Information technology Essays

140 essay samples found

An Issue of Social Media and Cyber Crimes

OVERVIEW Social media refers to all applications and websites or blogs that enable people around the globe to interconnect and socialize via the internet, chat, video call & so on. The very first recognizable social media site called ‘SixDegrees’ was created in 1997. It allowed users to upload their profile picture and make friends with […]

Pages: 4 Words: 1222 Topics: Crime, Cyber Crime, Cyberspace, Information Technology, Social Media

Cyber Security Threats on the State Level

This paper examines two notable events of cyber warfare and security in our current age (the Stuxnet attack on centrifuges, and the Petya ransomware affecting citizens and governmental agencies), as well as examines how these attacks shape foreign and domestic policies and procedures. By examining the extent of the damage of these two attacks, I […]

Pages: 7 Words: 1988 Topics: Computer Security, Crime Prevention, Cyber Security, Cyberspace, Information Technology, National Security, Policy, Security
Having doubts about how to write your paper correctly?

Our editors will help you fix any mistakes and get an A+!

Order now

12 Internet Safety Tips for Parents

Unfortunately protecting your child online it is easy as it used to be. As a parent you must absolutely play a very active role in your child’s education when introducing them to the Internet, and more importantly and use it safely. Today one of the most perilous threats to your child’s online safety are online […]

Pages: 3 Words: 833 Topics: Communication, Cyberspace, Information Technology, Internet

Apple as the World’s Leader Manufacturer and Seller of Smart Phone

Apple was established in April 1976 by Steve Jobs, Steve Wozniak, and Ronald Wayne. It is an American multinational company headquartered in Cupertino, California. It designs, manufactures, and markets mobile devices, personal computers, and portable digital music devices. The company is widespread internationally in European countries, Greater China, Japan, South America, and Rest of Asia […]

Pages: 5 Words: 1538 Topics: Apple Inc, Cloud Computing, Computer engineering, Computers, Digital Technology, Information Technology, Steve Jobs

Network Threat Management System Using Blockchain

Abstract— The Expansion of the Internet has led to adding more and more devices into its pocket having a tremendous flow of traffic between devices which has led to more insecure portable and stationary devices. Successful distributed denial-of-service (DDoS) attacks are those striking web crashes that bring critical enterprise services to their knees. Making DDOS […]

Pages: 8 Words: 2343 Topics: Blockchain, Computer Networking, Computers, Information Technology

Exploiting Internet of Things and its Application in Healthcare Domain

Abstract Internet of Things (IoT) is a network of physical devices such as sensors, actuators, electronic device, software and actuators which allows data transmission and reception across these modules. Internet of things has made significant strides in consumer, enterprise and infrastructure spaces. It has penetrated in every well known market today. A few examples of […]

Pages: 10 Words: 3080 Topics: Disease, Information Technology, Internet Of Things

The Internet of Things: Wireless Network of Uniquely Identifiable Connected Devices

Problem: The Internet of Things (IoT) may be defined as a wired or wireless network of uniquely identifiable connected devices which can process data and communicate with each other. Reinfurt (2016) discussed many different types of IoT devices such as service gateways, device shadows, rule engine, device wake up, all of which have challenges and […]

Pages: 6 Words: 1937 Topics: Computer Networking, Computer Security, Information Technology, Internet, Internet Of Things

Security in Internet of Things

Abstract The Internet helped people to connect with static information available but now it’s helping to build connection from people to people, physical things. Now-A-Days Internet of Things(IOT) represents a diverse technology and usage with wide range of business opportunities and risks. IOT allows the data to be transferred from physical devices to the internet. […]

Pages: 7 Words: 2129 Topics: Computer Networking, Cyberspace, Digital Technology, Information Technology, Internet, Internet Of Things

The Real Issue Behind Cyber-Security

The steady trend towards digitalization has been occurring for a long time, and as of lately, a new type of crime market has risen alongside digitalization. In recent years, companies all over the world have been affected by some form of cybersecurity issue whether that be attacks to infrastructure or momentary paralyzation of the company […]

Pages: 4 Words: 1229 Topics: Computer Security, Crime Prevention, Cyber Security, Cyberspace, Information Technology, Policy

Cyber Security Threats in Healthcare

With cyber-attacks over the course of 2018 targeting one of the largest industries in the United States – the healthcare industry – it’s time to hone in on protecting patient and institutional information with a more focused approach to cyber-security. Compared to other industries, most healthcare organizations are underinvested in cybersecurity and spend roughly half […]

Pages: 5 Words: 1429 Topics: Cloud Computing, Computer Networking, Computer Security, Crime Prevention, Cyber Security, Cyberspace, Health Care, Information Technology

Cybersecurity for a Successful Acquisition Report

The act of conducting a policy gap analysis is crucial in determining any missing overlap or technical deficiencies when planning to join the IT architecture and network topologies of two or more companies. During the acquisition process, the policies of either party will be examined in order to confirm current software updates and patches, proper […]

Pages: 4 Words: 1270 Topics: Computer Security, Cyber Security, Information Technology

About Cybersecurity

I believe everything that is created by man can also be destroyed by it. Humans have proved to be the most intelligent species in this world. We have created the technology that appears to be smarter than the human brain but if it overpowers the human intelligence it can be destroyed as well. Internet works […]

Pages: 5 Words: 1550 Topics: Computer Networking, Computer Security, Cyber Security, Cyberspace, Information Technology, Internet

Impact of IBM PC and Apple

“In the 1980’s technology would begin its’ evolution into the twenty-first century of instant communication which would in return bring positive cultural benefits and infringements on national security. Until the 1980’s, a standard computer would cost 9 million dollars, require a quarter acre of air conditioned space, and 60 people to operate it. The IBM […]

Pages: 3 Words: 789 Topics: Apple Inc, Communication, Computers, Digital Technology, Information Technology, Internet, Security, Smartphone

Cyber Security for our Generation

Some of the biggest threats to ordinary people’s security often go unnoticed. Some of the biggest threats to our national security often go unnoticed. These threats often are not publicized, and no emphasis is given to them. These are some of the biggest threats that people face in our generation. The shocking part about these […]

Pages: 11 Words: 3209 Topics: Communication, Computer Security, Cyber Security, Cyberspace, Facebook, Information Technology, Internet, Security, Terrorism

The Effects of the Epidemic Childhood Obesity

Childhood obesity has become a growing epidemic in more than just the U.S. However, over the past three decades, childhood obesity rates have tripled in the U.S. and today, the country has some of the highest obesity rates in the world: One out of six children is obese, and one out of three children is […]

Pages: 8 Words: 2437 Topics: Childhood Obesity, Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet

Is there an Ethical Dilemma with Athletes being Paid to Go to College?

College athletes receive money from revenue streams created through scholarship money, but I guess we need to wonder is it enough for what they need. The NCAA has explicit rules that prevent players from accepting bribes or incentives to play different sports and any payment made to the players has been viewed as a moral […]

Pages: 8 Words: 2368 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, Should College Athletes Be Paid

An Opposition to Paying Student Athletes

Introduction Intercollegiate athletics have grown popular among Americans over the last few decades. It has caused an increase in revenue for the National Collegiate Athletic Association (NCAA). Despite the rise of revenue, the NCAA prohibits athletes playing sports on the collegiate level from receiving any compensation from sports agents, merchandizers, advertisements, agencies and other non-school […]

Pages: 8 Words: 2255 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, Should College Athletes Be Paid

Treatment for down Syndrome

Abstract As stated by the Centers for Disease Control and Prevention, roughly one in every 700 infants in the United States are born with Down Syndrome. This condition continues to be the most common chromosomal disorder. Each year, about 6,000 babies are born with Down Syndrome. In most cases Down Syndrome occurs when an individual […]

Pages: 6 Words: 1722 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Down Syndrome, Information Technology, Internet

The Stress of Life

Introduction We spend much of the beginning of our life in school, whether we go to a public, private or homeschool, for most of us what we learn and experience during our time in school is meant to help us for when we go out into the big wide world. But during those last few […]

Pages: 6 Words: 1798 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, Stress

Martin Luther King, Jr: a True Servant Leader

Servant Leadership is a key component in the world today. We had the opportunity to read Greenleaf’s The Servant as Leader. Throughout this book a servant leader is described as being a servant first, then a leader. There are several servant leaders in our world, but the first individual that came to mind was Martin […]

Pages: 5 Words: 1464 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, Martin Luther King

Cybercrimes: an Unprecedented Threat to the Society

What is a Cybercrime? Cybercrime, or computer-oriented crime, is the crime that involves computer and its network. The computer may have been used in the commission of a crime, or it may be the target. Cybercrimes can be defined as: “Offences that are committed against individuals or groups of individuals with a criminal motive to […]

Pages: 7 Words: 2184 Topics: Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Information Technology

Substance Abuse Related to Depression

Depression is a mental health disorder that affects the mental state wellbeing of a person. It is a mental illness very commonly found in an adult age groups. Whereas, excessive use or depending on addictive substances such as alcohol and drugs refers to Substance abuse (web). The statistics of people diagnosed with depression and substance […]

Pages: 6 Words: 1684 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, Substance Abuse

Type II Diabetes in Children

In the last 50 years the prevalence of childhood obesity has risen at an alarming rate, and with it Type 2 Diabetes (T2D). T2D was once considered an adult disease until more recently when children began developing the disease worldwide. With T2D children are more at risk for other chronic health problems and diseases. Children […]

Pages: 5 Words: 1510 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Diabetes, Digital Technology, Information Technology, Internet

Research on Self-driving Cars

I am doing my research on self-driving cars. A self-driving is basically just a car that drives itself. It is a car or truck in which human drivers are never required to take control to safely operate the vehicle. Also known as autonomous or “”driverless”” cars, they combine sensors and software to control, navigate, and […]

Pages: 1 Words: 433 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, Self Driving Cars

Aristotle Quiz

According to Aristotle, while the house changing from non-being to being was discrete, the change in the quality of its elements was continuous and spanned a period of time. Aristotle argues that a change from being to non-being and vice versa, referred to simply as a change, is different from a change in the quality […]

Pages: 1 Words: 409 Topics: Aristotle, Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet

The Declaration of Independence: a History Moment

The Declaration of Independence has been justly celebrated since it was written and distributed on July 4, 1776. It is without question the most important short document in United States’ history. Yet one who reads it today cannot fail to be struck by a series of inconsistencies and even departures from morality. This paper will […]

Pages: 5 Words: 1533 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Declaration Of Independence, Digital Technology, Information Technology, Internet

America should not End Birthright Citizenship

“In the United States, birthright citizenship refers to the right of any person to acquire nationality as long as the person has been born within the territory of the state. This has become a major topic in America and the question revolves around what to do with the illegal immigrants who are already living in […]

Pages: 5 Words: 1589 Topics: Citizenship, Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet

Citizenship Clause

“Birthright citizenship, which grants citizenship to anyone born in the United States, regardless of whether the individual’s parents are citizens, is a frequent topic of debate. Is the practice legal and what are the pros and cons of awarding citizenship this way? The 14th amendment to the Constitution was ratified on July 9, 1868, and […]

Pages: 8 Words: 2307 Topics: Citizenship, Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet

Events Experienced by Odysseus

The Odyssey is a well-known poem written by a Greek writer Homer and is considered as one of the most ancient masterpieces of literature. The story of the poem takes place when Odysseus, the brave and strategic warrior fought in the Trojan War in Troy for ten years in Ancient Greece. While away, Odysseus faced […]

Pages: 7 Words: 2017 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, Odyssey

About the Odyssey by Homer

The Odyssey by Homer, an old epic written masterpiece, that depicts several themes and surprises we as readers encountered while reading it. Few major themes that will be discussed would be first off, the role of females in the odyssey and then proceed with other aspects of the book, among are power, revenge, family, how […]

Pages: 7 Words: 2019 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, Odyssey
1 2 3 5