StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Advent of the Internet - A Boon or a Bane - Case Study Example

Cite this document
Summary
This paper "The Advent of the Internet - A Boon or a Bane?" focuses on the fact that the rapid advancement in the field of science and technology has greatly influenced all aspects of our daily life. The technology has brought in a plethora of new ideas in all areas of human interaction. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.4% of users find it useful
The Advent of the Internet - A Boon or a Bane
Read Text Preview

Extract of sample "The Advent of the Internet - A Boon or a Bane"

Introduction The rapid advancement in the field of science and technology has greatly influenced all aspects of our daily life. The technology has brought in a plethora of new ideas and innovation in all areas of human interaction. It has created unlimited scope in the personal and professional lives of individuals with huge implications for the businesses across the world. The advent of internet has further shrunk the world into a global village and redefined the concept of distance and time. Its application in the business processes has greatly facilitated communication among various inter-related factors through the tacit manipulation of the informed choices by the organizations. It has indeed created a huge vista of new opportunities in the real world and has become a necessary business tool with its wide range of applications in the ever expanding and competitive global environment. But at the same time, it must also be acknowledged that misuse of technology has also become a serious concern for one and all. A boon or a bane? The advent of internet has redefined the communication and has become one the most powerful tools of information. It is also the most widely used application to access all types of information by one and all. In the recent times, the phenomenal growth in the internet user database has brought in a mixed feeling of exhilaration and anxiety. While easy access to information through internet has been hailed as the most radical process of dissemination of information, the lack of effective control over the same has become a cause of great concern. The easy access to information has also become a bane for the authorities and the increasing cases of variety of cyber crimes has become serious issue. Identity theft/ identity fraud, sexual offences, cyber terrorism, etc. are very serious cyber crimes that have become a threat to the society at large. In the recent time, the monitoring of emails, internet access, telephone calls etc have also become contentious issues between the employers and employees. Cyber crimes Cyber crime can be broadly defined as the crimes committed through the usage of computer network or information technology. Council of Europe has defined it as ‘any criminal offence committed against or with the help of computer network’ (EU Council, 2005). Identity theft and identity fraud are cyber crimes that have serious repercussions on the society as people’s identity and their confidential information is used by the cyber criminal to committed different types of illegal activities. Identity theft results when the confidential information of a person is stolen and another person assumes that identity for some vested interest, whereas in identity fraud, the criminal uses another person’s identity to commit fraud. Hacking the computer network and stealing information regarding credit cards has increasing become a serious problem for the authorities because of the complexity of the techniques involved in tracking the culprit in the cyberspace. It is therefore, necessary that vital information should not be disclosed over the internet and e-commerce activities must be confined to authenticated and secured sites to minimize the risk of identity theft. Online sex crimes Sexual offences and child pornography is another area that has witnessed tremendous upsurge in the recent times. The offenders have used the internet to lure gullible youngsters, including children to commit heinous sexual crimes on the innocents. The internet has the largest store of information that is being utilized on a continuous basis across the world. The ‘chat rooms’ have become highly susceptible to cyber crimes and effective platform to spread malicious and malafide information. Cathleen Cleaver, eminent author has articulated a grave concern of the misuse of internet and calls for collective action especially to protect and safeguard the interests of the children. Cleaver has correctly described the contemporary children by saying that ‘child is the father of man’ (Cleaver, 2006). The adaptability and understanding of technical gizmos by children is much superior to their parents and elders and internet, therefore, does pose a greater threat to the children, especially in the form of pornography and adult material. Pornographic material not only presents a much distorted view of sex but exposure to such sites is extremely damaging to their mental and physical growth. It influences their moral and ethical behaviour and promotes lack of values. Indeed, strong state control over the administration of internet sites is the need of the hour. Cathleen Cleaver’s concern for the children is genuine. One must accept that today’s generation is tech savvy and therefore, manual control by parents is not sufficient to provide effective deterring means for the children. So it is important that stringent cyber laws and effective enforcement is implemented to safeguard the interests and security of children. Emails and internet monitoring and misuse Internet with electronic mailing system has redefined the communication with its far reaching implications and has become one of the most important parts of any business strategy. In a business journal, author says that ‘e-mail has become a key method of communication in most industries, as common as the telephone’ (Rosenthal, 2005). The businesses across the world are re-evaluating their business strategy so that they can successfully exploit its potential for business purposes. The scholars had acknowledged that ‘knowledge management’ through effective communication becomes important part of workplace (Raghuram, 1996). Indeed, even though, the wide scope of computer was acknowledged by the academicians and industry, they have only recently become popular amongst the common man. But it may have damaging effects for the overall development of the organization if it is not used with caution and with an approach that calls for greater control and discipline. The impact of computer has been extensive in almost every area of one’s life including professional and personal. The direct and indirect use of computer technology in every sphere has made it extremely popular which has, in turn, made it highly susceptible for misuse by one and all, in the absence of any tangible means of control. According to a report in CNN ‘the survey of 294 U.S. companies with at least 1,000 employees found that, in many cases, employees who sent e-mails containing confidential information about the organization or e-mails that were considered obscene and offensive were disciplined or terminated’ (CNN, 2006). Interestingly, the advent of internet has also changed the entire equation of communication which has become much easier. The media monopoly has been cracked by the public, greatly transferring the power in the hands of common man. The corporate world has also jumped in to exploit the vast opportunity presented by the internet. The increasing presence of networking sites like Facebook, twitter and others have become hugely popular amongst the student community and public and privacy of individuals has literally become meaningless. The deluge of private and public information in the sites has become a grave concern for the peer population, academia and government. The NYT report where the Freedom Forum Foundation quotes the Supreme Court Justice clearly shows the total disregard of government’s control mechanisms and provokes people to defy the same in the name of freedom. Why the need for effective rules and regulation? Internet has become a very cost effective and time efficient tool with its wide ranging ramifications. But at the same time, it can also be easily misused by unscrupulous people for their own vested interests that may be extremely disastrous for the organization, general public and the states at large. As is evident by the latest trend, the use of information technology and internet by the various terrorist outfits has resulted in some of the worst human tragedies in recent time. Hence, the emerging trends in the computers and information technology urgently require strict regulations and effective strategies that can curb its usage by the terrorists and unethical users. Flynn (2009) says that well defined organizational policies are the need of the hour, especially relating to internet and its uses so as to reduce risks and maximise productivity in the workplace. Advancing technologies, especially internet and email services have become indispensable part of corporate work methodology and therefore, they need to be regulated to help promote faster and more efficient delivery of organizational goals and objectives. Since, internet has wide popularity base among the masses, it is important that some measures of control and monitoring are used so that people in the organization are not able to misuse the technology for personal gains, at the expense of the organizational time and space. Another very pertinent point is that the indiscrete use of internet and email services, tend to expose the computer systems to external threats from viruses and scam emails which have the potential of destroying valuable organizational data and information. In a journal article, it is stated that ‘Countless other cases involving corporate e-mail never reach the public domain. They involve costly viruses, security breaches, theft of proprietary information, and workplace discrimination and harassment suits’ (Overly, 1999). Internet, if not monitored, can also be used by rival companies and vested interests to access valuable and confidential organization’s information through sophisticated ‘spyware software’ that can be downloaded into the computer system, whenever internet is used without adequate security and controlled measures. Halbert and Inguilli (2002) argue that electronic surveillance is ‘justified’ for companies because of myriad reasons like: promote efficiency; uncover employee loyalty; serve as enabling tool to evaluate employees’ performance. While internet and email services are excellent communication tools, one cannot deny the fact that internet also provides vast opportunities of entertainment and chat-rooms that promote wastage of official time, if used by employees during working hours. It is often observed that in the guise of privacy and personal space, employees tend to misuse official internet services, well beyond their personal time and space! The offices have also become a safe haven for downloading pornographic material which are not only morally improper but such sites are infested with viruses and other damaging software that can prove fatal for computer systems. Most importantly, email services are vital tools for information dissemination, within and outside the organization and it is important that this services is not misused by employees to send unethical mails or material to other colleagues and people in violation of organizational code of conduct and the wider organizational aims and objectives. In yet another survey by ePolicy Institute ‘…monitor internal e-mail between employees—the kinds of messages that can give rise to discrimination or harassment suits’ (Cormick, 2004). For majority of the users, email services and instant messages are seen as informal medium of communication and people are prone to exploit it by expressing views and opinions that may not otherwise be proper. In the recent times, the increasing use of these services, in the professional and personal lives of the individuals, has exposed the vulnerability of this medium of communication. The companies that have not developed well defined guidelines for emails and IMs, have had to face lots of problems, including litigation for a variety of reasons. Lack of internet and email related policies have led to the abuse of official internet and email services by the staff and other people through mails that contain improper messages like sexual harassment, pornographic material, leakage of confidential information etc. In the absence of any policies, the organizations are often left with little or no evidence of impropriety, committed by its employees. Another very crucial aspect is that the lack of email policy of the organization can also give opportunities to its aggrieved employees to send improper emails to rivals and other external agencies that may prove detrimental to organization’s reputation and business credibility. Looking at all the above highly pertinent points, it becomes imperative that the organization must re-evaluate its strategy to combat effectively the misuse of email and other communication services by its people in the organization. Melber’s article is also indicative of future way of working where the internet may become the major platform for disseminating information and literally giving the reins in the hands of the people. If the internet like media is controlled by the vested interests of the few, it will, indeed be the cyberwar that would be fought on the internet to proclaim supremacy of individual opinions and ideologies. It is a great concern for the genuine and legitimate government who needs to preserve the confidentiality of its sensitive data not only for safeguarding national interest but for the wider welfare of its citizens who become innocent victim in the power games of the corporate world. Recommendations The following recommendations would facilitate in developing a comprehensive IM and email policy, which may also include the judicious use of other communication devices and services, in a manner that would not harm the interests of the organization. In-house training of the employees on the proper use of internet and email services. ‘To maximize the effect of the e-mail policy, the company must commit to educating its employees regarding the proper use of e-mail, and the risks inherent in e-mail use’ (Agin, MHT) Dissemination of information regarding the pros and cons of using the services at workplace to all its staff The email policy must incorporate the details of organization’s rights, vis-à-vis, the email correspondence of its employees at workplace, using official equipment and services that would facilitate better monitoring of internet and email usage by the employees and other staff through specialized software and tools. Organizational guidelines with regard to retention/removal of emails at regular period so as to promote better management of email storage at company’s website. Clear cut guidelines and policy regarding contents of the emails of the employees that not only forbid pornographic and indecent material and correspondence among the staff but the details must also include the materials that may breach the organizational ethics and code of conduct, adversely impacting its credibility and business interests. Implementation of strict enforcement measures that would deter misuse of such services, either intentionally or unintentionally. Filtering of contentious information on the internet is also necessary to guard against legal liability which may result from employees’ misuse of internet services in the workplace. Zuckerman (2010) has also found that online service providers filter information for services like social networking sites, blogs and websites which may contain offensive text or literature. Conclusion One can therefore conclude that it is imperative that organizations must develop comprehensive email policy because the internet and email services are increasingly become intrinsic part of organizational work culture. It is sad that some people in our world have found the Internet to be a useful tool for perpetrating crimes, conducting terrorism, and even waging war. This potential of misusing the Internet was thought of as a license that gives some governments and employers the right and need to monitor the e-mails, telephone calls and Internet access of their people. It is important that misuse of technology is prevented by organizations as well as by the vested interests like terrorists outfits. But us should ne realized that communication through electronic mail has made it easier to disseminate information among office staff of various branches, thereby, making it easy for the management to keep them informed regarding every aspects of organizational vision, mission and daily progress. It is also a fast and efficient tool of communication that leads to quality management. A well defined email policy would further improve the performance of the organization and its employees because its use at all levels of office hierarchy is crucial for the challenges and productive outcome of the visionary goals of the organization. (2588) Reference Agin, Warren E. Companies must spell out employees email policies. Mass High Tech newspaper (MHT). Available from: [Accessed 18 March, 2010]. Cleaver, Cathleen. (2006). The Internet: A Clear and Present Danger? Taken from The Prentice Hall Guide for College Writers, Brief, auth. Reid, Stephen P. Prentice Hall. CNN. (7 June, 2006). Employees get canned for emailing. Available from: [Accessed 18 March, 2010]. Cormick, John Mc. 1 Sept. 2004. ePolicy Institute survey: Companies are dropping the balls on email and IM. Available from: [Accessed 18 March, 2010]. EU Council. (2005). Convention on Cybercrime. Available from: [Accessed 18 March, 2010]. Flynn, N. (2009). The e-Policy Handbook - Rules and Best Practices to Safely Manage Your Company’s Email, Blogs, Social Networking and Other Electronic Communication Tools. AMACOM books. Halbert, T. and Inguilli, E. (2002) Cyberethics. Cincinnati: West Thomson Learning. Melber, Ari. (2007). About Facebook. Available: [Accessed 18 March, 2010]. Overly, M.R. (1999). E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect your Company and its Assets. NY: American Management Association (AMA). Raghuram, S. (1996).  Knowledge creation in the telework context.  International Journal of Technology Management, 11, 859-870. Rosenthal, Mike. (22 April, 2005). Companies get smart about securing corporate e-mail with policies, protocols. Austin Business Journal. Available from: [Accessed 18 March, 2010]. Zuckerman, E. (2010). Intermediary Censorship in Access Controlled, in: Deibert, R., Palfrey, J., Rohozinski, R. and Zittrain, J. (Eds.) The Shaping of Power, Rights and Rules in CyberSpace, The MIT Press, pp. 71-85. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(The Advent of the Internet - A Boon or a Bane Case Study, n.d.)
The Advent of the Internet - A Boon or a Bane Case Study. Retrieved from https://studentshare.org/business/1729692-applying-e-commerce-in-business
(The Advent of the Internet - A Boon or a Bane Case Study)
The Advent of the Internet - A Boon or a Bane Case Study. https://studentshare.org/business/1729692-applying-e-commerce-in-business.
“The Advent of the Internet - A Boon or a Bane Case Study”, n.d. https://studentshare.org/business/1729692-applying-e-commerce-in-business.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Advent of the Internet - A Boon or a Bane

2013 consuming fashion

The period around the late 70s and the early 80 witnessed a number of technological innovations key among which were in the sector of communication including the advent of the use of the internet.... The use of the internet and other advanced commination gadgets succeeded in making the world a global village.... By redefining the society, the internet and the associated communication development influenced people's understanding of cultures thus resulting in most people adopting new trends while abandon unfavorable behavior....
8 Pages (2000 words) Essay

The Impact of Internet on the International Marketing

The goal of this research paper is to investigate the impact of the emergence of the internet to the global business, and marketing in particular.... One of the obvious ones is the use of the internet in the process of international marketing.... Moreover, the use of the internet in global business is the place where information technology and economic value creation takes place and hence leads to a completely new form of economy.... (2003) believes that the internet lies at the heart of a business and is the global network of networks....
12 Pages (3000 words) Research Paper

A Brief Strategy for a Business Concept That Would Directly Compete With the Small Business

However, with the advent of technological aspect in the academic sector has changed the interest of the civilians in the United States of America (USA).... For instance, the business would provide a Wi-Fi facility that would allow customers to access the internet from their mobile, i-pad or other network aided equipment's.... nbsp; With the growing advent of advanced technological aspect within the present-day organizations and increased level of competitors herein, it has become essential for every organization to take an effective decision....
6 Pages (1500 words) Assignment

Main Causes of the Great Depression

UNIVERSITY NAME The Great Depression Research Paper 1) Which were the main causes of the Great Depression?... What created the Great Depression, the most noticeably awful financial misery in US history?... It wasn't just one component, rather a combo of local and worldwide conditions that expedited the Great Depression....
5 Pages (1250 words) Research Paper

Internet business and e commerce

Companies wishing to harness the power of the internet must be able to target their audience effectively while presenting an attractive, accessible and simple to use online “storefront” through which products can be market, advertised and sold.... What looked good and what looked bad?...
12 Pages (3000 words) Essay

Why Should you learn another language

Worldwide business are conducted in English, with the advent of outsourcing, bilingualism is used as a useful skill this makes the scope for employment much wider for those who speak English in foreign countries.... English is a West Germanic language that originated from the Anglo- Frisian dialects brought to Britain by Germanic invaders and settlers from Germany and Netherlands; it was first spoken in early medieval English....
4 Pages (1000 words) Essay

Desert Planet Arrakis

Spice is a drug whose many valuable characteristics include the introduction of a type of enhanced space-time perception in pilots of inter-planetary spacecraft (Herbert, Anderson and Herbert).... hellip; Chani is Paul's beloved Fremen concubine.... She is also a dedicated, caring mother and companion....
4 Pages (1000 words) Assignment

Effect of the Advent of the World Wide Web, the Internet on Business

From the paper "Effect of the advent of the World Wide Web, the Internet on Business" it is clear that Mullarkey recommends that a within-a-single-site study could use either site-centric or user-centric data whereas a between-site analysis would ideally user-centric data.... E-business is defined as “the conduct of business transactions and activities using in large part electronic means and typically involving use of the internet and the world-wide-web” (Clegg, Icasati-Johanson & Bennett, 2002, p....
8 Pages (2000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us