Saturday, July 27, 2019

Should countries control the internet Essay Example | Topics and Well Written Essays - 1000 words

Should countries control the internet - Essay Example Along with the effects of internet addiction on children, it also affects the privacy of the users of the internet in terms of hackers’ attacks. Although information technology professionals have been taking special measures to stop network-based unauthorized access to the personal computers of people, the issue of hacking has not resolved as yet. In this regard, some control should be there at the government level on the use of internet. In this paper, we will discuss a few harms associated with the free use of internet to conclude whether countries should control the use of internet or not. Uncontrolled use of internet affects academic progress of children as it shifts their attention and focus away from studies to the pornographic material available on the internet. These days, there is hardly any restriction policy that can prevent children from accessing negative content. The growing age of children is very critical for their proper mental, social, and physical development. Children are usually very eager to know about sex, therefore, they mostly use internet to get information about it. Therefore, it has become the need of today for the governments to have some control on the use of internet so that children are not exposed to harmful stuff. Information security has always been one of the main issues for people and organizations adopting the use of information technology. With the rapid pace of technological advancements taking place in the field of computer sciences and information technology, ensuring information security is also becoming more and more difficult due to more organized intrusion attempts and data retrieval attempts by hackers. Although many new measures have been introduced to make information security reliable and more protected, but they have been unable to resolve the information security issue. Therefore, it is essential to design a reliable system that can minimize the chances of unauthorized

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.