Skip to content

Advanced Studies in Information Processing

Menu
  • Home
  • Privacy Policy
  • About us
Menu

Information Literacy

Data Handling

Frontier Informatics

A Review and Reflection on Network Information Technology Studies

Posted on December 22, 2025 by Xinjie Li
Print 🖨

Introduction

Since the beginning of this semester, through this course, I have learned a lot of knowledge that I had never known before. Starting from understanding the knowledge of network information technology, to the privacy of network information, the security issues of network and personal information, the classification and security knowledge of network passwords, and then to the five stages of Project Life Cycle and Gantt Chart project progress management, etc. I feel that taking this course is a brand-new experience. Not only has my understanding of the Internet deepened, but I have also learned how to obtain information on the Internet and use it effectively.

Information Evolution and Network Technology

The course reviews the evolution of the importance of information in historical development – from the spark in the Stone Age to the grain reserve in the agricultural age, and then to the modern information monopoly. The course we are discussing is about information, and we have seen different ways of presenting information. We discussed the content management system, talked about how information is transmitted from one computer to other servers in the network, and also about how information is transmitted through Wi-Fi and cables, as well as the security issues involved. The problem with managing information lies not only in the information itself, but also in the fact that we have a large number of tools with exactly the same functions, making it impossible to tell which one is better than the other. So, why does this situation occur? In terms of personal research, we usually believe what our friends say and also what we see on social media. So when we think, all these factors come together. Next comes information management. As a client, personal data will be shared with large companies, and when working, one is also responsible for managing how the information shared by clients will be used internally. Whether in personal life or in a business environment, here are some things that are usually present. Best practices when choosing which technology to adopt, for example, chatgpt and DeepSeek. We will always be confronted with the question of how to manage the information we share with various companies and how to manage the information we obtain to complete our work.

Network Information and Security Challenges

Understanding network knowledge enables people to comprehend the distribution and characteristics of global network information resources and to use various information retrieval tools to obtain the information they need from the Internet, solve problems encountered in daily life, and make effective use of information [1]. As a confronting population of the present era, younger generation is experiencing emerging stage of life and is at higher risk of serious mental health problem [2]. While social network media bring us entertainment, it also brings psychological pressure. With the twenty-first century’s advancement of technology comes the increasing problem of data breaches wherein sensitive information is exposed [3]. In today’s era of rapid development, network data leakage has also become a problem that cannot be ignored. Therefore, when surfing the Internet in daily life, one should have the awareness of protecting their own information. Highlight that ICTs create new possibilities for cooperation that would be impossible or extremely difficult in traditional settings [4]. The social network effect plays a key role in shaping innovation in the digital society. Whether it is our research participation, technological cooperation, spatial differences or crisis response, the network determines how innovation unfolds. Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, modification in system, misuse, or denial of a computer network and network-accessible resources [5]. With the rapid development of modern network technology, network security is facing many threats. However, there are also many preventive measures for cyber security. Through these preventive measures, the network can be made more secure and a safer online environment can be created.There are various threat sources including software bugs mostly as the operating systems and software used becomes more functional and larger in size [6]. Computer network security has become a very important issue in today’s information society, and it is necessary to enhance network security protection.

Conclusion

Through the study of this course, I have understood what a website is, what the Internet is, and so on, and I want to have a deeper understanding. I found the study of this course quite different. Unlike what we learned in university before, the knowledge we are learning now is often a bit complex and difficult to understand deeply. We need to further understand and find answers based on the clues of the knowledge by ourselves. But this is exactly what we need to study at present. Through this period of study, I have gained a deeper understanding of the Internet from many aspects and different perspectives. I think this can not only enable me to acquire relevant knowledge, but also be helpful for my personal thinking and study habits. This is not merely a simple course; it also lays a foundation for one’s future thinking and learning.

References

[1] P. Xia, “A brief discussion on information literacy education for college students,” Library Science Research, no. 6, pp. 79–82, 2000. (in Chinese)

[2] H. Bashir and S. A. Bhat, “Effects of social media on mental health: A review,” International Journal of Indian Psychology, vol. 4, no. 3, pp. 125–131, 2017.

[3] C. Kenny, “The Equifax data breach and the resulting legal recourse,” Brooklyn Journal of Corporate, Financial & Commercial Law, vol. 13, pp. 215–240, 2018.

[4] G. Misuraca and G. Pasi, “Landscaping digital social innovation in the EU: Structuring the evidence and nurturing the science and policy debate towards a renewed agenda for social change,” Government Information Quarterly, vol. 36, no. 3, pp. 592–600, 2019.

[5] M. V. Pawar and J. Anuradha, “Network security and types of attacks in network,” Procedia Computer Science, vol. 48, pp. 503–506, 2015.

[6] M. A. Aydın, A. H. Zaim, and K. G. Ceylan, “A hybrid intrusion detection system design for computer network security,” Computers & Electrical Engineering, vol. 35, no. 3, pp. 517–526, 2009.

About Author

Xinjie Li

See author's posts

Recent Posts

  • Cameras That Collect Information – Benefits, Problems, and Security
  • A Review and Reflection on Network Information Technology Studies
  • Project Life Cycle in Everyday Activities
  • Project Management Through Simple and Real Examples
  • Project Management Thinking into Higher Education

Recent Comments

No comments to show.

Archives

  • December 2025
  • November 2025
  • October 2025

Tag Cloud

About us

LAI603 – 情報処理学特論
Advanced Studies in Information Processing
This website is used by the graduate students of Miyazaki International University in the Advanced Studies in Information Processing course.

Links

Miyazaki International University
Moodle
Admin
©2026 Advanced Studies in Information Processing | Design: Newspaperly WordPress Theme