The infrastructure and regulation of the internet

Assignment Help Management Information Sys
Reference no: EM13998116

Topic: The infrastructure and regulation of the Internet has seen many changes over the past two decades. It will certainly see as many, if not more, in the next. We have discussed where the Internet came from, why, how it is structured and how it moved from a government activity to an open public one as well as that it may be heading toward a government one again. Two significant events are effecting Internet operations. These are: 1) what was once essentially a means of correspondence has become the "Internet of things" with house locks, refrigerators and cars all being connected and 2) computing activities are rapidly moving toward mobile and cloud communications. There are forming two camps about the freedom of the internet as well as the communications that transpire on it.

Some believe that the government should stay out, has it historically has, of direct involvement and let the internet continue to define itself. These individuals make such points as the internet has reached its current level without government controls, it is going fine and that any controlling would be done at the pressures of "big money" and at the expense of the individual. Another group believe there is a need for government involvement/supervision. This group has exerted pressure to not only change the "ownership" of the Internet but also for governments to take a much more active role in regulation. This position points to a need to regulate content (e.g. pornography, hate), address hacking or even control who gets what speeds.

Discuss the below Pro and Con Statements

The Pro position statement: The Internet has expanded from a small group with a specific mission to a vast service that encompasses the far reaching "internet of things". In order to meet increasing consumer demands and secure the orderly future of the Internet, it is now essential that government move to increase their legal and regulatory control over internet activities.

The Con position statement: The Internet has expanded from a small group with a specific mission to today's vast international "internet of things". It has grown into this powerful international service with a minimum of government influence and it is essential for its future that government involvement be kept to an absolute minimum.

Reference no: EM13998116

Questions Cloud

Explain what the dock is and why it is useful : For this assignment, you will be exploring the Mac OSX interface. In the process, you will learn the answers to the following questions. Think of this assignment as a scavenger hunt for Mac OSX useful features. If you do not have Mac computer avai..
Find position x of sailboat as a function of base variables : As an equation, the magnitude of fk is equal to αv, where v is in meters per second, fk is in newtons, and α is a constant with units of kilograms per second. Assume the sail boat is moving at speed v at some generic time t. These quantities are kn..
A bia determines the extent of the impact : According to the text, a BIA determines the extent of the impact that a particular incident would have on business operation over time. Determine the major ways in which people, systems, data, and property will impact a BIA. Provide specific examples..
The infrastructure and regulation of the internet : Topic: The infrastructure and regulation of the Internet has seen many changes over the past two decades. It will certainly see as many, if not more, in the next. We have discussed where the Internet came from, why, how it is structured
The infrastructure and regulation of the internet : Topic: The infrastructure and regulation of the Internet has seen many changes over the past two decades. It will certainly see as many, if not more, in the next. We have discussed where the Internet came from, why, how it is structured and how it mo..
Recently hired as a network security analyst for a small : Recently hired as a network security analyst for a small accounting firm. The firm is realizing that they need help to secure their network and customer's data. With your background and skills, they are looking to you to provide guidance. In addition..
Formulate a security planning model : •&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ; Formulate a security planning model that addresses and solves a security problem at an agency or corporate entity.
Designers can develop the ability to know : In Security Engineering, it's quite common for designers to secure the wrong things. How do you think that system designers can develop the ability to know what the right thing is?
What is the half-life of the radium nuclei : A sample is being analyzed 5800 years after undergoing an alpha decay process. As the technician is analyzing, he observes the sample contains only 8.5% of the radium nuclei it initially contained. What is the half-life of the radium nuclei?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Detailed explanation to activity based costinghow in

detailed explanation to activity based costinghow in principle do activity based costing abc and activity based

  Discuss the issue of privacy in activity trackers

Provide a one-page summary identifying major issues and discuss five moral dimensions of the information age as they pertain to Internet tools and technologies such as the iPad (refer to Chapter 4).

  Security and privacy in technology in health care industry

Security and privacy in technology in health care industry - What would you want your health care provider to do in order to secure the privacy of your medical records?

  Packets routers and ip addresses

Packets, Routers and Private vs Public IP Addresses - The solution shows packets, routers and IP addresses. In terms of security, private IP address is favored over public IP address. However, Public IP addresses is favored in terms of commercial b..

  Describe information systems that fitness quest could use

Describe information systems that Fitness Quest could use to strengthen its strategy for bringing Indo-Row to market. Consider the factors you iden- tified in your answer to question 6 in your response.

  What are the potential security risks in implementation

What are the potential security risks in implementation of such a system? For the purpose of this assignment, you will make necessary assumptions, validate the same, and then provide a well-researched and informed report to the CEO.

  The report should have clear recommendations to ensure that

develop a 3000- to 3500-word report for the cio of kudler fine foods.middot this report should cover the

  Write a report on social media and erp system

write a report on Social Media and ERP System

  How could the cyber attack be dettered

A recent malicious cyber attack that cyber deterrence was used . Pre-Emp Deterence CNE Cyber attacks. How could the Cyber Attack be dettered

  Ethical issues regarding protection of data

Research the following areas related to protecting sensitive data for the Woodworker Cabinet company. Write a two-to three-page report to the CIO addressing the following issues: Ethical issues regarding protection of data

  Write analysis of uses of data warehousing and data mining

Write an analysis of uses of data warehousing, data mining and business intelligence, based on a study of recent texts, peer-reviewed conference papers and journal articles.

  Important part of a company''s distribution strategy

Supply chain management is an important part of a company's distribution strategy. Determine (REI) Recreational Equipment Incorporated and outline their current channel and methods of distribution.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd