Thursday, March 14, 2019
Internet Security Enforced Essay
The coming of computers and their related technologies has greatly impacted on everyday own(prenominal), academic, and professional lives. The meshing has become one of the leading sources of development as many plenty prefer to approach path and analyze the information they need from the World grand Web. The net profit has so much information which is very accessible to anyone who has a connected computer, and this includes small children. Teachers, students, and educational institutions have increasingly relied on the cyberspace for learning both inside and come outside the context of the classroom.How these technologies atomic number 18 implemented however determines if their application is good (ethical) or not good ( wrong). In this essay, the author seeks to explain how applied science might be in spend to ca ingestion good upbeats to the society and bighearted benefits. One major benefit of technology is that it has created efficiency in everyday life. Computer s arsehole process astronomical amounts of data with minute precision, and this application is in use by parentage organizations all over the world (Cohen, 1995).However, the information in the World wide-cut Web is accessible to many people, and if sufficient trade protection measures are not put in place, this benefit could end up universe ab employ. in that location is thus a need for software system developers, organizations, naturalizes and governments to work together in ensuring that technological systems that protect the rectitude, confidentiality and solitude of information posted on the cyberspace is ensured. Many unscrupulous individuals like hackers, cybercriminals and cyber-terrorists are ever lurking to seize personal information from the internet with the purpose of orchestrating several types of crime.With the amount of money organism paid in the black market for private information, hackers are always on the prowl waiting for an opportunity to cause hav oc on academic institutional, governmental and corporate websites (Guangrong, 1998). The information they obtain ends up being used to commit crimes like online fraud, identity theft and espionage. With this unethical workout being a very probable occurrence, very robust security software applications like anti-spyware and anti-viruses mustiness be made so that the integrity of information stored in the internet arsehole be protected.As I stated earlier, as long as the computers available in schools and libraries are connected to the internet, there is no limit to the diversity of information school children can gain access to. Any implementation of technology must be made with the objective of serving the community it targets with benefits. The objective of information technology services in schools is not that school children can access adult material or any other(a) information that can be of bad influence. This is where technology steps in. ffective technologies of combating unethical sites (that is the ones with pornographic material, dislike campaigns as well as a variety of other contrary content) should be implemented in schools and at homes to protect the innocence of children (Guangrong, 1998) The to a greater extent the internet technology penetrates, the more teachers and students are finding it a profitable tool for teaching and learning (Fung, 1998). The internet sounds and looks pretty simple to anyone who does not really understand the technicalities behind it.The use of persuasive technology on the internet is one suit of technologies that could lure both teachers and students in orchestrating the get along of unethical activities. Persuasive technology as used in the internet poses a very serious challenge to educational instructors who choose to bugger off unnecessary their services through the internet. There is a very high peril of persuasive technologies being used to intentionally or unintentionally make children submit sensi tive information about themselves or their families without knowing the risks they are exposing themselves and their families to.By definition, persuasive technologies are those interactive technologies which are intended to agitate an individuals behaviors or attitudes towards specific issues including cordial, sexual and political beliefs and practices (Ellison, Steinfied, & Lampe, 2007). They can also be used to bear on healthy eating habits and sense on environmental conservation. These are examples of technologies which can be used to promote good use of technology and also bad use as explained below.Intelligence systems designed to oversee the activities of employees as they log in and out of the systems in the workplace constitute a healthy of ethical use of technology since it ensures they effectively use the resources at their disposal for the benefit of their employer and themselves (Cohen, 1995). With social networking sites and chat rooms increasing by the day, empl oyees are developing the inclining to waste a lot of man hours on these sites. Their productivity therefrom goes down and the effect is finally transmitted to the economy.Additionally, employees can use military position systems to do bootleg things like spy on their employers or other entities. If persuasive technologies are put in place to monitor their activities, thence there will be less breakage of law and ethics. The homogeneous persuasive technologies can be put in place to monitor the movement of employees in service provision stores like supermarkets, restaurants and bars. This could end up ensuring that they stick to etiquette like washing their hands after visiting the washrooms or after getting into contact with other unhygienic practices, but it is unethical since it undermines their dignity and creates distrust.The same applies to companies who require visitors to their websites to submit their personal information onwards utilizing certain services before using a certain utility, for example downloading a software package or accessing a certain article. Legally, technology can be used to ensure adherence to laws especially those suppose to control the process of conducting or dissipating information on the web. If monitoring software can be installed at internet gateways to track any illegal undertakings being conducted in the web, the culprits can be tracked down and stop to promote the safety of other internet users.However, this in itself has ethical implications in that every bit of content will have to be checked, and the privacy of information will be compromised albeit by a law enforcing agency. The causation of monitoring agencies may be good, but it may be used to conduct morally unacceptable activities by all or kindle parties. Finally, there has been widespread condemnation of censorship, particularly in the case of Google stool and the government of the Peoples Republic of China.The Chinese government stipulates exigent c ensorship of the media including the internet. Not every type of information can be accessed, and this is achieved by the use of inhibitors to the various protocols used to search for and access information. This now violates the peoples right to information and is therefore not however unethical but also illegal. From these examples, it is evident that the internet and other tools provided for by technology can be used to constitute good and bad use.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.