Congratulations! You have just been selected to be the new Director of the Inter
ID: 3771877 • Letter: C
Question
Congratulations! You have just been selected to be the new Director of the Internet! Now it's time to do things your way. For your final exam, imagine that this is the scenario. You must consider everything you have learned and reviewed during this course and come up with a plan for how you will run the Internet.
Your plan should touch on all seven major topics that we have covered in this course:
Ethical Frameworks
Regulatory Schemes
Free Speech and Censorship
Copyright and Patent
Online Privacy
Information Security
International Issues
Explanation / Answer
*first of all preapaired thes all seven topic ,after that ready to PPT to 7 topic one by one.
I will creat a website and create some pages
1) home
2)internet privacy in this page related some topics(online privacy, information Security,)
3)international issue in this page related topics( international Terrorism, global warming etc)
4)registration or copyright
## Ethical frameworks-
Simply stated, ethics refers to standards of behavior that tell us how human beings ought to act in the many situations in which they find themselves-as friends, parents, children, citizens, businesspeople, teachers, professionals, and so on....
This statement, Ethics for Counselling and Psychotherapy, unifies and replaces all the earlier codes for counsellors, trainers and supervisors and is also applicable to counselling research, the use of counselling skills and the management of these services within organisations. It is intended to inform the practice of each member of the British Association for Counselling and Psychotherapy.
In this statement the term 'practitioner' is used generically to refer to anyone with responsibility for the provision of counselling- or psychotherapy-related services. 'Practitioner' includes anyone undertaking the role(s) of counsellor, psychotherapist, trainer, educator, supervisor, researcher, provider of counselling skills or manager of any of these services. The term 'client' is used as a generic term to refer to the recipient of any of these services. The client may be an individual, couple, family, group, organisation or other specifiable social unit. Alternative names may be substituted for 'practitioner' and 'client' in the practice setting, according to custom and context.
This statement indicates an important development in approach to ethics within the Association. One of the characteristics of contemporary society is the coexistence of different approaches to ethics. This statement reflects this ethical diversity by considering:
## Regulatory Schemes - Will the Internet be allowed to develop as a completely unfettered medium, or will
internet and content regulators from industry play a major role
in overseeing what happens? Opinion is divided. Almost three-quaters of the population
would like to see some form of regulation but most people are unsure how it can be done.
Whichever way the dust settles on this issue, the tension between free and regulated flow
of online information will continue to spark heated debates amongst academics,
policymakers, entrepreneurs and activists across the globe.
##Free Speech and Censorship -Free speech" isn't so free when it costs you your liberty. In countries around the world, the right to express one's thoughts and beliefs is under assault.
## Copyright And Patent -
copyright- Copyrights protect the expression of ideas. Artistic works are generally considered to be expressions of ideas – books, paintings, songs, movies, and computer programs are examples. Copyright will not protect the process through which a particular work was created or the use of information within it
Patent-A patent is a right, granted by the government, to exclude others from making, using, or selling your invention. Patents protect inventions such as new processes, machines, or chemicals. The central idea is that patents protect ideas, not just expressions of them. The main effect of patents is to give their holders the right to challenge any use of the invention by a third party. He thereby gave a temporary monopoly of exploitation which can be understood as a financial incentive for inventive industrial activities.
## Online privacy involves the right or mandate of personal privacy concerning the storing, repurposing, provision to third parties, and displaying of information pertaining to oneself via the Internet. Internet privacy is a subset of data privacy. Privacy concerns have been articulated from the beginnings of large scale computer sharing.
Some experts such as Steve Rambam, a private investigator specializing in Internet privacy cases, believe that privacy no longer exists; saying, "Privacy is dead – get over it". In fact, it has been suggested that the "appeal of online services is to broadcast personal information on purpose." On the other hand, in his essay The Value of Privacy, security expert Bruce Schneier says, "Privacy protects us from abuses by those in power, even if we're doing nothing wrong at the time of surveillance.
## Information Security - Sometimes referred to as computer security, Information Technology security is information security applied to technology (most often some form of computer system). It is worthwhile to note that a computer does not necessarily mean a home desktop. A computer is any device with a processor and some memory. Such devices can range from non-networked standalone devices as simple as calculators, to networked mobile computing devices such as smartphones and tablet computers. IT security specialists are almost always found in any major enterprise/establishment due to the nature and value of the data within larger businesses. They are responsible for keeping all of thetechnology within the company secure from malicious cyber attacks that often attempt to breach into critical private information or gain control of the internal systems.
## International Terrorism Issue -
This report examines international terrorist actions, threats, U.S. policies and responses. It reviews the nation’s use of tools at its disposal to combat terrorism, from diplomacy, international cooperation, and constructive engagement to physical security enhancement, economic sanctions, covert action, and military force.
A modern trend in terrorism appears to be toward loosely organized, selffinanced, international networks of terrorists. Increasingly, radical Islamist groups, or groups using religion as a pretext, pose a serious threat to U.S. interests and to friendly regimes. Of concern as well is the growing political participation of extremist Islamist parties in foreign nations. Also noteworthy is the apparent growth of cross-national links among different terrorist organizations, which may involve combinations of military training, funding, technology transfer, or political advice.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.