Questions:
1. An analysis of different methods schools can use to ensure children are protected from extremists and anarchists while using school computers
2. An analysis of the different methods parents can use to ensure children are protected from extremists and anarchists while using home computers
3. Can such protections be construed as an infringement upon Free Speech? Why or why not?
The analysis of the different methods, which the schools can think of using to protect the children from the anarchists and extremists when using the school computers, is discussed on basis of several recent incidents during which the kids are instigated by these extremist groups to join them (Allport & Horner, 2011). In this context the various methods, which the school can use that internet system which should support enrichment, career development and education of the children. This kind of internet system is known as the Districts, which focuses on educational use of the internet system that provide instructional and technical support, lesson plans, educational website and professional development (Atluri & Diaz, 2011).
The school can also develop certain educational policy, which should provide a clear idea to the students regarding the activities, which they can exercise in the school. Also, the student should get that while using internet in their school they have a very limited amount of internet (Balzarotti, Stolfo & Cova, 2012). The school authority plays an important role here where they convey the idea to the students that all their activities is regulated by the school and if in any case any student practice some inappropriate or illegal activities then strict action should be taken against those students (Bertino, 2012).
The basic aim of the school for its students should be to maintain a secure and safe environment. The safe internet environment means that the sites should be previewed in order to understand its educational value and appropriateness (Boyle & Panko, 2012). In case for further studies the students needs to check certain websites, which can be done under an expert supervision. Also, if the students encounter certain socially and culturally objectionable website while net surfing should immediately report it to their teacher (Chen, Yung & Zhu, 2012).
The school administration, teachers and their students receives certain instructions, which encompasses on responsible and safe use of internet. The students should be provided with education via the internet that should be accordance to the students’ understandings and age (‘Cybercrime diversifies’, 2011). There are instances when the extremist groups breach the privacy of the school internet system and trap some students with the aim to recruit them. Thus, the students should be educated about the inappropriateness of these groups and report any such illegal activities happening by the school computers both on his case and on others (‘Cyber-criminals becoming more professional’, 2014).
The analysis of the different methods, which the parents can think of using to protect their children from the anarchists and extremists when using the school computers are-
Evaluation of mobile devices has changed the way children uses the changing technology and internet system. Due to which some protection needs to be exercised which are-
Protections can be construed as an infringement upon Free Speech. In context to this statement, free speech can be defined as the basic right of every individual to communicate his or her ideas and opinions. However, in the United States the freedom of speech is can be misused for wrong reasons in order to harm both a person’s income and reputation. The basic functions of free speech in US is to promote the right to obtain ideas and information, right to get ideas and information and right to use those ideas and information (Ryan, Smyth & Wang, 2012.
The question in relation to free speech focuses that whether protections against the use of technological devices by children construe as the infringement on free speech. As per the protection, functions the children should be controlled to limit their overexposure to the internet. This may result in limiting the basic notion of free speech. Due to which the concept of the freedom of the information has started which was developed in connection to the censorship, surveillance and monitoring of the activities taken place in the internet (Ryan, Smyth & Wang, 2012). The monitoring of the digital information was developed mainly to promote clarity and avoid misappropriation of the information. Though limiting the flow of the digital information do limits the freedom of speech but it is done mainly to avoid both the children and the adults to prevent being trapped by anarchist and extremist groups (Torrenzano & Davis, 2011).
The freedom of information is mainly referred to as the mode of expressing ideas and opinions through the internet freely. However, often the banned social groups and fraudulent entity tries to influence innocent individuals, especially children. Thus, to avoid it, some legal restrictions or censorship is there on certain web sites to avoid misuse of information, fraudulent activities and unfair practices (Torrenzano & Davis, 2011).
Conclusion
Use of computers is becoming popular globally but it is the moral duty of the schools and the parents to exercise control of computer by the children and maintain appropriate and supervised internet usage. This will help the children protected from the extremist groups and use all their internet usage wisely. Also, it can be concluded that although the protection against use of certain websites can be termed as an infringement on free speech but with the rise of global disharmony and terrorism it is necessary to exercise some control on the free flow of the information (‘Introduction to Computer and Network Security’, 2013)
References
Allport, A., & Horner, J. (2011). Freedom of speech. New York, NY: Chelsea House.
Atluri, V., & Diaz, C. (2011). Computer security– ESORICS 2011. Berlin: Springer.
Balzarotti, D., Stolfo, S., & Cova, M. (2012). Research in Attacks, Intrusions, and Defenses. Berlin: Springer.
Bertino, E. (2012). Data protection from insider threats. San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA): Morgan & Claypool.
Boyle, R., & Panko, R. (2012). Corporate computer security. Boston: Pearson.
Chen, L., Yung, M., & Zhu, L. (2012). Trusted systems. Berlin: Springer.
Cybercrime diversifies. (2011). Computer Fraud & Security, 2011(2), 3-20. doi:10.1016/s1361-3723(11)70013-6
Cyber-criminals becoming more professional. (2014). Computer Fraud & Security, 2014(1), 3. doi:10.1016/s1361-3723(14)70003-x
Danezis, G., Dietrich, S., & Sako, K. (2012). Financial cryptography and data security. Berlin: Springer.
Easttom, C. (2011). Computer security fundamentals. Indianapolis, IN: Pearson.
Easttom, C. (2012). Computer security fundamentals. Indianapolis, Ind.: Pearson.
Flammini, F., Bologna, S., & Vittorini, V. (2011). Computer safety, reliability, and security. Berlin: Springer.
Garcia-Alfaro, J. (2012). Data privacy management and autonomous spontaneus [sic] security. Berlin: Springer.
Gelber, K. (2011). Speech matters. St. Lucia, Qld.: University of Queensland Press.
Gollmann, D. (2011). Computer security. Chichester, West Sussex: Wiley.
Gutwirth, S. (2011). Computers, privacy and data protection. Dordrecht: Springer.
Hanaoka, G., & Yamauchi, T. (2012). Advances in information and computer security. Berlin: Springer.
Introduction to Computer and Network Security. (2013). Network Security, 2013(11), 4. doi:10.1016/s1353-4858(13)70124-7
Iwata, T., & Nishigaki, M. (2011). Advances in information and computer security. Heidelberg: Springer.
Jones, C., & Connelly, S. (2011). Behind the dream. New York: Palgrave Macmillan.
Katzenbeisser, S. (2012). Trust and trustworthy computing. Berlin: Springer.
Kizza, J. (2014). Computer Network Security and Cyber Ethics. Jefferson N.C.: McFarland & Company, Inc., Publishers.
Kotenko, I., & Skormin, V. (2012). Computer network security. Heidelberg: Springer.
KutyÅ‚owski, M., & Vaidya, J. (2014). Computer Security – ESORICS 2014. Cham: Springer International Publishing.
Ortmeier, F., & Daniel, P. (2012). Computer safety, reliability, and security. Berlin: Springer.
Powers, E. (2011). Freedom of speech. Lewisburg, Pa.: Bucknell University Press.
Ryan, M., Smyth, B., & Wang, G. (2012). Information security practice and experience. Berlin: Springer.
Torrenzano, R., & Davis, M. (2011). Digital assassination. New York: St. Martin’s Press.
Vacca, J. (2013). Computer and information security handbook. Amsterdam: Morgan Kaufmann Publishers is an imprint of Elsevier.
Wells, J. (2009). Computer fraud casebook. Hoboken, N.J.: Wiley.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download