Internet censorship research paper

Document Type:Research Paper

Subject Area:Technology

Document 1

In addition, I will discuss how Internet censorship is essential in avoiding several cybercrimes. In conclusion, I will study and analyze both sides of the coin that is internet censorship and the control of the flow of information. In addition to that, I will give innovative alternatives to these measures. Table of Content Chapter 1: Introduction……………………………………………………………………. 5 Chapter 2: Problem Statement……………………………………………………………. 5: Virtualization…………………………………………………………………13 6. 6: Government Regulations……………………………………………………. 14 Chapter 7: Conclusion……………………………………………………………………. 15 References…………………………………………………………………………………14 Bibliography………………………………………………………………………………. 17 Introduction Over recent years, the internet has become one of the most powerful means of communication in the history of humankind. We should control the internet. One of the major reason is the internet has been used to spread hate and propaganda all over the world. Some governments have banned some of the search engines in their country.

Sign up to view the full document!

Is this move justified? I think it is justified because of different reasons which I will discuss in this paper. Control of Flow of Information Over the past years, leaders from all over the world in order to take control of their rule, they have tried to control the flow of information. As they deal with that, they have been accused of restricting access to networks. In addition, they have been accused of denying access to certain messaging apps such as Telegram (Liang & Lu 2010). Data Analysis According to Busch et al (2018), “manipulating the regulatory and political environment offers leaders a less disruptive option for controlling the media, including the internet. ” The authors' further state that this approach has been successful in governments in Turkey and Russia.

Sign up to view the full document!

The main important issue is to engineer laws. Also, the administration uses this style to overshadow online protest. The technique used is called astroturfing and aims at giving the appearance of grassroots support. In another example, the technique was tried in Saudi Arabia (Liang and Lu 2010). According to Busch et alt(2018), “his happened when it apparently co-opted automated accounts to advance an obscure figure in the Qatari royal family as a potential alternative to Emir Sheikh Tamim bin Hamad al-Thani. ” In the United States, during the 2016 presidential election, social media was widely used. This can include massive networks such as Facebook or Twitter. According to Cui, Tsang, Hui, Yiu, and Luo (2016), “this type of control does not fare well when there is fragmentation of destinations (the same content is available many places) and/or uncooperative destinations.

Sign up to view the full document!

” Nowadays it is difficult to centralize the integrity of Facebook and Twitter communities. Internet censoring in this can be of great help. For instance, when the internet is used for the right purpose, it can not cause any harm to other users. Internet Censorship is Essential to Avoid Several Cybercrimes All over the world, Internet regulation either through taxation or censorship has been a legislative non-starter. There are fundamental ways in which cybersecurity is any other array of legislation can affect web users. According to Cui et al (2016), “internet security is of much greater concern to the government than to most Americans. ” Public officials and computer experts term Internet sabotage as a potentially ominous threat. For example, firms shut down links to the outside world when there is a reported e-mails-borne virus.

Sign up to view the full document!

For instance, most of feeling insecure when we come to know that our privacy rights will be diminished if the FBI is out hunting for cyber crooks. Creating Conducive Infrastructure There is a need to protect our critical infrastructure. This measure involves improving infrastructure to companies that deal with the nation’s energy, transportation, communication, water, and emergency services. As the Clinton administration once posited critical infrastructure ensures that companies and institutions improve on the security of their computer systems. The move ensured that not only there will be an improvement of the economy but also the national defense. Ideally, when we advocate for the control of our information, it will be easy to curb cyber-attacks. Technological Innovations Through technological innovations, it is difficult for cybercriminals and spies to access our data.

Sign up to view the full document!

The government should introduce technology innovations that aim at eliminating cyber- attacks in the country and all over the world. According to Pan (2017), “calls today for expanded cybercrime-fighting authority reveal a great deal about how the government views the challenges to law enforcement in the Digital Age. " We need to innovate to fight cybercrimes. For example, the use of the Electronic Communications Privacy Act. The act governs the protection of electronic communications such as e-mail. Although at that only a few people understood the internet or email, later the act has helped many people today. According to Collins (2017), “the legal protections afforded e-mail do not match those that apply to either paper records or telephone conversations” Virtualization Internet censorship can help fight cybercrimes.

Sign up to view the full document!

One major security threat is the problem in virtualization. According to Collins, L. (2017), “in many countries, digital platforms have also benefitted from less regulation and reduced legal liability over content compared to traditional analog platforms. ” Over recent years traditional media platforms such as television and telephone services are not in use compared to new platforms such as online video and social media. The new platforms have led to increased benefits through higher revenues from a bigger-than-ever audience (Aceto & Pescapé, 2015). The government should take responsibility to control those revenues. These platforms have also made people spread relevant information. Although all that has been achieved, it is important to control information. Some times when business incentives for content creators are totally aligned with those of the platform on which the content hosted, the result can be anti-competitive behavior or harmful content.

Sign up to view the full document!

In this case, dominant platforms who effectively monopolize exclusive premium content may also threaten otherwise viable alternative platforms. There is a need to control all the information shared in social media in order to create healthy platforms for all content creators. This has been the main challenge affecting our social media platforms. Recently, Prime Minister May suggested that there should there be a new definition for these platforms. She further said that anyone who breaches information sharing rules should be accountable. References Aceto, G. , & Pescapé, A.  Engineering & Technology, 12(10), 28-31. Cui, X. , Tsang, Y. H. , Hui, L. Internet development, censorship, and cyber crimes in China.  Journal of Contemporary Criminal Justice, 26(1), 103-120 Pan, J. How the market dynamics of domestic and foreign social media firms shape strategies of internet censorship.

Sign up to view the full document!

From $10 to earn access

Only on Studyloop

Original template

Downloadable