Answer all the questions. Use APA format with more than 300 words and at least
3 references
Question 1:
Please assume you have the absolute power to control the internet and its
content.
Answer: Your post should be 400 words long (40 points).
Please use APA throughout.
Question 2 :
Response by: Harika
If I have the power to control the internet and its content, I will set specific
standards for the data viewable by the user. It’s a known fact that in today’s
world, the Internet plays a key role in everyone’s life. It’s an A-Z platform where
you can get information about everything. When a user searches for some
content on the Internet, he/she should get more relevant information, not pieces
of data. This should be controlled by protecting AdWords first. Ads must be
limited and appropriate (Weidmann, 2015). Since some negative comments may
also be available on the Internet, things or information should be taken into
consideration broadly. The government should establish specific rules for the
implementation and compliance of standards so that no group is aggressive.
Currently, data violations have become more and more popular due to increased
information leaks. The Internet is one of the main reasons for these violations.
Attackers attack the target by hacking system data. The goal can be a real person
or a big organization, but it affects the whole body. Personal and professional
data is attacked and used for some malicious attacks. Hackers sell data to
foreigners and cause suspicious activity (Sornette, 2015). For example, all online
banking accounts will have caches/cookies that are easy to cut after connecting. I
would avoid such things, create more awareness among people because they
should be kept secret and not used in a public internet café. Always keep two-
step authentication more protective. I will also focus more on the presentation of
relevant and important data.
whether you accepting the response or against the response depending upon the
question in more than 200 words.
Below are additional suggestions on how to respond to your classmates’
discussions:
· Ask a probing question, substantiated with additional background information,
evidence or research.
· Share an insight from having read your colleagues’ postings, synthesizing the
information to provide new perspectives.
· Offer and support an alternative perspective using readings from the classroom
or from your own research.
· Validate an idea with your own experience and additional research.
· Make a suggestion based on additional evidence drawn from readings or after
synthesizing multiple postings.
· Expand on your colleagues’ postings by providing additional insights or contrasting
perspectives based on readings and evidence.
Question 3.
Response: by Mitali
The Internet has become a necessity for people. Millions of people use the
internet for various purposes like banking, social networking, work. Through the
internet, we can see the whole world what’s going on, what’s trending. Some
people use the internet for illegal purposes, also like hacking. For example, we
have all of the financial data on the internet like bank accounts and if we see in
technical terms, its nothing but in the form of zeros and ones(binary). Some
people or group of people always try to develop software tools (also called virus)
to hack other people’s data (Saunders, 2016). Now to stop them, we need laws
and rules on the internet. So for different countries and states, courts are
different, and they may have different laws. For example, weed is legal in
California but not in other states. However, I believe this structure of different
laws according to the region will not work for cyber law, which applies to access
the internet. The Internet is something which is the same for the whole world.
Everybody is the same on the internet. We are just an IP address in the online
world.
Some countries have made laws on accessing the internet. For instance, China
and middle-east countries, they have banned some websites in their countries.
Google & Facebook is banned in China (Whitmore, Agarwal & Da Xu 2015). Some
adult and music websites are banned in Saudi Arabia. However, these laws are
specific to some purpose and cannot stop hacking. In the USA we have a Uniform
Computer Information Transactions Act (UCITA) and this is the first uniform law
that would govern software licenses and has sections related to the enforce
ability of shrink-wrap and click-on licenses and establishes rules for what law
governs, how to create electronic contracts, and what default rules apply to
contracts created online.
Answer : Please add your comments whether you accepting the response or
against the response depending upon the question in more than 200 words.
Below are additional suggestions on how to respond to your classmates’
discussions:
· Ask a probing question, substantiated with additional background information,
evidence or research.
· Share an insight from having read your colleagues’ postings, synthesizing the
information to provide new perspectives.
· Offer and support an alternative perspective using readings from the classroom
or from your own research.
· Validate an idea with your own experience and additional research.
· Make a suggestion based on additional evidence drawn from readings or after
synthesizing multiple postings.
· Expand on your colleagues’ postings by providing additional insights or contrasting
perspectives based on readings and evidence.
Purchase answer to see full
attachment
3 references
Question 1:
Please assume you have the absolute power to control the internet and its
content.
Answer: Your post should be 400 words long (40 points).
Please use APA throughout.
Question 2 :
Response by: Harika
If I have the power to control the internet and its content, I will set specific
standards for the data viewable by the user. It’s a known fact that in today’s
world, the Internet plays a key role in everyone’s life. It’s an A-Z platform where
you can get information about everything. When a user searches for some
content on the Internet, he/she should get more relevant information, not pieces
of data. This should be controlled by protecting AdWords first. Ads must be
limited and appropriate (Weidmann, 2015). Since some negative comments may
also be available on the Internet, things or information should be taken into
consideration broadly. The government should establish specific rules for the
implementation and compliance of standards so that no group is aggressive.
Currently, data violations have become more and more popular due to increased
information leaks. The Internet is one of the main reasons for these violations.
Attackers attack the target by hacking system data. The goal can be a real person
or a big organization, but it affects the whole body. Personal and professional
data is attacked and used for some malicious attacks. Hackers sell data to
foreigners and cause suspicious activity (Sornette, 2015). For example, all online
banking accounts will have caches/cookies that are easy to cut after connecting. I
would avoid such things, create more awareness among people because they
should be kept secret and not used in a public internet café. Always keep two-
step authentication more protective. I will also focus more on the presentation of
relevant and important data.
whether you accepting the response or against the response depending upon the
question in more than 200 words.
Below are additional suggestions on how to respond to your classmates’
discussions:
· Ask a probing question, substantiated with additional background information,
evidence or research.
· Share an insight from having read your colleagues’ postings, synthesizing the
information to provide new perspectives.
· Offer and support an alternative perspective using readings from the classroom
or from your own research.
· Validate an idea with your own experience and additional research.
· Make a suggestion based on additional evidence drawn from readings or after
synthesizing multiple postings.
· Expand on your colleagues’ postings by providing additional insights or contrasting
perspectives based on readings and evidence.
Question 3.
Response: by Mitali
The Internet has become a necessity for people. Millions of people use the
internet for various purposes like banking, social networking, work. Through the
internet, we can see the whole world what’s going on, what’s trending. Some
people use the internet for illegal purposes, also like hacking. For example, we
have all of the financial data on the internet like bank accounts and if we see in
technical terms, its nothing but in the form of zeros and ones(binary). Some
people or group of people always try to develop software tools (also called virus)
to hack other people’s data (Saunders, 2016). Now to stop them, we need laws
and rules on the internet. So for different countries and states, courts are
different, and they may have different laws. For example, weed is legal in
California but not in other states. However, I believe this structure of different
laws according to the region will not work for cyber law, which applies to access
the internet. The Internet is something which is the same for the whole world.
Everybody is the same on the internet. We are just an IP address in the online
world.
Some countries have made laws on accessing the internet. For instance, China
and middle-east countries, they have banned some websites in their countries.
Google & Facebook is banned in China (Whitmore, Agarwal & Da Xu 2015). Some
adult and music websites are banned in Saudi Arabia. However, these laws are
specific to some purpose and cannot stop hacking. In the USA we have a Uniform
Computer Information Transactions Act (UCITA) and this is the first uniform law
that would govern software licenses and has sections related to the enforce
ability of shrink-wrap and click-on licenses and establishes rules for what law
governs, how to create electronic contracts, and what default rules apply to
contracts created online.
Answer : Please add your comments whether you accepting the response or
against the response depending upon the question in more than 200 words.
Below are additional suggestions on how to respond to your classmates’
discussions:
· Ask a probing question, substantiated with additional background information,
evidence or research.
· Share an insight from having read your colleagues’ postings, synthesizing the
information to provide new perspectives.
· Offer and support an alternative perspective using readings from the classroom
or from your own research.
· Validate an idea with your own experience and additional research.
· Make a suggestion based on additional evidence drawn from readings or after
synthesizing multiple postings.
· Expand on your colleagues’ postings by providing additional insights or contrasting
perspectives based on readings and evidence.
Purchase answer to see full
attachment