Absolute power to control the internet and its content.(Reply 1 and reply 2)

[ad_1]
Hello,Hope you’re doing good. just i need 2 replies about 150-200 words for below topics. there are 2 same topics below , use word document for each reply and APA format(clearly avoid plagiarism). must provide 1 peer review reference for each reply.Discussion 1.1: absolute power to control the internet and its content.The internet has become one of our daily activities in our life. We can learn many new things as well as we can reach our family and friends who are on the other side of the globe through it. It acts as a medium for people to say their opinion to share the information. We can also get entertainment through it and it has been performing very well in e-Commerce. Of course, all this is only one side of it.We also have adverse effects of the internet on people. If I were given a chance to control the internet and the content of it, first I would like to remove all the nonsense and stick to the social standards and morals. We can remove material like,Bad Politics and power related content and political blogs and websites which unnecessary blame the government authorities in the country.Sites that contain hatred speech about a specific race or class of society and that promotes disparities among the people of the nation.Internet censorship circumvention is the processes used by technologically savvy Internet users to bypass the technical aspects of Internet filtering and gain access to the otherwise censored material. Circumvention is an inherent problem for those wishing to censor the Internet because filtering and blocking do not remove content from the Internet, but instead block access to it. Therefore, as long as there is at least one publicly accessible uncensored system, it will often be possible to gain access to the otherwise censored material. However circumvention may not be possible by non-tech-savvy users, so blocking and filtering remain effective means of censoring the Internet access of large numbers of users.Different techniques and resources are used to bypass Internet censorship, including Proxy websites, Sneakernets, and circumvention software tools. Solutions have differing ease of use, speed, security, and risks. Most, however, rely on gaining access to an Internet connection that is not subject to filtering, often in a different jurisdiction not subject to the same censorship laws. According to GlobalwebIndex, over 400 million people use virtual private networks to circumvent censorship or for an increased level of privacy. The majority of circumvention techniques are not suitable for day to day use.Discussion 1.2: absolute power to control the internet and its content.Most of the developed world today is connected via the internet. Even major parts of the emerging and under-developed nations are connected to the world wide web. This has caused information to freely flow on the internet without too many restrictions. Yes, there are countries in the world, like China and North Korea, that heavily censor information that can be accessed online; but these make-up for only a small part of the worlds internet share. While this free flow of information has its advantages, there are also a series of disadvantages that it brings with it. Listed below are the two biggest issues that plague the internet today and if I had supreme control over the internet I would do all in my power to mitigate, if not eliminate these issues (Hope, 2018). The first thing I would do is strengthen and equalize laws around piracy. The internet, as we know it today, is plagued with tons of piracy related issues – be it theft of data or intellectual property. Although there are laws that govern piracy, each country interprets it differently and hence there is a serious gap in the implementation of these laws (Hope, 2018). I would do my best to minimize this gap. The second issue I would like to fix is the problem around data and information privacy. While privacy is connected to piracy, it is not essentially the same thing. Piracy focusses more on theft of information. Privacy issues on the other hand deal with misuse of information to cause panic, spread rumors and/or create malicious content with the sole intent of destroying something or someone (Saunders, 2016). I would like to create effective laws and law-enforcement techniques that leave no room for speculation while understanding and implementing these laws.Note: Please write each Reply in a different word document.

What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but splendidwritings.com proved they are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 14***| Rating: ⭐⭐⭐⭐⭐
"The company has some nice prices and good content. I ordered a term paper here and got a very good one. I'll keep ordering from this website."

"Order a Custom Paper on Similar Assignment! No Plagiarism! Enjoy 20% Discount"