Saturday, November 24, 2012

Communication and Cyberspace 1-4


Chapter 1

When I first started working in the telecommunications field I felt really comfortable because I felt as thought I had an advantage over those who were not into the computer world per say.  Turns out that now I feel as thought I am being left behind as most teenagers today may have more exposure to the computer world since the launch of social media.  All joking aside it seems like these kids are born with a facebook and a twitter account just to name a few.  I could go on and on as there are so many different social media sites out there.  It seems that most teenagers before they reach the age where they can legally drive a vehicle, belong to more virtual networks than I do being twice there age.  It has gotten to the point that if you are not completely immersed in these networks, you will miss out on many things that those in your group will be taking part in.

Chapter 2

As stated in this chapter, many of those whom are deeply involved in the so called cyber-world have done so because we believe we have control of what we do and how we do it in this so called cyber world.  Some people have even lived fantasies that they would not be able to in their "REAL" life.  There is no better example then "These technologies then enable us to experience control ("cyber") as a projection of self out of our center, from our wills, into something else.  That something else, that field of activity, is space.  It is real because it is independent of us, but paradoxically more real because it also responds to us." What seems more and more outrageous is the fact that people are believing more and more on their cyber-life and the outcomes of it.

Chapter 3

Controlling Cyberspace in a practical way is almost impossible.  If we take a look at how a website works we can simply see that a website is just a server sitting somewhere that simply responds to a request from a user that is wanting to access the information that lies within that website server.  These servers are actively listening to request from users to either see, upload or download any of the information that sits on that server.  By wanting to control Cyberspace, we would have to place virtually thousands of traffic cops which would have to first monitor the request for information, and second they would have to monitor the reply of information from that server.  Not to mention controlling the websites that are embedded within a website calling for even more two way monitoring. Does not really seem to be a practical way to control cyberspace.

Chapter 4

The key to this whole chapter lies on one short paragraph on page 73-74.  What's Gone Wrong.  "The nature of the new technology makes it hard to limit the scope of what might be covered.  In systems that do not distinguish between each stage of information processing, like those found in electronic networks, a broad application of copyright protection creates a particularly acute problem: The public price must be calculated on the basis of a series of incremented costs that can far exceed the one time cost we pay for the printed version of the information".  Here is the key to all of the problems dealing with access control and copyrights.  It is extremely difficult to limit what one can and can't copy from the web once it is posted on the web.  

No comments:

Post a Comment