Demand Sensing Technology Demand Sensing increases forecast accuracy by up to 50%. www.TerraTechnology.comHigh Tech Campus business Want to do business with leading high tech companies in Brainport? www.technogation.comInternational Master ICT innovativ & international - study at MCI in Innsbruck / Austria www.mci.edu/en/ma-communication-itBlood Pressure Technology Customized Blood Pressure Modules with Excellent Service</di
Article Word Count: 517 [View Summary]
Comments (0)
The Internet has provided an opportunity to build a global information infrastructure that would link together the world's telecommunications and computer networks. But futurists and governmental leaders also believed that this interconnectedness would also bring friendship and cooperation, and that goal seems elusive.
Maybe peace and harmony are just over the horizon because of the Internet, but I have my doubts. The information superhighway certainly has connected the world together into one large global network, but highways don't bring peace. Highways connected the various countries in Europe for centuries, yet war was common and peace was not. An information superhighway connects us with countries all over the world, but global cooperation hasn't been the result, at least not yet
The information superhighway also has some dark back alleys. At the top of the list is pornography. The Internet has made the distribution of pornography much easier. It used to be that someone wanting to view this material had to leave their home and go to the other side of town. The Internet has become the ultimate brown wrapper. Hard core images that used to be difficult to obtain are now only a mouse click away.
Children see pornography at a much younger age than just a decade ago. The average age of first Internet exposure to pornography is eleven years old.{3} Sometimes this exposure is intentional, usually it is accidental. Schools, libraries, and homes using filters often are one step behind those trying to expose more and more people to pornography.
All of these concerns lead to the obvious question: Who will regulate the Internet? In the early day of the Internet, proponents saw it as the cyber-frontier that would be self-regulating. The Internet was to liberate us forever from government, borders, and even our physical selves. One writer said we should "look without illusion upon the present possibilities for building, in the on-line spaces of this world, societies more decent and free than those mapped onto dirt and concrete and capital."
Jack Goldsmith and Tim Wu, in their book, Who Controls the Internet?, describe the various ways foreign governments have exercised their authority.{6}
• France requires Yahoo to block Internet surfers from France so they cannot purchase Nazi memorabilia.{7}
• The People's Republic of China requires Yahoo to filter materials that might be harmful or threatening to Party rule. Yahoo is essentially an Internet censor for the Communist party.{8}
• The Chinese version of Google is much slower than the American version because the company cooperates with the Chinese government by blocking search words the Party finds offensive (words like Tibet or democracy).
Even more disturbing is the revelation that Yahoo provided information to the Chinese government that led to the imprisonment of Chinese journalists and pro-democracy leaders. Reporters Without Borders found that Yahoo has been implicated in the cases of most of the people they were defending.
All of this censorship and cooperation with foreign governments is disturbing, but it also underscores an important point. For years, proponents of the Internet have argued that we can't (or shouldn't) block Internet pornography or that we can't regulate what pedophiles do on the Internet. These recent revelations about Yahoo, Google, and Microsoft show that they can and do block information.
In previous articles we have addressed the issue of globalization and have recognized that technology (including the Internet) has made it much easier to move information around the world. There is no doubt that the Internet has accelerated the speed of transmission and thus made the world smaller. It is much easier for people around the world to access information and share it with others in this global information infrastructure
it diminishes the relevance of borders, territorial governments, and geography. Thomas Friedman believes that the Internet and other technologies are flattening the world "without regard to geography, distance, or, in the near future, even language."
There is still a legitimate function for government (Romans 13:1-7) even in this new world of cyberspace. Contrary to the perceived assumption that the Internet will shape governments and move us quickly toward globalization, there is good evidence to suggest that governments will in many ways shape the Internet.
"irst started Street View as an experimental project, we packed several computers into the back of an SUV, stuck cameras, lasers, and a GPS device on top, and drove around collecting our first imagery. Since Street View laun"
Those goods include not just movies shot surreptitiously in a theater with a jiggly hand-held video camera, the companies argue, but dangerously flawed pharmaceuticals, faulty brake pads and defective smoke alarms, to name a few categories of illegally copied goods.
“Unfortunately,” Mr. Erickson said, “the amendment also creates new problems in other places and fails to correct some of the original concerns we have raised since the start of the debate.
“That’s because they’ve made large profits by promoting rogue sites to U.S. consumers,” Mr. Smith said in a statement.
Now, however, two bills, broadly supported on both sides of the political aisle, aim to cut off the oxygen for foreign pirate sites by taking aim at American search engines like Google and Yahoo, payment processors like PayPal and ad servers that allow the pirates to function.
at least 15 lobbying firms to fight the bills
Naturally the howls of protest have been loud and lavishly financed, not only from Silicon Valley companies but also from public-interest groups, free-speech advocates and even venture capital investors
while setting a bad example of American censorship.
In my opinion, the main objective is purely to protect the entertainment industry by blocking infringing domain names however, as stated in the video these industries do not contribute so much to the US economy. Furthermore, theses bills will put the stability of new search engines at risk as the US government will be able to sue them if they advertise any infringing website.
If you're looking to understand the debate from the perspective of copyright holders, then watch Follow the Money: Who Profits from Piracy?,( http://vimeo.com/22541902 ) a video that tracks the theft of one movie, making it a microcosm of a larger problem.
Although protecting the entertainment industry from piracy and blocking certain websites containing disturbing and innappropriate material (paedophilia) is a good idea, the way SOPA and PIPA have been written/proposed makes it very easy for people enforcing both acts to abuse their power. Once we censor one thing, other will decide that other things must also be censored, therefore destroying any sembelence of free-speech Internet users have.
I also find it worrying how the American Senate decided by itself that these two acts should be made law, in the process crippling the Internet, a resource used by billions of people all around the world and not just the population of the US.
Criterion B . Describe, step by step, how the IT system works.
How unauthorised sites outside usa jurisdiction is censored within american borders:
A little bit like the great firewall of China, this kind of censorship takes place at a router level.
1. The American ISPs enter the domain names of the unauthorised sites and directories, blogs and forums that contain related links into the Internet routers. These enable data to flow back and forth between ISPs in the USA and Internet servers around the world.
2. The user types in the domain name of an unauthorised website.
3. The request is sent to the web server at the ISP, and the domain name is looked up on the database of addresses in the router
4. The router denies the request from the web server
5. An error message appears in the user's browser
how chinese censorship works - http://embargo.gn.apc.org/3.htm#_ftn5
how internet works - http://www.explainthatstuff.com/internet.html
The SOPA is mainly adresses the protection of intellectual property of content creators. Obviously this is the one of the biggest advantages being proposed by the act as artists and entertainers will be able to profit more from the content they make. Nowadays much of their content is illegally downloaded from the internet, such as music.
However SOPA will have a severe impact on online freedom of speech as numerous websites would be affected by the act and blacklisted as a result. The internet is makes frequent use of copyrighted material not necessarily in a legal way. Doing streaming of such content after the act could lead to a maximum penalty of five years in prison. However the US congress states that protecting intellectual property is not the same as censorship
http://agbeat.wpengine.netdna-cdn.com/wp-content/uploads/2011/12/sopa-infographic1.png
The image above provides more detail about SOPA including how it will take effect and the impact it would have on businesses. It shows the major supporters of SOPA as well as the major opposers, one of them being Google.
The main social and ethical issue in this article is security and privacy. Using a method known as 'spear-phising', hackers were handed users' account information. I find it quite freightning how people, who are supposed to be some of the best minds in the world, as they work in sensitive parts of the US government, fall into the trap of giving their account information to hackers. In my opinion a greater awareness should be raised, on how to protect their privacy, among high-profile government officials in order to protect vital and classified information.
I agree with Andre as though the consequences of the hack can be dealt with in a relatively short amount of time, the incident reveals a bigger problem with the security of the government's files and questions just how safe confidential information really is from being accessed by the wrong people. The main social and ethical issue is security, as the security of US official's e-mails may have been breached by fishing. The fact that such an incident has occurred in such a place with such important information and with supposedly very high security measures is worrying, and ways to detect and combat the threat of phishing should be publicized.