Monday, June 17, 2019

Should countries control the internet Essay Example | Topics and Well Written Essays - 1000 words

Should countries control the net - Essay ExampleAlong with the effects of internet addiction on children, it also affects the privacy of the users of the internet in terms of hackers attacks. Although reading technology professionals have been taking special measures to stop network-based unauthorized access to the personal computers of people, the issue of hacking has not resolved as yet. In this regard, some control should be there at the government level on the use of internet. In this paper, we will discuss a a few(prenominal) harms associated with the free use of internet to conclude whether countries should control the use of internet or not.Uncontrolled use of internet affects academic progress of children as it shifts their upkeep and focus away from studies to the pornographic material available on the internet. These days, there is hardly any restriction policy that can prevent children from accessing negative content. The exploitation age of children is very critical for their proper mental, social, and physical development. Children are usually very eager to know about sex, therefore, they mostly use internet to chance information about it. Therefore, it has become the need of today for the governments to have some control on the use of internet so that children are not capable to harmful stuff.Information security has always been one of the main issues for people and organizations adopting the use of information technology. With the rapid pace of technological advancements taking place in the field of computer sciences and information technology, ensuring information security is also becoming more and more difficult due to more organized intrusion attempts and selective information retrieval attempts by hackers. Although many new measures have been introduced to make information security reliable and more protected, but they have been unable to resolve the information security issue. Therefore, it is essential to design a reliable system tha t can minimize the chances of unauthorized

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.