Chapter 17.2 - Peshtigo School District
Download
Report
Transcript Chapter 17.2 - Peshtigo School District
Chapter 17.2
Challenges for Democracy
Divisions in Society
• Many people thought the Internet would
promote the spread of democratic ideas
and undermine authoritarian regimes –
governments in which one leader or group
holds absolute power. But authoritarian
governments are limiting online political
communication by building electronic
borders similar to “firewalls” that protect
business networks from intruders.
continued
• The Chinese gov’t controls access to Web
sites of human rights groups and foreign
newspapers. It watches the messages
Chinese users post. It has shut down
Web sites of some dissident groups –
groups who disagree with the established
political or religious system.
continued
• In the U.S., some people fear the Internet is
widening the gap between the “haves” and the
“have-nots” and empowering intolerant extremist
groups. Another concern is that the Internet
leaves citizens vulnerable to invasions of
privacy.
• Access to the Internet is becoming a necessity,
yet a major study shows that wealthy families
are far more likely to have Internet access than
are low-income families.
continued
• Schools and public libraries are helping to
close the technology gap. Business and
political leaders are also looking into ways
to provide training and Internet access.
• The Internet also gives hate and extremist
groups a way to ban together and spread
their ideas and propaganda – misleading
messages designed to manipulate people.
Threats to Privacy
• Law enforcement is working to fight cybercrimes
such as fraud and identity theft. While most
people see the need for some gov’t surveillance
of the Internet, controversy surrounds the
potential threat to privacy.
• The FBI developed a wiretapping technology for
the Internet called “Carnivore”. It is meant for
use only in criminal investigations when
authorized by the court.
continued
• Carnivore can watch for particular words and
phrases in messages. It can record addresses
when a suspect sends or receives an e-mail.
• As Carnivore monitors, however, it captures not
only a suspect’s messages but also those of
bystanders. A member of Congress voiced
concern that Carnivore may violate the 4th
Amendment’s protection against unwarranted
searches.
continued
• Some employers keep tabs on how their
workers use the Internet on company time.
• Criminals can intercept people’s files and
e-mail unless they are encrypted.
• Most Web sites gather information about
visitors. If you register at a site, you may
have to provide your name, e-mail
address, home address and phone, and
credit card number.
continued
• Sites can also collect data about you
without your knowledge. The site may
track the pages you visit, the links you
click and the terms you search for. Before
long, the business may have built a
personal profile that includes your age,
reading preferences, shopping tastes,
favorite travel spots and other details.
continued
• Site operators may sell your information,
resulting in a lot of unwanted junk mail.
Information you wanted to keep private might be
passed on.
• The Children’s Online Privacy Protection Act
requires Web site companies to establish a
privacy policy describing the information they
collect from children and how they will use it.
The companies need parents’ permission to
gather information from children under age 13.