Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave

Evolution of Internet Censorship in Last 5 Years

Internet censorship is the control program which is deployed by the regulators for accessing, publishing, and viewing of initiatives taken by them on the internet. “The individual can develop the self-censorship program for organizing their moral, religious, and legal believes associated with the activities performed by them” (Wang, 2017). The internet censorship program usually occurred during the time of election, protest, and other anticipation program. There are different tools and technologies which are used for deploying censorship on the internet which can be classified as DNS server, proxy server, website mirrors, cached web pages, and others. The sensitive information can be safely interchanged on the internet by making use of internet censorship technology.  It is used for managing copyrights of the organization. The structured framework of policies is prepared for deploying the website under the legal laws. The internet censorship is capable of limiting the criminal activities and helps in increasing national security. In this paper, we are looking forward for analysing the positive and negative impact on the society. The government and organizations are used for securing their confidential information from accessing.

Internet censorship is the method which is used for putting restriction on the information which is viewed and published on the internet. The internet censorship is commonly used by government and big organization to restrict the copyright of the information and to prevent confidential information of the business. It is the propaganda method for promoting religions and political agendas.” Traditionally, the traffic management on the internet was done by the internet community but with the passage of time and evolution of internet censorship than the traffic management goes in the hand of the government and organization” (Erixon, 2009). They can manage the flow of data and put restriction according to their requirement and confidentiality. It helps in putting restriction on the interference and freedom of speech. The internet censorship is capable of limiting the criminal activities and helps in increasing national security. The self-monitoring system helps in resolving many issues of the government such as limiting the growth of criminal activity, provides the cultural diversity in the internet user, deployment of political doctrines, and others. Internet censorship is responsible for managing the accessing of information related to copyright and intellectual property of the organization, non-disclosure of sensitive and private information, generating new political ideas for promoting religion and political agenda, controlling the internet related crime, monitoring the discussion between billions of people over the network, and others. The internet censorship is useful for analysing the big data of the organization. It helps in reducing the occurrence of fraud and theft of identity. Filter bubbles are used for managing the views and opinions between different units. The online censorship is responsible for maintaining the email privacy. With the increasing complexity of the internet and associated technologies, it is required to deploy the fundamentals of internet censorship. The new technologies can be securely deployed on the internet by using the technique of internet censorship for putting restriction to the confidential information. This helps in the non-disclosure of confidential information and maintains the privacy of the information. Various types of filtering methods are used for managing decentralised communication between different units. The censor intelligence technique is used for deploying traffic analysis and snowball sampling. The strategies should be developed for implementing wiretapping system, intrusion detection and prevention methods, and firewall. The internet censorship helps in strengthening the national security program. It is capable of predicting and punishing the hackers and the violators. There are number of software used in relation with internet censorship such as CGI proxies, HTTP proxies, Application proxies, re-routing system, and others. The CGI proxies are used for performing the proxy function on the script running deployed on web server. The HTTP proxies are used for sending requests to the intermediate proxy server. Application proxies are associated with different applications. The re-routing system is used for sending request and response to the encrypted data for managing proxy on various proxy server. Peer-to peer relationship should be developed between client and server for managing trust between them.

There are two types of internet censorship program one is the technical censorship and other is the non-technical censorship which are explained below in the table:

Type

Particulars

Explanation

Technical Censorship

Address blocking through internet protocol

The restriction put on IP address from accessing. The shared hosting server will block all the website running on it.

Re-direction and filtering of domain name system

The DNS resolver is used for protecting the hijacking of DNS by blocking the domain names. HTTP, FTP, and POP protocols are generally used for this purpose. It helps in putting restriction to the modification done in the host file

Filtering of uniform resource locator

The URL is responsible for scanning of target keywords specified in the domain name of the address. The encrypted protocols such as virtual private network and secure socket layer is used for resolving these issues

Methodologies used for packet filtering

The controversial keywords which are associated with the transmission of TCP packet should be identified and terminated. HTTP, FTP, and POP protocols are generally used for this purpose. The encrypted protocols such as virtual private network and secure socket layer are used for escaping of HTML contents. The amount of text in the packet can be reduced by using the method of TCP/IP stacks

Resetting of connection

“The filter is used for blocking the TCP connection. HTTP, FTP, and POP protocols are generally used for this purpose” (Walske, 2015). The circumvention method is used for  ignoring the resetting of the packet which are transmitted by the firewall.

Disconnection of network

The internet censorship is used for cutting down the path from the routers. The termination is terminated by pulling out of cable from hardware and software.

Removal of search result and portal censorship

The portal and the search engines can be removed from the website to make it invisible to the user. This is called as censorship because it helps in satisfying the legal requirement of the user

Attacks on the computer network

The blocking of the web services helps in limiting the denial of service attacks. The limiting access of the web pages helps in providing sustainability and longevity to the website.

Over and under blocking of the website

“These techniques is used for blocking the permissible objects which are provided with less protection mechanism” (Ang, 2015).

Commercial filtering software

It is used for providing sophistication to the content of the website

Non-Technical censorship

Laws and regulation

The content from the website should be excluded or removed from the website on the basis of laws and regulation

Formal and informal request sent to publisher and authors

The Formal and informal request sent to publisher and authors for removing and altering data available on the website

Punishment

The authors can be given punishment for wrong deeds

Confiscated

Destroying of the equipment

Creation of own publication

The censor should create their own website for guiding the people about online publication restriction

Restricting licensing policies

Licensing policies should be followed while working on the internet

There are wide range of comprehensive tools to establish internet censorship to prevent the system from denial of service attacks and other. The following table shows the list of tools used in deploying censorship:

Tools

Explanation

TCP/ IP header filtering tool

The censor router is used for inspecting the IP address and associated port number.

TCP / IP content filtering tool

The censor router is used for inspecting the content of the packet by establishing the technique of pattern matching.

Tampering of domain name server

The user can easily fetched the details of the domain name server from the IP address of the destination. The tampering process is used for restricting the access of domain name to the user.

Proxy filtering by using hypertext  transfer protocol

Proxy filtering by using hypertext  transfer protocol is more powerful than TCP / IP content filtering tool and Tampering of domain name server because it keeps monitoring of the traffic available on the internet.

Proxy filtering using Hybrid TCP/IP and HTTP

It is used for developing the list of IP address  and the prohibition of content associated with it.

Denial of service attacks

“The host server is affected by the denial of service attacks” (Bitso, 2016). The denial of service attacks arises when large number f computers provide services to only one single computer and the system is inefficient in handling those requests.

Server take down

Putting extra load on the server will automatic disconnect the server from the internet.

Surveillance

“The logging transfers is used for managing constant technical monitoring between host and internet user” (Chiang, 2014. The legal action can be taken against the user if he is trying to access the banned data from the internet. It could create a sense of fear in violators.

Social Techniques

The user should show their photo identification card before using the internet cafes and public computers.

Cached pages

The blocking of the cached pages

Mirror and archive sites

Removal of the copies of website from the internet

Web to email services

The web pages should not be sent as an email services

RSS aggregators

Google reader and bloglines are used for blocking the access of the website

Virtual private networks

The internet censorship can be created by using the virtual private network which provides secure connection for browsing the internet globally.

SSH Tunneling

SSH tunnelling is used for managing encrypted channel over the traffic for managing request and response between blocking sites

Reverse proxy

Reverse proxy is used for managing load, encryption and decryption technique, caching, and authentication technique.

Sneakernets

“These are used for transferring the electronic information between computer files and data storage unit. It is capable of moving the data on restricted network platforms” (Smith, 2014).

  • Criminal activities are minimised: it has been seen that implementation of internet censorship has limited the occurrence of criminal activities such as terrorist group recruitment, personnel bank account hacking process, phishing attack, theft of identity information, online spamming, and others. “In the last few decades many innocent people were become victim of such activities and have faced many troublesome problems” (Sorak, 2013). The internet censorship is the best solution to overcome the problem of fraud and other related illegal activities. The malicious content can be removed from the website which can be the cause of suspicious activity.

  • Protection to children: The increasing demand of internet in the youth and children for surfing related with their education helps in increasing the knowledge of the children because the internet is the medium of presenting information which is collected globally. The parents can use internet censorship to protect their children from the negative impact of the internet.

  • Provides online security to data: “The internet censorship is capable of blocking the harmful sites which can access the reliable data of the website” (Vivan, 2014). The sensitive information can be safely interchanged on the internet by making use of internet censorship technology.

  • Standards for publications: “The structured framework of policies is prepared for deploying the website under the legal laws” (Majette, 2012). The discrimination of the website can be protected by indulging the technique of censorship. It is capable of restricting the violated message present on the internet.

  • Limitation can be set to the free society: no absolute freedom is given to the individual by using the technique of internet censorship. The racist speech can be avoided on the internet.

  • National security: The internet censorship helps in strengthening the national security program. It is capable of predicting and punishing the hackers and the violators. The terrorist information can be easily accessed by using the method internet censorship. The nation can be overcome by the threats of the terrorist attacks.

  • The theft of identity can be minimised: The violators can be easily accessed and scanned who are attempting for hacking the information related to the identity of the individual. The anti-phishing software is used for preserving the personal information of the individual. 

The internet is the common platform to cover all the activities of day to day life. The censoring techniques are used for removing the ubiquity from the internet. The negative impacts of internet censorship on society are listed below:

  • Right violation: “The rules should be followed for doing amendments in the data available on the internet” (Khattak, 2015). The rights of the web master can be violated when the website is not under use and its content are modified by the hacker without following legal rules.

  • Limitation put on educational resources: “The implementation of filter with good intention is used for hiding inappropriate data but due to this the student cannot able to read the complete content of books” (Chandio, 2014).

  • The social gaps can be increased: The global meetings can be easily organized on the platform of internet. The intellectual and ideological levels can be organized on the single platform. This is used for recognizing different cultures of the participating units. The implementation of internet censorship limited the prediction of difference and similarities between the participating units.

  • Cost: The implementation of internet censorship increases the cost of the organization in terms of time and resources. The maintenance cost of upgrading the system periodically should be associated with the project deployed on the internet. The distribution of cost should be effectively done for resolving the issue of the cost.

  • Business issue: The internet censorship have the negative impact on the business and organization. The application cannot be accessed by all the consumers. The organizations are not able to access the best websites associated with supplier information and other related services. The global scale of the internet is not fully utilized by the business owner due to the association of internet censorship because it put restriction on some of the website from accessing of the third party.

  • Loss of freedom of expressions: The limiting use of internet increases the violation of right to express and speech. The internet is the platform of sharing of information, views, and opinion globally but use of censorship takes the right of discussion and expressing ourself freely on the internet.

  • Control of information: The people can take advantage of controlling the information available on the internet. The implementation of censorship can be taken as in the disruptive form.

Conclusion:

Internet censorship is the method which is used for putting restriction on the information which is viewed and published on the internet. The internet censorship can be created by using the virtual private network which provides secure connection for browsing the internet globally. It has been seen that implementation of internet censorship has limited the occurrence of criminal activities such as terrorist group recruitment, personnel bank account hacking process, phishing attack, theft of identity information, online spamming, and others. The internet censorship is useful for analysing the big data of the organization. It helps in reducing the occurrence of fraud and theft of identity.

References:

Ang, P. (2015). Censorship and internet: A singapore perspective. 1st ed. [ebook] Available at: https://unpan1.un.org/intradoc/groups/public/documents/apcity/unpan004065.pdf [Accessed 01 June. 2017]. 

Bitso, C. (2016). Trend in transition from classical censorship to internet censorship. 1st ed. [ebook] Available at: https://www.ifla.org/files/assets/faife/publications/spotlights/1%20Bitso_Fourie_BothmaTrendsInTransiton.pdf [Accessed 01 June. 2017]. 

Chandio, M. (2014). Use of internet and its effect on our society. 1st ed. [ebook] Available at: https://www.szabist.edu.pk/Publications/Session%20VIII%20Paper%20No%202%20(P%20157-161).pdf [Accessed 01 June. 2017]. 

Chiang, M. (2014). A taxonomy of internet censorship and anti-censorship. 1st ed. [ebook] Available at: https://www.princeton.edu/~chiangm/anticensorship.pdf [Accessed 01 June. 2017]. 

Erixon, F. (2009). Protectionism Online: Internet censorship and international trade law. 1st ed. [ebook] Available at: https://www.ecipe.org/app/uploads/2014/12/protectionism-online-internet-censorship-and-international-trade-law.pdf [Accessed 01 June. 2017].

Khattack, S. (2015). A look at the consequences of internet censorship. 1st ed. [ebook] Available at: https://www.icir.org/vern/papers/censorship-response.imc14.pdf [Accessed 01 June. 2017]. 

Majette, S. (2017). Internet censorship. [Blog] Computer Forensic. Available at: https://theimpactnews.com/items-we-barely-use/retired-columnists/weird/2012/12/13/internet-censorship/ [Accessed 2 Jun. 2017]. 

Smith, M. (2017). The impact of information technology security upon society. [Blog] Digital Guardian. Available at: https://eprints.qut.edu.au/6082/1/6082.pdf [Accessed 2 Jun. 2017].

Sorak, N. (2013). Internet censorship and corruption. 1st ed. [ebook] Available at: https://qog.pol.gu.se/digitalAssets/1609/1609805_qogwp_2016_17_sorak.pdf [Accessed 01 June. 2017]. 

Vivan, M. (2014). Surveillence and internet censorship: The impact of technology on human right. International Conference paper for information and communication, [online] 4(3). Available at: https://www.europarl.europa.eu/RegData/etudes/STUD/2015/549034/EXPO_STU(2015)549034_EN.pdf [Accessed 2 Jun. 2017]. 

Walske, Z. (2015). Internet censorship: Protecting citizens or trampling freedom. 1st ed. [ebook] Available at: https://books.google.co.in/books/about/Internet_Censorship.html?id=U2QMxWxq46kC&redir_esc=y [Accessed 01 June. 2017]. 

Wang, S. (2017). Internet censorship: Protecting citizens or trampling freedom. The Sunday Times. [online] Available at: https://www.szabist.edu.pk/Publications/Session%20VIII%20Paper%20No%202%20(P%20157-161).pdf [Accessed 2 Jun. 2017].

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2022). Internet Censorship: Positive And Negative Impact On Society. Retrieved from https://myassignmenthelp.com/free-samples/32563-it-professional-and-society/evolution-of-internet-censorship-file-A8C77F.html.

"Internet Censorship: Positive And Negative Impact On Society." My Assignment Help, 2022, https://myassignmenthelp.com/free-samples/32563-it-professional-and-society/evolution-of-internet-censorship-file-A8C77F.html.

My Assignment Help (2022) Internet Censorship: Positive And Negative Impact On Society [Online]. Available from: https://myassignmenthelp.com/free-samples/32563-it-professional-and-society/evolution-of-internet-censorship-file-A8C77F.html
[Accessed 29 March 2024].

My Assignment Help. 'Internet Censorship: Positive And Negative Impact On Society' (My Assignment Help, 2022) <https://myassignmenthelp.com/free-samples/32563-it-professional-and-society/evolution-of-internet-censorship-file-A8C77F.html> accessed 29 March 2024.

My Assignment Help. Internet Censorship: Positive And Negative Impact On Society [Internet]. My Assignment Help. 2022 [cited 29 March 2024]. Available from: https://myassignmenthelp.com/free-samples/32563-it-professional-and-society/evolution-of-internet-censorship-file-A8C77F.html.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
Whatsapp
callback
sales
sales chat
Whatsapp
callback
sales chat
close