The infrastructure and regulation of the internet

Assignment Help Management Information Sys
Reference no: EM13998117

Topic: The infrastructure and regulation of the Internet has seen many changes over the past two decades. It will certainly see as many, if not more, in the next. We have discussed where the Internet came from, why, how it is structured and how it moved from a government activity to an open public one as well as that it may be heading toward a government one again. Two significant events are effecting Internet operations. These are: 1) what was once essentially a means of correspondence has become the "Internet of things" with house locks, refrigerators and cars all being connected and 2) computing activities are rapidly moving toward mobile and cloud communications. There are forming two camps about the freedom of the internet as well as the communications that transpire on it.

Some believe that the government should stay out, has it historically has, of direct involvement and let the internet continue to define itself. These individuals make such points as the internet has reached its current level without government controls, it is going fine and that any controlling would be done at the pressures of "big money" and at the expense of the individual. Another group believe there is a need for government involvement/supervision. This group has exerted pressure to not only change the "ownership" of the Internet but also for governments to take a much more active role in regulation. This position points to a need to regulate content (e.g. pornography, hate), address hacking or even control who gets what speeds.

Discuss the below Pro and Con Statements

The Pro position statement: The Internet has expanded from a small group with a specific mission to a vast service that encompasses the far reaching "internet of things". In order to meet increasing consumer demands and secure the orderly future of the Internet, it is now essential that government move to increase their legal and regulatory control over internet activities.

The Con position statement: The Internet has expanded from a small group with a specific mission to today's vast international "internet of things". It has grown into this powerful international service with a minimum of government influence and it is essential for its future that government involvement be kept to an absolute minimum.

Reference no: EM13998117

Questions Cloud

Discuss the role of public policy in shaping policy : Discuss the role of public policy in shaping policy and standards. What role should lawmakers play? Are there examples of recent acts that make it difficult for companies and organizations to do their jobs? What role should lobbying organizations pla..
Explain what the dock is and why it is useful : For this assignment, you will be exploring the Mac OSX interface. In the process, you will learn the answers to the following questions. Think of this assignment as a scavenger hunt for Mac OSX useful features. If you do not have Mac computer avai..
Find position x of sailboat as a function of base variables : As an equation, the magnitude of fk is equal to αv, where v is in meters per second, fk is in newtons, and α is a constant with units of kilograms per second. Assume the sail boat is moving at speed v at some generic time t. These quantities are kn..
A bia determines the extent of the impact : According to the text, a BIA determines the extent of the impact that a particular incident would have on business operation over time. Determine the major ways in which people, systems, data, and property will impact a BIA. Provide specific examples..
The infrastructure and regulation of the internet : Topic: The infrastructure and regulation of the Internet has seen many changes over the past two decades. It will certainly see as many, if not more, in the next. We have discussed where the Internet came from, why, how it is structured
The infrastructure and regulation of the internet : Topic: The infrastructure and regulation of the Internet has seen many changes over the past two decades. It will certainly see as many, if not more, in the next. We have discussed where the Internet came from, why, how it is structured and how it mo..
Recently hired as a network security analyst for a small : Recently hired as a network security analyst for a small accounting firm. The firm is realizing that they need help to secure their network and customer's data. With your background and skills, they are looking to you to provide guidance. In addition..
Formulate a security planning model : •&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ; Formulate a security planning model that addresses and solves a security problem at an agency or corporate entity.
Designers can develop the ability to know : In Security Engineering, it's quite common for designers to secure the wrong things. How do you think that system designers can develop the ability to know what the right thing is?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Operational and supply chain management

Operational and Supply Chain Management - Why are companies interested in operational management today

  Analyze the fundamentals of pki

Suppose you are the Information Security Director at a small software company. Analyze the fundamentals of PKI, and determine the primary ways in which its features and functions could benefit your organization and its information security departm..

  You work as the senior network engineer for a medium size

you work as the senior network engineer for a medium size organization. the company has offices in miami and los

  Explain strategic mis categories in detail

Define MIS ? What are the characteristics of MIS and explain strategic MIS categories in detail. Give relevant examples.

  Technology processes in a companyare there any manual or

technology processes in a companyare there any manual or ineffective processes at your current company that technology

  Explain about project management and risk management

Project Management and Risk Management - The supply chain decisions that are made have risk involved like any other project decision.

  Explian about vendor managed inventory system

What are the pros and cons of a vendor managed inventory system and How does it differ from a facility managed system

  How big is facebook compared to netflix

Facebook vs. Netflix - How big is Facebook compared to Netflix? Do you think that Facebook presents a credible threat to Netflix? Why or why not?

  Capabilities and weaknesses of the candidate

A new client of your security consulting firm is worried about the potential for data leaks that could expose it to financial losses as well as a damaged reputation. A comparison (compare/contrast) of the capabilities and weaknesses of the candidat..

  What operational changes would you expect

What operational changes would you expect if your company implemented a new supply chain system ? What barriers to implementation would you see?

  What is your phase-out plan for the existing system

You can use Internet resources, peer-reviewed journals, and reputable, published articles, and you may interview an executive of a healthcare facility, What is your phase-out plan for the existing system

  Discuss the impact of airside systems on aviation operations

Discuss the impact of airside systems on aviation operations. What is the significance of AVI systems on airport operations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd