Verified Document

Computers And Work -- And Term Paper

" (Wahlgren, 2004) Telecommuting, conversely, can cause the opposite problem -- isolating employees from the input of other individuals, and also the system of rewards that comes from having a manager praise -- or critique one's performance in a personal basis, rather than through emails or online correspondence. The Internet seems to act to decrease social connections on the whole. "13% of heavy Internet users reported spending less time attending events outside the house and 65% of the heavy Internet users reported spending less time watching television." (Nielson, 2004) Thus, the computer revolution is here to stay, but not all of its effects may be salutary in terms of personal life or workplace productivity. Works Cited

Brain, Marshall....

(2004) "How Computer Viruses Work: What's a Virus" How Stuff Works. Retrieved on 27 October 2004. http://c1.zedo.com/jsc/c1/ff2.html?n=162;c=9/1;s=8;d=16;w=720;h=300;t=UndertoneNetworks.com
Brain, Marshall. (2004) "How Computer Viruses Work: What's a Worm" How Stuff Works. Retrieved on 27 October 2004. http://c1.zedo.com/jsc/c1/ff2.html?n=162;c=9/1;s=8;d=16;w=720;h=300;t=UndertoneNetworks.com

Nielson, Jacob. (2000) Does the Internet Make us Lonely?" Alert Box. Retrieved on 27 October 2004. http://www.useit.com/alertbox/20000220.html

Wahlgren, Eric. (February 12, 2004) "Looking for e-love -- at work" Business Week Online. Retrieved on 27 October 2004 http://www.businessweek.com/bwdaily/dnflash/feb2004/nf20040212_7051_db040.htm

Sources used in this document:
Works Cited

Brain, Marshall. (2004) "How Computer Viruses Work: What's a Virus" How Stuff Works. Retrieved on 27 October 2004. http://c1.zedo.com/jsc/c1/ff2.html?n=162;c=9/1;s=8;d=16;w=720;h=300;t=UndertoneNetworks.com

Brain, Marshall. (2004) "How Computer Viruses Work: What's a Worm" How Stuff Works. Retrieved on 27 October 2004. http://c1.zedo.com/jsc/c1/ff2.html?n=162;c=9/1;s=8;d=16;w=720;h=300;t=UndertoneNetworks.com

Nielson, Jacob. (2000) Does the Internet Make us Lonely?" Alert Box. Retrieved on 27 October 2004. http://www.useit.com/alertbox/20000220.html

Wahlgren, Eric. (February 12, 2004) "Looking for e-love -- at work" Business Week Online. Retrieved on 27 October 2004 http://www.businessweek.com/bwdaily/dnflash/feb2004/nf20040212_7051_db040.htm
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Viruses: A Quantitative Analysis
Words: 2542 Length: 10 Document Type: Term Paper

This report will hopefully pull together the research available with regard to this issue, and also identify what users are most at risk for virus attacks. The research currently available also confirms that modern viruses are becoming more insidious and complex, with the potential to incur more damage to computers and data than in the past. Studies suggest that newer versions of viruses may escape detection using standard anti-viral software.

Computer Virus Is Among the Greatest Enemy
Words: 2494 Length: 9 Document Type: Term Paper

computer virus is among the greatest enemy of computer technology's globalization. In just a few split of seconds, it can turn our endeavor of automating our diverse activities into a nightmare. This is especially a catastrophe to businesses whose operation at a large percentage depends on computerized data access and retrieval. Globally, computerization is the trend among businesses. Thus, the damage that computer viruses can cause is a global

Computer Hacker Nefarious Notions III
Words: 9646 Length: 35 Document Type: Term Paper

(Hackers Chronology, 2006). 1989 The first case of cyber espionage is recognized in Germany (west). This reportedly involved the CHAOS computer club. "Mentor releases the hacker manifesto Conscience of a hacker, which ends with the intriguing line: 'You may stop the individual, but you can't stop us all.'" (Hackers Chronology, 2006). 1990 Electronic Frontier, Freedom on the Internet advocacy group, is launched Polymorphic viruses (which modifies themselves when they spread), along with other sophisticated kinds of

Computer Crime Can Be Classified
Words: 1216 Length: 4 Document Type: Term Paper

Phishing is another criminal technique used to cull bank account or credit card information. Lovet (2007) describes how simple and potentially lucrative phishing can be: "the total costs for sending out 100,000 phishing emails can be as little as $60. This kind of 'phishing trip' will uncover at least 20 bank accounts of varying cash balances, giving a 'market value' of $200 - $2,000 in e-gold." Most incidents of

Computer Terrorism According to Weimann,
Words: 562 Length: 2 Document Type: Term Paper

Hacking, the apolitical counterpart of hacktivism, is also not necessarily a form of terrorism. However, cyberterrorists often use hacking as a tool of terrorism. Terrorists may be tempted to use computer attacks for several reasons including the following. First, cyberterrorism can be relatively inexpensive. Second, terrorists can easily remain anonymous when they use computer terrorism. Third, the scope of the attack can potentially be larger than physically combative ones. Fourth,

Computer Crime As It Differs
Words: 630 Length: 2 Document Type: Term Paper

These attacks result in billions of dollars in damage to the United States and other global economies. Although technology is becoming more secure, cybercrime has increased as Internet use has risen. In fact, according to the Computer Emergency Response Team (CERT) Coordination Center at Carnegie Mellon University, the number of cybersecurity incidents more than doubled to nearly 53,000 last year. In the first three months of 2002 alone, CERT counted

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now