Wednesday, November 20, 2019
Information policy Essay Example | Topics and Well Written Essays - 1250 words
Information policy - Essay Example ââ¬Å"Children today are ââ¬Ëdigital nativesââ¬â¢. They have grown up with computers and the internet and they spend a good deal of time online while at school and at homeâ⬠(Conroy, p.1) Children are mostly vulnerable especially at their adolescent period. They were not much enough to separate between the good and evils during this period. The thirst for new knowledge will encourage them to experiment things which may potentially harmful to the society. Internet is an ocean of knowledge from where the children may get the wanted and unwanted information. It is difficult to control the internet activities fully because of its usefulness in the modern learning processes. The growth of incidents like online identity theft; cyber-bullying; abuse of child avatars in virtual worlds; computer addiction; an increase in the number of registered profiles of sex offenders on MySpace; and online breaches of privacy such as the posting of sexual photos and sex videos by students are some of the criminal activities associated with internet. (Conroy, p.1)The Australian government has recently suggested a policy of controlling the internet activities or internet filtering which has raised a hot debate among the Australian public. The Australian government has recently suggested a policy of controlling the internet activities or internet filtering which has raised a hot debate among the Australian public. (Maurushat & Watt) Supporter of internet filtering argues that such a move is necessary protect the countryââ¬â¢s political, social and cultural interests while the opponents reject such an argument saying that the governmentââ¬â¢s move may limit the freedom of expression by the public. (Maurushat & Watt) ââ¬Å"Labor considers that, just as we teach Australian children about the risks of drunk driving, we must also teach them how to be responsible cyber-citizens and about the importance of cyber-safety.â⬠(Conroy, p.1) It is
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment