Need an research paper on internet needs more rules and regulations. Needs to be 5 pages. Please no plagiarism. The widespread use of internet network administration is crucial for reliable access to the network (Kranakis et.al 176). The extensive use has resulted in conflicts among the users and administrators thus necessitating rules to regulate internet usage. For example, different server systems are in use over a wide range of networks. Therefore, the basic rules that apply to society also apply in electronic form. The protection against plagiarism applies to protect information whether obtained from devices such as diskettes or internet sources (Grama 328).
There are a number of mindboggling matters that still remain a puzzle in the electronic world hence calling for the need for more rules and regulations in the use of the internet (Grama 330). For example, vandalism on the internet is unlike that in the real world context but is as well bound to undergo the same security check since in this particular case a user’s information is ’broken into’ hence resulting in what may be called information leakage of what would be rather very confidential issues (Himma 21). It is of importance, therefore, that rules and regulations are taken into consideration in this rapidly growing technological world. The internet is highly prone to electronic malpractices since it is a decentralized system spread out to very many users worldwide (Roberts & Zahay 422). There is no particular person, company, organization, or user that can have full control of the internet. Therefore, rules and regulations are essential to regulate the use of the internet.
Internet users experience a number of threats whether as organizations with a large server network or as individuals’ clients (Himma 36). The Computer Emergency Response Team an, organization that guards the internet explains how computer hackers are exploiting the internet users through internet protocol spoofing whereby they counteract security measures .by posing as “friendly computers” to an internal network and adopting an IP address similar to those of the internal computers thereby allowing the cracker into the system. .