Net Neutrality and the Internet

The internet is ideally a networking infrastructure that connects millions of people globally. The Internet is a recent technology that has been evolving from time to time. The "father of the internet" who aided into its development is known as Vint Cerf who co-designed the TCP/IP protocols as well as the internet architecture. The development of technology was received with a lot of expectations such as overthrowing existing hierarchies and fostering equitable distribution of power. Most people and individuals have embraced the use of internet due to the numerous benefits derived from it which include the supply of endless entertainment and information, connectivity, communication, mapping, sharing, and shopping to name just a few. Despite the numerous benefits derived from the internet, some controversies face the use of this technology such as loss of privacy of users, net neutrality issue, and triggering violence. The research will seek to contribute to the ongoing intellectual inquiry, "is it worth losing your privacy to participate in a web-based society/culture/world?"


The Controversies/Problems surrounding the use of Internet


Loss of Privacy


The internet has been regarded as a breeding ground of controversies since its development. One of the greatest controversies affecting the use of internet is the loss of privacy.  The internet users have aired their concerns concerning the privacy of the information. The government and organizations have spearheaded the loss of privacy on the internet among entities collecting users' information on the internet (Lamdan 263). Some of the internet users willingly or unwillingly post their private information on the internet such as in the Facebook platform with an expectation that the information will remain private.


            Besides, some of Facebook and games are posing quizzes to their users seeking to gather information such as the physical user address, age, email, relationship status, movies, favorite websites, restaurants, and vacation destinations among others.  The information is later shared with third parties such as companies to help in marketing their products without the consent of the users. The privacy of internet has been compromised by some online entities that insert cookies into the user's computer which then gives the companies an opportunity to track the user as he moves across the web. The company can track the sites the user visits, things bought online, and also other things done online (Rubinstein, and Nathaniel 1339). Some of the sites even ask for emails. All of the user information obtained is stored for future use by data miners and the government. The above actions violate the internet user privacy, as consent should be obtained first before obtaining any information and exposing it to third parties.


The uncontrolled disclosure of users' information is harmful and is a problem as it raises ethical issues. Besides, loss of privacy on the internet denies the users the space to open up. Important to note is that privacy is very crucial for human beings as human needs refuge from the community eye (Jiang 579). Therefore, self-monitoring is significant in facilitating the development of ideas, behaviors, and identities. Disclosure of users' information is harmful as affects the balance of power between the state and citizens. Moreover, it is unethical for any organization to disclose the client's information without their consent for personal gains (Rubinstein, and Nathaniel 1337). Privacy is very crucial as it brings about the freedom to think without unfair and unreasonable influence. Loss of internet is a challenge that needs an immediate address to avoid turning the society into a totalitarian. Important to consider in addressing the problem of loss of privacy on the internet is the creativity fostered by privacy. 


Virus threats have also interfered with internet users' privacy. Most of the viruses are acquired from downloading corrupted files or using sites that send a virus to personal computers. Once the viruses attack the personal computers, most of the data stored there are damaged and lost. The users incur losses of installing anti-virus which is quite expensive. Vital information may also be lost in the process.


It is important to acknowledge the breach of internet privacy by internet service providers through sharing of private information to third parties without informing the users. The aspect is also a threat to personal security as it exposes users to the terrorists who use the information to locate users and plan attacks. Therefore, there is an immediate need to implement appropriate solutions in ensuring customer safety as they enjoy the internet. One of the proposed solutions in enhancing privacy in internet use is the implementation of policies restricting internet service providers to design their website to ensure they notify users and request them to use their private information in other areas. The government and other regulating authorities should define policies on hefty fines on internet service providers found breaching internet users privacy. Restrictions should also be put in place requiring internet service providers to inform consumers that their information will be shared with third parties so that users are aware of what kind of information to post.


Net Neutrality


Net neutrality the principle that requires internet service providers to embrace fairness and equality by avoiding discrimination; this is through allowing access to all applications and contents on the internet. Net neutrality is a major controversy facing the internet use today. Without net neutrality, the future of internet remains uncertain. There has been an ongoing debate in the United States regarding safeguarding net neutrality. Some scholars oppose adaption of net neutrality arguing that its adoption will facilitate illegal transfer of information and other fraudulent activities on the internet. It is evident that internet service providers are favoring some websites by blocking access to specific online services and websites.


The lack of net neutrality in place has denied the internet users the right to free and open internet. Internet users are experiencing unnecessary control over the website they should visit by being blocked from accessing specific sites and application, and also being redirected to competing sites (Anderson 167). The absence of net neutrality is crucial internet problem that is fostering unfair competition between companies. It is evident that some companies such as Facebook and Google are buying priority access to ISP customers to offer their customers fast and reliable access to their websites. The absence of net neutrality is a problem as it hinders the development of innovative start-up services for companies that cannot afford to purchase the priority access from ISPs. The controversy has further burdened customers with additional costs due to the charges by ISPs. Non-adoption of net neutrality allows "paid prioritization" thereby fostering favoritism and discrimination which are unethical business practices (Anderson 167). New developments should strive to embrace ethical business practices rather than contributing towards their development and thriving. Adoption of net neutrality will foster fairness, equity, greater content options, transparency, and creativity among the entrepreneurs and other internet users.


The government should take responsibility for enforcing adoption of net neutrality by internet providers by implementing the relevant policies. The government should set policies and rules prohibiting the internet service providers from interfering with customer's internet speed. The relevant regulatory authorities should engage in shunning ISPs down by setting rules and policies revolving around the provision of consumer freedom in using any internet application without interference (Anderson 167). The government has the mandate of providing a solution to funding towards the creation of more ISPs to increase competition. The current problem of net neutrality can be associated with the limited number of ISPs which collaborates in to make connections the weakest at the highest prices. Hence, increased competition through the creation of more ISPs will offer opportunities to better services at fair prices.


Exposure of Young People to Dirty Contents and Addiction


Another controversy or challenge associated with the internet use is increased exposure of young people to dirty contents which are currently everywhere on the internet. There are websites on the internet that post sex videos, porn images and other sex-related contents which can poison the mind of children who are using the internet (Ponte 163). Young children below the age of 18 years are updated with sex matters which are all attributed to increased use of the internet. The consequence is that are having sex too early while others are being provoked to commit crimes such as rape. The aspect has almost reduced the children morality and performance. Research indicates a high internet addiction among young adults and children. The young generation has become less creative as most of the free time is spend viewing updates, images, and videos on the internet. In solving this problem, children should adopt strict controls over the children by ensuring that they only access specific sites at the specified time under supervision (Ponte 163).


Besides, some organizations management has opposed the installation of the internet in workplace citing reduced productivity among the employees. Most of the employee spends most of the time browsing instead of undertaking their assigned tasks. The aspect has resulted in addiction thereby reducing employee performance and productivity. The Internet is significant in organizations in facilitating communication but on the other hand can be harmful if misused. Managers should encourage and create a positive internet culture whereby employees use it when necessary and appropriate. Strict rules and regulations should be set to counter those found misusing internet in the organization.


Internet Hacking Resulting in Data manipulation and Theft


Research indicates that servers have become vulnerable to attacks. One of the servers that were recently hacked is the Climate Research Unit at the University of East Anglia. The outcome was leakage of multiple emails, and other vital information was used to support climate change models and predictions. Most of the organizations and individuals that rely on the internet in daily operations have lost significant information through hacking of their systems. The hackers have been able to gain access to vital customer information from organization systems which they have used to exploit customers. The common types of hacking are; post scanners, vulnerability scanners, password cracking, and port scanners. The organization information acquired by unauthorized personnel through hacking is at times sold to competitors thereby damaging the enterprise competitiveness (Steinmetz 59).


Hacking of systems and servers is a rampant internet problem that needs to be addressed through proper authentication and close monitoring of operations. Besides, hacking of Facebook accounts is very common and has gotten many internet users into trouble through the posting of illegal information. For instance, when a Facebook account is hacked, the hacker pretends to be the owner and posts illegal information such as one likely to trigger violence. The account owner is then tracked and is prosecuted for spreading hate speech through social media networks.


Hacking has cost most of the organization due to data theft. Research indicates that hacking is a heavy burden for average American firm as it costs around $15.4 million per year (Saco 141). Hacking has mainly been contributed by the weak underlying protocols (TCP/IP) that expose the systems to attackers. The software vendors are also to blame as they have reported offering broken programs with significant security threats. Hacking has also occurred through downloading of music, videos, movies, and pictures from the free websites which gives the website owner the opportunity to know the IP address of the computer that logged in. After acquiring the IP address, the owner of the website gains access to personal files stored on the computer which puts the user in great trouble in the future (Saco 143). Some companies are struggling with bankruptcy due to lack of profitability attributed to the loss of customer confidence caused by numerous hacking.


Organizations and individuals should use strong passwords, codes, and algorithms for their servers and accounts to safeguard against unauthorized access by hackers. Passwords should be complex and changed regularly. Organizations should employ highly skilled system administrators to safeguard the systems from attackers. People should prevent unauthorized access to their computers by putting a firewall. Installation of a firewall will prevent authorized access from outsiders as it will allow specific authorized people to connect to the system from the internet (Steinmetz 59). Also organizations and individual should block hackers by ensuring they have the most recent versions of operating and software as well as the anti-virus program.


Recommendations in Solving Internet Controversy


The Internet is a useful technology that is developing rapidly. The benefits of using internet outweigh the cost thus organizations and individuals should embrace the use of internet in improving operations. The most significant internet controversy is the loss of privacy characterized by sharing of users' information to third parties by internet service providers. The regulating authorities should put in place strict regulations on internet service providers who share users' information with third parties without their consent. Besides, internet providers should be restricted to obtain user consent before using any private information posted. Internet providers should further seek to adopt net neutrality by charging users equally and allowing accessibility of all internet content to foster transparency, equity, fairness, and creativity. Young people should be closely monitored when using the internet to avoid the excessive use and accessing dirty contents that may poison their mind. Organizations and individuals should be more responsible for safeguarding their information by incorporating complex passwords, installing firewalls, and hiring highly skilled system administrators to safeguard system safety from unauthorized personnel. People should adopt ethical practices and behavior by doing what is right and that which is not harmful to others.


Works Cited


Anderson, Steve. “Net Neutrality and the Threat to Open Cultural Expression.” Dynamic Fair


Dealing: Creating Canadian Culture Online, edited by ROSEMARY J. COOMBE et al., University of Toronto Press, Toronto; Buffalo; London, 2014, pp. 133–143.


Jiang, Zhenhui (Jack), et al. “Research Note: Privacy Concerns and Privacy-Protective Behavior


in Synchronous Online Social Interactions.” Information Systems Research, vol. 24, no. 3, 2013, pp. 579–595.,


Lamdan, Sarah Shik. “Social Media Privacy: A Rallying Cry to Librarians.” The Library


Quarterly: Information, Community, Policy, vol. 85, no. 3, 2015, pp. 261–277.


Ponte, Cristina, et al. “Children and the Internet in the News: Agency, Voices and


Agendas.” Kids Online: Opportunities and Risks for Children, edited by Sonia Livingstone and Leslie Haddon, Policy Press at the University of Bristol, Bristol, UK; Portland, OR, USA, 2009, pp. 159–172.


Rubinstein, Ira S., and Nathaniel Good. “Privacy by Design: A Counterfactual Analysis of


Google and Facebook Privacy Incidents.” Berkeley Technology Law Journal, vol. 28, no. 2, 2013, pp. 1333–1413.


Steinmetz, Kevin F. “The Front End of Hacking.” Hacked: A Radical Approach to Hacker


Culture and Crime, NYU Press, New York, 2016, pp. 41–71.


Saco, Diana. “Hacking Cyberspace.” Cybering Democracy: Public Space and the Internet, NED


- New edition ed., vol. 7, University of Minnesota Press, 2002, pp. 141–198.

Deadline is approaching?

Wait no more. Let us write you an essay from scratch

Receive Paper In 3 Hours
Calculate the Price
275 words
First order 15%
Total Price:
$38.07 $38.07
Calculating ellipsis
Hire an expert
This discount is valid only for orders of new customer and with the total more than 25$
This sample could have been used by your fellow student... Get your own unique essay on any topic and submit it by the deadline.

Find Out the Cost of Your Paper

Get Price