Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Chapter 17.2 Challenges for Democracy Divisions in Society • Many people thought the Internet would promote the spread of democratic ideas and undermine authoritarian regimes – governments in which one leader or group holds absolute power. But authoritarian governments are limiting online political communication by building electronic borders similar to “firewalls” that protect business networks from intruders. continued • The Chinese gov’t controls access to Web sites of human rights groups and foreign newspapers. It watches the messages Chinese users post. It has shut down Web sites of some dissident groups – groups who disagree with the established political or religious system. continued • In the U.S., some people fear the Internet is widening the gap between the “haves” and the “have-nots” and empowering intolerant extremist groups. Another concern is that the Internet leaves citizens vulnerable to invasions of privacy. • Access to the Internet is becoming a necessity, yet a major study shows that wealthy families are far more likely to have Internet access than are low-income families. continued • Schools and public libraries are helping to close the technology gap. Business and political leaders are also looking into ways to provide training and Internet access. • The Internet also gives hate and extremist groups a way to ban together and spread their ideas and propaganda – misleading messages designed to manipulate people. Threats to Privacy • Law enforcement is working to fight cybercrimes such as fraud and identity theft. While most people see the need for some gov’t surveillance of the Internet, controversy surrounds the potential threat to privacy. • The FBI developed a wiretapping technology for the Internet called “Carnivore”. It is meant for use only in criminal investigations when authorized by the court. continued • Carnivore can watch for particular words and phrases in messages. It can record addresses when a suspect sends or receives an e-mail. • As Carnivore monitors, however, it captures not only a suspect’s messages but also those of bystanders. A member of Congress voiced concern that Carnivore may violate the 4th Amendment’s protection against unwarranted searches. continued • Some employers keep tabs on how their workers use the Internet on company time. • Criminals can intercept people’s files and e-mail unless they are encrypted. • Most Web sites gather information about visitors. If you register at a site, you may have to provide your name, e-mail address, home address and phone, and credit card number. continued • Sites can also collect data about you without your knowledge. The site may track the pages you visit, the links you click and the terms you search for. Before long, the business may have built a personal profile that includes your age, reading preferences, shopping tastes, favorite travel spots and other details. continued • Site operators may sell your information, resulting in a lot of unwanted junk mail. Information you wanted to keep private might be passed on. • The Children’s Online Privacy Protection Act requires Web site companies to establish a privacy policy describing the information they collect from children and how they will use it. The companies need parents’ permission to gather information from children under age 13.