Totally anonymous means of accessing the internet

Assignment Help Basic Computer Science
Reference no: EM132398658

1. Answer the following discussion question :

Please describe the reasons for having a totally anonymous means of accessing the internet. Please also discuss the dangers of that same internet. Minimum 250 words with 2 APA references.

2. Respond to the following post from another student : Minimum 100 words

People can access the internet in a totally anonymous way, and many people prefer to do so. There are various reasons why people choose to access the internet anonymously. It may be due to privacy issues, protection of the identity of an individual, where someone might prefer not to declare their identity on the internet. Also, they may not want their personality and identity exposed to the internet (Clark-Gordon, 2019). Motivation being the protection of one's identity to social safety (Barlett, 2016). Uncovering of their identity might lead to a status loss in society, disapproval from one's society, and work. For example, being gay is not accepted or prosecuted in some parts of the world, and the individual may want this information to remain anonymous. Or loss of their anonymity can help hackers to gain information about the individual's details and steal that person's identity and may lead to financial and legal troubles for that person (Ford, 2015). Another reason to be anonymous could be security. We know there are some countries free speech may get you into trouble. In order to avoid repercussions of free speech, people may choose to be anonymous. This reason for anonymity is essential as it enables people to speak what is in their mind as they feel much protected. With anonymity, people are able to express their views without fear of being punished. The last reason for anonymity is, it enables people to avoid personal harassment. There are people on the internet who stalk and harass other people. If one is totally anonymous, they can prevent these kinds of tracking and harassment. On the other hand, total anonymity poses some dangers. The most critical risk being it promotes crime as criminals can use this anonymity as a way of preventing getting caught. Apart from this, anonymity also encourages the use of hate speeches and harassment (Barlett, 2016). Lastly, it also promotes online abuse, lies, and passing of the threats, and stalking, which puts the lives of the involved in danger.

3. Respond to the following post from another student: Minimum 100 words

Many people don't accept internet anonymity because the source of generating content or accessing content is not trackable. This sort of conduct watch out for amateurish, unscrupulous as far as web utilization. In any case, individuals will utilize unknown in light of the accompanying reasons. Identity Protection: Numerous individuals don't prefer to come to spotlight to know everyone think about them despite the fact that they are doing nothing illicit or against law. This is question of social wellbeing, when you think in that way secrecy is ensure individuals and ensuring the government managed savings. This is vital angle in web networks.Personal Harassment: Online obscurity additionally assumes an imperative job in opportunity of articulation. A standout amongst the most astonishing things about the Internet is that it can offer voices to the individuals who are effectively being hushed, enabling them to talk without dread of repercussion.Touchy Issues: There's one other significant class of individuals who advantage from secrecy: the individuals who require more data on a given subject however would prefer not to be discovered searching out that data. The vast majority really fall into this gathering without acknowledging it. One regular model is somebody who's battling with their sexuality, hasn't opened up to the world about that battle, however has numerous unvoiced inquiries and concerns. This individual can solicit all from their inquiries in an online network without uncovering their personality and gambling untimely introduction.While obscurity has its favorable circumstances, there are a few threats that are confronted as a result of it. Namelessness offers clients opportunity to reprieve laws, abuse privileges of others like digital harassing, digital wrongdoings, spreading scorn by utilizing religion or race, and harming individual or society. It offers raise to numerous criminal exercises by holing up behind a false name. Individuals who utilize unknown web create against social conduct that will cause outrageous enthusiastic unsettling influences. Online extortion, betting and dangers to people have been on the raise with secrecy. The individual assaults for individuals to close down there informal communication accounts there by limiting the right to speak freely.

Reference no: EM132398658

Questions Cloud

About the composition process during the course : Reflect on what you learned about the composition process during the course. Discuss two insights you have gained from your composition process.
Intellectual Property-Describe guidelines for crafting claim : What is Intellectual Property ? What are the 3 requirements that the law requires patents to be? Describe the guidelines for crafting the claims.
How will this program impact your career growth : What are your research interests in the area of information technology? What is your current job/career and how will this program impact your career growth?
United States Supreme Court Carpenter v. United States 2018 : Please run a Google search of the term, "United States Supreme Court Carpenter v. United States 2018."
Totally anonymous means of accessing the internet : Describe the reasons for having a totally anonymous means of accessing the internet. Please also discuss the dangers of that same internet
Intuit uses to measure the effectiveness of their ERM : Chapter 12 presented the approach Intuit uses to measure the effectiveness of their ERM, and chapter 15 presented the process the City of Edmonton employed
Support system technologies-decision support systems : Support System Technologies-we focus in the realm of decision making, we have the Decision Support Systems (DSS).
Protected without implementing proper security controls : According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls
Education and performance expectations from management : What impact has increase reliance upon technology had upon workforce education and performance expectations from management?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd