Friday, December 6, 2019
Propaganda - Recruitment and Anarchy
Questions: 1. An analysis of different methods schools can use to ensure children are protected from extremists and anarchists while using school computers 2. An analysis of the different methods parents can use to ensure children are protected from extremists and anarchists while using home computers 3. Can such protections be construed as an infringement upon Free Speech? Why or why not? Answers: Introduction The analysis of the different methods, which the schools can think of using to protect the children from the anarchists and extremists when using the school computers, is discussed on basis of several recent incidents during which the kids are instigated by these extremist groups to join them (Allport Horner, 2011). In this context the various methods, which the school can use that internet system which should support enrichment, career development and education of the children. This kind of internet system is known as the Districts, which focuses on educational use of the internet system that provide instructional and technical support, lesson plans, educational website and professional development (Atluri Diaz, 2011). 1. Analysis of different methods: Used by schools The school can also develop certain educational policy, which should provide a clear idea to the students regarding the activities, which they can exercise in the school. Also, the student should get that while using internet in their school they have a very limited amount of internet (Balzarotti, Stolfo Cova, 2012). The school authority plays an important role here where they convey the idea to the students that all their activities is regulated by the school and if in any case any student practice some inappropriate or illegal activities then strict action should be taken against those students (Bertino, 2012). The basic aim of the school for its students should be to maintain a secure and safe environment. The safe internet environment means that the sites should be previewed in order to understand its educational value and appropriateness (Boyle Panko, 2012). In case for further studies the students needs to check certain websites, which can be done under an expert supervision. Also, if the students encounter certain socially and culturally objectionable website while net surfing should immediately report it to their teacher (Chen, Yung Zhu, 2012). The school administration, teachers and their students receives certain instructions, which encompasses on responsible and safe use of internet. The students should be provided with education via the internet that should be accordance to the students understandings and age ('Cybercrime diversifies', 2011). There are instances when the extremist groups breach the privacy of the school internet system and trap some students with the aim to recruit them. Thus, the students should be educated about the inappropriateness of these groups and report any such illegal activities happening by the school computers both on his case and on others ('Cyber-criminals becoming more professional', 2014). 2. Analysis of different methods: Used by parents The analysis of the different methods, which the parents can think of using to protect their children from the anarchists and extremists when using the school computers are- In todays age, the children are being accustomed with the internet from a very early age, which improves their technical skills and abilities in the internet use. This may result for the children to be connected with the extremists and anarchist groups (Danezis, Dietrich Sako, 2012). Therefore, the parents need to improve their computer competency in order to keep a note on the activities carried out by their children online (Easttom, 2011). The children should be taught by their parents that accessing the internet is more of a privilege and should be used responsibly (Easttom, 2012). The parents should monitor what their children is doing while using the internet and convey this to their children. This will restrict the activities of the students and prevent them from using objectionable and unlawful content while net surfing (Flammini, Bologna Vittorini, 2011). Parents can also think of keeping the computer in the living room, instead of putting it in the kids bedroom. The kids should also be motivated to participate in outdoor games instead of just sitting in front of the computer all the time (Garcia-Alfaro, 2012). Parents can interact more with their children and educate them regarding the utility of the internet. They can also install some parental control software to make control on their children and explain them to stay cautious from the extremists and anarchists who aim to spread hatred (Gelber, 2011). Another objective is that with the popularity of the social network sites the children are getting more interests in opening their account in these social networks. This may result in those children becoming the victim of the social predators like terrorists groups and organizations (Gollmann, 2011). Due to which the parents should have access on the user id and password of their kids, have control on their friend lists and the children should be taught to avoid any derogatory statements online, add friends according to their parents permission and refrain from giving personal details in any social networks (Gutwirth, 2011). Finally while using the social networks the children should be taught to avoid joining any kind of controversial groups and accepting unknown friend requests. On the contrary rather than sticking all the time to the internet parent should spend more time with their children and develop better memories with them (Hanaoka Yamauchi, 2012). 3. Protection of school kids: against mobile devices Evaluation of mobile devices has changed the way children uses the changing technology and internet system. Due to which some protection needs to be exercised which are- Firstly, children should use mobile devices like iPads, Smart phones and iPhones carefully. They should not share their personal information in the chat rooms and online forums. Personal information includes the physical description, age, selfies, e-mail id, phone numbers, usernames, location and other information (Iwata Nishigaki, 2011). Secondly, not to give contact number to someone and agree to contact any stranger the children meet via their mobile devices through the internet. Before meeting any stranger the children needs to discuss it with their parents and then meet anyone (Jones Connelly, 2011). Thirdly, never make any kind of internet purchases, which will require the credit card details, their passwords, or required to hang up the phone (Katzenbeisser, 2012). Fourthly, children should be cautious while downloading any file from any unknown link or extension because it may give away their personal information to the strangers (Kotenko Skormin, 2012). Fifthly, sometimes via chat, e-mail or messengers, web pages are sent to the students. However, the students should take the advice of their parents before visiting those web pages (Kizza, 2014). Sixthly, the children should not accept any online gifts, offers, and parents should check that. Seventhly, children should not give their personal information or details even to their friends because it may later tie them to some kind of problems (Kutyowski Vaidya, 2014). Eighthly, the children should not share their personal pictures or more appropriately their private pictures with anyone through their smart phones and Iphones. Ninthly, if any online information hurts or upsets the children then they should discuss it with their parents (Ortmeier Daniel, 2012). Finally, parents should note that the children did not join any messenger group, which promotes vindictive or rebellious ideas (Powers, 2011). Free Speech Protections can be construed as an infringement upon Free Speech. In context to this statement, free speech can be defined as the basic right of every individual to communicate his or her ideas and opinions. However, in the United States the freedom of speech is can be misused for wrong reasons in order to harm both a persons income and reputation. The basic functions of free speech in US is to promote the right to obtain ideas and information, right to get ideas and information and right to use those ideas and information (Ryan, Smyth Wang, 2012. The question in relation to free speech focuses that whether protections against the use of technological devices by children construe as the infringement on free speech. As per the protection, functions the children should be controlled to limit their overexposure to the internet. This may result in limiting the basic notion of free speech. Due to which the concept of the freedom of the information has started which was developed in connection to the censorship, surveillance and monitoring of the activities taken place in the internet (Ryan, Smyth Wang, 2012). The monitoring of the digital information was developed mainly to promote clarity and avoid misappropriation of the information. Though limiting the flow of the digital information do limits the freedom of speech but it is done mainly to avoid both the children and the adults to prevent being trapped by anarchist and extremist groups (Torrenzano Davis, 2011). The freedom of information is mainly referred to as the mode of expressing ideas and opinions through the internet freely. However, often the banned social groups and fraudulent entity tries to influence innocent individuals, especially children. Thus, to avoid it, some legal restrictions or censorship is there on certain web sites to avoid misuse of information, fraudulent activities and unfair practices (Torrenzano Davis, 2011). Conclusion Use of computers is becoming popular globally but it is the moral duty of the schools and the parents to exercise control of computer by the children and maintain appropriate and supervised internet usage. This will help the children protected from the extremist groups and use all their internet usage wisely. Also, it can be concluded that although the protection against use of certain websites can be termed as an infringement on free speech but with the rise of global disharmony and terrorism it is necessary to exercise some control on the free flow of the information ('Introduction to Computer and Network Security', 2013) References Allport, A., Horner, J. (2011).Freedom of speech. New York, NY: Chelsea House. Atluri, V., Diaz, C. (2011).Computer security-- ESORICS 2011. Berlin: Springer. Balzarotti, D., Stolfo, S., Cova, M. (2012).Research in Attacks, Intrusions, and Defenses. Berlin: Springer. Bertino, E. (2012).Data protection from insider threats. San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA): Morgan Claypool. Boyle, R., Panko, R. (2012).Corporate computer security. Boston: Pearson. Chen, L., Yung, M., Zhu, L. (2012).Trusted systems. Berlin: Springer. Cybercrime diversifies. (2011).Computer Fraud Security,2011(2), 3-20. doi:10.1016/s1361-3723(11)70013-6 Cyber-criminals becoming more professional. (2014).Computer Fraud Security,2014(1), 3. doi:10.1016/s1361-3723(14)70003-x Danezis, G., Dietrich, S., Sako, K. (2012).Financial cryptography and data security. Berlin: Springer. Easttom, C. (2011).Computer security fundamentals. Indianapolis, IN: Pearson. Easttom, C. (2012).Computer security fundamentals. Indianapolis, Ind.: Pearson. Flammini, F., Bologna, S., Vittorini, V. (2011).Computer safety, reliability, and security. Berlin: Springer. Garcia-Alfaro, J. (2012).Data privacy management and autonomous spontaneus [sic] security. Berlin: Springer. Gelber, K. (2011).Speech matters. St. Lucia, Qld.: University of Queensland Press. Gollmann, D. (2011).Computer security. Chichester, West Sussex: Wiley. Gutwirth, S. (2011).Computers, privacy and data protection. Dordrecht: Springer. Hanaoka, G., Yamauchi, T. (2012).Advances in information and computer security. Berlin: Springer. Introduction to Computer and Network Security. (2013).Network Security,2013(11), 4. doi:10.1016/s1353-4858(13)70124-7 Iwata, T., Nishigaki, M. (2011).Advances in information and computer security. Heidelberg: Springer. Jones, C., Connelly, S. (2011).Behind the dream. New York: Palgrave Macmillan. Katzenbeisser, S. (2012).Trust and trustworthy computing. Berlin: Springer. Kizza, J. (2014).Computer Network Security and Cyber Ethics. Jefferson N.C.: McFarland Company, Inc., Publishers. Kotenko, I., Skormin, V. (2012).Computer network security. Heidelberg: Springer. Kutyowski, M., Vaidya, J. (2014).Computer Security - ESORICS 2014. Cham: Springer International Publishing. Ortmeier, F., Daniel, P. (2012).Computer safety, reliability, and security. Berlin: Springer. Powers, E. (2011).Freedom of speech. Lewisburg, Pa.: Bucknell University Press. Ryan, M., Smyth, B., Wang, G. (2012).Information security practice and experience. Berlin: Springer. Torrenzano, R., Davis, M. (2011).Digital assassination. New York: St. Martin's Press. Vacca, J. (2013).Computer and information security handbook. Amsterdam: Morgan Kaufmann Publishers is an imprint of Elsevier. Wells, J. (2009).Computer fraud casebook. Hoboken, N.J.: Wiley.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.