• ENVIRONMENT
  • FOREIGN AFFAIRS
  • REAL ESTATE
  • WHAT’S ON
  • LATEST NEWS
  • GREEK EDITION

ic_k_home

The Internet is a double-edged sword

Every great technological leap is a double-edged sword that brings positive and negative changes to society. In other words, what goes for fire also goes for the Internet. The Internet is a powerful tool of communication and education, especially for the young, but it can have undesirable side effects. It can get some children hooked. This by-product of the great technological revolution must be dealt with by raising awareness of the problem among the young. Classes on preventing such adverse effects should be taught within the context of IT classes in schools. Addiction and the criminal rings that take advantage of young people suffering from it should top the agenda. And the only way to deal with the problem is through education in schools.

Subscribe to our Newsletters

Enter your information below to receive our weekly newsletters with the latest insights, opinion pieces and current events straight to your inbox.

essay about the internet is a double edged weapon

January 16, 1958

Historic building now derelict, amateurish reaction, expansionist agenda.

MHT

24/7 writing help on your phone

To install StudyMoose App tap and then “Add to Home Screen”

Technology as a double-edged weapon

Save to my list

Remove from my list

Dr. Karlyna PhD

Technology as a double-edged weapon. (2017, Jan 27). Retrieved from https://studymoose.com/technology-as-a-double-edged-weapon-essay

"Technology as a double-edged weapon." StudyMoose , 27 Jan 2017, https://studymoose.com/technology-as-a-double-edged-weapon-essay

StudyMoose. (2017). Technology as a double-edged weapon . [Online]. Available at: https://studymoose.com/technology-as-a-double-edged-weapon-essay [Accessed: 23 Aug. 2024]

"Technology as a double-edged weapon." StudyMoose, Jan 27, 2017. Accessed August 23, 2024. https://studymoose.com/technology-as-a-double-edged-weapon-essay

"Technology as a double-edged weapon," StudyMoose , 27-Jan-2017. [Online]. Available: https://studymoose.com/technology-as-a-double-edged-weapon-essay. [Accessed: 23-Aug-2024]

StudyMoose. (2017). Technology as a double-edged weapon . [Online]. Available at: https://studymoose.com/technology-as-a-double-edged-weapon-essay [Accessed: 23-Aug-2024]

  • A Double Edged Sword Cuts Both Ways Pages: 5 (1341 words)
  • Unionization: A Double-Edged Sword? Pages: 2 (555 words)
  • The Double-Edged Sword of Modern Inventions Pages: 2 (355 words)
  • Tourism's Double-Edged Sword: The Hidden Toll of Sex Tourism Pages: 4 (1115 words)
  • Ethnocentrism: A Double-Edged Sword in Society Pages: 3 (735 words)
  • A Double-Edged Sword in Modern Education Pages: 11 (3147 words)
  • Television: A Double-Edged Sword Shaping Society and Culture Pages: 3 (842 words)
  • The Nazi Police State: A Double-Edged Sword of Order and Fear Pages: 4 (1185 words)
  • Navigating College Ragging: A Double-Edged Tradition Pages: 2 (581 words)
  • Globalization: A Double-Edged Sword Pages: 2 (499 words)

Technology as a double-edged weapon essay

👋 Hi! I’m your smart assistant Amy!

Don’t know where to start? Type your requirements and I’ll connect you to an academic expert within 3 minutes.

Researching the sharp edges of the Internet's double-edged sword

essay about the internet is a double edged weapon

Editor, writer and strategist

Social media and an open Internet are seen by activists around the globe as tools for democracy, empowering disenfranchised communities, and social change. But in countries across Asia, Africa and Eastern Europe, the power of digital communications can be a double-edged sword.

Technology as a force for repression (not just change) is a primary subject of Katy Pearce’s research. Pearce is an assistant professor in the Department of Communication at the University of Washington. Her research covers social and political uses of technologies and digital content in non-democratic contexts, specifically in the semi- and fully-authoritarian states of the former Soviet Union.

On Thursday, June 5th, Katy Pearce is speaking at Personal Democracy Forum  (PDF) about a double-edged sword: the use of social media to suppress activism in Azerbaijan (a nation in which she focuses her research) and other parts of the world. She is also participating in the From Memes to Movements panel.

We caught up with Katy to find more about her work, what she’s speaking about at PDF and its implications for campaigners and international social change groups.

Give our readers a quick taste of your research and what you’ll be talking about at Personal Democracy Forum.

Being a dictator today is harder than it used to be. You have to be more subtle. You don’t, for instance, barge in and shut down Radio Free Europe, you audit its books. Today’s authoritarian (or authoritarian minded) government relies on subtle bureaucratic ways to limit people. An accessible Internet open up all sorts of subtle routes to suppression.

You’re speaking at PDF as part of a segment titled “The Internet’s Double Edged Sword.” Can you say more about how you see that double edge operating?

In the course of our research, I and others in this field like Zeynep Tufekci and Emily Parker see first-hand how governments use the Internet. All the powers that make the Internet and social media good for action are same things that make it powerful for authoritarian regimes.

The Azerbaijani regime, for example, has taken tech and social media and is using it against dissent — it’s using technology to suppress people in very creative ways. Activists in the West use memes effectively online. The government in Azerbaijan is using memes in a similar way to raise public pressure against dissent.

It’s great that people can use social media tools to organize others but governments can also use the same tools as a way of intelligence gathering. Governments are really winning a lot.

Those of us studying this end up having to fight against the cyber utopians as far as the potential of the Internet to be a large causal factor in social movements and collective action.

How might a more restrictive digital communications/Internet play role in organizing for sustainable change or movement building?

That depends on what we mean by “sustainable?” Is Azerbaijan doing short term change well online? No. But there could be big long term changes that are harder to measure.

Preference revelation is an example of what social media enables in a country like Azerbaijan. Recently, a man came out publicly as gay (Azerbaijan has a strong anti-homosexual culture, it’s believed). This individual committed suicide after coming out and left a note behind online that others could read and share.

A surprising number of people responded online supporting this man . Social media gives people a place to see and share opinions they didn’t realize others had. I imagine that these sorts of experiences are exposing more Azerbaijanis to societal norms. Core values are barriers to change. It’s a “little a” authoritarian society. Authoritarianism is a cultural value that leads to BIG A authoritarianism. Facebook exposes people to new information and new ways of sharing information and opinions. Over time this can be powerful.

On your website you describe work on “context collapse.” Can you describe/explain context collapse and what it’s implications might be for organizing communications?

Context collapse is something that we all experience. Your childhood friend makes a joke about 4th grade on Facebook and all your current coworkers see it. Without social media the networks in our lives don’t come together. People react to that in different ways: some people don’t get on social media; some don’t post anything controversial; some use privacy settings.

Context collapse gives activists and dissidents a lot to think about when writing about work. You might have a large online following as an anti-government activist but meanwhile you’re talking to an embassy and you don’t want followers to know.

I suspect that activists in authoritarian environments that are using social media in their work are taking different kinds of strategies than you or I would. This summer, we’ll be interviewing Azerbaijanis about the strategies people take.

If all organizing (not just awareness building) relies on insecure digital communications then can we organize at all?

In Azerbaijan, people go to jail for things they READ on the Internet each week. Kids there went to jail for doing the Harlem Shake and being members of a Facebook group.

People don’t really organize in Azerbaijan. 2013 saw the biggest protest since 2006. A lot of people were swiftly arrested.

But there are other forms of organizing. In Azerbaijan there was a “ 5 cent campaign ” to raise money for people arrested in these protests. Later, a law against online fundraising was passed in Parliament. Even when we look at people getting around things, the law can change quickly. There are laws about what news sites can look like – how wide the margins must be and so on. People can use technology to do great things but in many places the government makes information sharing very hard.

Tell us about humor as a form of dissent – it’s something you’ve been examining.

Humor can be tool of dissent. It’s salient and viral. The Internet gives us a culture of memes, jokes, and funny videos. Humor is a big part of activist work. I’ve been looking at how governments and others are using humor/memes as a way to suppress. They’re anonymous, cheap and spread easily. Everything good about humor and memes in activism can also be bad if used the right way.

Is this “double edged sword” visible in the West?

In Turkey, the Mayor of Istanbul is very active in this sort of method. In Russia, pro-government youth groups are active. Of course, it’s harder to tie this behavior to them because it’s a more open environment.

My takeaway is that all the good of tech can be flipped back at us. We love free speech but that also means people we don’t agree with. Internet is a great resource for hate groups, too. Be aware that internet can be used in different.

Stay Connected

  • @katypearce

Categories:

Stories you may also like...

Social media activism in repressive environments.

Activists and organisers in the global south talk campaigning under repressive regimes and using about social media and offline networks together.

by Phil Wilmot

essay about the internet is a double edged weapon

Stay safe out there: Threat modeling for campaigners

A campaigner's guide to threat modeling will help you evaluate online and operational security risks so you know what to worry about and how to prepare.

by Jason Tashea

essay about the internet is a double edged weapon

How to push back against online intimidation

Interview with Allyson Kapin about findings of 2014 research into online intimidation by Rad Campaign, Lincoln Park Strategies and Craig Newmark of craigconnects.

by Ted Fickes

A Student Publication of Mt. San Antonio College in Walnut, CA

  • Arts & Entertainment
  • College Life

The Internet is a Double-Edged Sword

Beware of the spread of misinformation

Natalia Chairez | November 16, 2021

Adobe Stock Image

Adobe Stock Image

Society has never failed to become a victim of the infamous spread of misinformation. The rapid changes in our media consumption have only made audiences more gullible, despite what we know now. If anything it’s gotten much easier to get people caught in the mousetrap.

This is true for people with big or evolving platforms. Today’s generation of active social media presence tends to consist of Gen Z and millennials, which have seen the transformation in online media literacy and societal norms. With the change in generational values came the transition of internet culture. TikTok, Twitter, Instagram, and even YouTube have been the main crime scenes of the dumpster fire that is the impact of the internet.

Before delving into the negative sides of the internet, it’s crucial to understand what led up to this point. If you were born between the 90s to 2000s, the internet was your stuffed animal. It became an important aspect of growing up. You were the generation that began the phenomenon of vlogging and putting your life online. You were also the generation of kids who shouldn’t have had access to a Facebook account at 10 years old.

The internet became a whole new world where people became more informed and opinionated. It became the norm to invest in the lives of others for entertainment and an escape from our own. The line between what goes online and what stays to ourselves went from a definitive line to a fading blur.

Whether it’s the discussion of politics, social issues, pop culture, sports, and other big current events in general, the internet loves to talk. There’s a facilitation for people to have an opinion about something happening in the world and post about it for their followers to see. You don’t have to be this big influencer or celebrity anymore. That’s where it gets complicated.

While there are many—and I mean many instances where the internet was the cause of misinformation, there’s one I want to bring attention to. Whether you watch the news or not, you may have heard of the disappearance of Gabby Petito. She was a 22-year-old girl who documented her life and travels online on a blog including her “van life” adventures with her fiance Brian Laundrie. The media began suspecting him with involvement in Gabby’s disappearance after released police body cam footage suspecting of domestic assault. There was also evidence of Laundrie arriving at his family’s home in Petito’s van without her in it. It’s easy to assume something wasn’t right.

Just like many other cases of disappearance that’ve gone widely reported, the involvement from social media was an integral part in the investigation. With users on TikTok, Twitter, and Instagram witnessing a live case unfold in front of them, many took the opportunity to become invested in the case. For the most part people did so with good intent. They want to help and get justice for the girl. There have been donations to GoFundMe , spreading awareness on the case, sending support to her family .

In a recent press conference, Petito’s family thanked social media’s help with the case saying, “I don’t want to dismiss the ridiculously hard work that the FBI and law enforcement all around did, but social media has been amazing and very influential. And to be honest, it should continue for other people too [ … ]”

But of course, there were also people whose intentions weren’t so great.

Some became so invested to the point where they spoke about it like it was something entertaining. Some even went as far as making “ psychic ” videos on their predictions on the case, which were usually inaccurate and caused more turmoil with who and what to believe.

TikTok user KellyTheMagicalMedium says, “I did not do a lot of research on this [ … ] This is not truth, this is just the visions that I’ve had [ … ] I do feel like he did have a hot temper, but I don’t feel like he would’ve purposely killed her in a way in his logical mind.”

It’s safe to say that audiences didn’t respond well to this.

It became difficult to distinguish who was helping and who wasn’t. It caused audiences to not know what to believe and took credibility away from actual tips and new information from witnesses and state officials. It also demonstrates how many people lack empathy and respect.

Without the help of the internet there might not have been as much coverage in her case as there was. However it’s important to remember the impact words and misinformation can have outside of a screen. These are real people’s lives, not your source of entertainment and gossip. We may not be so easily gullible to believe internet scams like in earlier years, but have we really gotten better?

Have we as a society really been able to advance in our media literacy and impact of what happens on the internet? To be honest, it’s hard to tell.

Photo of Natalia Chairez

Comments (0)

Cancel reply

Your email address will not be published. Required fields are marked *

  • Magazine of the International Sociological Association
  • Available in multiple languages

essay about the internet is a double edged weapon

Global Dialogue is available in multiple languages! Select the language to download the issue.

Social Media and Democracy – A Double-Edged Sword?

by Haryati Abdul Karim

essay about the internet is a double edged weapon

December 04, 2018

One of the most profound effects of social media on society is undoubtedly the extent to which it has become a tool of empowerment for ordinary citizens to determine their future lives. Social life today is characterized by Internet activism, in which people from all walks of life can easily be involved via the smartphones in the palms of their hands. It certainly paves the way for citizens to participate and engage more freely in public discussions about their country and the world outside while remaining relatively anonymous. This is especially valuable in countries where freedom of expression is not a culture or norm.

Malaysia is no exception to this new development. Today, Malaysians use social media religiously to express themselves on all kinds of issues, as never before. It has become habitual for them to post comments, share or upload on their social media accounts videos and websites on issues that they feel strongly about, and start an online discussion among friends. Social media such as Facebook, Instagram, and YouTube are all very popular among Malaysians. But Facebook tops it all, with about 81% of Malaysians using Facebook, of which almost 90% access it via smartphone.

The extent to which the social media have actually “liberated” Malaysians can simply be seen by how vocal they are in openly expressing their views about the government and issues that are deemed sensitive, such as religion and ethnicity, despite the existence of laws restricting such discussions. This forms a healthy and vibrant atmosphere for people to get involved in national issues that affect them. Apart from politics, social media also enable Malaysians to express and carve out a hybrid global-local identity.

In countries where the state has strong control of the media, whether through direct media ownership or through legislation, channels of communication for alternative views have become limited. Hence, people are forced to go underground via the new media. Social media is found to be much more effective compared to alternative news portals in shaping public opinion. An instance of this was in the Arab Spring where channels of communication were severely limited and the public had lost trust in the government and the mainstream media. Social media became the only source of information for the people, and also a space where they could express their views.

In Malaysia, social media contributed to what has been termed as the political tsunami during the 2008 general election, which saw the hegemony of the National Coalition (Barisan Nasional or BN) government slowly crumble. BN’s political opponent, then known as Alliance of Hope (Pakatan Harapan or PH), continued underground since it was being excluded from the mainstream media. Social media became a tool for PH’s cybertroopers and strong supporters to propagate their views to the people. Using their Facebook fan pages, thorny issues like the Goods and Services Tax (GST), high cost of living, and purported corrupt practices of the BN government were highlighted systematically. This led to a discussion among the citizens and created a public sphere. Bloggers who were strong supporters of the Alliance used their blogs to shape public opinion in their favor. In the recently-concluded fourteenth general election, WhatsApp began to be used as a campaign tool in addition to Twitter and Facebook. Unlike Facebook, WhatsApp reaches individuals personally. A public sphere was created among individuals within their WhatsApp chat group to discuss PH’s campaign messages. It was perhaps this very well-orchestrated campaign strategy where PH focused on specific issues and communicated it repeatedly that saw it overthrow the 61-year-old BN government. BN was slow in turning to the social media, as it controlled the mainstream media. The outcome of PH’s communication strategy was that it won 113 Parliament seats out of 222, while BN only managed to secure 79 seats in the May 9, 2018 election.

When it comes to the question of social media, press freedom, and democracy, social media is a double-edged sword. While it opens more doors for freedom of expression and self-empowerment, it also paves the way for fake news to be created and go viral. Fake news has become a major issue among Malaysians. In the recent general election, voters were inundated with fake news rather than with authentic news reports in the social media. With fake news distorting information to perfection, it ultimately denies citizens the right to know the truth. The overreliance on social media as the sole source of information further contributed to the thriving of fake news because citizens rarely cross-check facts. The government’s attempt to address the issue by passing the Anti-Fake News Act in 2018 failed to clearly define what constituted “fake” when it came to news. In any case, the Act appears short-lived, as the new government has announced its intention to repeal it.

Another threat that social media poses now is when the political fanaticism of supporters of the dominant class reigns over other views in cyberspace. Those with alternative positions are subject to cyberbullying, so much so that it demotivates them from participating in democratic discussion, while others are traumatized by the hostile response from political fanatics. Even if some of the points raised are sound, political fanatics rally together and condemn such users with vulgarity, denying their right and freedom to express their opinion. This lack of civility and rationality at the level of ordinary people douses their spirit to engage in a healthy discussion of public issues.

For the social media to become an effective tool for true democracy, civility and media literacy must first become a norm and culture among citizens. Citizens must be made to understand the meaning of rational communication. Only then can genuine reformation of the nation take place through exchange of ideas.

Haryati Abdul Karim , Universiti Malaysia Sabah (UMS), Malaysia < [email protected] >

Read more about Challenged Democracy

essay about the internet is a double edged weapon

Global Governance: A Concept for a Democratic World Order?

by Peter Wahl

essay about the internet is a double edged weapon

The Erasure of Women from Egypt’s Revolution

by Amy Austin Holmes

essay about the internet is a double edged weapon

Democratic Retreat in Argentina

by Esteban Torres

essay about the internet is a double edged weapon

Democracy in Athens

by Gerassimos Kouzelis

essay about the internet is a double edged weapon

The Fallacy of Democracy in Post-1994 South Africa

by Hlengiwe Ndlovu

Ethnicized Citizenship as Illegitimate Citizenship

by Andrea Silva-Tapia

The Rise of Authoritarian Capitalism

by Christian Fuchs

essay about the internet is a double edged weapon

The Crisis of Democracy

by Hauke Brunkhorst

This issue is not available yet in this language. Request to be notified when the issue is available in your language.

If you prefer, you can access previous issues available in your language:

Is Snowden a hero?

The double-edged sword

I believe that the Internet is one of the major feats of human endeavour. As it enables the instant and almost free transmission of data, it holds the power to connect, educate and entertain billions. How easy it is to follow a course at MIT, Skype to colleagues in Japan, conduct a worldwide business, or even find the perfect partner – all at marginal cost. Now this powerful network has reared it’s ugly head against us as it can store, analyse, classify and corrupt all our on-line activities without us even knowing.

This frightening fact, so early predicted by some , changes the nature of the game. The Internet, once confined to large computers and wires, has become ubiquitous and will, before long, spawn all activities, on-line and off. Our phones and laptops are equipped to record text, sound, voice and location, and since we carry them everywhere these little eyes and ears have infested the realm of our whole life. At the same time they are so convenient and seductive that we will not get rid of them any time soon.

Recently much attention was paid to Apps that tacitly collect users data in exchange for (almost) free functionality. However, this is nothing compared to what states can do with their unlimited power and ability to wrought or bend the laws. In the name of safety and the protection of our freedom, they destroy what they are bound to secure. By their acts, they effectively kill the private sphere, as was done in (former) communist states - and who would want to live there. 

Since last week we know that whoever thinks there is one state that is not actively pushing these new possibilities is wrong. Thanks to the extraordinary act of courage by Edward Snowden, who sacrificed his life to alarm us, we have another proof of the extent and the intentions of the governments we mostly trust.

So what can we do? I see several options. Get off the grid, like some people have done ? This is extremely difficult and requires ever increasing sacrifices. Massively mislead the system by sending false or contradictory information? As the analysing powers increase at lightning speed, this is a race we cannot win, and dangerous to the individual too. Build alternative technical infrastructures that are immune to tinkering? This will bring only temporary relief, as the nature of the state is currently set at total control. Power corrupts, and absolute power corrupts absolutely.

The only option I see is pressing our legal representatives to combat the status quo. There is no such thing as a risk-free society, and the rights of individuals to privacy demand to be safeguarded. Our governments should be checked much more than they currently are, especially in the field of security and surveillance. We have to know how often the system is employed, what it's results are, at what cost - and how this interferes with human basic rights. 9-11 has opened the black box of the control state, now it is time to inspect it and gently close it, while we still can.

This is not a dark story. As with all technology, the Internet is a double-edged sword that can be used for the good and for the bad, and mostly both at the same time. With the proper caution, determination and mindset, it will stay the boon for society that it was intended to be. Since we all have a lot to lose, let’s help to keep it that way.

  • Frank Kresin

Related articles

Broken internet visual

Copyright Directive threatens Internet

Computer Protection

Why WhatsApp (and the rest of the Internet) needs to be encrypted

Logo

Essay on Technology Is a Double Edged Sword

Students are often asked to write an essay on Technology Is a Double Edged Sword in their schools and colleges. And if you’re also looking for the same, we have created 100-word, 250-word, and 500-word essays on the topic.

Let’s take a look…

100 Words Essay on Technology Is a Double Edged Sword

Introduction.

Technology is a tool that can be used for good or bad. It’s like a double-edged sword. On one hand, it makes our lives easier. On the other, it can also cause problems.

Benefits of Technology

Drawbacks of technology.

However, technology can also be harmful. It can be addictive, cause health problems, and lead to privacy issues. It can also make us lazy.

So, technology is a double-edged sword. We must use it wisely to enjoy its benefits and avoid its drawbacks.

250 Words Essay on Technology Is a Double Edged Sword

The dual nature of technology, technology as a catalyst for progress.

Technology is undeniably a force for good. It is the engine that powers advancements in various fields. In medicine, it has led to life-saving innovations like MRI machines and telemedicine. In education, it has democratized access to knowledge, bridging gaps in learning opportunities.

The Dark Side of Technology

However, the same technology can also be a source of harm. The advent of digital technology has brought about issues like cybercrime, data breaches, and privacy invasion. Furthermore, technology can widen socio-economic disparities, as not everyone has equal access to these advancements.

Striking a Balance

The key lies in striking a balance. We must harness the power of technology to drive progress, while also mitigating its potential harm. This requires a combination of ethical considerations, robust regulations, and education to ensure responsible use.

In conclusion, technology, like a double-edged sword, has both benefits and drawbacks. It is our responsibility to wield this sword wisely, shaping our future in a way that maximizes the benefits and minimizes the harm. The challenge and opportunity of our generation is to navigate this complex landscape, leveraging technology as a tool for positive change.

500 Words Essay on Technology Is a Double Edged Sword

Technology is an integral part of our daily lives, shaping our society in ways unimaginable a few decades ago. However, it is a double-edged sword, offering both immense benefits and significant drawbacks. This essay explores the multifaceted nature of technology, highlighting its potential to both drive progress and pose risks.

The Bright Side of Technology

Moreover, technology has transformed communication, fostering global connectivity. Through social media platforms and video conferencing tools, people can connect with others across the globe instantaneously, fostering cultural exchange and understanding. Similarly, technology has revolutionized the business sector, enabling e-commerce and remote work, thus expanding economic opportunities and enhancing productivity.

Despite the numerous benefits, technology also presents significant challenges. One of the most pressing is the issue of privacy. With the proliferation of digital platforms, personal data is often at risk, leading to potential misuse and infringement of privacy. Additionally, the increased reliance on technology has led to a rise in cybercrime, with individuals and institutions becoming targets of hacking, identity theft, and online fraud.

Moreover, technology has given rise to a new form of addiction – screen addiction. Excessive screen time has been linked to mental health issues, including depression and anxiety, particularly among the younger generation. Furthermore, while technology has made communication easier, it has also made it impersonal, leading to a decline in face-to-face interactions and potentially fostering feelings of isolation and loneliness.

Technology and the Environment

In conclusion, technology is indeed a double-edged sword. It has the power to transform societies, improve lives, and drive economic growth. However, it also poses significant challenges related to privacy, mental health, and the environment. As we continue to embrace technology, it is crucial to strike a balance, leveraging its benefits while mitigating its drawbacks. This requires a concerted effort from all stakeholders, including policymakers, technologists, and users, to ensure responsible and sustainable use of technology.

Apart from these, you can look at all the essays by clicking here .

Happy studying!

Leave a Reply Cancel reply

To read this content please select one of the options below:

Please note you do not have access to teaching notes, terrorism and the internet: a double‐edged sword.

Journal of Money Laundering Control

ISSN : 1368-5201

Article publication date: 11 October 2011

The purpose of this paper is to highlight the extent of the use of the internet by terrorist organisations to achieve their strategic and operational objectives.

Design/methodology/approach

The methodology adopted consisted of an extensive literature review on topics to include Islamic terrorism, cyber crime, globalisation, and financial crime, supported by field work to verify findings.

Al‐Qaeda has become a radical Islamic phenomenon held together through its global network of communities, both virtual and physical. One significant enabler has been the internet, which enables anonymous communication, aids recruitment, encourages the sharing of knowledge, as well as playing a significant role in the spreading of propaganda. The understanding of the use of internet‐based technologies, not only as a potential target for terrorist attack, but as a tool to achieve its ideological and operational goals, remains a neglected area of study requiring further focus.

Originality/value

This paper serves as a useful guide to alert and educate counter‐terrorism professionals, law enforcement and policy makers of the significance of the extent of the use of the internet for purposes such as operational planning, recruitment, psychological operations and fund raising. It is essential that these subjects should not be viewed as a peripheral issue to cyber‐terrorism, but instead, should be considered to be central to the existing counter‐terrorism effort.

  • Globalization
  • Internet technology
  • Risk assessment
  • Psychological operations

Keene, S.D. (2011), "Terrorism and the internet: a double‐edged sword", Journal of Money Laundering Control , Vol. 14 No. 4, pp. 359-370. https://doi.org/10.1108/13685201111173839

Emerald Group Publishing Limited

Copyright © 2011, Emerald Group Publishing Limited

Related articles

All feedback is valuable.

Please share your general feedback

Report an issue or find answers to frequently asked questions

Contact Customer Support

Is the internet a double-edged sword for organizations? An empirical study on cyberloafing

  • Published: 04 January 2023

Cite this article

essay about the internet is a double edged weapon

  • Muddassar Sarfraz   ORCID: orcid.org/0000-0001-6165-732X 1 ,
  • Kausar Fiaz Khawaja 2 &
  • Um-e-Farwah 2  

1041 Accesses

Explore all metrics

Cyberloafing is common in today's organizational environment, where employees utilize the organization's internet during working hours for personal use. Based on the need to investigate what makes employees engage in such deviant behavior, this study investigates the influence of technology self-efficacy on cyberloafing with consideration for the mediating role of internet addiction and moderating role of three neutralization techniques. Hence, four hypotheses were proposed and statistically tested. Data were collected at three different periods from 334 employees of telecommunication companies in Pakistan. The study's findings revealed that internet addiction mediates the relationship between technology self-efficacy and cyberloafing by utilizing the PROCESS approach for mediation and moderation. Furthermore, denial of responsibility and defense of necessity is positively related to cyberloafing. Lastly, neutralization techniques moderate the relationship between internet addiction and cyberloafing.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save.

  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime

Price includes VAT (Russian Federation)

Instant access to the full article PDF.

Rent this article via DeepDyve

Institutional subscriptions

essay about the internet is a double edged weapon

Similar content being viewed by others

Cyberloafing in the workplace: mitigation tactics and their impact on individuals’ behavior.

essay about the internet is a double edged weapon

Nexus among cyberloafing behavior, job demands and job resources: A mediated-moderated model

essay about the internet is a double edged weapon

Eager to belong: Social cyberloafing as a coping response to workplace ostracism

Agarwal UA, Avey JB (2020) Abusive supervisors and employees who cyberloaf: examining the roles of psychological capital and contract breach. Internet Res 30(3):789

Article   Google Scholar  

Aljomaa SS, AlQudah MF, Albursan IS, Bakhiet SF, Abduljabbar AS (2016) Smartphone addiction among university students in the light of some variables. Comput Hum Behav 61:155–164

Alt D, Boniel-Nissim M (2018) Using multidimensional scaling and PLS-SEM to assess the relationships between personality traits, problematic internet use, and fear of missing out. Behav Inf Technol 37(12):1264–1276

Amo LC, Grijalva E, Herath T, Lemoine GJ, Rao HR (2022) Technological entitlement: it’s my technology and I’ll (Ab) use it how i want to. Manag Inf Syst Q 46(3):1395–1420

Google Scholar  

Andel SA, Kessler SR, Pindek S, Kleinman G, Spector PE (2019) Is cyberloafing more complex than we originally thought? Cyberloafing as a coping response to workplace aggression exposure. Comput Hum Behav 101:124–130

Anderson JC, Gerbing DW (1988) Structural equation modeling in practice: a review and recommended two-step approach. Psychol Bull 103(3):411

Askew K, Buckner JE, Taing MU, Ilie A, Bauer JA, Coovert MD (2014) Explaining cyberloafing: the role of the theory of planned behavior. Comput Hum Behav 36:510–519

Bandura A, Freeman WH, Lightsey R (1999) Self-efficacy: the exercise of control. Springer

Batabyal SK, Bhal KT (2020) Traditional cyberloafing, mobile cyberloafing and personal mobile-internet loafing in business organizations: exploring cognitive ethical logics. J Inf Commun Ethics Soc 18(4):631

Beard KW (2005) Internet addiction: a review of current assessment techniques and potential assessment questions. Cyberpsychol Behav 8(1):7–14

Benlian A (2020) A daily field investigation of technology-driven spillovers from work to home. MIS Q 44(3):1259–1300

RJ Bennett, SL Robinson, (2003) The past, present, and future of workplace deviance research.

Blanchard AL, Henle CA (2008) Correlates of different forms of cyberloafing: the role of norms and external locus of control. Comput Hum Behav 24(3):1067–1084

Brender-Ilan Y, Sheaffer Z (2019) How do self-efficacy, narcissism and autonomy mediate the link between destructive leadership and counterproductive work behaviour. Asia Pac Manag Rev 24(3):212–222

Chak K, Leung L (2004) Shyness and locus of control as predictors of internet addiction and internet use. Cyberpsychol Behav 7(5):559–570

Chen JV, Ross WH, Yang H-H (2011) Personality and motivational factors predicting internet abuse at work. Cyberpsychology 5(1):1

Chen Y, Galletta DF, Lowry PB, Luo X, Moody GD, Willison R (2021) Understanding inconsistent employee compliance with information security policies through the lens of the extended parallel process model. Inf Syst Res 32(3):1043–1065. https://doi.org/10.1287/isre.2021.1014

Cheng B, Zhou X, Guo G, Yang K (2020) Perceived overqualification and cyberloafing: a moderated-mediation model based on equity theory. J Bus Ethics 164(3):565–577

Darban M, Kim M, Koksal A (2021) When the technology abandonment intentions remitted: the case of herd behavior. Inf Technol Manag 22(3):163–178. https://doi.org/10.1007/s10799-021-00329-5

De Lara PZM (2007) Relationship between organizational justice and cyberloafing in the workplace: has “anomia” a say in the matter? Cyberpsychol Behav 10(3):464–470

de Vargas Pinto A, Beerepoot I, Maçada ACG (2022) Encourage autonomy to increase individual work performance: the impact of job characteristics on workaround behavior and shadow IT usage. Inf Technol Manag. https://doi.org/10.1007/s10799-022-00368-6

Duhita S, Daellenbach U (2016) Is loafing at work necessarily detrimental? A study of loafing, job productivity and satisfaction. Acad Manag Proc 2016(1):15471

Dursun OO, Donmez O, Akbulut Y (2018) Predictors of cyberloafing among preservice information technology teachers. Contemp Edu Technol 9(1):22–41

Ellen PS, Bearden WO, Sharma S (1991) Resistance to technological innovations: an examination of the role of self-efficacy and performance satisfaction. J Acad Mark Sci 19(4):297–307

Gökçearslan Ş, Mumcu FK, Haşlaman T, Çevik YD (2016) Modelling smartphone addiction: the role of smartphone usage, self-regulation, general self-efficacy and cyberloafing in university students. Comput Hum Behav 63:639–649

Goswami V, Singh DR (2016) İnternet addiction among adolescents: a review of the research. Int J Indian Psychol 3(3):37–44

Griffiths M (1996) Gambling on the internet: a brief note. J Gambl Stud 12:4–471

Güğerçin U (2020) Does techno-stress justify cyberslacking? An empirical study based on the neutralisation theory. Behav Inf Technol 39(7):824–836

Haag S, Eckhardt A, Schwarz A (2019) The acceptance of justifications among shadow IT users and nonusers–an empirical analysis. Inf Manag 56(5):731–741

Hair JF, Black WC, Babin BJ, Anderson RE (2010) Multivariate data analysis. In Seventh Edition Prentice Hall

Hannah ST, Sweeney PJ, Lester PB (2007) Toward a courageous mindset: the subjective act and experience of courage. J Posit Psychol 2(2):129–135

Henle CA, Blanchard AL (2008) The interaction of work stressors and organizational sanctions on cyberloafing. J Managerial Issues 1:383–400

Hobfoll SE, Halbesleben J, Neveu J-P, Westman M (2018) Conservation of resources in the organizational context: the reality of resources and their consequences. Annu Rev Organ Psych Organ Behav 5:103–128

Hollinger RC (1991) Neutralizing in the workplace: an empirical analysis of property theft and production deviance. Deviant Behav 12(2):169–202

Hsia J-W, Chang C-C, Tseng A-H (2014) Effects of individuals’ locus of control and computer self-efficacy on their e-learning acceptance in high-tech companies. Behav Inf Technol 33(1):51–64

Hsiao K-L (2017) Compulsive mobile application usage and technostress: the role of personality traits. Online Information Review

I Huertas-Valdivia, FJ Llorens-Montes, A Ruiz-Moreno (2018) Achieving engagement among hospitality employees: a serial mediation model. Int J Contempor Hospitality Manage.

Keser H, Kavuk M, Numanoglu G (2016) The Relationship between Cyber-Loafing and Internet Addiction. Cypriot J Educ Sci 11(1):37–42

Khan J, Jaafar M, Mubarak N, Khan AK (2022) Employee mindfulness, innovative work behaviour, and IT project success: the role of inclusive leadership. Inf Technol Manag. https://doi.org/10.1007/s10799-022-00369-5

Khansa L, Kuem J, Siponen M, Kim SS (2017) To cyberloaf or not to cyberloaf: the impact of the announcement of formal organizational controls. J Manag Inf Syst 34(1):141–176

Koay K-Y, Soh PC-H (2018) Should cyberloafing be allowed in the workplace? Hum Res Manag Int Digest. 26(7):4

Koay KY (2018) Workplace ostracism and cyberloafing: a moderated–mediation model. Internet Res 28(4):1141

Krishnan, S., & Lim, V. K. G. (2010). Moderating effects of extroversion and neuroticism on sleep deprivation and cyberloafing.

Kulviwat S, Bruner GC II, Neelankavil JP (2014) Self-efficacy as an antecedent of cognition and affect in technology acceptance. J Consum Marketing. 31(3):190

Li G, Fang C-C (2022) Exploring factors that influence information resources sharing intention via the perspective of consensus perception of blockchain. Inf Technol Manag 23(1):23–38. https://doi.org/10.1007/s10799-021-00338-4

Lim VKG (2002) The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice. J Organ Behav Int J Ind Occup Organ Psychol Behav 23(5):675–694

Mahatanankoon P, Anandarajan M, Igbaria M (2004) Development of a measure of personal web usage in the workplace. Cyberpsychol Behav 7(1):93–104

Marakas GM, Yi MY, Johnson RD (1998) The multilevel and multifaceted character of computer self-efficacy: toward clarification of the construct and an integrative framework for research. Inf Syst Res 9(2):126–163

Mashi MS, Salimon MG (2016) Consideration of future consequences as an antecedent of employee cyberloafing behavior among selected working adults in Nigeria. Int J Bus Technopreneurship 6(2):319–334

McCrae RR, Costa PT Jr (1997) Personality trait structure as a human universal. Am Psychol 52(5):509

Mercado BK, Giordano C, Dilchert S (2017) A meta-analytic investigation of cyberloafing. Career Dev Int 22(5):546

Miller B (2018) Moderating neutralization techniques in information security violations through expertise: a correlational study. Capella University

Mitchell J, Dodder RA (1980) An examination of types of delinquency through path analysis. J Youth Adolesc 9(3):239–248

Morris SA (2007) Factors related to the counterproductive use of computers. Ohio University

Naseer S, Khawaja KF, Qazi S, Syed F, Shamim F (2021) How and when information proactiveness leads to operational firm performance in the banking sector of Pakistan? The roles of open innovation, creative cognitive style, and climate for innovation. Int J Inf Manag 56:102260

Niemz K, Griffiths M, Banyard P (2005) Prevalence of pathological Internet use among university students and correlations with self-esteem, the General Health Questionnaire (GHQ), and disinhibition. Cyberpsychol Behav 8(6):562–570

O’Neill TA, Hambley LA, Bercovich A (2014) Prediction of cyberslacking when employees are working away from the office. Comput Hum Behav 34:291–298

Park EH, Kim J, Wiles L (2022) The role of collectivism and moderating effect of IT proficiency on intention to disclose protected health information. Inf Technol Manag. https://doi.org/10.1007/s10799-022-00362-y

Pedersen PE (2005) Adoption of mobile Internet services: an exploratory study of mobile commerce early adopters. J Organ Comput Electron Commer 15(3):203–222

Pindek S, Krajcevska A, Spector PE (2018) Cyberloafing as a coping mechanism: dealing with workplace boredom. Comput Hum Behav 86:147–152

Piquero NL, Tibbetts SG, Blankenship MB (2005) Examining the role of differential association and techniques of neutralization in explaining corporate crime. Deviant Behav. https://doi.org/10.1080/01639620590881930

Restubog SLD, Garcia PRJM, Toledano LS, Amarnani RK, Tolentino LR, Tang RL (2011) Yielding to (cyber)-temptation: exploring the buffering role of self-control in the relationship between organizational justice and cyberloafing behavior in the workplace. J Res Pers 45(2):247–251

SL Robinson, MS Kraatz (1998). Constructing the reality of normative behavior: the use of neutralization strategies by organizational deviants .

Salam MA, Ali M (2020) Building reputation through sustainable supplier selection: the case of an emerging economy. EurJ Manag Bus Econ 23(3):315

Sarwar A, Naseer S, Zhong JY (2020) Effects of bullying on job insecurity and deviant behaviors in nurses: roles of resilience and support. J Nurs Manag 28(2):267–276

Silic M, Barlow JB, Back A (2017) A new perspective on neutralization and deterrence: predicting shadow IT usage. Inf Manag 54(8):1023–1037

Siponen M, Vance A (2010) Neutralization: new insights into the problem of employee information systems security policy violations. MIS Q 34(3):487–502

W Soliman, H Mohammadnazar (2022). New insights into the justifiability of organizational information security policy noncompliance: a case study. Proceedings of the Annual Hawaii International Conference on System Sciences.

EH Sutherland (1939). A theory of criminology. Principles of Criminology (Thirdedition), Chicago: JB Lippincott Co

Sutherland EH, Cressey DR, Luckenbill DF (1992) Principles of criminology. Altamira Press

Sykes GM, Matza D (1957) Techniques of neutralization: a theory of delinquency. Am Sociol Rev 22(6):664–670

Tamunomiebi MD, Adim CV (2019) The nexus between employee cyberloafing and generational diversity: implications for contemporary managers. Manag Hum Resour Res J 8(12):29–41

A Tandon, P Kaur,N Ruparel,JU Islam, A Dhir (2021). Cyberloafing and cyberslacking in the workplace: systematic literature review of past achievements and future promises. Int Res.

Ugrin JC, Pearson JM, Nickle SM (2018) An examination of the relationship between culture and cyberloafing using the hofstede model. J Internet Commer 17(1):46–63

Usman M, Javed U, Shoukat A, Bashir NA (2021) Does meaningful work reduce cyberloafing? Important roles of affective commitment and leader-member exchange. Behav Inf Technol 40(2):206–220

Vaghefi I, Negoita B, Lapointe L (2022) The path to hedonic information system use addiction: a process model in the context of social networking sites. Inf Syst Res. https://doi.org/10.1287/isre.2022.1109

Van Doorn, O. N. (2011) Cyberloafing: a multi-dimensional construct placed in a theoretical framework. Department Industrial Engineering and Innovation Sciences Eindhoven University of Technology, Unpublished Master Thesis, Eindhoven: Netherlands.

Venkatesh V, Bala H (2008) Technology acceptance model 3 and a research agenda on interventions. Decis Sci 39(2):273–315

V Venkatesh, F Davis, C Cheung, Z Lee(2021). Cyberslacking in the Workplace: antecedents and Effects on Job Performance.MIS Quarterly, Forthcoming

Venkatesh V, Sykes T, Chan FKY, Thong JYL, Hu PJH (2019) Children’s Internet addiction, family-to-work conflict, and job outcomes: a study of parent-child dyads. MIS Q 43(3):903–927

Willison R, Warkentin M, Johnston AC (2018) Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives. Inf Syst J 28(2):266–293

Yang SC, Tung C-J (2007) Comparison of Internet addicts and non-addicts in Taiwanese high school. Comput Hum Behav 23(1):79–96

Yılmaz FGK, Yılmaz R, Öztürk HT, Sezer B, Karademir T (2015) Cyberloafing as a barrier to the successful integration of information and communication technologies into teaching and learning environments. Comput Hum Behav 45:290–298

KS Young, RC Rodgers (1998) Internet addiction: personality traits associated with its development. 69th Annual Meeting of the Eastern Psychological Association, 40–50.

Young K, Suler J (1996) Intervention for pathological and deviant behavior within an online community. Young 1996(1997a):1998

Zhang H, Zhao H, Liu J, Xu Y, Lu H (2015) The dampening effect of employees’ future orientation on cyberloafing behaviors: the mediating role of self-control. Front Psychol 6:1482

Zhou C, Li K, Zhang X (2022) Why do I take deviant disclosure behavior on internet platforms? An explanation based on the neutralization theory. Inf Process Manag 59(1):102785

Zhou Y, Li D, Li X, Wang Y, Zhao L (2017) Big five personality and adolescent Internet addiction: the mediating role of coping style. Addict Behav 64:42–48

Download references

Author information

Authors and affiliations.

School of Management, Zhejiang Shuren University, Hangzhou, People’s Republic of China

Muddassar Sarfraz

Faculty of Management Sciences, International Islamic University, Islamabad, Pakistan

Kausar Fiaz Khawaja &  Um-e-Farwah

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Muddassar Sarfraz .

Additional information

Publisher's note.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

1: measurement scales

Technology self-efficacy

[ ]

If I had used similar packages/apps before to do the same job

If there was no one around to tell me what to do as I go

If I had just the built-in help facility for assistance

If someone showed me how to do it first

Internet addiction

[ ]

How often do you prefer the excitement of the Internet to intimacy with your partner?

How often do you form new relationships with fellow online users?

How often do others in your life complain to you about the amount of time you spend online?

How often does your work assignment suffer because of the amount of time you spend online?

How often do you check your email before something else that you need to do?

How often does your job performance or productivity suffer because of the Internet?

How often do you become defensive or secretive when anyone asks you what you do online?

How often do you block out disturbing thoughts about your life with soothing thoughts of the Internet?

How often do you find yourself anticipating when you will go online again?

How often do you fear that life without the Internet would be boring, empty, and joyless?

How often do you snap, yell, or act annoyed if someone bothers you while you are online?

How often do you lose sleep due to being online?

How often do you feel preoccupied with the Internet when off-line, or fantasize about being online?

How often do you find yourself saying "just a few more minutes" when online?

How often do you try to cut down the amount of time you spend online and fail?

How often do you try to hide how long you've been online?

How often do you choose to spend more time online over going out with others?

How often do you feel depressed, moody, or nervous when you are off-line, which goes away once you are back online?

Denial of responsibility (DOR)

[ ]

It is OK to violate the company policy if you aren’t sure what the policy is

It is OK to violate the company policy if the policy is not advertised

It is OK to violate the company policy if you don’t understand it

Metaphor of ledger (MOL)

[ ]

I feel my general adherence to company policy compensates for occasionally violating a policy

I feel my good job performance compensates for occasionally violating policy

I feel my hard work in the company compensates for occasionally violating a policy

Defense of necessity (DON)

[ ]

It is all right to violate the company policy under circumstances where it seems like you have little another choice

It is all right to violate the company policy when you are under a tight deadline

It is all right to violate the company policy when you are in a hurry

Cyberloafing [ ]

Conducting personal external businesses

Conducting personal investment and banking activities

Conducting personal on-line shopping

Conducting personal travel or recreational activities

Reading on-line news, including sports, weather, etc

Researching any products or services related to personal interests

Researching personal hobbies

Viewing entertainment products and services

Sending e-cards, e-flowers, e-gifts, etc. to friends and family

Sending or forwarding the e-mail to multiple mailing lists, individuals, or newsgroups

Using personal web-based e-mail, such as Hotmail, Yahoo, etc

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Sarfraz, M., Khawaja, K.F. & Um-e-Farwah Is the internet a double-edged sword for organizations? An empirical study on cyberloafing. Inf Technol Manag (2023). https://doi.org/10.1007/s10799-022-00385-5

Download citation

Accepted : 08 December 2022

Published : 04 January 2023

DOI : https://doi.org/10.1007/s10799-022-00385-5

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Cyberloafing
  • Internet addiction
  • Neutralization techniques
  • Technology self-efficacy
  • Differential association theory
  • Find a journal
  • Publish with us
  • Track your research

Home — Essay Samples — Sociology — Social Media — Social Media as a Double-Edged Sword: Better Life and Addiction

test_template

Social Media as a Double-edged Sword: Better Life and Addiction

  • Categories: Social Media

About this sample

close

Words: 1315 |

Published: Feb 9, 2023

Words: 1315 | Pages: 3 | 7 min read

Image of Dr. Oliver Johnson

Cite this Essay

Let us write you an essay from scratch

  • 450+ experts on 30 subjects ready to help
  • Custom essay delivered in as few as 3 hours

Get high-quality help

author

Verified writer

  • Expert in: Sociology

writer

+ 120 experts online

By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy . We’ll occasionally send you promo and account related email

No need to pay just yet!

Related Essays

1 pages / 657 words

2 pages / 745 words

3 pages / 1383 words

5 pages / 2318 words

Remember! This is just a sample.

You can get your custom paper by one of our expert writers.

121 writers online

Still can’t find what you need?

Browse our vast selection of original essay samples, each expertly formatted and styled

Related Essays on Social Media

The era of social media has revolutionized how we connect, communicate, and share information. However, beneath the glossy filters and curated posts lies a pervasive issue - the prevalence of fake content. This essay delves into [...]

Ascharya, Kat. 'What Facebook Is Doing To Your Brain Is Shocking.' HuffPost Life, HuffPost, 27 Jan. 2017, https://psycnet.apa.org/record/2019-08314-001

Anderson, C. A., & Jiang, S. (2018). The value of social media data. Marketing Science, 37(3), 387-402.Boczkowski, P. J., & Mitchelstein, E. (2013). The news gap: When the information preferences of the media and the public [...]

Bulmer, J. G., McLeod, J. M., & Rice, R. E. (2009). Television and Political Life: Studies in Six European Countries. Springer Science & Business Media.Fulcher, J., & Scott, J. (2011). Sociology. Oxford University Press.Kitts, [...]

One of our rights in the United States is freedom of speech, which is guaranteed by the First Amendment. The First Amendment of the United States Constitution, “…prohibits the making of any law respecting an establishment of [...]

The rise of social media usage has caused a great impact on the younger generations. Popular social media platforms include Facebook, Instagram, Twitter, Pinterest and many more. It is very rare to come across someone from the [...]

Related Topics

By clicking “Send”, you agree to our Terms of service and Privacy statement . We will occasionally send you account related emails.

Where do you want us to send this sample?

By clicking “Continue”, you agree to our terms of service and privacy policy.

Be careful. This essay is not unique

This essay was donated by a student and is likely to have been used and submitted before

Download this Sample

Free samples may contain mistakes and not unique parts

Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

Please check your inbox.

We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!

Get Your Personalized Essay in 3 Hours or Less!

We use cookies to personalyze your web-site experience. By continuing we’ll assume you board with our cookie policy .

  • Instructions Followed To The Letter
  • Deadlines Met At Every Stage
  • Unique And Plagiarism Free

essay about the internet is a double edged weapon

some people believe that the internet has a negative impact on society and people while other believe there are advantages to internet

Unauthorized use and/or duplication of this material without express and written permission from this site’s author and/or owner is strictly prohibited. Excerpts and links may be used, provided that full and clear credit is given to Writing9 with appropriate and specific direction to the original content.

Your opinion

Don’t put your opinion unless you are asked to give it.

If the question asks what you think, you MUST give your opinion to get a good score.

Don’t leave your opinion until the conclusion.

Here are examples of instructions that require you to give your opinion:

...do you agree or disagree? ...do you think...? ...your opinion...?

Discover more tips in The Ultimate Guide to Get a Target Band Score of 7+ » — a book that's free for 🚀 Premium users.

  • Check your IELTS essay »
  • Find essays with the same topic
  • View collections of IELTS Writing Samples
  • Show IELTS Writing Task 2 Topics

Television is dangerous because it destroys family life and any sense of community; instead of visiting people or talking with our family, we just watch television. To what extent fo you agree or disagree with this opinion?

The climograph below shows average monthly temperatures and rainfall in the city of kolkata., older people often choose to spend money on themselves (e.g. on holidays) rather than save money for their children after retirement. is this a positive or negative development, you are taking a course at a local college. the deadline for your project was last week but you have not finished it. introduce yourself explain why you haven't handed in the project yet request more time to do it, nuclear power is far too dangerous, therefore, countries should ban its use and concentrate instead on developing alternative sources such as hydroelectric power and solar energy.to what extent do you agree..

IMAGES

  1. How is the Internet a double-edged sword? by Santiago Luna

    essay about the internet is a double edged weapon

  2. (PDF) Internet: A double-edged sword?

    essay about the internet is a double edged weapon

  3. Internet Is a Double-Edged Sword

    essay about the internet is a double edged weapon

  4. Social Network: 'Double-Edged Sword' Is Not Easy to Use

    essay about the internet is a double edged weapon

  5. Internet Is a Double-Edged Sword

    essay about the internet is a double edged weapon

  6. The Internet is a "double-edged sword"

    essay about the internet is a double edged weapon

COMMENTS

  1. Internet: A Double-Edged Sword: [Essay Example], 669 words

    Conclusion. In conclusion, the internet is a double-edged sword, offering a myriad of advantages while also presenting significant challenges. Its role in democratizing access to information, enhancing communication, and driving innovation cannot be overstated.

  2. The Internet is a double-edged sword

    The Internet is a double-edged sword. Every great technological leap is a double-edged sword that brings positive and negative changes to society. In other words, what goes for fire also goes for the Internet. The Internet is a powerful tool of communication and education, especially for the young, but it can have undesirable side effects.

  3. Technology as a Double-Edged Sword

    73. With its rapid development and wide application, technology has been an inseparable part of our daily lives. Yet, despite the crucial role it plays, it has remained controversial even until ...

  4. The Internet Is A Double Edge Sword

    The Internet Is A Double Edge Sword. Satisfactory Essays. 1364 Words. 6 Pages. Open Document. The Internet is the most used source to gather information from, it is a very good place to find information about almost anything in the world. Within the past decade, the Internet has grown a lot and more people than ever have access to the Internet.

  5. Technology as a double-edged weapon Free Essay Example

    Technology as a double-edged weapon. We live in a generation that relies heavily on technology and on the Internet. People spend much time online on the Web, whether for work, school or University homework, for fun or just for social networking. So, for this main reason this issue of excessive use of technology and the Internet is a topic of ...

  6. Researching the sharp edges of the Internet's double-edged sword

    Researching the sharp edges of the Internet's double-edged sword. Social media and an open Internet are seen by activists around the globe as tools for democracy, empowering disenfranchised communities, and social change. But in countries across Asia, Africa and Eastern Europe, the power of digital communications can be a double-edged sword.

  7. The Internet is a Double-Edged Sword

    Feature. The Internet is a Double-Edged Sword. Beware of the spread of misinformation. Natalia Chairez |November 16, 2021. Adobe Stock Image. Society has never failed to become a victim of the infamous spread of misinformation. The rapid changes in our media consumption have only made audiences more gullible, despite what we know now.

  8. The Internet: A Double-Edged Sword

    The Internet, a remarkable invention of the 20th century, has revolutionized the way we communicate, access information, and conduct business. ... The Internet: A Double-Edged Sword — Exploring ...

  9. The Internet: A Double-Edged Sword for Humanity

    However, as much as the internet is a powerful tool for progress, it also poses significant risks and challenges, making it a double-edged sword for mankind. The Bright Side: A Catalyst for Global ...

  10. The double-edged sword of digital technology

    "That's why the internet is this double-edged sword, because while some people in this generation are using it to learn, ... When theology graduate Fr John Sanderson was deployed to Afghanistan as a military chaplain, his weapon was a peaceful demeanour. Career. Trackside at MotoGP. High speed motorbikes, pumping adrenaline - MotoGP is ...

  11. Social Media and Democracy

    When it comes to the question of social media, press freedom, and democracy, social media is a double-edged sword. While it opens more doors for freedom of expression and self-empowerment, it also paves the way for fake news to be created and go viral. Fake news has become a major issue among Malaysians. In the recent general election, voters ...

  12. Waag

    The double-edged sword. I believe that the Internet is one of the major feats of human endeavour. As it enables the instant and almost free transmission of data, it holds the power to connect, educate and entertain billions. ... As with all technology, the Internet is a double-edged sword that can be used for the good and for the bad, and ...

  13. Essay on Technology Is a Double Edged Sword for Students

    Conclusion. In conclusion, technology is indeed a double-edged sword. It has the power to transform societies, improve lives, and drive economic growth. However, it also poses significant challenges related to privacy, mental health, and the environment. As we continue to embrace technology, it is crucial to strike a balance, leveraging its ...

  14. Technology As a Double Edged Sword: A Promise Yet to be ...

    However, there are many different standards used in different disciplines and Internet technology affords new ways to attribute sources not yet accepted by the Academy. In 2012, a Swedish student handed in an essay of a factual nature, containing a passage the marker recognized from a report, which had been copied word for word.

  15. Technology In Education: A Double-Edged Sword

    Technology should never be used to replace or supersede student-centered learning. In fact, technology can be a powerful tool for supporting student-centered learning. The rise of technology has caused a lot of changes in the educational field. The term "double-edged sword" has been used often to describe technology, as it can be both helpful ...

  16. Terrorism and the internet: a double‐edged sword

    This paper serves as a useful guide to alert and educate counter‐terrorism professionals, law enforcement and policy makers of the significance of the extent of the use of the internet for purposes such as operational planning, recruitment, psychological operations and fund raising. It is essential that these subjects should not be viewed as ...

  17. Influence Of Technology: A Double-Edged Weapon

    A Double-Edged Weapon Technology is the biggest influence in today's society. Telephones, computers, and many other electronic devices are changing many person point of view. The easiest and most effective way to research any information is sitting in front of a computer or any electronic devices and just clicking a keyboard key.

  18. Is the internet a double-edged sword for organizations? An empirical

    Cyberloafing is common in today's organizational environment, where employees utilize the organization's internet during working hours for personal use. Based on the need to investigate what makes employees engage in such deviant behavior, this study investigates the influence of technology self-efficacy on cyberloafing with consideration for the mediating role of internet addiction and ...

  19. The Double-Edged Sword: How Social Media Changed Our World

    It's become like air — everywhere we go, it's there. But unlike air, social media's impact is a double-edged sword. Let's dive into how it's transformed our world, for better and worse ...

  20. Social Media as a Double-Edged Sword: Better Life and Addiction: [Essay

    The first effect of social media on human health is through their physical health. Based on research, a usual phone users touch their phone about 2617 times daily, and this number can be reached to more than 5400 times daily, about the top 10% of users ("Smartphone Addiction').

  21. Beside a lot of advantages, some people believe that the Internet

    Internet is considered a double-edged weapon. When adults and children use internet, it has to have some limits to bring its benefits and avoid its harm by different meanings | Band: 5.5. ... This essay will discuss the aspects behind the necessity of using the country's wealth in helping the Earth's health. writing9

  22. The Internet : Man 's Greatest Double Edge Sword

    Good Essays. 1326 Words. 6 Pages. Open Document. The Internet: Man's Greatest Double Edge Sword The internet. It is one of man's greatest technological achievements and useful tools, but also one of its deadliest and addicting drugs. And with each hallucinogen comes consequences. It starts small, as with any narcotic.

  23. some people believe that the internet has a negative impact ...

    some people believe that the internet has a negative impact on society and people while other believe there are advantages to internet ... is considered a double-edged weapon. So, in . this. essay, the advantages and disadvantages are going to be discussed. One benefit of using the . internet.