Boundaries and regulation of cyberspace

Cyberspace as a medium through which people engage in more complex processes. The history and development of information security principles in the World Wide Web, an assessment of their effectiveness in practice, the prospects for further development.

Рубрика Программирование, компьютеры и кибернетика
Вид реферат
Язык английский
Дата добавления 24.03.2015
Размер файла 15,4 K

Отправить свою хорошую работу в базу знаний просто. Используйте форму, расположенную ниже

Студенты, аспиранты, молодые ученые, использующие базу знаний в своей учебе и работе, будут вам очень благодарны.

Размещено на http://www.allbest.ru/

Размещено на http://www.allbest.ru/

Boundaries and regulation of cyberspace

The Cyberspace has become a medium through which people engage in increasingly sophisticated processes. Although it was originally developed as a means for government agencies to monitor defense-related research in academia, industry and military, now it has become much more. Private parties now use the Cyberspace which is usually called Internet to communicate between each other, for different data processes and transactions. The data, services, and applications in cyberspace flow across routers and servers that cover the globe. Internet has grown in visibility and importance economically, socially, politically, and culturally. And as the number of international transactions utilizing the medium has exploded, it is no surprise that governments around the world have begun to give it greater attention. In many cases governments have begun to pass laws and regulations seeking to control conduct and content on the Internet, within and beyond their borders.

Nowadays one-third of world's population is using Internet. By 2015, the UN's goal is to have 60 percent of the world with internet access - 50 percent in developing counties and 15 percent in the least developed countries. And usually these users are not divided by nationality, gender, race or sexual preferences. But does it mean that Cyberspace doesn't have any boundaries or it shouldn't have it.

Probably most of people will agree with different researches who saying that there are no such things as boundaries in Cyberspace. There are no international borders and there are no oceans to cross. Cyberspace is limitless when it comes to its reach. And many of the critical processes that we operate in our day-to-day-lives are now computer-based. So much of that we doing in virtual world occur over the internet and over publicly available networks. So the risks are now also in the physical world.

In «Law and Borders - The Rise of Law in Cyberspace», David R. Johnson and David G. Post (1996) saying: «While these electronic communications play havoc with geographic boundaries, a new boundary, made up of the screens and passwords that separate the virtual world from the «real world» of atoms, emerges. This new boundary defines a distinct Cyberspace that needs and can create its own law and legal institutions» [2]. So basically they saying that virtual world have some boundaries. But not geographical one like we used to know. And these borders can be both physical and virtual. It means that people «located» in Cyberspace is separated by computer monitors. Even with appearance of applications such as Skype or Viber users still don't have full effect of real life communication. Other boundaries are nonmaterial and usually created by users. People decided by themselves how much of personal information they need to provide freely available, what should they hide. Also as a delimiter in Cyberspace can comes out the governance. It determines which actions and processes in virtual world are legal, which are not. I agree with Johnson and Post opinion. For sure Cyberspace cleans up usual for us geographical borders. We can easily communicate with our friends, relatives and some random stranger in almost any part of world. We don't need to send letters by usual post, wait the answer, buy tickets on plane, get some visas and spend a lot of money just to keep in touch with people. Instead we can just open our laptop, login in and become a part of virtual society. Moreover different applications and programs make this communication for us even easier. By this I mean translation services which make communication between people who doesn't speak any common language possible. As removing of boundaries not only communication can be consider. It also includes plenty of services such as banking transactions, job employment, remote access to work materials. Now we can get a job by interviewing in Skype and work on some company in Germany staying at home in Ukraine. Other example can be services which provide access to the most popular and beautiful parts of our planet in real-time mode. But there appear new boundaries such as passwords, limited access to some internet sources due to its content. It can be some private information, government data or intellectual property. In some countries sources such as Yotube, Faccebook or free online resources with movies, music or books are forbidden. Another aspect which creates boundaries and regulation in Cyberspace is norms of behavior. Of course these norms are not the same as norms in real life. How we behave online is not the same as doing what we like in the privacy of your living room. And they differ from age, gender or religion of users. But for sure they have influence on regulating and boundaring of Cyberspace. And for my opinion it's very important for all of us to put our own borders using Cyberspace. We need to take steps to ensure that personal data is not accessible to anybody who does not have permission to access it. This includes date of birth and address, etc. We should be careful that our behavior and conversations on the Internet doesn't compromise us. Treat our online conversations as if we were talking with people in a public space where we can be seen and overheard, learn how to adjust our security or privacy settings in virtual world. Good boundaries are important for healthy relationships, but when it comes to our online lives, we rarely think to create clear-cut borders. The most important reason to set boundaries online is for our safety and protection.

About connection between physical location and regulating cyberspace Johnson D.R. and Post D.G. (1996) say that «the rise of the global computer network is destroying the link between geographical location and the power of local governments to assert control over online behavior, the effects of online behavior on individuals or things, the legitimacy of a local sovereign's efforts to regulate global phenomena; and the ability of physical location to give notice of which sets of rules apply. Net thus radically subverts the system of rule-making based on borders between physical spaces, at least with respect to the claim that Cyberspace should naturally be governed by territorially defined rules» [2]. At this point I can't totally agree with them. Because it will be wrong to say that government doing nothing and not trying to solves Cyberspace problems. There exist different ways of regulating virtual world. But unfortunately not all of them are implemented successfully and working as they need to.

For regulation of Cyberspace constraints described in Lawrence Lessig's «Code is Law» Version 2.0 (2206) can be used. And loss of location in Cyberspace in my opinion effects negative on this regulation. Maybe it's not influence on all four constrains, but they all dependent on each other and they support or oppose the other [3]. Because of it I think there is no constraint which plays the biggest role in regulating Cyberspace. All of them are important and plays unique role in Cyberspace behavior regulation. Law regulates behavior in Cyberspace in a same manner as it regulates it in real life. People are afraid of punishment or losing of money. The same as they dependent on opinion of others. Because of it people follow some rules and norm and this is how norm constraint works in Cyberspace. Also they don't want to spend more money on things they don't need in real or virtual world. So people don't use all possible resources in internet, but only the one can afford to. And lastly architecture regulates behavior in Cyberspace. In this context it presented in a form code. It controls our free, anonymous or authenticated accesses in the network.

So if there exist some techniques and norms of regulating Cyberspace it means that it should be regulated and governed. And these is there I disagree with Barlow and his «Declaration of the Independence of Cyberspace». First I would like to say that it's very utopian and inspiring work. I really liked the ideas which presented in this article, but I can't say that they can be implemented and work in practice. For example:

«We are creating a world that all may enter without privilege or prejudice accorded by race, economic power, military force, or station of birth.

We are creating a world where anyone, anywhere may express his or her beliefs, no matter how singular, without fear of being coerced into silence or conformity.» [1]

We have to admit that even in virtual world we still dependent on who or where we are in real world. We still have a lot of crimes coming from Cyberspace which need to be investigated and punished. And we can't do it only with self-regulation. We need some support from government in it.

Cyberspace is constantly crowing, provide new opportunities and open new doors for us. But we need to define which doors should we opened, which not. We need to put some borders in virtual world so it can't make damage in our real life. And with the help of government we need to identify this borders and how they should be regulate.

References

cyberspace security information

1. Barlow J.P. (1996) «A Declaration of the Independence of Cyberspace», Davos, Switzerland

2. Johnson D.R., Post D.G. (1996), «Law and Borders - The Rise of Law in Cyberspace», 45 Stan. L. Rev. 1367

3. Lawrence Lessig's (2006), «Code is Law» Version 2.0, Chapter I, V and VII, Basic Books

4. Frank H. Easterbrook (1996), «Cyberspace and the Law of the Horse», U Chi Legal F

Размещено на Allbest.ru

...

Подобные документы

  • IS management standards development. The national peculiarities of the IS management standards. The most integrated existent IS management solution. General description of the ISS model. Application of semi-Markov processes in ISS state description.

    дипломная работа [2,2 M], добавлен 28.10.2011

  • Overview history of company and structure of organization. Characterization of complex tasks and necessity of automation. Database specifications and system security. The calculation of economic efficiency of the project. Safety measures during work.

    дипломная работа [1009,6 K], добавлен 09.03.2015

  • Technical and economic characteristics of medical institutions. Development of an automation project. Justification of the methods of calculating cost-effectiveness. General information about health and organization safety. Providing electrical safety.

    дипломная работа [3,7 M], добавлен 14.05.2014

  • Practical acquaintance with the capabilities and configuration of firewalls, their basic principles and types. Block specific IP-address. Files and Folders Integrity Protection firewalls. Development of information security of corporate policy system.

    лабораторная работа [3,2 M], добавлен 09.04.2016

  • Information security problems of modern computer companies networks. The levels of network security of the company. Methods of protection organization's computer network from unauthorized access from the Internet. Information Security in the Internet.

    реферат [20,9 K], добавлен 19.12.2013

  • Consideration of a systematic approach to the identification of the organization's processes for improving management efficiency. Approaches to the identification of business processes. Architecture of an Integrated Information Systems methodology.

    реферат [195,5 K], добавлен 12.02.2016

  • Всемирная паутина World Wide Web, основные принципы ее работы. Характеристика технологий и компонентов WWW. Создание таблицы "Расход продуктов", расчет стоимости выпеченных изделий. Сводная таблица и графическое представление результатов вычислений.

    контрольная работа [579,9 K], добавлен 23.04.2013

  • History of development. Building Automation System (BMS) and "smart house" systems. Multiroom: how it works and ways to establish. The price of smart house. Excursion to the most expensive smart house in the world. Smart House - friend of elders.

    контрольная работа [26,8 K], добавлен 18.10.2011

  • История появления и развития сети Интернет, особенности ее гуманитарной и технической стороны. Применение системы World Wide Web - "Всемирная паутина". Ключевые аспекты WWW-технологии, специфика ее использования для создания образовательных ресурсов.

    реферат [19,3 K], добавлен 26.03.2011

  • Строение класса complex. Примеры использования класса complex. Результат выполнения программы. Цикл возведения первого числа во второе. Операции с комплексными числами. Конструкторы и операции присваивания для типа complex. Неявные преобразования типов.

    курсовая работа [1,5 M], добавлен 18.05.2011

  • Архитектура операционной системы Android. Инструменты Android-разработчика. Установка Java Development Kit, Eclipse IDE, Android SDK. Настройка Android Development Tools. Разработка программы для работы с документами и для осуществления оперативной связи.

    курсовая работа [2,0 M], добавлен 19.10.2014

  • Основные алгоритмические структуры. Запись алгоритма в словесной форме, в виде блок-схемы. Система команд исполнителя. Язык высокого уровня. Создание программы и её отладка. Интегрированные среды разработки: Integrated Development Environment, IDE.

    лекция [61,7 K], добавлен 09.10.2013

  • Review of development of cloud computing. Service models of cloud computing. Deployment models of cloud computing. Technology of virtualization. Algorithm of "Cloudy". Safety and labor protection. Justification of the cost-effectiveness of the project.

    дипломная работа [2,3 M], добавлен 13.05.2015

  • Сrime of ciber is an activity done using computers and internet. History of cyber crime. Categories and types of cyber crime. Advantages of cyber security. The characteristic of safety tips to cyber crime. Application of cyber security in personal compute

    презентация [203,5 K], добавлен 08.12.2014

  • The material and technological basis of the information society are all sorts of systems based on computers and computer networks, information technology, telecommunication. The task of Ukraine in area of information and communication technologies.

    реферат [29,5 K], добавлен 10.05.2011

  • NANO Security - сплоченная команда молодых специалистов: программистов, аналитиков, тестировщиков, менеджеров. Предметная область, назначение разработки, требования к программному изделию, системы управления обучением. Обзор языков программирования.

    отчет по практике [1,1 M], добавлен 22.07.2012

  • Data mining, developmental history of data mining and knowledge discovery. Technological elements and methods of data mining. Steps in knowledge discovery. Change and deviation detection. Related disciplines, information retrieval and text extraction.

    доклад [25,3 K], добавлен 16.06.2012

  • Создание World Wide Web как единства информационных ресурсов. Разработка и внедрение технологических стандартов для Интернета и Всемирной паутины. Применение гипертекста для построения информационной среды. Использование специальной программы браузеры.

    презентация [652,5 K], добавлен 09.10.2014

  • Международный стандарт ISO/IEC 12207:1995 ”Information Technology – Software Life Cycle Processes” (ГОСТ Р ИСО/МЭК 12207-99) определяющий структуру ЖЦ, содержащую процессы, которые должны быть выполнены во время создания программного обеспечения.

    презентация [519,6 K], добавлен 19.09.2016

  • Система World Wide Web: структура, принципы, технологии, история разработки и перспективы развития. Способы активного отображения информации во Всемирной паутине. Электронная реклама с использованием E-mail. Поисковая оптимизация, доска объявлений.

    реферат [47,6 K], добавлен 22.01.2011

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу.