Restrictions of Internet Use Jeremiah Jones Rodney Dowdy Pablo Gonzalez Pers 2730 Internet Technologies Dr. Chunlei Liu Jeremiah.

Slides:



Advertisements
Similar presentations
Surrey Libraries Computer Learning Centres January 2012 Internet Searching Teaching Script Totally New to Computers Internet Searching.
Advertisements

Freedom of Speech (Part 3)
Basic Internet Terms Digital Design. Arpanet The first Internet prototype created in 1965 by the Department of Defense.
By Brian Langone. Internet censorship is essentially a method used by corporations, governments and others in order to filter what a user can view on.
Developed by Technology Services 1:1 Laptop Initiative
Let's say we want to access domain - reliablescribe.com First we need to buy a computer We need to subscribe to an Internet Service Provider (ISP) The.
Haygrove School – E Safety Induction E Safety Update #protecting your professional identity.
Tradition innovation Websites – Does yours comply with the law? Kate Legg Solicitor.
Keeping digital advertising within the law EFCCE Conference May, Paris LHC Building Blocks - Media Law Training.
1.8 Malpractice and Crime In this section you must be able to: Explain the consequences of malpractice and crime on information systems. Describe the possible.
TOPIC LEARNING BTEC Level 3 Unit 28 Websites L01- All students will understand the web architecture and components which allow the internet and websites.
1 Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie Chapter 8 Network Security Copyright © 2010, Elsevier Inc. All rights.
Copyrights and Internet Piracy: SOPA and PIPA Essential Questions… What are SOPA and PIPA? Should people make money off of their creativity? How damaging.
By Leo Koo and Chris Mendoza AP Government Mr. Lohman Period 4.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Background Information Definition:. Background Information Controversy Ex)
Chapter 12 Network Security.
72% of all parents are concerned that other people could locate their child through their mobile phone using location based services.
Forced Internet Filtering Thomas Mahoney. Internet Filtering ► Techniques  Technical blocking  Search result removal  Take-Down  Self-Censorship ►
CENSORSHIP Jack Homer Frederick Abreu James Carroll Minsoo Kim.
Electronic Commerce. On-line ordering---an e-commerce application On-line ordering assumes that: A company publishes its catalog on the Internet; Customers.
Internet Censorship By: Austin Tyler And, Lisa. Introduction  Ever since there has been an Internet, there have been attempts to control it. However,
Internet Censorship Controversy Internet censorship, When does it go to far?
Internet Censorship Ann Lee, Gregory Fillios, Hugo Ponte, Kathryn Wells, Malcolm Greaves.
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1.
What tech Is your family using?. Raising Digital Citizens.
A brief walkthrough the world of the internet.  TCP/IP stands for Transmission Control Protocol/Internet Protocol  TCP/IP is the standard for transmitting.
Network Installation. Internet & Intranets Topics to be discussed Internet. Intranet. .
Computer Tech Class August 20,  Internet was originally started by Department of Defense  Was made as means of communication without central location.
 Presentation Software - Group Assignment LRC 320 Group 6 Members: Brandon Boyle Osvaldo Macias Kwang Joon An Daniel Boice.
Digital Landscape Summary GhanaKenyaNigeria Population: million43.8 million million Internet Users: 4.14 (16.34 % penetration)21.2 million.
Copyright © 2004 Pearson Education, Inc. Slide 5-1 Securing Channels of Communication Secure Sockets Layer (SSL): Most common form of securing channels.
 Commercial- to sell or promote company products  Portal- provide a variety of everyday services  Informational- provide useful info & news  Educational-
November 10,  Acceptable use  Internet Filtering  Social Web (MySpace, Facebook, etc.)  Cyberbullying  Plagiarism  Phishing.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Chapter 8 Browsing and Searching the Web. Browsing and Searching the Web FAQs: – What’s a Web page? – What’s a URL? – How does a browser work? – How do.
Firewalls. Intro to Firewalls Basically a firewall is a __________to keep destructive forces away from your ________ ____________.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
| | | |
Helping you and your family to stay in control. YouTubeWhatsApp Instagram Facebook Google Moviestar Planet Twitter Oovoo Amazon Club Penguin.
Chapter 8 Browsing and Searching the Web. 2Practical PC 5 th Edition Chapter 8 Getting Started In this Chapter, you will learn: − What is a Web page −
SURVEILLANCE The Fears of the Digital Age. Privacy –Identity –Anonymity Logging –Tracking Hacking Censorship State Security/Anti Terror Online The Discussion.
Internet Censorship Alex Lipp. The Bills in Congress PIPA — the Senate bill originally called the Protect IP Act. SOPA — the Stop Online Piracy Act —
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Presentation by: Jennifer Collins Roldan Padilla.
3.4 Internet Strand 3 Sara Liquori. 3.4 Internet  A global computer network providing a variety of information and communication facilities, consisting.
THE INTERNET IP  The Internet Protocol (IP) is the principal communications protocol used for relaying datagrams (packets) across an internetwork using.
Be Computer Smart Internet Safety Kathy Pascavage.
Understand Internet Security LESSON Security Fundamentals.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
HART RESEARCH ASSOTESCIA Key findings from telephone survey of parents of children who access the Internet, conducted for Who Needs Parental Controls?
Internet & Teen Culture By Mike Cimino and James Snowden Division 8.
Laws and Rules That Govern Internet Safety Ashley Martin.
Uniform Resource Locator URL protocol URL host Path to file Every single website on the Internet has its own unique.
DIGITAL SAFETY City of Edinburgh Council Digital Learning Team.
What is Smoothwall? Department of Children’s Services.
The Internet in the K-12 Classroom. Search Engines Curriculum Resources WebQuests Projects Scavenger Hunts.
Global One internet, worldwide Uncitral WTO Some laws: –Communications Decency Act –Child Online Protectioon Act –Children’s Internet Protection Act.
Hawaii Property Management Companies -
Chapter 8 Browsing and Searching the Web
Living with technology Helping you and your family to stay in control
Internet Basics.
PART III Ethical Issues in Business
Digital Footprints.
Information & Democracy
Information & Democracy
Information & Democracy
Democracy and Information
Democracy and Information
Information & Democracy
Presentation transcript:

Restrictions of Internet Use Jeremiah Jones Rodney Dowdy Pablo Gonzalez Pers 2730 Internet Technologies Dr. Chunlei Liu Jeremiah

Table of Contents Definition of Internet Censorship Restriction of use between citizens in the US as compared to citizens in China Also compare and contrast restriction of use on military computers verse personal computers Summary Rodney

Restrictions of Internet Use Internet censorship – is the control or suppression of what can be accessed published or viewed on the internet. This is accomplished in several ways; Technical censorship – technical blocks to information through a variety of ways, Internet protocol blocking, Domain name filtering/redirect, Packet filtering, and several other ways that stop sites from being available. Non-technical censorship – the use of legislation and term agreements to limit or restrict what is available on the web. Pablo

Restrictions of Internet Use in China China has established limitations on internet usage known as the “Great Firewall” that limits what is viewable by the population Use of key words that returns a connection error when blocked sites are requested Ex- Democracy, Dicatorship, human rights, oppression, genocide Websites that are blocked include many search engines through Ex- Google, Youtube, Yahoo, Facebook, Twitter, Jeremiah

Restrictions of Internet Use in the US Usually carried out by government and private organizations. Legislation – Communications decency Act Child online privacry protection act Digital mellenium copyright act Private organizations have the right to limit information they deem unacceptable while using their property Ex – churchs, companies. Rodney

Internet restriction in US Military Controlled by the DOD and Congress, filtering and blocked sites Subject to the UCMJ, determines what personel can an cannot say especially during war time situations increased restrictions while in combat zones to ensure military stratiegy and safety. Pablo

Differences between censorship between the US and China. around-world around-world s s restrictions-on-the-internet-use.html?_r=0 restrictions-on-the-internet-use.html?_r=0 Jeremiah

Censorship between the citizens and military s s of-the-u-s-military-and-the-growing-divide-between-the-military-and- civilians/ of-the-u-s-military-and-the-growing-divide-between-the-military-and- civilians/ intercept/ intercept/ Rodney

Summary Definition of Internet Censorship Restriction of use between citizens in the US as compared to citizens in China Also compare and contrast restriction of use on military computers verse personal computers Questions?? Pablo