This paper examines some practical aspects of human rights and the dominant trends in a given country.... The research focuses on the human rights records and structures of Iran, a country in the Persian-Gulf region of the Middle East with a dominant Islamic population.... .... ... ... This paper examines the nature and degree of human rights violations in Iran....
6 Pages (1500 words) Research Paper

Abused-to-Abuser Hypothesis: Validity Issues

For this study, did child sexual abuse truly cause or correlate to the development of sexual offending attitudes and behaviors among the sampling or group being studied?... McGrath, Nilsen, and Kerley (2011) discovered from their review of literature on profiled juvenile delinquents and adult sexual offenders that the physical and psychological trauma of sexual abuse does not, all the time, amplify the predisposition of children to become future juvenile and adult sexual offenders of children also, although 'their chances are greater than for those who are not abused as children' (p....
7 Pages (1750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us