Global E-Business Essay Example

  • Category:
    Business
  • Document type:
    Essay
  • Level:
    Masters
  • Page:
    2
  • Words:
    935

5Global E-Business

Global E-Business

Customer’s name:

Customer’s Course

22nd April, 2014

It is generally agreed that the internet presents a wide range of opportunities for the children, such as learning, education, self expression and identity and it also increases their level of participation and creativity. Irrespective of this they also distinguish that through the use of the internet children are also exposed to various other risks. Thus, children ought to be protected when they are using the internet so as to mitigate the various online risks (Department for Children, Schools and Families, 2008).

A major level of protection that children ought to enjoy over adults is to have access to free or low cost access to child protection software. The low cost or free software’s will enable parents to be able to afford them and thus enhance the monitoring of the content that children can view. These software’s are mostly applied by parents to protect their young ones and this software is also employed in schools (Jody et al., 2010). This software’s consist of a number of software’s that work in collaboration so as to prevent the users from viewing certain kinds of information on the internet. This software will play a great role in restricting and blocking the web content that children can be able to see. When these software’s are installed, they will block the access to a great number of sites that contains objectionable content, for example, gratuitous violence, hate speech, obscenity and pornography.

Another measure in the protection of children is to increase in penalties to those sites that containing objectionable materials. The charges that are usually charged on sites containing explicit materials are very low compared to the harm they cause to the children (European Commission, 2008). . A great number of governments are committed to increasing the amount of penalties for the production and possession and distribution of child exploitation materials. Possession and distribution of exploitative materials are repugnant. These materials are usually termed as is a measure to protect inappropriate use of the internet by children dreadful abuse that children suffers. By viewing these materials children are usually re-victimized by the acquisition of knowledge that images that are abusive can be readily available in the internet.

Another measure is to adopt monitoring and time limiting technologies. In essence, this technology usually tracks all the online activities that a child is engaging in and it sets limits on the amount of time that children can be able to spend on the internet (Jody et al., 2010). This software’s usually covers the child use of the email, internet and the instant messaging activities. After the set time has elapsed the computer, usually shuts down and thus the child cannot be able to use the computer any longer.

The other measure is more related to the adoption as well as enforcement of policies that are aimed at the responsible use of the internet. These policies are currently being put in place so as to encourage the consumers as well as the producers to take full responsibility for their online content with the aim of promoting and developing responsible online behavior. For example, the European commissions and the UK home office are encouraging the social media providers to ensure responsible behavior for their users by the use of codes of practice and good practice supervision (European Commission, 2008). The UK Home Office established a task force in relation to child protection so as to promote internet safety in young people (Home Office, 2005) The task force has over time developed a great number of guidance documents which are aimed at offering the service providers with the current risks that are available in an online environment and the necessary measures that can be put in place to minimize all the available risks (GSM, 2007).

Another additional measure in regard to use of the internet by children is age verification. Age verification in the use of online substances addresses a number of risks such as risks associated with content and risks associated with grooming (GSM, 2007). Age verification is usually deployed during the supply chain point where the internet services and content are hosted. Age verification is usually implemented so as to restrict access by young children to behavior and content that is only considered appropriate for adults. Online communities that are designed solely for use by the young people and children can offer a safe internet environment for children, given that the adults with various sexual interests are prohibited from accessing such sites.

The last measure is increasing awareness among both parents and children about the important role they can play when it comes to labeling the content that they put online and also harmful content in the aim of reducing the availability of the material in the internet. Some sites utilize their users so as to improve their moderation processes (GSM, 2007).

References

Department for Children, Schools and Families (2008). Government Launches New UK Council for Child Internet Safety, Retrieved April 30, 2014, from http://www.dcsf.gov.uk/pns/DisplayPN.cgi?pn_id=2008_0215

European Commission (2008). Social Networking Sites: Commissioner Reding stresses their economic and societal importance for Europe, Retrieved April 30, 2014, from http://ec.europa.eu/information_society/newsroom/cf/itemdetail.cfm?item_id=4398 ,

GSM (2007). European Framework for Safer Mobile Use by Younger Teenagers and Children, Retrieved April 30, 2014, from http://www.gsmworld.com/gsmeurope/documents/eur.pdf

Home Office (2005). Good Practice Guidance for the Moderation of Interactive Services for Children, Retrieved April 30, 2014, from http://police.homeoffice.gov.uk/publications/operational­policing/moderation-document-final.pdf

Jody, O., Ian, E., David, M. & Anthony, B. (2010). The use of actuarial risk assessment measures with UK internet child pornography offenders. Journal of Aggression, Conflict and Peace Research, 2 (3), 16 – 24.