StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

My Cyber Identity-Blog - Essay Example

Cite this document
Summary
Information technology has changed the way people interact or exchange information, the way they communicate and they way they share photos and videos. Information technology has influenced the American culture; it has given the people a new platform, a new tool or a web based…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.4% of users find it useful
My Cyber Identity-Blog
Read Text Preview

Extract of sample "My Cyber Identity-Blog"

Download file to see previous pages

Edelson (2005) describes it in simple words as "just" a browser interface to web site publishing. Blogs are used by different sections of the society for different purposes. While the perceived benefits are many, so are the threats and risks to the society and its people. Mehan (2006) refers to the blogsphere world as colorful and varied as the animal world. There is an evolutionary struggle for supremacy amongst bloggers. A blog is ranked by the number of hits it receives and the number of outbound link that it has.

Mehan clarifies that there are all levels of bloggers – ranging from those that have entered the world of bloggers and up to the founding fathers. To some blogging is merely a hobby but for many blogging can translate into very big business. There are some who blog almost everyday and they are able to attract advertisers or even product endorsement offers. There are different sites that offer tools to assist in meaningful blogging. For instance, Site Meter offers a free, basic hit count and link log in exchange for posting a logo-link to their website.

And if this was not enough, there are software tools that boost the blog’s hit count. There is also an exchange program where people surf other blogs in exchange for others visiting their blogs. It is now a part of the elite culture followed by the upper middle class – to read blogs. This is evident from the fact that many corporations have their own blogs. The marketing departments benefit too from such blogs. Rauchway (2007) reports in The New Republic that blogging have helped to marginalize scholarly Internet discourse.

Blogging has helped a doctoral candidate Scott Eric Kaufman, to develop for himself a much higher profile. When he posted a chapter of his dissertation and sought advice, he received 66 commentaries from people of different disciplines. Blogging produces a truly better debate, opines another blogger but its practitioners do not

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“My Cyber Identity-Blog Essay Example | Topics and Well Written Essays - 1250 words”, n.d.)
My Cyber Identity-Blog Essay Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/miscellaneous/1548856-my-cyber-identity-blog
(My Cyber Identity-Blog Essay Example | Topics and Well Written Essays - 1250 Words)
My Cyber Identity-Blog Essay Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/miscellaneous/1548856-my-cyber-identity-blog.
“My Cyber Identity-Blog Essay Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/miscellaneous/1548856-my-cyber-identity-blog.
  • Cited: 0 times

CHECK THESE SAMPLES OF My Cyber Identity-Blog

Negative Impacts of Technology

Three negative aspects of technology discussed here are cyber bullying, identity theft and negative health impacts resulting from cell phone use.... The paper reveals that cyber bullying is one of the leading causes of suicide amongst young people given their higher access and use.... The victims of cyber bullying always have an underlying problem that is used by bullies to humiliate, ridicule and hurt....
28 Pages (7000 words) Essay

Trends in International Marketing

Peer Review Assessment May 19, 2012 International marketing involves several concepts.... The research centers on the Sony Corporation blog analysis.... The research centers on comparing and contrasting two blogs.... The Sony Corporation blogs indicate the implementation of a viable international marketing strategy....
6 Pages (1500 words) Assignment

Internet and criminal activity

Provide three (3) specific examples of how the Internet has aided criminal activity cyber crime: This is the activity, using the internet and computers to steal information or financial credits from business companies, banks or persons.... Billions of dollars are theft through cyber crime on the internet.... cyber-espionage is the example of the cyber crime, which is used to steal the personal information with commercial value....
3 Pages (750 words) Essay

BHS 411 – Issues of Terrorism Mod 4 SLP

It is called cyberattack or cyber terrorism, in which the primary tools are computers and the Internet, and the new battleground is called the cyber space.... This new trend of launching terrorist activities is advantageous for the terrorists since federal law enforcement agencies are having hard times in detecting cyber crimes committed by terrorists than that of the ordinary cyber criminals. Given the chance to be a cyber terrorist with a mission to launch a cyberattack against a US government agency, I will launch a cyberattack against the Federal Bureau of Investigation (FBI) which is the lead agency of providing intelligence and investigation reports to other government agencies of impending terrorist activities....
2 Pages (500 words) Essay

Ethical issues in social media

cyber criminals managed to develop a fake website that aped the original PayPal website.... This is because social media has the power to direct traffic into one's website, blog or social media pages.... This means that when promoting global products, social media allows… However, the more traffic there is in one's site, the higher the risks on the issue of privacy and this ends up ruining the organizations reputation....
2 Pages (500 words) Essay

Digital Identity Concept

This is because the current generation came alongside a number of technological advancements, whose main objective was to ease… Of all the inventions, one of the biggest was the introduction of the internet.... It was after the internet invention that websites came into existence, whereby through them communication was eased....
9 Pages (2250 words) Essay

Is Online Community Interaction Liberating or Oppressive

The paper "Is Online Community Interaction Liberating or Oppressive?... states that external blogs serve the purpose of strengthening external stakeholders of the business and keeping them up to date with the recent endeavors of the business.... A key aspect of a blog is that the style is informal....
8 Pages (2000 words) Coursework

Main Areas and Aspects of Cyber Safety

… The paper “cyber Safety, the Ways of cyber-Crimes, Consequences of Lack of cyber-Safety, Online Protection Tools” is an informative variant of an essay on information technology.... The paper “cyber Safety, the Ways of cyber-Crimes, Consequences of Lack of cyber-Safety, Online Protection Tools” is an informative variant of an essay on information technology.... cyber-safety is the responsible and safe utilization of the web/internet services as well as the entire communication and information technology devices, comprising digital cameras, mobile phones, and webcams....
10 Pages (2500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us