Friday, February 22, 2019
Censor: regulating the digital environment is difficult and challenging Essay
Bill battle of Hastings, the promontory censor, has set forth to propose changes and modifications on the current law that regulates rise to power to and field of video games and movies universe marketed and shown to the public. Hastings went forward to ask for the stand of Richard Worth, the minister of Internal Affairs in ball club to expand the reportage and implementation of regulation laws on video games and movies. The decision and advocacy of Hastings to modify laws on regulations of digital contents were based on his stamp that current laws are superseded and do not apply to the changing dynamics of digital content.Hastings has acknowledged the exponential development of technology and digital content stating that their continuing advancement should be the same reason wherefore regulation laws should also be adjusted. The thoughts and ideas presented by Hastings relate to the issues of evaluating and unequivocal technology and digital content. It is true the continu ous development of technology makes it catchy to implement laws that evaluate and regulate them. With the passage of time, technology and digital content changes and transforms straying away from the authority and influence of laws that are rigid and inflexible.For these reasons, with the growth and expansion of technology, laws should also be constantly evaluated and adjusted in order for judicial branches and institutions to strictly implement sound regulations consistently and appropriately. This issue is decent of societys attention because it relates to the kind of digital content that the public is able to access. With various issues dug up on the certain outcomes of unregulated technology, such as pornography, piracy, adaptation of violent tendencies, exploitation, harassment, etc., society must be made aware of the need for the establishment and implementation or fitting regulation laws. NZPA. (2009).Censor Wants to Regulate Online Games. Retrieved 18 Jul 2009, from Tele vision in the raw Zealand Limited. Website http//tvnz. co. nz/technology-news/censor-wants-regulate-online-games-2465707 A Failure The Vulnerability of Computer Technology to Hacking Kilgannon and Cohen, correspondents for the New York propagation, have cover a Cyberwar games at westmost Point in New York.Among the contenders were the brilliant calculator science and instruction technology students from various countersign and surety groups and institutions including West Point, the Merchant Marine, Naval Postgraduate School, Air ramp Institute of Technology, and so on. The objective of the game was to counteract the cyber threats and challenges from the National credentials sanction. Ostensibly, the aforementioned agencies decided to conduct a Cyberwar game as a means to gain their awareness and vigilance towards hacking.In addition, it was the sanction and Defense Departments scheme in order to key the most knowledgeable and skilled students and individuals from afore mentioned security and intelligence groups and resume them to boost the resources for national security. The strong campaign of the National Security Agency and Defense Department to go to great lengths in order to increase awareness and preparedness against hacking is a glaring evidence of the risks and threats involved in utilizing data processor technology to secure national intelligence and safety.As utter by Kilgannon and Cohen (2009), the game was Part of the Pentagons effort to increase the armys capabilities. The practices and precautions taken by the security, intelligence, and defense agencies in the United States tho mean that the pitfalls of computer technology are imminent. The news may be considered a word of advice and reminder to society about the risks, threats, drawbacks, and problems involved with computer technology.It is a caution against the recording of personal information online since the vulnerability of computer technology to hacking makes it and th e Internet unsafe mediums for communication. Kilhannon, C. and Cohen, N. (2009). Cadets Trade the Trenches for Firewalls. Retrieved 18 Jul 2009, from The New York Times Company.Website http//www. nytimes. com/2009/05/11/technology/11cybergames. html? _r=1 Computer Technology Fails to procure Cyberspace from Breaches In January, the National Security Agency has revealed a inclination containing numerous erroneous codes and sequences that would pave the way for security breaches.According to the Agency, on that point are various possibilities that would lead to security breaches and one of them is leaving forms conquerable to external attacks and interventions. As the Chief Technology Officer from Veracode, Chris Wysopal said that the softwares being installed in computers should be thoroughly checked and assessed taking note of the earthly concern of the codes and sequences written on the list. Prior to the reproduction of the softwares for computers, the codes and sequences, t hat proves to be dangers to the security of the system should be cancelled out.Just as the Cyberwar games conducted at West Point imply the vulnerability of computer technology to hacking, the existence and designation of dangerous codes that become the source of security breaches prove the precarious constitution of the computer as a system. Apparently, the installation of security applications or softwares with preventative features are not adequate in order to ensure that the information being sent and received by users are secure and that their retirement is valued and protected. The inability of computer technology to ensure safety and security is a huge error and failure.With the exponential advancement of technology, security and hacking softwares, programs, and schemes testament always cancel out each other leaving the computer a technology that is always open to risks and threats. Once again, this is a warning to society about the dangers of computer technology. Being a technological dent that continuously evolves, people should realize that there will always be security and privacy risks and threats involved with the use of the computer. BBC. (2009).Dangerous Coding Errors Revealed. Retrieved 18 Jul 2009, from BBC. Website http//news. bbc. co. uk/2/hi/technology/7824939. stm.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment