Wednesday, May 8, 2019

Should countries control the internet Essay Example | Topics and Well Written Essays - 1000 words

Should countries control the meshing - Essay ExampleAlong with the effects of mesh addiction on children, it also affects the privacy of the subroutiners of the internet in terms of hackers attacks. Although information technology professionals have been taking special measures to stop network-based unauthorized admission fee to the personal computers of people, the issue of hacking has not resolved as yet. In this regard, some control should be there at the government level on the use of internet. In this paper, we will discuss a some harms associated with the free use of internet to conclude whether countries should control the use of internet or not.Uncontrolled use of internet affects academic progress of children as it shifts their attention and focus away from studies to the pornographic material useable on the internet. These days, there is hardly any restriction policy that can prevent children from accessing negative content. The evolution age of children is very crit ical for their proper mental, social, and physical development. Children are usually very eager to recognise about sex, therefore, they mostly use internet to get information about it. Therefore, it has become the need of at once for the governments to have some control on the use of internet so that children are not expose to harmful stuff.Information gage has always been one of the main issues for people and organizations adopting the use of information technology. With the speedy pace of technological advancements taking place in the field of computer sciences and information technology, ensuring information security is also becoming much and more difficult due to more organized intrusion attempts and information retrieval attempts by hackers. Although many new measures have been introduced to make information security bona fide and more protected, but they have been unable to resolve the information security issue. Therefore, it is essential to design a reliable system tha t can minimize the chances of unauthorized

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.