Wednesday, 26 June 2013

The discussion of the potential threats which the use of it has introduced
Scenario, there are many forms of potential threats which it has introduced like, an unknown person is hacking into your account from their own computer and trying to steal your personal files, with private information and the unknown person is using many forms of hacking and more that’ll be stated in the subsequent, and to those whom have concerns of being attacked, by viruses, hacking, malware, then they should keep in mind that an unauthorised access is when a data is addressed by controlling the access rights, however, there are even more potential dangers and security issues.
Security issues is a person(s) whom can access a single computer, they can access the rest and entire of the computers which is very, potentially dangerous in which the wrong person can access other work files, personal information, privacy, personal documents and more, the reason is, once they have accessed them computer system, they can then access all the other entire computers, however, the hacker can be stopped by installing antivirus protection such as, firewall, Norton security, furthermore, this way the personal information and documents will be safe and secure knowing your computer secure.


The forms of potential threats which the use of it has introduced
The forms of potential threats which the use of it has introduced are in the subsequent and not only should a people keep in mind that their account can get hacked but, there are many other forms of the hackers using their advantages to steal, take a look, duplicate the private and personal information, and privacy including confidentiality, which is what every computer user should keep safe and secure from hackers and the other forms they can use to get to you by accessing your email, social networking site(s), and through your webcam and this is considered an criminal offence and unlawful.
Hackers can use have many forms, advantages, and ways to get to you but, with great security with 1 or 2 installations of antivirus, the person(s) are safe and secure which will keep safe your privacy, confidentiality, and personal information furthermore, there are not only hackers but, other forms of threats which the use of it has introduced and this can be done by installing viruses and they come in many forms and in the subsequent there are the forms of potential, high risk, viruses, and how their purpose and uses they have which is explained and what can occur once they have gained access.


The sort of viruses that are potential threats which it has introduced
Malware also, known as, (malicious software) is a software program which includes viruses like, worms, trojans, is designed to cause dangers and have potential security issues,
Viruses are what damages files and can be prevented by installing antivirus software and by not opening attachments to emails from unknown sources,
Hacking is an act in which person(s), breaks into your computer system plus, hacking can be prevented through installing a firewall which creates a software barrier, preventing other network users gaining access to your data on the computer,
Backups are what we use in case, a disaster strikes, the reason is, the users need backups and is essential that plenty backups and to try to recover files, documents, personal, information, privacy, and confidentiality, to prevent corruption, damage and loss of data, files, and personal information and to especially avoid the loss of data,


The security issues that the use of potential threats of it has introduced
The potential security issues people whom have personal computers have should be aware of the issues that can affect them and their pc and this is where security issues to keep in mind, the reason is, there are hackers that can access your pc, your networking sites such as, face book and twitter, they can also, access your personal information, pictures, videos, images, documents, confidentiality files and documents and their privacy and etc, however, the installing of antivirus they can protect their pc and files, and prevent them from corruption, damage or even loss of data which is to be kept in mind,
Their personal computers can be accessed through their social networking site(s) through friends or to everybody and this way they have found their way to get to your pc that includes, your personal information, pictures, videos, images, documents, etc, and to just allow friends this way you won’t be hacked and this is another way to prevent hacking and this is an advantage for the people and the vice versa for the hacker also, this can be prevented on emails, you tube, Gmail accounts etc,


The potential threats of it and the forms it includes
Cyber bullying is the use of communication through networks to bully an individual by, typically sending to them messages that are intimidating or of threatening nature and this is can be prevented by reporting the individual(s) whom are bullying and cyber bullying is considered as, an criminal offence which is unlawful,
Virus bug is a piece of code that is capable of coping itself and typically has a corruption effect, such as, damaging files, or destroying the data and a virus bug can be prevented by installing a firewall which is a software that creates a barrier of antivirus software to keep the virus bug at bay to prevent any loss of data, and this is done by downloading a virus bug,
Spam is unknown individual(s), using viruses that send the same message indiscriminately to large numbers of people on the internet, through social networking sites mostly and the reply of the individual can be prevented,
Phishing is stealing identities, private information and confidential files and documents as well as, passw3ords, usernames, and more etc, furthermore, phishing is an activity seen as, defrauding an online account holder of financial information by posing as an actual company with a fake website setup, and is a trap that can be avoided,


The forms of hacking a personal computer to identity theft to rejection of service attack
Computer hacking is an, individual is trying to gain access by breaking through the barriers of antivirus with the use of a threat of virus which is extremely complex and this can be done though either the many computers they can have to get to you or by using the internet, plus, hacking in fact is most noticed amongst teenagers and young adults, there are many elder hackers as well moreover, the many hackers there are, are known as, it buffs who enjoy learning about how computers work and which they consider hacking as , an ‘art’ form,
However, this is a problem that can be overcome with solutions by setting security questions and answers and answers for your account along with an alternative email which is an great advantages, people whom have pc’s should be aware of making sure their usernames aren’t too, simple especially their passwords which is the complex part, the way to prevent this is to have letters, numbers and symbols, to make it complex for the hacker and the password should be about , 8 characters for the password, there are as, many advantages, with many other disadvantages,
Identity theft is considered as, an offence and unlawful which have stern consequences for the actions of those individual(s), whom have done this act and are considered as, an criminal, identity theft is basically, to find information on people to like, their personal information, private and confidential files and documents as well as, personal details and more, they can use these to open bank accounts, credit card details, documents like, passports ad driving licenses in the people’s names and surnames’ to overcome this problem there is a straightforward solution,
The problem can be overcome is to be careful what information people enter in the computer or on the internet websites, for social networking sites such as, face book and twitter whom can see ‘knowing me’ the people can alter that to friends only, which is people whom accept you and this way people can overcome identity thefts, furthermore, there are many websites that have viruses, spam, malware, trojans, spy’s, hacking, identity theft, rejection of service attacks, and popup, which is harmful to the pc and can trap you on the website with spam and steal your personal information,
Rejection for service attacks is for i.e. malware, usually comes as popup ads and can hijack your browser, redirect your research attempts and you get pop-up’s  that the computer may have a virus of some sort and you would then need t buy a an antivirus like, firewall which creates a software and acts as, an barrier to keep the viruses at bay and an AVG scanner which detects any viruses and eliminates them straight away and should be done daily and this way it will prevent the hackers using their ‘art’ form, and will be denied access even if they tried which is an elegant system,
However, pc users need to keep in mind that you cannot use certain, virus scanners, the reason is, its blocked and can make the pc users computer slow and therefore, they won’t be able to open most of the programmes, the reason is, the hackers want them pc users  to buy, a new virus scanner, and you click buy, and so, it doesn't work then you would need to buy their virus scanner again, and this is an advantages which hackers use to get to people and by stealing you money and the hackers see them as, a host, by taking over their entire computer,


How to stay safe and secure from potential threats which the use of it has introduced
The subsequent is stated about the safety and security of the pc users and this has linked with e-safety, which keeps people from troubles with hacking, social networking sites, identity theft, and viruses, conference calls, and more, however, it has helped many pc users overcome these problems with ultimate solutions,
The internet is a virtual world wide web in which millions of people uses all over the world to communicate with each other and most information is set up. The internet offers and provides useful information and provides many opportunities to explore create and collaborate. But it’s important to keep yourself safe and secure so that you can make the most of it.
The growing popularity on the Internet in recent years has brought about many concerns about online safety. Many users are concerned about the protection of information online, and others are troubled about safety of minors browsing online. The Internet offers so many opportunities o explore, create, and collaborate. But, it’s important to keep yourself safe and secure so that you can make the most of it. Whether, you’re a new Internet user or an expert, the tips and tools online help you to navigate the web safely and securely.
A criminal might try to gain access to your personal information such as email password, bank details, or national insurance number, et ...they might do this by storing some kind of virus such as malware on your computer, by tricking you into your own account or tricking you into giving them the information. Then they could steal from you, impersonate you or even sell your details and personal information to the highest bidder.
People can also get in to your personal details though phishing, phishing is a method of online identity theft. Phishing emails are designed to trick the users into visiting the links in the email that are designed to steal personal information such as usernames, passwords, credit card information et   So it is very important to be aware of these dangers and not go on harmful website.


The forms of staying safe & secure online to prevent issues
Secure passwords - learn more about how to create strong passwords
Prevent identity theft - know the common tricks that criminals employ to help you protect yourself from online fraud and identity theft.
Avoid scams - the web can be a great place, but not everyone online has good intentions. Learn three simple ways to avoid scammers and stay safe on the web.
Keep you device clean - find out some common signs that your device might be infected with malware - malicious software designed to harm your device or network and how you can protect yourself.
Signing in & out - signing into your Google account is simple and useful - but know when it is important to sign out as well.
Lock your screen or device - you wouldn't go out for the day leaving your front door wide open, right? Find out why you should lock you screen or device.
Report abuse and illegal activity - help you and others to stay safe online by reporting people or companies who send spam, try to sell counterfeit goods, distribute malware or are otherwise abusing our systems.
Check your G mail settings - if you use G mail, you can follow these steps to help make sure that your account stays safe.
Use secure networks - are extra careful whenever you go online using a network you don’t know and learn about settings up your home router and Wi-Fi network securely.




How to ensure the pc users data is safe & secure
To ensure that your computer data is safe and secure by avoiding viruses and using some forms of Protection. An great example would be Phishing and what this performs is its attacks can be avoided and prevented, by guarding against spam, avoid Phishing attacks by communicating personal information only through phone or though websites that are secure such as Hotmail and G mail and to find out and ensure that your personal information is safe also, never enter personal information on a pop up screen.
 The sorts of protection to prevent security issues
Smart screen filter is like firewall in which it helps, prevent spyware, trojan s  and viruses et.  From entering your computer system and personal information i.e.  my documents, pictures, emails, social networking sites, passwords, accounts, and your webcam.

          i.            Ensure that your computer is protected with a firewall, spam filters, anti-virus protection and anti-spyware software. Keep in mind to ensure you don’t reply do a random email message(s) and to avoid going on fake websites, which may harm you or your computer.
        ii.            You should minimise security issues in the browsers.
       iii.            Use trustworthy websites, certificates
        iv.            Use a strong password and prevent anyone from going into your account
         v.            Have private browsing so that only you know what you’re undertaking
        vi.            Pop up blocker is useful and helps prevent any pop ups which may be harmful to you or your computer
Knowing when to trust a legitimate website & how to identify a secure website
Many websites require you to enter your personal information such as Hotmail, G mail  & Social Networking Sites such as, Face book & Twitter before you can access areas on the site or purchase an item or service. Before you trust a website with your personal information, ensure the subsequent;
          i.            If you arrive at a website from a link in an email message, verify with the sender of the email message that the website is legitimate before you provide any information to the site. Phishing websites can sometimes send email messages that mimic, or spoof, legitimate email addresses.
        ii.            Make sure that the website’s address begins with HTTP S, and that a lock icon Picture of lock icon appears in the Address Bar. You can click the icon view to view your security information and certificate details.
       iii.            Check the web address in the Address Bar and in the certificate details to make sure it matches the address you want. Phishing or Fraudulent websites will use similar website names to trick visitors into believing they’re visiting trusting websites.
        iv.            Check to see if the website displays an Internet trust organisation logo. The logo indicates that a site has a privacy statement and allows users to choose how their information is sued.
For more information on secure websites, just click the link about how to know if an online transaction is secure in Internet Explorer 9. Note, however, that many legitimate websites aren't registered with trust organizations, and some websites display fraudulent logos. However, if you aren't sure whether a trust logo is legitimate, contact the trust organization to see if the website is registered with them.
You should cover the subsequent t in order to make sure that your data is safe:
A firewall is a software or hardware item which provides security for a computer or local network by preventing illegal access.
Encryption defines to mixing data in a way that only the PC user with the secret code can interpret it.
Backups imply making one or more copies of your data somewhere else; in case a harmful virus wipes out your operating system you will still have the work and data as you had backed it up.
5 Tips for Staying Safe on the Web
                      i.            Use strong passwords
                    ii.            Enable 2-step verification
                   iii.            Install updates right away
                    iv.            Be wary of suspicious emails and offers
                     v.            Scan regularly for viruses
You can learn how you can stay safe and secure online, how you can protect your family online, learn how Google helps to protect you, and know you web. The next are safe sites: to verify whether these sites are safe or not, the way to notice it is to look on the after HTTP, it then has an S at the end and looking across the link the site will have a padlock to show that their site is safe.

Wednesday, 19 June 2013

Dcscuss the potentialm threast which the use of IT has introduced


Discuss the potential threats which the use of IT has introduced

Scenario: An example of a security issue is i.e. someone that could access your personal record and share the information with everyone.

An unauthorised access is when a data is addressed by controlling the access rights, but, there are even more potential dangers and security issues.

Security Issues are if someone can access a single computer, they can access the rest of the computers which is potentially dangerous in which the person can access others work folders, files, documents, email and confidentiality which is a risk in having security issues.

Malware also, known as (malicious software) is a software program which includes viruses, worms and Trojans are designed to cause danger and security issues.

Viruses are what damages files and can be prevented by installing anti-virus software and by not opening attachments to emails from unknown sources.

Backups are what we use in case a disaster strikes and the reason is that we need backups is that it is essential that sufficient backups and trying to recover it are in place to avoid possible loss of data.
 
Hacking is an act in which a person(s) breaks into your computer system also; hacking can be prevented though installing a firewall which creates a software barrier, preventing other network users gaining access to your data on the computer.

Monday, 17 June 2013


 Why I used the blog:

Out of all of the other communication channels I used the blog as it allowed me to share information with my team. This method is more effective then email as it allows all of us to see the information on the blog plus it lets us edit information and also allows us to comment on other peoples work. A benefit of using the blog is that its time affective for example if you an email you would have to usually wait for them to access and reply whereas with a blog they would get the information quicker and will reply straight away. We could have also used facebook to share information but we did not do that as other people who are not involved can get involved or steal our information whereas in the blog the information was only between me and my team for example invitation only.

Other social networks could have been used for example twitter, MSN, Google plus etc. The reason why we did not choose any of these channels to communicate our information is because they would not allow us to secure connections.

Another reason why we did not use facebook etc is because we could not access them within the collage environment whereas we can access the blog anywhere.  

Monday, 10 June 2013

§computer networking

§How computer networks improve communications for individuals and organisations

§The Computer Networks
A computer network is when two or more computers are connected together to share information such as hardware, data, and software. Most common are the local area network (LAN) and the wide area network (WAN). A LAN can range from a few computers in a small office to several thousand computers spread throughout dozens of buildings on a school campus or in an industrial park. Expand this latter scenario to encompass multiple geographic locations, possibly on different continents, and you have a WAN. Topology is the description of how the networks are arranged and the features of topology are i.e. Star, ring and bus etc...

Email is a quick, simple and easy way of communicating to others and the reason why an email is thought to be a networking site is that a person communicating through to one or more people is thought as a networking site. However, if a person wants to send work to a friend of theirs it would be that they would attach the work through an email and once the email has been sent, the information on the work such as hardware, software data or would go through a server that sends the information of the work which is on the email attachment to the person and the person would receive the work.
§The Current Use of Computer Networks & Their Purpose

Computer networking is currently being used to browse, buy, sell, research, socialize and playing online games etc... Nowadays more and more people are researching, buying/selling or socializing on networking sites such as face book, hotmail, twitter and Skype etc...However, people generally use computer networking as a way of communicating to one or more people such as to friends, family or work colleagues. People use Skype as a social networking site to communicate to far away relatives across the world. People on face book and twitter generally talk about what they did during the day, what they’re going to do and general talk.
What’s more is that why face book and twitter are the common socializing networking sites is that you can upload videos, jokes, checking the latest news and playing online games while socializing to other people. In addition Google is the world’s biggest networking site and the reason is because most people around the world use it for businesses purposes such as setting up websites, for their organizations or companies etc. What’s more is that on company websites such as eBay or Amazon are currently being browsed for what item of product the person is looking for and they can buy it online buy paying the other person directly.

§The Reasons Why Social Networking Is A Great Way of Communicating
Social networking is a good way of communicating with one or more people through social networking sites such as face book, twitter, hotmail, MySpace, email, msn, Bebo, instagram, bbm, Skype, podcasting, YouTube and Google. As an example YouTube has videos that can be uploaded, removed, shared and viewed by millions people across the world also, comments can be put beneath the video and they can make humorous jokes, have debates or talk about a topic issue and have a laugh or two about the video. Google is the world’s biggest search engine and the reason is because most of the people use it on a daily basis.

In another example of an everyday scenario for office workers, staff or boss use email as a quick, easy and simple way of communicating to each other with their workers, clients, staff etc... Such as when the next business trip is, who will be promoted employee of the year or what improvements are needed to make better the business. There are different kinds of emails such as hotmail or msn and email is sending a message to someone electronically. Communicating by social networking sites with Skype, face book or email are great ways of communicating to those that are in another town or in another country.
§The Kinds of Communications & Their Purposes

Communicating is considered being able to talk to one or more people through social networking such as the following;
How is social networking a good way of communicating?

Face book
Twitter

Hotmail
Msn
MySpace

Bebo
Instagram

Skype
BBM

Podcasting
E-mail

YouTube
Phoning and texting, both are good ways of communicating to family and friends.

§The Reasons a Computer Network Can Help Improve
Office workers are reminded when the next meeting will be by receiving an email from the boss or other co-workers, nonetheless a computer network is good because you can have a website which will improve the business as well as the number of people putting in positive comments about their business. A computer network can help improve the business with a website to show the company as to how much they’ve improved and what they needs improving. The structure can also be used to see who the manager is > executive assistant > personal assistant > receptionist > workers etc... Like a spider diagram.

A computer can help improve the way we communicate and socialize with other people using various types of networks and are very useful because it makes our learning easier, the way we live simpler and what we are looking for quicker. A computer network is important for those that work in industries, companies and organizations etc... As well as communicating using computer networks. Although they help us in our everyday lives computers are useful in offices because using a computer network it can show you a structure of either you business or company in which what’s good so far and what will need to be improved.
§The Kinds of Ways of an Individual Communication Using Computer Networks

Ways of individual communication using computer networks through social networking sites i.e. Face book, webcam and twitter etc...,nonetheless face book and twitter are optional and this is because the person with a face book account can choose how many people they want to communicate, socialize and become friends with. Webcam is most often an individual communication whilst using a computer network, it depends on the number of people you are communicating to by talking to them, in a way webcam is /isn’t optional. Individual communication is better.
Individual communication is a way of using the computer networks through the internet in which can set up a blog. A blog is a website on which an individual or group of users record opinions, information, comment, videos and pictures/photos, post their thoughts etc... On a regular basis a person can set up a blog with just them and their friends to know what they are doing up-to-date. Nowadays people use the internet as a way of communicating with family and friends.

§The Kinds of Ways of an Organisational Communication Using Computer Networks
Ways of organisational communication using computer networks for example social networking sites are used to communicate and people can start an organisation to campaign/protest or to do a petition so you can get your point across. Organisations as i.e. Human rights, non profitable, charity and international organisations etc... However, organisations would use Wikipedia as a way of communicating as it allows them to put information about the business also; businesses use the intranet for communication. Intranets a business website that’s only used by those within the business and no other person can access the website.

Whereas Amazon is a website which everyone can access because it sells products that have been made in the UK and sometimes overseas international by importing them and people can buy this by having a buy the specific product they’re looking for by paying online or direct debit. Amazon is one of the most visited organisational website that people have been on to look for, browse, buy and sell products on. EBay is another organisational website that is quite similar to Amazon. Moreover, Amazon and EBay could advertise their products on other websites for people to click onto and browse on and this would expand their organisation by using computer networks. Amazon and EBay are also a company as well as an organisation.
§The Kinds of Networks That Allow the Sharing Of Information, Hardware & Software

Information - you can use hardware i.e. a scanner, on a network and everyone can be connected to it so that they’re information can go through the network to be scanned and then to appear onto the screen monitor.
Hardware - is a printer, scanner, photocopier, fax machine. However, a fax machine and printer are quite similar and the reason is that they both have information on which you can print off. > PRC prints off work and everyone can have access to that one printer in the room.

Software - if a person buy’s a  Microsoft license and install‘s it on a pc also known as a personal computer and anyone who were to log in and uses that specific pc they can also, use the same software and helps to prevent illegal software.
§The Kinds of Networks That Are Used To Manage Resources

Large organisations have a network administrator that could be responsible for managing the network with the resources;
Making sure it runs smoothly - no problems by preventing viruses, hacking and preventing people from installing illegal software.

Deal with issues proactively and reactively - proactively is preventing a virus from entering the networks and reactively is a virus that’s in the networks but, is prevented by installing an anti-virus.
Backing up data - making sure that you save files on a hard disk drive and storing it in a safe site.

Setting up policies - ensuring that people do things properly such as i.e. passwords etc
Providing security - preventing viruses and hacking into the system etc

Organisations that I am familiar with are i.e. Argos is a huge organisational company that has a website to show what products they sell that people would be interested in buying  however, to improve their productivity they could advertise on other websites such as business, non-profitable and social networking sites etc... Because they can get more people to buy their products which would increase their profit also, to see how much they have improved in their productivity and how much difference they have made in their organisation. To make the productivity even better is that they could advertise on TV programmes or have a fun run by being sponsored. Amazon is too, an organisational company but, is a little different to what Argos does.
§The Many Kinds of Network Issues

Speed
Small server, limited processing and memory

Low bandwidth, high contention
Costs

Extra equipment and maintenance
Staff skills

Network specialist
More user skills

Downtime
Needs maintenance

Planned downtime or emergency
Security issues

Unauthorised access
Malware & hacking

Backups
§The Speed & the Costs

Scenario: In a workplace you had a small server to ruin the network, the people that are in charge of the IT would need to limit to the number of people trying to use the system at the same time.
Bandwidth: Insufficient bandwidth could result in the server running quite slowly and whoever, uses is will become frustrated. I.e. a film watched on YouTube lacks of continuity because the picture keeps freezing.

Contention: if too many people were to try and send messages or access a resource at the same time, contention issues would result in as a system crash. However, until the problem has been dealt with, no-one can access the system.
Speed Issues: Can be avoided by having inadequate resources such as;

Memory
Fast processing speed

Appropriate wireless connections
Costs: A networked system is simple than the same number of individual computers. The interconnection of the hardware and the network operating systems adds to the complexity > cost > of the system.

§The Staff Skills & the Downtime
Staff skills: Network users need higher skills than those that are have individual computers. These skills can be provided through the training, in the following;

How to log on
The importance of passwords and keeping them secure

How to share files
How to use work areas

Downtime: a network cannot run forever, without a period of maintenance. Access to the network has to be suspended and this is called (planned) downtime.
Organisations such as banks schedule a downtime at the least busy times for the network.

§The Report OF Describing the Network Issues of an Organization Should Be Aware Of
The network issues that the organization should be aware is of personal information and this is where security risks comes in and the reason for this being is a hacker can access you computer, your networking sites such as face book or twitter, and can also, access you personal information, pictures, videos, images, documents, etc...However, to install an anti-virus you can protect you files as well as your computer from being accessed by someone else plus, only allow access to your friends on you networking site and this way you can’t be hacked and the person(s) won’t be able to access our networking site.

There are major security risks that are in social networking and they are;
Scenario: An example of a security issue is i.e. someone that could access your personal record and share the information with everyone.

An unauthorised access is when a data is addressed by controlling the access rights, but, there are even more potential dangers and security issues.
Security Issues are if someone can access a single computer, they can access the rest of the computers which is potentially dangerous in which the person can access others work folders, files, documents, email and confidentiality which is a risk in having security issues.

Malware also, known as (malicious software) is a software program which includes viruses, worms and Trojans are designed to cause danger and security issues.
Viruses are what damages files and can be prevented by installing anti-virus software and by not opening attachments to emails from unknown sources.

Backups are what we use in case a disaster strikes and the reason is that we need backups is that it is essential that sufficient backups and trying to recover it are in place to avoid possible loss of data.
Hacking is an act in which a person(s) breaks into your computer system also; hacking can be prevented though installing a firewall which creates a software barrier, preventing other network users gaining access to your data on the computer.

§The Kinds of Individuals & Organisations Using Networks to Improve Productivity
There are those kinds of individuals and organisations that use networks to boost their productivity by setting up a website or upgrading the website, like Amazon offering a one day rush which is a way to attract customers that find it interesting, quick, simple, and great to use, and with this your delivery can come early 2-3 days too, however, there are other similar websites  like eBay which do the same thing but, are 3 massive companies also, known as an organisation which use the networks to improve their productivity plus, these organisations use the networks to improve their productivity by advertising on the social networking sites such as: Face book & Twitter which that is sued by many users of these social networking sites all over the world. Other individuals use social networking sites and the media to improve their productivity and even though the individual isn’t in a massive organisation, the individual step by step can create a mass organisation which can only be done though the use of networks for the individual.

These are the subsequent ways in which individuals and organisations themselves use the networks to boost their productivity, the individuals can create a mass organisation through the use of networks and so, can the organisations create mass companies too.
The individuals:

The social networking sites
The advertisement on t.v

The sponsors on the websites
The media, news, newspapers

The jobs available on websites
The company’s contracts sign

The organisations:
The social networking sites

The advertisements on t.v
The sponsors on the websites

The media, news, newspapers
The jobs available on websites

The company’s contracts sign
There not just these networks but, many other however, many o the other have their own ways of having their many ways of use o networks plus, this is the greatest way to have great revenue sales customs.

§The Examples, Reasons, & Purposes of Individuals & Of Organisations Ways of Boosting Their Productivity by the Networks
The subsequent are examples, reasons, and purposes of individuals and of organisations ways of boosting their productivity by the use of networks and this will be explained with a  scenario which will give a brief outline of what will be explained plus, there will only be 2 examples decidedly explained so, these are the subsequent:

Scenario: you have been asked to boost productivity by using the networks. You must explain in detail for the examples, the reasons, and the purposes of it and so, you must do this to meet your merit criteria.
There are many examples of individuals and organisations which use the network to boost their productivity using the networks and they are the subsequent:
EBay
Argos

Matalan
John Lewis
Amazon
The Apprentice
& many more
§The One Major Individual That Has Improved Productivity as a Result Of Using Networks
Scenario: you have been asked to boost productivity by using the networks. You must explain in detail for the examples, the reasons, and the purposes of it and so, you must do this to meet your merit criteria.
The Apprentice is an  British reality television series in which a group of aspiring young businessmen and women compete for the chance to work with the British business magnate Lord Sugar plus, in the series one - six, the prize was £100,000 a year job and the winners went onto work at Amstrad, that’s an electronics manufacturing company founded by Lord Sugar or one of Sugar’s companies  such as: Vilene, Arms prop, or Arms hold in series seven, the prize changed to £250,000 investment in a business of the candidate’s creation, with Lord Sugar as a 50% owner.
The Lord Sugar has signed contracts and has an electronics manufacturing company, and many other companies also, this is an individual who has created a mass of companies by himself and he did this by using networks and communication moreover, as a result he is now a billionaire plus, Lord Sugar uses his networks, companies, and contacts, overseas as a way of communication and by him setting up and creating companies he is the one major individual that has improved his productivity and as a result of using networks.
The networks the Apprentice and the individual who is Lord Sugar uses are to boost their productivity so, they have as a result a successful company, workers, networks, and contracts, plus, the networks Lord Sugar uses are essential for an individual who is successful in the field of business moreover, Lord Sugar uses networks such as: the media, which has network contacts with the newspapers, the news, the global technology, the social networking sites, sponsors by huge companies, adverts, t.v programmes websites, and company contracts.
The networks used are quick, simple, and a great way to communicate and have contacts which can boost their productivity in the field of business especially, including the media as a useful and economical network that has links to many other destinations, furthermore, not only is the network useful and economic but, a fascinating way of achieving sales revenue customs and the individual Lord Sugar also, known as Sir Alan Sugar has created an empire of companies and is an billionaire and is successful in what he known and does best in.
§The One Major Organisation That Has Improved Productivity as a Result Of Using Networks
Scenario: you have been asked to boost productivity by using the networks. You must explain in detail for the examples, the reasons, and the purposes of it and so, you must do this to meet your merit criteria.
Amazon also, known as Amazon.com, Inc is an American-Based Multinational Electronic Commerce Company and is the America’s Largest online retailer, with nearly 3 times the internet sales revenue of the runner up, Staples, Inc, Plus, Amazon serves its products worldwide and using networks Amazon has separate retail websites for the United States, Canada, United Kingdom, France, Germany, Italy, Spain, Brazil, Japan, and China, with International shipping of the products.
The networks the Amazon organisation uses to boost their productivity with their custom revenue sales, with the International shipping of Amazon to certain other countries for some products and another networks which is simple, quick, and great to use is their website which is a network used to boost their productivity online to their customers sales on a daily basis.
Amazon is expected to launch a websites in Poland, Netherlands, and Sweden and the reason for that being is they would like to make more revenue custom sales daily from more countries and by launching a website in 3 more countries it will give the Amazon organisation an mass difference they use the media, the social networking sites, the advertisements and many more way to boost their productivity and have signed contracts with other companies  like Staples, Plus, Amazon is an successful mass company.

Amazon is successful business organisation in its field , the reason for that being is an major organisation as Amazon, there are many Amazon companies all over the globe and this is the mass great way of using networks by having other Amazon companies everywhere and this way their sales revenue customs with increase and not only that but, Amazon will be successful in its business filed and have improved a mass great way of improving their productivity plus, Amazon as a result is successful by using networks and communication.