Is Their Craze on the Internet?

10.28945/2372 ◽  
2001 ◽  
Author(s):  
Thomas Benesch

For a long time researchers have been considered the question of the use of Internet for its users. In this study we do not want to execute a collection over companies or an entire state, but to limit us to a user group, the students of the Graz University of Technology.From the total extent of the students with a valid e-mail address a representative sample survey has been carried out. To those students a message, which refers to the questionnaire, was sent by means of e-mail. The questionnaire is available electronically at the WWW. The results of this study give us a view, how strong electronic services determined and as which medium it is used.

Author(s):  
Edwin I. Achugbue

The chapter focuses on the history of the internet system of e-mail; e-mail security; threat to e-mail security, usefulness of e-mail address and country codes, how e-mails can be secured by the individual and electronic mail policy. The future of e-mail security is also described.


2013 ◽  
Vol 2013 ◽  
pp. 1-11 ◽  
Author(s):  
Ying-Chiang Cho ◽  
Jen-Yi Pan

Over the years, human dependence on the Internet has increased dramatically. A large amount of information is placed on the Internet and retrieved from it daily, which makes web security in terms of online information a major concern. In recent years, the most problematic issues in web security have been e-mail address leakage and SQL injection attacks. There are many possible causes of information leakage, such as inadequate precautions during the programming process, which lead to the leakage of e-mail addresses entered online or insufficient protection of database information, a loophole that enables malicious users to steal online content. In this paper, we implement a crawler mining system that is equipped with SQL injection vulnerability detection, by means of an algorithm developed for the web crawler. In addition, we analyze portal sites of the governments of various countries or regions in order to investigate the information leaking status of each site. Subsequently, we analyze the database structure and content of each site, using the data collected. Thus, we make use of practical verification in order to focus on information security and privacy through black-box testing.


Author(s):  
Stephanie Austria

 Spoofing is one of the newest forms of cyber-attack, a technological methodology adapted to mask the identity of spammers who have faced hostile reaction in response to bulk, unsolicited, electronic mail messages.[1] Sending Spam, however, is no longer the only reason for deception, as crackers have taken pleasure in the challenge of manipulating computer systems and, additionally, find recreational enjoyment in doing so. In this legal Note, the author’s intent is to show that criminal, rather than civil liability is the best way to effectively deter and punish the spoofer. The injury that results when a computer system’s technological safety measures fail to adequately safeguard the system affects not only the owner of the hijacked e-mail address, but also the Internet Service Provider, and the Network as a whole. Current Anti-Spam Legislation is arguably ineffective at targeting these particular types of malicious attacks, and a different legal approach is suggested.


2016 ◽  
Vol 17 (1) ◽  
pp. 53-81 ◽  
Author(s):  
Elspeth Healey ◽  
Melissa Nykanen

Introduction In 2015, the Rare Books and Manuscripts Section (RBMS) surveyed its membership for the first time in 18 years.1 At roughly the span of a generation, 18 years is a long time in the rapidly changing world of libraries. Consider, for example, that in 1997 J.K. Rowling had just released the first Harry Potter novel, Google was a year away from being founded, and fewer than half of the respondents to the first RBMS Membership Survey had access to e-mail and the Internet at home. New landscapes call for new data, and the 2015 RBMS Membership Survey answers that . . .


Author(s):  
Jerry Pournelle

If you’ve used e-mail for any time at all, you’ve no doubt had your inbox deluged with messages pitching aphrodisiacs, mortgages, junk stocks, pornography, and substances that claim to help you lose weight in your sleep. But don’t despair. Such messages don’t have to be part of the Internet experience. You can avoid them, or certainly reduce the annoyance level, with a few simple measures. Some spammers harvest e-mail addresses from the Internet by using a “spider” (also known as a robot or crawler)—a computer program that creeps through the World Wide Web collecting information you’d prefer to keep private. So the better you are at hiding your address from faceless prowlers, the less spam you will receive. 1. If your Internet Service Provider gives you the choice, create a long, fairly complicated address preceding the @; don’t just use your first name: [email protected] is better than [email protected]. Better still is donquixotedelamancha@example. com. It may be unwieldy, but your friends can always use a nickname—or just click on your address. Happily, longer addresses confuse spammers, who—without having exact user accounts in hand—use a “dictionary attack” to find them, testing the validity of every possible address from lists of common words and names: [email protected], [email protected], and so forth. 2. Again, unless some online service makes it mandatory, don’t use your e-mail address as part of a login name or identity. However convenient that might make it when logging in to eBay, it’s equally convenient for spammers. 3. Use a second, public address for nonpersonal mail and for public posting. Create a free account with Hotmail, Yahoo, or Excite, or set up another screen name if you use either AOL or another Internet Service Provider that allows you to have multiple addresses. This keeps your main address private and exposes only your public address to spammers. Check the public account at least occasionally, in case something innocent has come in. Then massively delete the rest. It’s important to learn how your e-mail client (the program you use to send and receive e-mail) handles thorough deleting; in Outlook Express, for example, you have to delete an e-mail you don’t want from your inbox, delete it from the “Deleted” folder, and then compact folders before you are genuinely rid of it.


Author(s):  
Pruthikrai Mahatanankoon

The management of Internet usage in the workplace is becoming one of most important productivity concerns of the modern workplaces. Through proper use of Internet technology, organizations reap the benefits of efficient communication and information sharing among employees, managers, and organizations’ customers. The Internet is an essential necessity, as global business expansion requires networked organizations that can understand and predict future market trends, analyze competitors’ movements, and identify vital environmental factors that could be affecting their competitive position. For this reason the Internet has provided many added benefits for organizations, and modern workplaces have equipped their employees with access to the Internet and provided individual e-mail accounts.


2001 ◽  
Vol 25 (10) ◽  
pp. 395-396
Author(s):  
Trevor Hicks ◽  
Martin Briscoe

Journals on-lineThe British Journal of Psychiatry (BJP), Psychiatric Bulletin and Advances in Psychiatric Treatment have been available at www.rcpsych.org since May 2000 (Fig. 1). During the initial free trial period all users of the internet had access to the full content of these journals on-line. This period ended on 31 January 2001. Access to full text is now limited to subscribers only; but access to electronic tables of contents (eTOCs), abstracts and the ability to search full text will continue to be available. Individuals or institutions who subscribe to BJP in print or are Members of the College are now able to activate an on-line subscription and select a username and password by entering a subscriber number. The eTOC service allows anyone who registers his or her e-mail address to be notified via e-mail when new content goes on-line. Users may choose to receive any or all of the following: notification that a new issue of BJP is on-line; a complete eTOC for new issues; and special announcements from the College.


2018 ◽  
Author(s):  
András Fittler ◽  
Róbert György Vida ◽  
Mátyás Káplár ◽  
Lajos Botz

BACKGROUND During the past two decades, the internet has become an accepted way to purchase products and services. Buying medications online are no exception. Besides its benefits, several patient safety risks are linked to the purchase of medicines outside the traditional supply chain. Although thousands of internet pharmacies are accessible on the web, the actual size of the market is unknown. Currently, there is limited data available on the use of internet pharmacies, the number, and attitude of people obtaining medications and other health products from the internet. OBJECTIVE This study aims to gather information on the frequency and attitudes of patients purchasing medications online in a nationally representative sample of outpatients. Attitudes towards main supply chain channels, perceived benefits, and disadvantages of influencing online medication purchase are evaluated. METHODS A cross-sectional explorative study using a personally administered survey was conducted in a representative sample of Hungarian outpatients in 2018. RESULTS A total of 1055 outpatients completed the survey (response rate 77.23%). The mean age was 45 years, and 456 (43.22%) reported having chronic health conditions. The majority (872/1055, 82.65%) of the respondents were aware that medications could be obtained online, but only 44 (4.17%) used the internet for previous medication purchases. Attitudes towards the different pharmaceutical supply chain retail channels showed significant differences (P<.001), respondents accepted retail pharmacy units as the most appropriate source of medications while rejected internet pharmacies. Respondents were asked to evaluate 9 statements regarding the potential benefits and disadvantages about the online medicine purchase, and based on the computed relative attitude rate there is a weak still significant tendency toward rejection (P<.001). Correspondence of demographic factors, internet usage behavior, and prospective online drug purchase attitude was evaluated. Respondents who use the internet more and purchase goods online will be more likely to buy medications online. Furthermore, youth and education will determine the medication purchase behavior. CONCLUSIONS Many patients will purchase medications on the internet in the future. Currently, there is an increased risk of patients buying products from illegal sites because these dominate the global online pharmacy market. Consequently, improved patient-provider communication and promotion campaigns are needed to inform the public about the safe use of internet pharmacies, as these initiatives can directly prevent patient safety threats.


2018 ◽  
Vol 8 (3) ◽  
pp. 88-93
Author(s):  
B. Manjunatha ◽  
B. T. Sampath Kumar

The present paper focuses on the use of Internet, experience in the use of Internet and use of various Internet applications by students and faculty members of Dental Sciences. The study found that majority (98.69%) of the respondents used Internet. The Internet is mainly used for e-mail (60.26%), teaching (43.02%), to know the trends in subject and also for doing research. Majority of respondents (59.6%) felt that Internet is more useful. 31.12% of respondents learnt the Internet with the help of friends/colleagues followed by trial and error (23.84%).


Author(s):  
Nestor J. Zaluzec

The Information SuperHighway, Email, The Internet, FTP, BBS, Modems, : all buzz words which are becoming more and more routine in our daily life. Confusing terminology? Hopefully it won't be in a few minutes, all you need is to have a handle on a few basic concepts and terms and you will be on-line with the rest of the "telecommunication experts". These terms all refer to some type or aspect of tools associated with a range of computer-based communication software and hardware. They are in fact far less complex than the instruments we use on a day to day basis as microscopist's and microanalyst's. The key is for each of us to know what each is and how to make use of the wealth of information which they can make available to us for the asking. Basically all of these items relate to mechanisms and protocols by which we as scientists can easily exchange information rapidly and efficiently to colleagues in the office down the hall, or half-way around the world using computers and various communications media. The purpose of this tutorial/paper is to outline and demonstrate the basic ideas of some of the major information systems available to all of us today. For the sake of simplicity we will break this presentation down into two distinct (but as we shall see later connected) areas: telecommunications over conventional phone lines, and telecommunications by computer networks. Live tutorial/demonstrations of both procedures will be presented in the Computer Workshop/Software Exchange during the course of the meeting.


Sign in / Sign up

Export Citation Format

Share Document