分析利弊 英文
Internet Crisis
Many inventions bring goodneand convenience to our lives. The computer is probably one of the greatest tools invented. According to Dmeiwen.anslib.com, The definition of computer is “an electronic device designed to accept data, perform prescribed mathematical and logical operations at high speed, and display the results of these operations.” Therefore, it has flexible verities of usages. Computers were used for military communications about several decades ago but after it was discovered for more purposes, the true meaning of computer has changed.
People now use computers not only to store data, but also to edit a whole lot more programs and texts than it could before. PC games have changed a lot of kids’ lives. Some of them played games, got addicted to them and dropped out of schools because of that; some of them played, got addicted, but after discovering and developing their own skills on such things as computer designing, they became billionaires. However, these people aren’t even 10% of all PC gamers. As the birth was given to computers, the Internet hatched after computers. The connections between Internet and computer somehow made the attitudes toward computers even worse. Because people can share information on the internet through computers, the “information” can’t be all good and proper. Besides the fact that people are getting addicted to games or online surfing, violence and pornographies have also become big issues. Internet viruses, identity thieves have also caused many troubles to people who use computers. Therefore this question has been more and more considered by people: should computers, computer programs, and, most of all, the Internet, have more restrictions on people based on their background, ages or other information by the government? Or should the Internet be like what it is now, or even freer?
Many people may argue over the answer for this question. As we all know, restrictions have already been used for many programs such as video games and soft wares. But when internet has been so frequently used by people, very few regulations have be made based on ages. It’s a common problem that most of the internet hackers are teenagers or college students. They hack all different websites, from people’s personal sites to United States National Security website. Some of them hack websites for money, but most of them do that just for fun. People can hardly do anything to prevent this from happening because all the smart hackers know how to clear or change their IP addreto prevent government from tracing them. Another key factor for these teenagers to do that is because overloaded confidence. They want to improve themselves by breaking the websites that seem to be impossible to hack. This is obviously illegal and foolish, but it seems a little crucial to put the young talented hackers into jails.
Many of the hackers have now been trained officially and are working for either government or large corporations to prevent the damage they have done to the internet. However, not every hacker can be found and trained to be put in good use. Internet hacking and viruses should be prevented, not corrected. The reason why teenagers are so addicted to computers is that computers are very much something they can have total acceand control of. Most of American teenagers have their personal computers, and they most likely have passwords for their computers. First, the passwords give them security of using putting their information in their computers. After internet surfing, some of them might want to do more than just playing games, listening to songs or watching movies on the internet, that’s the beginning of the transformation from an internet surfer to an internet hacker. Because there is almost no rules internet and people can surf on the internet as long as they have internet connections. Therefore, no matter the age, the Internet gives them total freedom of doing whatever, however, and whenever.
More restrictions are the keys to the solutions to this internet hacking problem. Such regulations as “internet acceregistration” can be very helpful to internet security. The way it works is that if a person wants to have internet accewith any kind of computer he has, he will have to register to a certain department, and have all his information stored in the system. So every time when he goes online, he has to spend a few seconds, entering his internet ID number to confirm his identity. Therefore, no matter how he changes his IP address, he and his actions on the internet will still be traced.
Identity theft is another problem existing on the internet, thanks to online shopping, people can now buy cloths, books, or even food online. The most common way of online payment is through credit cards and that’s where the problem begins. People’s information on their credit cards can often be stolen by “Identity Thieves”, they are special thieves that steal accounts and passwords from people without stealing their actual cards. So when you have your credit cards in your hand, it doesn’t mean that you are absolutely safe from identity thieves.
The best solutions for identity theft are both restricted regulations and Individual identity protection. For example, In the United Kingdom personal data is protected by the Data Protection Act. It covers all personal data which an organization may hold, including names, birthday and anniversary dates, addresses, telephone numbers, etc. Technology experts have been developing a new kind of credit cards called “traceable” cards. There is a tiny tracing device inside of the card, so when the card is missing, it’s easy to be traced back no matter if it’s stolen. But if the thieve can steal someone’s information without looking at the card, it requires more than higher technologies. People should also take caution by themselves when they’re asked to give personal information online. For example, when an online shopping site asks you to give your credit card information to them; ideally, before you do anything, you should check if they have the permission from the government of trading goods online.
【分析利弊 英文】相关文章:
利弊分析英文09-13
婚姻分析利弊08-24
留学利弊分析09-30
利弊分析模板08-13
大学利弊英文08-13
二八法则利弊分析08-31
高消费利弊分析09-21
各国留学利弊分析09-12
月饼包装利弊分析07-30