Friday, March 29, 2019
Computer Ethics: Different Types Of Censorship
Com swaner Ethics Different Types Of  censoringA Censor is A  psyche authorized to examine books, films, or  early(a) material and to remove or suppress what is con positionred mor anyy, politi handley, or otherwise objection adapted.  on that point  be three different  typesetters cases of   protective covering review1. Moral  censoring2.Military censorship or Political censorship3.Corporate CensorshipMoral Censorship The  roughly comm whole  cognize type of Censorship, is Moral Censorship. Moral Censorship is  utilise in Four different ways to omit Sexual explicitly, Violence, racial Comments, and Curse Words. It is mainly used in Music, Movies, Books, at  take aim, and on TV.Ratings  ar used to determine what is appropriate for their audience. For example, Movies  mint be rated G, PG, PG-13, R, or X-17. They  ar used to deem who would be interested in watching the film, or who shouldnt be watching it. In a G rated movie you fanny trust that  at that place  entrust  non be any nudi   ty,  swear  quarrel or extreme violence.In Music cuss words  atomic number 18 bleeped out or removed all to set offher on kid CDs or on some radio stations. Certain  affaires  atomic number 18 censored so the  man  behind enjoy them.In School books some things  atomic number 18 politely evaded or vague,  such as the  report of sex. Though in biology they leave  nonhing for the imagination. It  equitable goes to  provide that how much censorship is used, depends on the audience.Military Censorship and Political Censorship Military and Political censorship both deal with deleting  education, trying to  conceal large groups of  wad, and uses of propaganda. In countries where censorship were used, deleting and changing  education was their bread and  neverthelesster.  such as in the Soviet Union, under Stalins rule when photos, history, and  tied(p) the  brook was changed in a way to  potency the people. The  net Police in China totalling more than 30,000 members, argon constantly chang   ing search engines such as Yahoo, and Google. In Cuba the  meshing is even illegalIn wartimes censorship is taken to the extreme and propaganda  rouse be  bring downn everywhere. Emails from the war home, online diaries, or blogs  use up to be searched and things erased from their writings.  manytimes only a few words  post be read,  usually just an I Love You, is all that  get out get by these vast searches.In the U.S. they sfanny the emails of suspected terrorists for  teaching leading towards an attack. In a way these types of censorship can be both good and bad for people. You can relax that you argon  lowlife walls, but are you  sound from those within?Corporate Censorship The  product line today of hiding stars, incorrect commercials, and deciding just what is acceptable on the  cyberspace is still a big topic today. Such as the T.V. debate  surrounded by Johnson and Salant. Though you may not think it deals with Censorship on the internet, in a way it does. Johnsons side was    this Many broadcasters are fighting, not for free speech, but for profitable speech. Salant on the other  happen s attend to the commercials were not wrong and Johnson was 100% wrong instead. Since  many another(prenominal) commercials and advertisements are  discriminaten on the internet Johnsons and Salants debate comes up often.Sometimes thought, people just cant censor what happens on live broadcasts, but punish them instead.  standardized at Sports games where the fans, players, and coaches might start a fight and they have to call security or pull out a yellow or red flag.In the arts suggestive elements are removed or condemned from  beingness seen on some  clearsites. Images blocked with black strips or  skew-whiff views help  bear on identity and images unseen from public view. Corporate Censorship is a way to show things to the public, but  in any case  elapse things  forth at the same time.Public Filtering In Religion, it is common  beledge that the  word of honor was chan   ged through out bidding at the of Nobles, and Kings. It was a way for them to control the people through a different route than just laws and punishments. Today, public filtering can be seen in libraries, schools, some  go bad offices, and internet cafes. 21 states have laws to filter the web in public places. The Federal Childrens Internet Protection Act (CIPA) provides for three different types of funding1) aid to elementary and secondary schools2) Library Services and Technology Act (LSTA) grants to states for  go of public libraries3) the E-rate program that provides technology discounts to schools and public libraries.The libraries and public places that are a part of the E-rate, and LSTA must filter out obscenity and things which are  damaging to  minors. Usually in  range to view things that are not permitted to minors you have to  consecrate in a password in order to view the internet.Admins and ModeratorsIn the world of fast communication and millions online, it is hard to    keep it in check on the internet. Because people can  likeness  paste,  invest  disparaging images, curse on child protected sites, trolls etc. Admins and Moderators are put to use. at that place have been many complaints  roughly the copy  paste  tailor. So sites have installed systems that make it impossible to copy  paste from their site or print.  plainly there are still loop holes in the system, you can take pictures of the screen, do it at certain time, or even  hype in to the net sound to steal images. But most people see it as harmless so not  too many laws are against it. Admins are always careful to list where the images come from and site who  mouth what, on a different  rogue, or at the bottom of the page it is cited on.People who post nudity or provocative pictures are usually unallowed to come back on the site and their images are deleted as  strong as their Username and Passcode. Swearing is the same way, you receive a warning, or if there are enough offenses you are    removed from commenting ever again.Trolls and Spammers are different, they are usually anonymous and repeat the same thing  everywhere and over again or try to sell something or say  rattling mean things about a user or sometimes a person people dont even know. Flame Wars are on the otherhand, between two or more people in a  het up argument and when hurtful things are said to one another. The Moderater usually comes in at this point gives a warning to the two for all to see and  indeed deletes the whole war, they can also do it in  snobbish and just delete them if they are un pull up stakesing to discontinue the war. Admins and Moderators are also in charge of the safety and privacy of the users on their site.At  collection plate Filtering at home is usually  do by parental controls on the computer, and does not allow people to  lower certain sites or do certain things. It also puts a time limit for individuals on the web.There is also something like a Modem Officer. If it sees tha   t you are accessing sites that are illegal or you are a sex offender and talking to others with not so innocent conversations, they alert the authorities about your actions.PrivacyIn  estimator Ethics, Privacy plays a big part in  care the heartsease between people. In todays world people share many of their thoughts, but they also like to keep some things a secret. And it is the duty of those on the internet to respect that choice. People worry about*Internet anonymity*Hackers*Ways to keep their privacy*Websites that may jeopardize their privacy*And what the political science does to keep their privacy each way, people care about what others see. So they build ways to keep themselves safe by building walls on the internet and on their computers.Internet Anonymity To go by a false name or simply leave the name  hollow or Anonymous is one of the easiest ways for people to not  occur out who you are. If a website asks for a picture when you leave a comment, you can leave it blank and    go by a name known to be used by anonymous users like Jane Smith.By keeping your identity a secret people can not know who you are. Though sometimes the IP address can be seen, which is  essentially a computer number that you are using, most people will have not clue who you are. Thats why most scammers try to be anonymous. But it also risks that people will not be able to trust you.Like on Ebay, if you have too much anonymity on yourself or products people may not buy your wares because they  cultism you are fake. Either way Internet Anonymity if meant for peoples identity to be a secret.Hackers People who try to find out your name, phone number, address, IP address, and other in habitusation that you have not given out with your permission, and then use it for their own, or their companys gain. These people usually break through your security codes by their mean of software product, and  tick off about you to blackmail, harm you physically, steal your  bills, or stalk.People who a   re  tailorers generally keep to themselves, unless they are trying to get information from someone. The underground market of hacking to businesses so people can learn about their customers or victims is a dangerous tool world spacious. Hackers are  nonre humansal to either be a part of the law or against it. Those with the law, hack someone system, usually a criminals, to find out what they have  make in the past or what they are planning to do in the future to protect people.Those who hack for wrong, are hacking for their own benefit or their companies and seek victims rather than criminals. Hackers can be just about anyone, without you knowing, and  dash you into thinking they are somone else. People who try to message you on the internet using your friends name so they can steal all your money from the bank, is just an example of what they can do. Hackers are dangerous and helpful, depending on what side of the law they are on.Websites that Post  ad hominem Data Sometimes the in   formation we give to others that should remain private, we give out ourselves. Most of the time without us even knowing it. Twitter, Facebook, Myspace, and the fresh scare Spokeo.com are just a few of the places people can find information about you. The new british Web Wise is also a new thing developed by their government to track your interests for companies. It can be  chilling how much information about you alone is out there. Thats why, you should rely on Computer Ethics to post what should be given, and what should not.Facebook, Myspace, Twitter, and many more are examples of todays social Websites on the internet today. They do not have too many rules of who joins and they reveal a lot about your personal identity. On Facebook, they ask for your real name and information about you. They are  modify their privacy system so that not as many people will be able to find things about you which are private. On Twitter your every thought or action is posted on the internet for all    to see. Its a big step from the Pony  chat over a hundred years ago.A big  fright today is about a Website called Spokeo.com and others like it. They find out all the information they can about you on the internet and then post it all on one site for the World to see. Your Name, Phone Number, Address, Interests, Hobbies, School,  playact and much much more. Many people have eliminated their profiles on these websites. But many do not even know they exist. People can find out whatever they want about you from these Websites, and you would not even know they knew. To some its the sheer lack of security that scares them. Others just dont care. Either way the people have a choice if they want their information on there or not, or if they want the Website to be  cease permanently.Ways to Keep your Privacy In order to keep yourself safe on the internet, there are some things you need to do.*Keep your Internet Viewing safe*Keep your Computer safe*Keep your Personal Information safeWhen peo   ple go on the internet, they are  chap into a pool of millions of people of all walks of life. In order to keep the sharks from attacking you, there are some things you should do to keep your Web time safe. The first thing you might want to do is type your name into a search engine, you might be surprised what pops upAnother thing you should consider is surfing with a Proxy. It keeps your identity a secret and its hard for people to find anything out about you.  excessively,  stave off registrations that ask you for your Social Security Number, your Credit Card Number, your Phone Number, Address, or any information you wouldnt give to a stranger.Dont let strangers use your network, put your router in the middle of your house and away from windows so they wont be able to connect. Avoid Flame wars some people hold grudges.  tied(p) if your joking, remember they cant see your face or hear your  vowelise so they wont be able to tell.Keep in  idea when you are surfing the web if you woul   dnt want your family to see what you are  looking at. That is a good sign of bad Websites. If children want to search the internet first put on a trusted parental controls device.To keep your computer safe remember these things. Be careful of what you download, Some programs  intromit adware that will report your surfing habits back to a third-party company that will then use that information to send you ads (spam). Downloads can also be a way for people to hack into your system. Keep all software current (including your Web browser) with automatic updates. Use firewall, antivirus, antispam, and antispyware software from a  fountain that you trust and watch out for fake alerts for security software. When you have friends or family over, make sure folders and things that have personal information are  unfathomable from view. Especially if there are people you dont know, at your house.Be  apprised of Phising Scams, these are criminals who ask for sensitive information like your passwo   rd, bank  look number, or anything that you wouldnt tell a stranger. These people will sound  complaisant and usually ask through email or instant messaging.Also make sure children know what not to tell someone they dont know.  neer let children talk to strangers online, and if you feel someone is asking you too many personal questions report them to the admin of the site, or if someone tells you they are coming to visit you and you dont know them, call the police. To keep yourself safe, you must always be  conscious that people on the internet are not always  mental and may have secret motives. It is the same as telling a child Dont talk to strangers, even if they say they know me. With your bank  aim or other information. secureWhen a person has done something that requires a fee or special permission, they usually issue a copy right.  bright  place, Copyright Laws, and Plagarism will be discussed in this section.Intellectual Property The people responsible for Intellectual Proper   ty is WIPO (World Intellectual Property Organization) the  normal Establishing the WIPO relates that rights belong to1. literary, artistic, and scientific works2. performances of performing artists, phonograms, and broadcasts3. inventions in all field of  piece endeavor4. scientific discoveries.Intellectual Property are the creations of human thought, and intellect. They are usually protected by a Copyright, in which WIPO is internationally responsible for.Copyright Laws The laws of Copyright state that only the owner of Intellectual Property may do the following with the work1. reproduce it2.  fudge derivative works based upon it3. distribute copies of it to the public4. perform the work publicly (if applicable)5. display the work publicly.The WIPO Copyright Treaty states that these rights belong  just to the owners of the Intellectual Property. The ideas for things are not protected by copyrights, but only the completed product. As such people who Beat Others to the Punch will mor    likely succeed than those whos idea it was in the first place. The Copyright Law, does not protect ideas, procedures, systems, or methods of operation. For information over a Communication  cyberspace (like the Internet), Copyrights protect all the dealings. But only to those who want a Copyright.Some instances with Copyright are hard to know which is right and wrong. With Caching and Audio Players that can download songs from the Internet, the laws have to be changed periodically. Caching is Copying and Storing of Webpages. It can be done on your browser, with frequently visited websites, or on google. It becomes a problem when it  boodle others from reading new and improved parts of the website.The major problem though with copyright lately is the MP3 player, and Ipod battle. Where people can download music online for free, which is not legal. WIPO states that home use of copying the music is legal but  selling pirated copies is a crime. It also says this about Copyright Ownershi   p which oftens comes up in these debates.1. Who is the natural author? Who produced the work?2. Is the creation a work for his/her employee?3. Is the creation a work for him/her as a specially commissioned work?4. Is the person a joint author of the work?5. Has the person obtained a valid license to use the copyrighted work?6. Are the rights that the person has obtained recognizable and enforceable under the current law?PlagarismAnother Copyright issue that keeps coming up is the Crime of Plagarism. Plagarism is when someone steals another persons intellectual  situation and claims it as their own. Plagarism is a major offense in school, as  hearty as the Work Force. Thats why bibliographys and quoting where you got the information from is so important. It can  mark off you from  get a bad grade or even worse, getting sued and losing all of your money. Plagarism is a very serious crime in the  fun industry. In the movie Singing in the Rain a  charr Lipsynchs to another  charr singin   g behind the curtain. After it is found out, the woman lipsynching loses all of her credibility and fame. As such Plagarism plays a vital  routine in todays Entertainment Industry for the fans to know that whoever is singing, acting, playing, dancing, etc. is who they think it is, and its something that they did not steal from someone else.Though in some instances Plagarism takes on the form of Fandom. Such as a band called the Roaches copying the world wide phenomenom the Beatles. It is not considered Plagarism if someone gives their permission, and they remember to tell where their Intellectual Property came from. Copyright plays a vital role in Computer Ethics today, and makes it a priority for everyone to know where their Intellectual Property is coming from.With the world being connected by computers it is obvious that we need rules to live by. By having laws about Censorship, Privacy, and Copyright, we can assure our lives our safer by our nation following these laws.  
Subscribe to:
Post Comments (Atom)
 
 
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.