The infrastructure and regulation of the internet

Assignment Help Management Information Sys
Reference no: EM13998116

Topic: The infrastructure and regulation of the Internet has seen many changes over the past two decades. It will certainly see as many, if not more, in the next. We have discussed where the Internet came from, why, how it is structured and how it moved from a government activity to an open public one as well as that it may be heading toward a government one again. Two significant events are effecting Internet operations. These are: 1) what was once essentially a means of correspondence has become the "Internet of things" with house locks, refrigerators and cars all being connected and 2) computing activities are rapidly moving toward mobile and cloud communications. There are forming two camps about the freedom of the internet as well as the communications that transpire on it.

Some believe that the government should stay out, has it historically has, of direct involvement and let the internet continue to define itself. These individuals make such points as the internet has reached its current level without government controls, it is going fine and that any controlling would be done at the pressures of "big money" and at the expense of the individual. Another group believe there is a need for government involvement/supervision. This group has exerted pressure to not only change the "ownership" of the Internet but also for governments to take a much more active role in regulation. This position points to a need to regulate content (e.g. pornography, hate), address hacking or even control who gets what speeds.

Discuss the below Pro and Con Statements

The Pro position statement: The Internet has expanded from a small group with a specific mission to a vast service that encompasses the far reaching "internet of things". In order to meet increasing consumer demands and secure the orderly future of the Internet, it is now essential that government move to increase their legal and regulatory control over internet activities.

The Con position statement: The Internet has expanded from a small group with a specific mission to today's vast international "internet of things". It has grown into this powerful international service with a minimum of government influence and it is essential for its future that government involvement be kept to an absolute minimum.

Reference no: EM13998116

Questions Cloud

Explain what the dock is and why it is useful : For this assignment, you will be exploring the Mac OSX interface. In the process, you will learn the answers to the following questions. Think of this assignment as a scavenger hunt for Mac OSX useful features. If you do not have Mac computer avai..
Find position x of sailboat as a function of base variables : As an equation, the magnitude of fk is equal to αv, where v is in meters per second, fk is in newtons, and α is a constant with units of kilograms per second. Assume the sail boat is moving at speed v at some generic time t. These quantities are kn..
A bia determines the extent of the impact : According to the text, a BIA determines the extent of the impact that a particular incident would have on business operation over time. Determine the major ways in which people, systems, data, and property will impact a BIA. Provide specific examples..
The infrastructure and regulation of the internet : Topic: The infrastructure and regulation of the Internet has seen many changes over the past two decades. It will certainly see as many, if not more, in the next. We have discussed where the Internet came from, why, how it is structured
The infrastructure and regulation of the internet : Topic: The infrastructure and regulation of the Internet has seen many changes over the past two decades. It will certainly see as many, if not more, in the next. We have discussed where the Internet came from, why, how it is structured and how it mo..
Recently hired as a network security analyst for a small : Recently hired as a network security analyst for a small accounting firm. The firm is realizing that they need help to secure their network and customer's data. With your background and skills, they are looking to you to provide guidance. In addition..
Formulate a security planning model : •&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ; Formulate a security planning model that addresses and solves a security problem at an agency or corporate entity.
Designers can develop the ability to know : In Security Engineering, it's quite common for designers to secure the wrong things. How do you think that system designers can develop the ability to know what the right thing is?
What is the half-life of the radium nuclei : A sample is being analyzed 5800 years after undergoing an alpha decay process. As the technician is analyzing, he observes the sample contains only 8.5% of the radium nuclei it initially contained. What is the half-life of the radium nuclei?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Explain the types of computerized information systems

Healthcare information systems: Importance of four types of systems and Explain the types of computerized information systems:

  Analyze the privacy factors

Analyze the privacy factors raised as a result of this type of screening. Imagine that you are the CIO for a company of one hundred employees. Would you recommend the use of social media to screen employees? Why or why not

  Research the key terms applications software

Research the key terms "Applications Software", "Application Design", "Software Design"; find a journal publication pertaining to the subject, and write a 1-2 pages APA format report, summarizing the paper.

  Define what action the organization should take

A recommendation of what action the organization should take. An explanation of what the organization's responsibility should be regarding ethics as it relates to IS

  The value chainin general what is the importance of the

the value chainin general what is the importance of the value chain. i have read article after article on this topic

  Determine what his break even point

John owns a shave ice stand - Help Him to determine what his break even point is.

  Explain how udp differs from ip

Explain how UDP (User Datagram Protocol) differs from IP as a transport mechanism.  Finally, describe the added capability TCP (Transmission Control Protocol) provides for data transport

  Describe a research on distributed systems

Research on distributed systems - Distributed systems are or are not dominating the computing landscape

  Identify tools or techniques for reviewing application code

Identify tools or techniques for reviewing the application code for security prior to release. Describe the use of each tool or technique you have identified

  Systems evolution

Systems Evolution - Must include an introduction and conclusion in accordance with the paper.

  Categories of physical media in use in networks

Describe at least three categories of physical media in use in telecommunications networks today. Which of these media has the highest bandwidth? Which has the least bandwidth?

  In what ways do we erode our own privacy online

In what ways do we erode our own privacy online? In what ways do we erode our friends' privacy Online? What are some of the possible long-term consequences of eroding our own privacy or our friends' privacy online

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd