StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Correct Information for the Good of All Global Internet and Cyberspace Users - Assignment Example

Cite this document
Summary
The author of the following paper under the title 'The Correct Information for the Good of All Global Internet and Cyberspace Users' presents one of the characteristics of the global frame which is the mythical correlations, also known as the global mythic frame…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.1% of users find it useful
The Correct Information for the Good of All Global Internet and Cyberspace Users
Read Text Preview

Extract of sample "The Correct Information for the Good of All Global Internet and Cyberspace Users"

Computer Sciences and Information Technology Inserts Inserts Grade Inserts Global Frame and Its Characteristics One of the characteristics of the global frame is the mythical correlations, also known as the global mythic frame. This relates to the freedom of expression in the internet and cyberspace and the responsibility pinned to these freedoms. Every cyberspace user has a right to access coupled with freedom of expression, and hence they are responsible for ensuring propped use of the cyberspace without transmitting untrue information that threatens the rights and privacy of other users. Te freedom of expression and right to access must be upheld without compromising or threatening the rights of others, and their freedom of expression to. Media coverage is highly determined by diverse social forces, such as government and other interest groups, which is mostly a rhetorical advancement and mythical experience to the third parties. This rhetoric and mythic experience may easily lead to information distortion that is likely to influence public opinion. In this globalized world, advances in technology may become unethical avenues of communication and information transmission, and hence there is need to ensure that the correct information is transmitted. This responsibility is placed on each cyberspace user as well as the respective cyberspace security and surveillance authorities to safeguard the security within and without the cyberspace. Inter-correlation is also a characteristic of the global framework whereby different information versions are shared and transmitted through the internet and other avenues, and cyberspace as a whole. This is bound to be a compromise to the rights of other internet and cyberspace users. As a matter of fact, information integrity must always be ensured so as to protect the rights of the majority users, as well as to withhold the responsibilities of internet and cyberspace users without compromise or discrimination. The mythical nature of any information is based on the factual information on the same that has an inbuilt complexity. Mythic framing of information lies on public opinion and the real source of the information. Information integrity is core, especially in the technology sector where information flows within a limited time span. It is factual that human beings have the ability to maintain trail relevant changes in their surrounding environment. It is only ethical to enjoy the right to access and freedom of expression without violating or tempting to violate the rights of others through information distortion. My question on the global frame will be based on the basic freedom of expression and right to access. If as a user you have access to critical or sensitive information, why distort the same information without caring about the interests and rights of other users? It is only common sense and ethics to share the correct information for the good of all global internet and cyberspace users. The Economic Frame and Its Characteristics The economic frame was characterized by perceptions and confusion which led to the need for urgent ‘solutions’ (Findlay, 2013). The global economic crisis was far much fabricated by the media, which in turn created a confusion and escalation of tension and downturn in the global economy (Kremer & Müller, 2014). Cyberspace contributed enormously in the global financial crisis, with countries sharing sensitive information and data in a bid to review the nature of the economic crisis and reduce its spread, and impacts (Findlay, 2013). During the global financial crisis, the analytical tools used for evaluation of the crisis mostly came from crisis research. This worked towards the evaluation of preparedness in individuals, groups and/or organization in the event of a crisis (Findlay, 2013). However, cyberspace and information sharing amplified the global economic crisis, which resulted in a social-political crisis that threatened the global economy. According to Findlay (2013), it is a fact that the crisis started from small regions before spreading rapidly across the globe. The economic frame was also characterized by market ideologies whereby profit maximization was considered as morally appropriate and market interference condemned as a moral ill (Findlay, 2013). Many economies used this ideology through information sharing, whereby the cyberspace provided an excellent and effective channel for the spread of the economic crises. On the other hand, cyberspace helped in the efficient research for amicable solutions to the economic crisis to reduce its impact and prevent further spread to the entire world (Findlay, 2013). There was an establishment of crisis rhetoric in the global economic system due to the politics of recession that further caused the rapid spread of the crisis (Findlay, 2013). Many economies unethically engaged in the spread of the global economic crisis through the perception of profit maximization at the expense of innovation and creativity to search for solutions (Kizza, 2010). The economic frame is also characterized by misplaced economic policies that opposed corporate market domination. This accelerated capitalism amongst major economies and led to the fierce spread of the economic crisis, with most of the affected being the capitalist economies. The use of cyberspace in information sharing portrayed the crisis as a capitalist debt crisis. There was also an assumption of the social environment that led to an underestimation of the situation reality. The assumption of the social environment virtually created a viral path for the spread of the economic crisis. The reckless and irresponsible use of computers and media greatly compromise intellectual property rights (Kizza, 2010). As a matter of fact, there was potential to research and look for lasting solutions to reduce the impacts of the economic crisis. The spread of the crisis was long overdue and even economic experts asserted that the global economic crisis could have been priory prevented. The question I can pose with regard to the Economic frame is whether cyberspace motivated the spread of the economic crisis. What was the motivation borne from cyberspace? The Social-Cultural (Local) Frame and Its Characteristics Individualism is a characteristic of the social-cultural frame whereby culture is interpreted as individualistic (Kremer & Müller, 2014). The social-cultural frame aims at reducing collusion surrounding the relationship between individualism, collectivism and culture. In individualistic values, the individual has the sole duty to care for the self and their respective families (Kremer & Müller, 2014). The relationship between behavior and culture is derived from individual morals and values, though individualism tends to focus on culture as an individualistic entity. Contrary to the individualistic culture, the collectivist culture involves every individual entity in the culture to mutually take care of others (Kremer & Müller, 2014). As a matter of fact, collectivist cultures tend to be selfish, static, and discriminative as compared to the individualistic, in the terms of seller-buyer relationship. Individualism has a high value on autonomy and privacy, whereas collectivism is based on conformity, loyalty and basic societal groups such as family (Kremer & Müller, 2014). The power/distance cultural dimension also characterizes the social-cultural frame, whereby societies tend to accept a compromised equity in power distribution (Kremer & Müller, 2014). A high power/distance cultural dimension refers to an unequal power share and diversity. Low power/distance cultural dimension means equal power sharing and individual equity in the society (Kremer & Müller, 2014). There is decentralization of power in low power/distance settings with shorter authority hierarch due to the decentralization of authority, contrary to the strictly hierarchical high power settings. The power/distance characteristic of the social-cultural frame aims at the analysis of power acceptance in diverse social settings and addresses the equal power distribution in cultural settings (Kizza, 2010). Additionally, there is the masculinity-femininity characteristic of the social-cultural framework which helps in the description and analysis of achievement and relationships within cultural settings (Kremer & Müller, 2014). It aims at relating achievement to relationships in social-cultural settings, in the terms of gender equity and success. This characteristic describes masculinity as an assertive power acquisition as compared to the feministic gender that cares for the disadvantaged in their respective social and cultural settings (Kremer & Müller, 2014). In the cyberspace setting, there must be gender harmonization and equity for the protection of minority rights, such as women and children rights. As much as cyberspace is used to develop careers and other achievements, it should also be a platform for social-cultural harmonization through promotion of gender equity. Individual rights and intellectual property must be respected wholesomely in a mission to creating a domicile cyberspace (Kremer & Müller, 2014). Another characteristic of the social-cultural frame is uncertainty where there are reduced procedures and desire in risk taking for some societies, whereas other societies are threatened by ambiguity and hence need stability and rules (Kremer & Müller, 2014). My question based on the social-cultural frame is: Should web pages be availed in diverse languages and culture and should there be existing rules to counter social-cultural inequities? Cyberspace is diverse and should be treated as such and policy makers must implement the social-cultural framework for the effective use of cyberspace and effectiveness of web pages. The Ethical (DUE) Frame and Its Characteristics Communication is the core characteristic of the ethical frame, whereby there must be communication between individuals, groups or organizations. There is a difference between real world communication and communication through the cyberspace (Kremer & Müller, 2014). However, it is only ethical and there are set rules and policies which cyberspace communicators must adhere to. Etiquette is core in cyberspace communication to prevent cyber crime, such as bullying. Improper use of cyberspace has its consequences which are addressed by the ethical frame (Kremer & Müller, 2014). Behavior modeling is also a characteristic of the ethical frame, where the frame champions for ethical behavior modeling to make critical improvement in cyberspace use (Jasper, 2010). The basic simple rule and policy of cyberspace use also characterizes the ethical frame, whereby all cyberspace users are expected to use computers in the appropriate manner. This means using the cyberspace in the right manner without harming other users (Jasper, 2010). On the other hand, cyberspace users are obligated to ensure that any software they use, except open-source software, is dully purchased or licensed (Spinello & Tavani, 2005). The use of cyberspace is almost a right in modern day world and many tend to use cyberspace for their individual gains. The ethical frame ensures that all users benefit without any infringement on other users’ privileges. The ethical frame is also characterized by a recognition intellectual property rights (Spinello & Tavani, 2005). All cyberspace or internet users are required to respect other people’s intellectual properties, such as movies, music, or academic work (Spinello & Tavani, 2005). The recognition of the intellectual property owner is a must in ethical cyberspace use. Cybercrime is also characteristic in the ethical frame with an aim of reducing or eliminating cybercrimes, such as hacking, pornography or cyber bullying (Kizza, 2010). Privacy is also a characteristic of the ethical frame, whereby every cyberspace user is required to respect other people’s privacy and their rights to access the cyberspace (Jasper, 2010). Illegal cyberspace practices, such as spread of illegal or false information or cyber terrorism, are also entailed in the ethical frame (Kizza, 2010). The digital divide is also characteristic in the ethical frame in the terms of rights of access to diverse individuals, groups or organizations that are at diverse technology advancement levels. This helps in the improvement of literacy levels, social-economic relations and technology advancement. Additionally, safety is also a core characteristic of the ethical frame and acts as the basic guide for ethical cyberspace use (Kizza, 2010). Every user is entitled to safety, as much as every citizen in any part of the world is entitled to security. Cyber bullying results to psychological torture and sometimes physical harm or torture (Kizza, 2010). My question in reference to the ethical frame is simple, why do we have an escalation of cyberspace terrorism and increased cybercrime, which have led to escalated cases of collateral damage? My simple answer is that cyberspace ethics have been totally compromised and there is no respect for intellectual property (Kremer & Müller, 2014). As a matter of fact, collateral damage is a burning issue in this globalized world, and hence there is a need for both offensive and defensive solution requirements and capabilities throughout the digital divide. There is need for extensive innovations to protect the cyberspace (Kizza, 2010). References Belting, H., & Binter, S. (2011). Global studies: Mapping contemporary art and culture. Ostfildern: Hatje Cantz. Findlay, M. (2013). Contemporary challenges in regulating global order. Basingstoke: Palgrave Macmillan. Jasper, S. (2010). Securing freedom in the global commons. Stanford, California: Stanford Security Studies. Kizza, M. (2010). Ethical and social issues in the information age. London: Springer. Kremer, J. & Müller, B. (2014). Cyberspace and international relations: Theory, prospects and challenges. Berlin: Springer. Spinello, A., & Tavani, T. (2005). Intellectual property rights in a networked world: Theory and practice. Hershey, PA: Information Science Pub. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(The Correct Information for the Good of All Global Internet and Cyberspace Users Case Study Example | Topics and Well Written Essays - 2000 words, n.d.)
The Correct Information for the Good of All Global Internet and Cyberspace Users Case Study Example | Topics and Well Written Essays - 2000 words. https://studentshare.org/information-technology/1854011-essay-questions
(The Correct Information for the Good of All Global Internet and Cyberspace Users Case Study Example | Topics and Well Written Essays - 2000 Words)
The Correct Information for the Good of All Global Internet and Cyberspace Users Case Study Example | Topics and Well Written Essays - 2000 Words. https://studentshare.org/information-technology/1854011-essay-questions.
“The Correct Information for the Good of All Global Internet and Cyberspace Users Case Study Example | Topics and Well Written Essays - 2000 Words”. https://studentshare.org/information-technology/1854011-essay-questions.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Correct Information for the Good of All Global Internet and Cyberspace Users

Sharing Ideas through the Internet

The biggest strength of using the internet and sharing ideas is that it is available to almost everyone.... In addition, people with technical knowledge and skills may compromise unsuspecting users sharing information on the internet, which they may use to infect your correspondent's computer with malicious software.... ue to the ease of access, some people possess impure intentions as they log onto cyberspace with everyone else.... Today, the internet is a ubiquitous part of people's lives....
5 Pages (1250 words) Research Paper

Spam as a Scourge of the Internet

When a service or product is purchased on the internet, does this give implied permission for the company to suggest sell daily via your email account?... An opt-in list can be purchased, on the internet, of course, thus making even a respectable company's permission list suspect.... If a consumer is required to type in an email address to visit the site or bought a related product from another company that, in turn, sold their email lists, this is all considered permission to inundate an email box with spam....
7 Pages (1750 words) Essay

Copyright Law: Copyright and Performers' Rights in the Music Industry and Opposing Parties on the Internet

The author states that as a consequence of granting intellectual property rights, a monopoly is created in a product that Internet users need.... A large number of Internet consumers grants each user the benefit of network effects -- the effects of a system whose value to a given user increases with the number of users of that system --- a significant externality that affects decisions by potential new participants.... Network effects are particularly important with regard to the Internet because the more users it has, the more valuable it is as an information resource, a communications tool, and a marketplace for goods and services....
18 Pages (4500 words) Term Paper

The Regulation of Cyberspace Activity

The pervasiveness of the electronic medium and the facility of connectivity across geographical boundaries through the Internet have resulted in a vast space where users communicate, that may be referred to as cyberspace.... Similarly, the anonymity of users is well preserved in the electronic medium, which further complicates the issue of control and prevention of illegal activities.... This research provides a report on issues like cyberspace regulation and the problem of its regulation through laws....
16 Pages (4000 words) Essay

Information Law Issues

The case study "Information Law Issues" states that the internet and information revolution the world has experienced in the last two decades has had a phenomenal impact on our society, yet poses questions on how information should be handled from legal aspects.... One of these issues is the blocking information for political and social reasons.... hellip; As we can see from the above discussions, the original question of whether or not a law is desirable or practical over the information in cyberspace is not a question that can easily answer....
8 Pages (2000 words) Case Study

Critical Annotated Bibliography on Cybersecurity

cyberspace at a global level has become complicated instead of devising many effective solutions, as heterogeneous and diverse players as well as... The author of this paper "Critical Annotated Bibliography on Cybersecurity" discusses the literature concerning the problems of cybersecurity, criminal and fraudulent motivations, the security implications in information communication, critically analyzing the bibliography.... In the context of cybersecurity, the government of the US has focused on the seven crucial areas including risk management, incident management, privacy and information sharing, international engagement, supply chain security, research and development, innovation, education, and awareness....
6 Pages (1500 words) Annotated Bibliography

SWOT Analysis of Internet Security

The paper "SWOT Analysis of internet Security" focuses on the benefits of the internet for humans and corporations, but the issues of virtual communication security are becoming important because advancement in technology has been used by terrorists and hackers for their destructive missions.... remedy will be attained by the proper establishment of internet security, which forms the discussion topic in this paper.... Analysis of internet security will be done in terms of its strengths, weaknesses, application opportunities and threats faced....
10 Pages (2500 words) Essay

Political Boundaries in Cyberspace

This website quickly airs content in the form of audio and video which the users deem fitting for the global audiences on the Internet.... … The paper "Political Boundaries In cyberspace" is an outstanding example of a law essay.... With the advent of newer avenues within cyberspace, it has become all the more difficult to curtail political thought, bias and opinion.... The paper "Political Boundaries In cyberspace" is an outstanding example of a law essay....
1 Pages (250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us