The domain name of your website needs to be catchy and descriptive of the content that one would find by visiting. It needs to be memorable and easy to type by even the most novice of Internet users. Although you might have the perfect name for your site in mind, there are several ways that i...
- Thursday, 14 July 2016 03:08
- By Jasper Solander
Is the Net inherently unethical, or does it simply make it too easy for users to act immorally? Either way, tech too often brings out the worst in even the best of us. Some people see the Internet as a mirror held up to our culture. If it is, the mirror shows us in an unflattering light. From newsro...
- Wednesday, 22 June 2016 03:30
- By Jason bourne
1. “Today's revolution in social communications involves a fundamental reshaping of the elements by which people comprehend the world about them, and verify and express what they comprehend. The constant availability of images and ideas, and their rapid transmission even from continent to continen...
- Tuesday, 21 June 2016 05:00
- By Barbara Larson
Technology has become so deeply rooted in business, non-IT managers can't afford not to learn about IT basics. These 10 fundamental IT topics and practices need to be on every business manager's list for developing their tech skills and knowledge. 1: How to define a business case for a new applicati...
- Thursday, 09 June 2016 05:37
- By Jason bourne
Okay, so maybe that’s a little extreme – a murderer is likely either sitting in prison, or doing everything in his or her power to avoid being found. So, in a world where virtually everything can be found online, and once something’s posted it never really goes away, people rely on online repu...
- Thursday, 09 June 2016 03:26
- By James Gill
Ever signed up for something online and then found it very difficult to unsubscribe? Then you've been to a roach motel - one of many web design tricks employed by some firms to drum up more trade. Microsoft provoked outrage recently when it was revealed that closing a pop-up box reminding Windows us...
- Wednesday, 08 June 2016 01:49
- By Wushe Zhiyang
How many times have you hit that publish button, not 100% sure about your content and if it’s really worthwhile? A feeling that becomes more definite as weeks pass and you get fed up with waiting for your post to pick up traffic and results? Whatever the case, there are things you should be doing ...
- Saturday, 21 May 2016 03:37
- By Bridget Miller
What are CISO’s (Chief Information Security Officers) worrying about in 2016? According to the recent 2016 Security Pressures report from Trustwave, theft of information from a successful breach or cyber-attack ranks as the top worrying outcome for nearly two-thirds of respondents. With the Identi...
- Friday, 20 May 2016 17:52
- By Corey Parker
I’ve got some good news and some bad news. The good news is that presidential candidates are starting to talk about Internet issues. The bad news is that presidential candidates are starting to talk about Internet issues. Since the 2012 election, the Internet has emerged as a widely discussed poli...
- Friday, 20 May 2016 06:12
- By Joshua Simon
The use of Internet to aid research practice has become more popular in the recent years. In fact, some believe that Internet surveying and electronic data collection may revolutionize many disciplines by allowing for easier data collection, larger samples, and therefore more representative data. Ho...
- Thursday, 19 May 2016 10:12
- By Clara Johnson
Indexed discovery services are a lot like Google: you can search simply and get results quickly, but the sources you are rocky-trailsearching tend to be mysterious. Do you know if you are searching specialized sources or generic sources? Authoritative or with an agenda? When a researcher pushes the ...
- Wednesday, 18 May 2016 04:09
- By Jay Harris
You might look at the internet in private, but anything you share can quickly become very public. Knowing these five types of internet abuse—which have been used by cyberbullies to embarrass, exploit and harass others—as well as strategies for protecting yourself against them, can help you avoid...
- Friday, 13 May 2016 01:26
- By Logan Hochstetler
Internet Regulations refers to limiting user’s access to information on the internet. This control on internet information is a highly deliberated topic, and the possibility of internet regulations resulting in internet neutrality has been greatly debated around the world. Forms of Internet regula...
- Thursday, 02 July 2015 02:28
- By Patrick Moore
A billion dollars, 100 banks, 30 countries. This is what a multinational gang of cyber criminals managed to steal before they were discovered. This is an example of a successful bank heist conducted through computer networks, otherwise known as a cyber crime. Any crime committed against an individua...
- Wednesday, 01 July 2015 03:29
- By Patrick Moore
Netiquette vs Internet Ethics Every society has an etiquette code that governs acceptable behavior. The behavior that is considered courteous and polite in society is the cornerstone of etiquette. Though it is a new idea, ‘netiquette' is very similar to etiquettes. In the same way that ‘etiquett...
- Tuesday, 30 June 2015 11:06
- By Barbara Larson
Should Internet companies be ruled by law or ethics? “The law sets the floor,” Brad Smith, the CEO of Intuit (INTU, -1.35%), said during a panel on the Ethics of the Internet Society at Fortune’s Brainstorm Tech conference. “But you still have to have judgment.” Smith said t...
- Monday, 08 June 2015 12:02
- By Mercedes J. Steinman
Note: After reading this editorial, please visit the transcript of the discussion forum to view readers' comments. Mrs. Wohfiehl was the type of teacher other teachers sought to emulate. She was intelligent, hardworking, and innovative, and she loved to teach. She frequently used Internet search eng...
- Saturday, 06 June 2015 06:33
- By Jennifer Levin
Our Ethics Code distinguishes between our professional and our private lives. The code's second paragraph in the "Introduction and Applicability" section states, "This Ethics Code applies only to psychologists' activities that are part of their scientific, educational, or professional roles as psych...
- Monday, 27 October 2014 01:59
- By Jeremy Frink