StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security, Prosperity, and Freedom in Cyberspace - Essay Example

Cite this document
Summary
"Security, Prosperity, and Freedom in Cyberspace" paper argues that Internet neutrality if allowed would enable users to access the Internet without interference from the government and network interference, and allow network operators to transmit content and applications deemed illegal…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.1% of users find it useful
Security, Prosperity, and Freedom in Cyberspace
Read Text Preview

Extract of sample "Security, Prosperity, and Freedom in Cyberspace"

The statistics indicate a lack of sufficient awareness and training on cyber security in the United States. Employers and the state should create awareness programs on cyber safety and ISP required to communicate cyber safety issues to their customers Making cyber security training such as annual information assurance mandatory for all is not feasible.

Institutions such as the military should make it necessary as any information in the military is sensitive to national security. However, not all information is that sensitive. For example, access to class notes would not require such training as it would not pose a security threat. Such pieces of training whether in the workplace or by internet service providers might not be possible because of the hyped number of users and the costs involved. When a cyber-attack occurs, the cost of the breach is felt by the consumer, of computer-based service (Steven, Bucci, Rosenzweig & Inserra, 2013).

The ISP and manufacturers of the software are not liable for the attack as per their contractual agreements. Most individuals due to a lack of cyber security awareness tend to rely on antivirus protection applications. The software is for sale, and consumers who want security are encouraged to purchase them. Depending on the contractual agreements, antivirus providers can be sued if malware commits a cybercrime they claim they can prevent. Question 2 For a stable and secure internet, three web characteristics must be preserved.

The characteristics are permissionless innovation, collaboration, and open access (Contreras, DeNardis & Teplinsky, 2013). ISPS, therefore, have a duty to ensure they preserve the above musts while providing that public access does not involve a breach of other people’s privacy. They should act when a violation of privacy occurs. According to Wired (2015), ISPs should search and shut off internet access to compromised PCs reported to them by cyber security companies. ISPs should ensure their subscribers are protected.

One of the measures they should take is to blacklist a computer and users who use their Internet to commit unethical practices. ISPs should also share the information with other ISPs to ensure the dishonest users are blacklisted on their Ithat too. Customers should be allowed to sue an ISP for cyber-attacks but only in some instances. One instance when ISPs should be sued is when a cyber-security company has issued them with information about a user or computer that performs cybercrime. If the ISP does not blacklist the user or computer, and the user or computer carries out cybercrime, then the ISP should be sued for negligence.

Question 3A Multi-stakeholder governance of the Internet between government, civil societies, and the private sector is necessary to preserve the Internet (Contreras, DeNardis & Teplinsky, 2013). The role of the internet as a shared resource and its architecInterneturring of time and space provides unique challenges for internet governance. Therefore, as President OInterneticated there must be a multi-stakeholder partnership to deal with the challenges. 

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Policy Essay Example | Topics and Well Written Essays - 500 words - 2”, n.d.)
Information Policy Essay Example | Topics and Well Written Essays - 500 words - 2. Retrieved from https://studentshare.org/information-technology/1697646-information-policy
(Information Policy Essay Example | Topics and Well Written Essays - 500 Words - 2)
Information Policy Essay Example | Topics and Well Written Essays - 500 Words - 2. https://studentshare.org/information-technology/1697646-information-policy.
“Information Policy Essay Example | Topics and Well Written Essays - 500 Words - 2”, n.d. https://studentshare.org/information-technology/1697646-information-policy.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security, Prosperity, and Freedom in Cyberspace

Constitutional Challenges Associated With Investigating Cybercrimes

As a result, there have emerged modern systems of law enforcement that are aimed at providing security and order and at the same time maintaining liberty and freedom in an open society.... Technological developments especially in respect to cyberspace have been inarguably beneficial to human beings and have positively impacted on how they conduct business and how they live (Ditzion, et al.... cyberspace has enabled people to engage in the creation of a completely diverse, chaotic, and new democracy which is free from physical and geographic constraints, as well as sharing ideas over large distances....
10 Pages (2500 words) Term Paper

Intellectual Property and Cyber Law Issues

Moreover, cyber laws conflict with the freedom of information and cyberspace.... In the United States, freedom of speech is protected under the First Amendment and it does not necessarily have internet-based conversations.... The essay "Intellectual Property and Cyber Law Issues" focuses on the critical analysis of the major issues on intellectual property and cyber law....
8 Pages (2000 words) Essay

To Be or Not To Be Free

The Right to freedom of Speech and Expression has been recognized universally by the United Nations Human Rights Council.... “Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers.... ?? However, one must question themselves and rephrase this interrogation once again: What kind of a world would we be living in if we did not keep a check on or misuse the Right to freedom of Speech and Expression?...
4 Pages (1000 words) Essay

Critical Annotated Bibliography on Cybersecurity

cyberspace at a global level has become complicated instead of devising many effective solutions, as heterogeneous and diverse players as well as... The author of this paper "Critical Annotated Bibliography on Cybersecurity" discusses the literature concerning the problems of cybersecurity, criminal and fraudulent motivations, the security implications in information communication, critically analyzing the bibliography.... In the context of cybersecurity, the government of the US has focused on the seven crucial areas including risk management, incident management, privacy and information sharing, international engagement, supply chain security, research and development, innovation, education, and awareness....
6 Pages (1500 words) Annotated Bibliography

Public Sector Cybersecurity Issues

The coursework "Public Sector Cybersecurity Issues" describes the main aspects of cybersecurity.... This paper analyzes the effects of cybersecurity regulations on the American food industry and the public sector, goals of lawmakers in the public sector.... ... .... ... ... For example, they may collect information concerning all customers so as to study their needs....
6 Pages (1500 words) Coursework

Cyberspace Policy

The paper also analyzes the possible threats that people may face in cyberspace, discuss various questions related to cybersecurity such as: Who was/is being harmed by whom?... The paper "cyberspace Policy" presents that in recent times, almost all business and personal operations are dependent on computers and technology.... It has often been observed that by virtue of cyber security, various ruling parties used to keep track of the opposition which is not at all right....
11 Pages (2750 words) Term Paper

Cyber Espionage Crime

According to research findings of the paper 'Cyber Espionage Crime', the US government should establish trade links and proper relationship with countries such as Russia and China as well as other international communities.... Such links may help to reduce cyber espionage crimes and promote cohesiveness....
5 Pages (1250 words) Report

The Correct Information for the Good of All Global Internet and Cyberspace Users

It is only ethical to enjoy the right to access and freedom of expression without violating or tempting to violate the rights of others through information distortion.... The author of the following paper under the title 'The Correct Information for the Good of All Global Internet and cyberspace Users' presents one of the characteristics of the global frame which is the mythical correlations, also known as the global mythic frame.... Every cyberspace user has a right to access coupled with freedom of expression, and hence they are responsible for ensuring propped use of cyberspace without transmitting untrue information that threatens the rights and privacy of other users....
8 Pages (2000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us