Internet technology
The internet has existed as an open network in the US working under the net neutrality principle for quite some time. Whether or not the internet needs regulation as it is the case with the other types of media is an issue that is subject to debate since there are both merits and demerits involved.
Currently, there are several laws operating in the country for curbing issues related to child pornography over the internet as well as several other activities that are illegal. However, there are various organizations and individuals who feel that there is need for a complete regulation for the internet. But despite the fact that an absolutely transparent internet has a few demerits, there is much more value in ensuring that the internet is unregulated as much as possible since it is only through such a move that the internet will be more valuable (Hammer, 2005).
A complete internet takeover by either the government or the giants of telecommunication can most likely lead to mass net neutrality violation and will also have the effect of dampening the internets effectiveness. Stringent internet regulation will act against the principle of net neutrality and will permit various websites to restrict their contents to the paid clients. In essence, internet regulation will have the propensity of curbing the expression freedom, which probably is one of the factors that are most conspicuous and instrumental in this mediums popularity and success. For several years, the internet has operated as an information source that is open. Any severe regulation on the internet will imply that there will be restricted access to this source of information that is very extensive (Smith Boardman, 2007).
A strictly regulated internet in the United States has less value as compared to a free and transparent one. Regulating the internet would have the impact of killing innovation and competition that is crucial in the achievement of more and more, advancements in the internet technology. Most of the great innovations that we celebrate in todays internet started as small and minor tests and experiments but over time, their developers realized that they could be used in achieving certain goals. Should there have been stringent regulation at the initial stages of such innovations, perhaps their developers could have given up and now the country could not be enjoying the numerous benefits that arise from these developments in the internet. At the same time, the well established and wealthy internet providers can take advantage of the regulation rules and procedures to eliminate the much smaller players from the industry. If such practices take place as a result of regulations, eventually competition would also be killed and the internet users in the country would access internet services of a lower quality. It would be more worse if the other nations competing with the United States in terms of internet fail to regulate internet in their countries and thus they will have much more superior internet than that of the United States in the long run since the internet providers will constantly be facing a lot of competition which will make them more innovative and competitive (Hammer, 2005).
Role of time in the cyber world
Civilizing the cyber world is a very important process as it will eventually cover all aspects that are non-technical such as free speech and democracy, universal service, online ethics, encryption and privacy, creating communities, citizen action and intellectual property. However, the cyber world cannot be civilized and expected to achieve all these within one day, some time is required especially due to the fact that cyber world is very dynamic and it changes rather fast. While civilizing the cyber world, a lot of time is needed in achieving a service that is largely universal, which avoids as much as possible creating information differences for the haves and the have nots. It should not be seen to perpetrate discrimination or any other vice among the worlds societies. It is necessary for the cyber world development be given time in order to ensure that it does not develop in a manner that does not protect privacy of individuals and organizations, or avert erosion of civil liberties and free speech (Fischer Mullins, 2006).
As it is currently evident, the cyber world has in the recent history been very instrumental in creating a telecommunication which has played a great role in strengthening communities and democracy. However, the cyber world has consumed substantial amount of time in order for it to attain these great achievements instead of it just acting as a simple instrument of media manipulation in a new way. It is therefore evident that more time is required for this particular world to be civilized especially because this process is largely continuous and it is greatly affected by the developments taking place in it. Furthermore, civilization of the cyber world will require more time in order for it to be able to protect adequately the standards of living of people particularly in todays multinational economy (Kokswijk, 2007).
Laws have always been enacted by various societies around the world to govern people according to the prevailing circumstances. In the past, there were basically no laws at all which to regulate the cyber world since it did not exist. But over time, it was apparent that laws were required to regulate this world since it became evident that individuals and organizations were deviating from the norm through the use of the internet. As the cyber world continued to change due to its high dynamism, the initial laws had to be amended to cater for the new and emerging dimensions of this world. Time is therefore a very crucial resource in the development of laws to govern this particular world since it is not possible to enact fixed laws for governing and regulating certain dimensions that are currently not known (Fischer Mullins, 2006).
Copyright infringement
It is not only possible but it also easy for one to infringe the intellectual property rights while performing some analysis on a program that belongs to a competitor. In fact, it is highly risky for a program to be analyzed by ones competitor. The party with the responsibility of analyzing such a program may illegally copy certain aspects of the program with the intention of using them to develop another program. This would amount to infringing the copyrights of the original owner since, there is no consent between the parties allowing the analyzer to copy either all or part of the programs content with the objective of using them later as their own. Despite the fact that it is unethical for the individual or corporation analyzing the program to infringe the copyrights of the owner, there are several factors that would lure such an individual or organization to infringe the rights of the owner (Ross, 2000).
One of the major factors that can lure the party analyzing the program is to use it to harm the original owner since they are both competitors in the same industry. The victim in this case would eventually suffer great losses and loss in terms of competitiveness to other competitors since some of its confidential information is in the wrong hands. It is possible for the party analyzing the program to use the same program or make some slight changes on it to damage the reputation of the copyright owner. The most common factor that would lure a party into infringing the copyrights of the competitor is financial gain. The party is likely to develop another program using the stolen details of the original program to develop another program, which closely resembles the original program. Since the latter program will not have employed a lot of resources in developing the program, it is most likely that the program will be sold at a much lower price than the original one. Because both programs would be capable of performing similar functions, the cheaper one would be sold more than the original one making the copyright owner to lose substantially (Quinto, 2001).
Future and ethics
As more technological advancements are achieved, more complications are experienced in the world ethics. Technology has offered individuals and organizations an extensive platform on which to compromise on ethics. Technology has made unethical behaviors to be carried out with a lot of ease. Since the technology is developing very fast, there will be even more unethical practices that will be conducted in future. Internet ethics is further complicated by the fact that it is possible to perpetrate an unethical act on someone without actually meeting them physically. The internet technology makes it possible for millions of internet users around the world to access intellectual properties of other people which are copyrighted. It is also easy to download some of these properties and use them as your own thus making their owners to lose substantially despite having employed a lot of resources and time in order to come up with such works (Cavalier, 2005 Zittrain, 2009).
Internet filter
Internet filter is the control measure on the internet that is mostly used in controlling the contents that are found in the internet. The internet filter ensures that any software that needs to be installed is actually installed by the use of a web browser. In so doing, the internet filter makes sure that only the software that meets all the required standards are installed and available on the internet. The software has to authenticated and verified by the internet filter thereby implying that it is the only the original owners of such pieces of work with the right of installing them. Furthermore, the internet filter denies unauthorized individuals a chance of downloading the entire software and using them as their own (Deibert, 2008).
Moreover, the internet filter has facilities that deny unqualified individuals the right to access various websites through the internet which contains offensive of unsuitable materials. This particular measure ensures that the right people are able to access the right information over the internet at the right time. The facility is therefore a very important tool in promoting internet ethics as it reduces chances of people accessing and using certain pieces of information to infringe the rights of others (Eyerdam, 2003).
0 comments:
Post a Comment