The infrastructure and regulation of the internet

Assignment Help Management Information Sys
Reference no: EM13998117

Topic: The infrastructure and regulation of the Internet has seen many changes over the past two decades. It will certainly see as many, if not more, in the next. We have discussed where the Internet came from, why, how it is structured and how it moved from a government activity to an open public one as well as that it may be heading toward a government one again. Two significant events are effecting Internet operations. These are: 1) what was once essentially a means of correspondence has become the "Internet of things" with house locks, refrigerators and cars all being connected and 2) computing activities are rapidly moving toward mobile and cloud communications. There are forming two camps about the freedom of the internet as well as the communications that transpire on it.

Some believe that the government should stay out, has it historically has, of direct involvement and let the internet continue to define itself. These individuals make such points as the internet has reached its current level without government controls, it is going fine and that any controlling would be done at the pressures of "big money" and at the expense of the individual. Another group believe there is a need for government involvement/supervision. This group has exerted pressure to not only change the "ownership" of the Internet but also for governments to take a much more active role in regulation. This position points to a need to regulate content (e.g. pornography, hate), address hacking or even control who gets what speeds.

Discuss the below Pro and Con Statements

The Pro position statement: The Internet has expanded from a small group with a specific mission to a vast service that encompasses the far reaching "internet of things". In order to meet increasing consumer demands and secure the orderly future of the Internet, it is now essential that government move to increase their legal and regulatory control over internet activities.

The Con position statement: The Internet has expanded from a small group with a specific mission to today's vast international "internet of things". It has grown into this powerful international service with a minimum of government influence and it is essential for its future that government involvement be kept to an absolute minimum.

Reference no: EM13998117

Questions Cloud

Discuss the role of public policy in shaping policy : Discuss the role of public policy in shaping policy and standards. What role should lawmakers play? Are there examples of recent acts that make it difficult for companies and organizations to do their jobs? What role should lobbying organizations pla..
Explain what the dock is and why it is useful : For this assignment, you will be exploring the Mac OSX interface. In the process, you will learn the answers to the following questions. Think of this assignment as a scavenger hunt for Mac OSX useful features. If you do not have Mac computer avai..
Find position x of sailboat as a function of base variables : As an equation, the magnitude of fk is equal to αv, where v is in meters per second, fk is in newtons, and α is a constant with units of kilograms per second. Assume the sail boat is moving at speed v at some generic time t. These quantities are kn..
A bia determines the extent of the impact : According to the text, a BIA determines the extent of the impact that a particular incident would have on business operation over time. Determine the major ways in which people, systems, data, and property will impact a BIA. Provide specific examples..
The infrastructure and regulation of the internet : Topic: The infrastructure and regulation of the Internet has seen many changes over the past two decades. It will certainly see as many, if not more, in the next. We have discussed where the Internet came from, why, how it is structured
The infrastructure and regulation of the internet : Topic: The infrastructure and regulation of the Internet has seen many changes over the past two decades. It will certainly see as many, if not more, in the next. We have discussed where the Internet came from, why, how it is structured and how it mo..
Recently hired as a network security analyst for a small : Recently hired as a network security analyst for a small accounting firm. The firm is realizing that they need help to secure their network and customer's data. With your background and skills, they are looking to you to provide guidance. In addition..
Formulate a security planning model : •&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ; Formulate a security planning model that addresses and solves a security problem at an agency or corporate entity.
Designers can develop the ability to know : In Security Engineering, it's quite common for designers to secure the wrong things. How do you think that system designers can develop the ability to know what the right thing is?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Atampt ipad security breach1 as the atampt ceo discuss how

atampt ipad security breach1. as the atampt ceo discuss how you would respond differently to this security breach.2.

  Costs and savings of a videoconferencing systemi have been

costs and savings of a videoconferencing systemi have been hired as a telecommunications consultant to help an

  Develop the conclusions and recommendations

Analyze Case Study: "Supporting Mobile Health Clinics: The Children's Health Fund of New York City" , Analyze the case study, and develop the conclusions, recommendations, and implications

  Show the chain of authority for compliance

Organizational structure: Chain of authority for compliance and In my last company the compliance office was assigned to the same manager who consistently violated the ethics of the corporation.

  How might surface be used in architecture and chemistry

How might Surface be used in architecture, chemistry, law, medicine, business, geography, political science, art, music, or any other discipline in which your team has interest?

  Swot analysis of a large technology company

Look at your organization (or one similar to it) and perform a SWOT analysis. For any reason you cannot use your organization, do a SWOT analysis of a large technology company such as Google, Microsoft, Oracle, Cisco and Apple. C

  Management in pairsapply the extreme programming concept of

management in pairsapply the extreme programming concept of pair programming to management. what might be the effect of

  What additional recommendations would you make to adam

What are the benefits from implementing a single, companywide ERP system? What challenges are likely to be encountered during implementation? What additional recommendations would you make to Adam?

  Current architecture of internet and on any planned changes

Compare and contrast each architecture and How are they unique? What do they share? What factors drive your decision?

  Was your social media strategy successful

You implement social media strategy and begin generating $200,000 in revenue through your Facebook page. At the end your sales are still $1 million.

  Challenges to design a supply chainif you were to be tasked

challenges to design a supply chainif you were to be tasked to design a supply chain what are some of the challenges

  Strategic supply chain managementcohen and roussels fourth

strategic supply chain managementcohen and roussels fourth core discipline - build the right collaborative model. refer

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd