.

Tuesday, January 29, 2019

Alternative solutions for internet censorship in Australia Essay

This report was commissioned to elaborate different alternative systems that fag be handlingd to monitor profit study in Australia without incorporating earnings filtration as the Australian establishment proposes. The future of Australian children has been compromised by the iniquitous vices that the consumption of the meshing perpetuates. Moreover, organizations, customers and innovators own similarly suffered from this paradigm which advocates for phishing, on-line identicalness larceny and piracy among others.Therefore, the report advocates for the use of engine room, political power, moral ethics and civil libertarians. These methods argon non liable to scrutiny and criticism as they do not impede the first amendment bill of the constitution which advocates for independence of expression among other concerns explained in the report. Further more than, the report evaluates this range of methods and concludes that it would be sample to implement the technology m ethod. Introduction Advancement in technology has increase the reliance of cyberspace as a means of entertainment and bringment source.It has too encompassed the education curriculum, social, economic and political activities creating both a verificatory and a negative impact. We render been able to succeed and are rattling grateful because most of the information and technological know how arse be retrieved with ease. However, our children and business enterprises have been adversely affected by the increase net income sexual harassment, privacy invasion, cyber-bullying, on-line identity theft, piracy and phishing just to every last(predicate)ude a few in the unending list.In the typesetters case our children have developed aggressive attitudes which advocates for delinquent demeanors. On the other hand children that have experienced network sexual harassment and bullying among others become grim and thence are cut out from social life and its benefits. This explain s the increased rates of teen develop suicidal attempts in Australia (Australian presidential term 2007). Therefore, the authorities has wee-ween a further step in an attempt of curbing this quandary by introducing mandatory cyberspace filtration to all internet services at home, in schools and man race computers use by he Australian children.The organisation also plans to prepare the Australian children on strategies of being responsible cyber-citizens, protect their identity fleck on-line, understanding the impact of their actions on others while using the internet, responding to cyber-bulling and invasion of their privacy among other negative internet vices. To achieve this the presidency plans to launch education curriculum that provides first rate cyber- guard duty education programs and civilise parents on the negative vices prevailed by the internet thus ensuring their children use the internet responsibly.Furthermore, the government plans to use the blacklist fo rmulated by the Australia Communications and Media effectiveness (ACMA) to ensure harmful information is not availed to the children, establish a jejuneness Advisory Group (YAG) to easily nark information affecting children on-line and to do further research on cyber- safety issues in Australia among others (Australian organisation 2007). This initiative has been met with mixed reactions as some citizens support the idea while others reject the move critically analysing it.Critics view the move as a lash to the phylogeny and welfare of the citizens in terms of internet use because internet censoring exit reduce the speed of the internet, the initiative is not effective because people entrust still be able to coming the prohibited information through the use of proxy services and weathervane services just to mention a few. The initiative provide also violate the first amendment bill which advocates for freedom of expression.The country leave alone louse up a huge sum of its capital through the implementation of this ethereal solution because approximately USD 22billion of tax payers money go forth be used to implement this initiative. Furthermore, the criteria that go forth be used to determine the appropriate age to use the internet, the appropriateness of information on the internet and determining a comprehensive blacklist are in question. Therefore, to anal the dilemma the government is facing this report will elaborate on alternative methods of internet censorship other than internet filtration that can be used (Harvey 2009b). resource solutionsTo end the conflicts that have arisen because of the proposal of incorporating compulsory profit Service supplier (ISP) filtering in the country the government should implement other alternatives much(prenominal) as use of technology, political power, moral ethics and civil libertarian to implement internet censorship as outlined below. Technology The government can practice the available techn ology to help implement their strategies on internet censorship rather than using internet filtration. It can establish websites that teach and admonish adults and children on the dangers prevailed by the internet and how to avoid them. or else it can take the initiative of funding such programs that have already being established. This method will be effective as the probability of people using the internet to access such information is high. The method is also hail effective as such initiatives have been implemented in other countries for example USA and proved to be efficient. Also the government will easily be able to avail on-line safety rules to the neighborhood of children such as using passwords, meeting people met through the internet with the consent or accompaniment of parents and avoiding giving out personal information.For lawsuit the Business Software Alliance (BSA) has enable to alert and educate e-tailers and customers on the dangers of internet such as auction site frauds, counterfeiting, identity theft and phishing among others and effective ways of preventing being victims of the to a higher place vices. BSA has established a website were they notch their acquire and safe guarding tips by displaying stories from victims and tips of avoiding such incidents (Lindroth 2008). Moreover, programs that allow parents to personally amaze internet information availed to their children should be used.This will prevent the government from formulating legislations that violated constitutional rights such as freedom of speech and expression. It will also allow the development of this technology thus benefiting the country and improving the welfare of the creation at large. For example US citizens have been able to enthrall the benefits of using glubble a Firefox browser plug-in that has enabled parents to create a safe shop environment for their kids.The technology is easy to use, fast to install, helps parents to manipulate internet informat ion at the vicinity of their children and enable their children to have the appropriate on-line experience. Furthermore, it does not limit internet information that is important to adults but harmful to children such as family planning tips. Therefore, the government should capitalize on such mechanisms by offering their support either politically or economically (Gary 2009). policy-making power The government is politically empowered thus has the power to restraint legislations and policies that forge this country.Therefore, it should use this opportunity to formulate policies that will enable development of cyber- security system without contradicting on legislations that had been previously formulated. For instance use of plug-ins and programs that will allow parents and mankind utilities where children are predominate users of the internet will increase intellectual proportion infringement therefore, legislations that will protect owners innovation should be stipulated all owing effective use of trade marks, patents and copyright laws among others thus expand the rights of these intellectual property holders.This will encourage innovators thus increase the variety of the advanced technology to consumers. Furthermore, it will increase the competitive nature of the economy of Australia both locally and in the world market. The government should also stipulate mechanisms that will take shag action against culprits who are caught perpetuating cyber-bulling, internet sexual harassment and stealing peoples identity. The government should also avail easy mechanisms for reporting vices that curb cyber-safety.This will military service as a warning to prospective culprits and thus decrease the turning of such incidents. Also children will grow up morally as they will avoid practising such vices because this initiative will effectively mute them. Victims of such vices, parents, and children will willingly surrender information concerning such culprits to t he pertinent authority because of the assurance that effective action will be taken (Harvey 2009a). Moral ethics Most of the activities and information in the internet are morally wrong as they violate ethics and human norms.Therefore, some other mechanism that can be used to increase cyber-safety is educating and guiding the population and children in particular on moral vices that can be adopted, thus enabling the adherence and respect of business, religious, social and moral ethics. For example more incidents of school children participating in social networking sites that perpetuate scrofulous behaviour such as pornography and prostitution are evident therefore, postulateing institutions should formulate policies that will effectively deal with school children that participate in such incidents and break school rules.Parents on the other hand should develop engaging relationships with their children to be able to further instil the moral principles that they learn and adop t from their school environment. Therefore, the school administration should work hand in hand with the government to clearly outline guidelines that will discipline students in regards to information availed and collected from the internet. The collation that will be formed will also help parents and the general Australian population to access such guidelines thus further perpetuate adherence to moral ethics and human norms (Madson 2005).It is quite evident that teachers nowadays use social networking sites for education purposes. Therefore, teachers should ensure that they effectively elaborate to their students how they intend to communicate to them and the necessary instructions that they should keep when logged into such sites to prevent them from accessing information that is not related to education and perpetuates immorality.Alternatively the school administration should establish websites which should be regularly monitored where teachers and students can communicate. More over, the tuition institutions should implement educative programs that will educate the students on issues related to on-line- safety and the responsible ways of using Facebook and MySpace among others. Furthermore, policies that will effectively deal with students that perpetuate and practice cyber-bullying should be enacted.This responsibility should not only be leave to the school administration and the government, other bodies such as religious institutions, public conferences and gatherings, activists and ethicist should also advocate for the adherence of moral ethics and human norms through the use of mechanisms such as safety conversation (McMahon 2008). polished libertarian The government should also not ignore the role played by civil libertarians rather they should work hand in hand with them.This will further help them to ensure cyber-safety in Australia is emanated and thus protect the innocence and rights of children. This is because civil libertarians fight for th e rights and respect of computer and network users by load-bearing(a) those involved to register with them thus regulates their activities. Therefore when formulating new legislations or changing those that already exists the government should engage such organizations thus the policies that will be formulated will be at the best interest of all stakeholders.For instance the Electronic Frontier Foundation in US provides levelheaded assistance to companies or organizations that have out rightly been denied their constitutional rights by implementation of impractical legislations. In the event the organization promotes the US laws and allows efficient incorporation of advanced technology into the country. However, it indirectly regulates the information in the internet by offering legal support to organizations that avail useful information which is not harmful to the social being and economic welfare of the confederation and the country.Therefore, Australia should implement this example and follow suit as cyber-security will be enhanced while protecting and respecting the constitutional and human rights of its citizens (Swidorski 2003). Conclusion From the above facts it is quite clear that all the above principles should be implemented to effectively implement internet censorship. Each principle covers a specific demesne of enhancing cyber-safety in the country and among the citizens. The role that the government and politicians in general can play in the attempt of protecting Australian children from internet immoral vices without developing conflicts is outlined.However, the government also needs to work hand in hand with the school administration, teachers, parents and civil libertarians to efficiently enhance on-line security and educate Australian children on mechanisms of being responsible cyber-citizens. Also as we aim to be a world class country we will have to incorporate more sophisticated technology which is mainly come through from the relian ce of the internet therefore, this subject should be researched regularly to enable planning of policies that are relevant to the current technology in the country.In the event the country will be able to attain the technology without restrictions that whitethorn curb its development. Therefore, from my own opinion it is ideal for the government to implement the technology method which will go hand in hand with the development objective of the country because it will be cheaper to incorporate, it will be easier to regulate internet information at the disclosure of children while still gaining access to information that will help in improving the welfare of the participation and country at large and human rights will not be violated as a result of internet censorship which I do not support.Word Count 2189 List of references Australian Government (2007), Attitudes and behaviour of young people on-line, Research Summary. accessible at <http//www. minister. dcita. gov. au/_data/ass ets/pdf_file/73394/research_summary- web. pdf> Accessed on 28th, May, 2009. Gary, J. (2009), Short range plug-ins work best in US, automotive Engineer, 34(3), p. 49. Harvey, S. (2009a), Australian internet censorship in practice, Available at <http//www. pingudownunder. com/ intercommunicate/2009/03/19/australian-internet-censorship-in- practice/>Accessed on 28th, May, 2009 Harvey, S. (2009b), Issues with re-establishing identity after natural disasters, Available at < http//www. pingudownunder. com/blog/index. php> Accessed on 28th, May, 2009 Lindroth, L. (2008), How to improve on-line safety, Teaching Pre K-8, 28(7), p20. Madson, W. (2005), Internet censorship, Available at <http//www. rense. com/general69/intercens. htm> Accessed on 28th, May, 2009 McMahon, F. (2008), Smooth operator, Digital Content Producer, 34(11), pp. 30-33. Swidorski, C. (2003), semipolitical science, the Labour Movement, and the struggle for freedom of expression, New Political Science, 22(3 ), pp. 319-340.

No comments:

Post a Comment