Friday, June 7, 2019
Electronic civil disobedience Essay Example for Free
Electronic civil disobedience EssayCivil disobedience has been a large part of societies and the past generations that brook existed. With the further dawning of the cultivation technology era, civil disobedience has taken some other formelectronic civil disobedience (ECD). Though ECD takes a quite a non- carmine means in advancing the interests of certain groups and positing challenges to the status quo of several institutions, ECD has nevertheless remained a crucial force in shaping the image of mankind in general and will remain to be a contri notwithstandinging element in the coming historic periodand beyond. A look into electronic civil disobedience comparisons and analyses In contrast to computer criminality, electronic civil disobedience is a means merely designed to attack the institutions whereas the former is more inclined to fetch profit from actions that damage an individual. This standing distinction contests the probable argument that there is no solid, or at least an ideal difference amongst the two and that both are the same means in putting down the strength of an institution or of an individual.However, while computer criminality is, by the name itself, a crime punishable by existing and applicable laws under the jurisdiction of certain states, resistance via electronic meansthe most general of which is through cyberspaceis deemed to be a means to challenge the existing authority, for instance, in pushing fore necessary changes that are being sought afterwards by individuals. This measure is, apparently, still within the borders of the law and are, hence, legal.Electronic civil disobedience (ECD) is oftentimes carried out in a manner that is not violent or, at the very least, in ways that do not involve direct physical contact (Electronic Civil Disobedience). Although there can be validatory physical consequences that can be attributed to the means and ends that are involved with ECD, a large bulk of the essence of ECD rests on its forefrontresistance through the upper limit utility of the intangible resources available.These resources are largely comprised of electronic information and invisible systems in cyberspace that do not require physical contact among the individuals that attempt to advance their interests in the face of another individual or an existing authority. Though by and large much of the past generationsand even a commodious act of the present generation of citizenshave been closely attached to the physical means of civil disobedience such as in the literal sense datum of taking-up the streets, a shift in the manifestation of civil disobedience is greatly felt in the electronic realm.Since information technologys presence has more and more grown over the past few decades and since its developments have been continuous and have been exponential in refinement, the impacts of electronic civil disobedience has also risen in levels proportional to the booming of the information technolog y industry. As recent developments in the field of cyberspace expand abruptly, so are the probable means in which ECD can make itself successful in achieving its goals or, at least, in making its presence and mission felt across territorial boundaries of states (Cleaver).Moreover, this growth in information technology (IT) has also started to break down the physical barriers as well as the invisible fences that hold back attempts at pushing forth civil resistance or disobedience. The physical institutions that seek to eradicate or lessen the probability of occurrence of these civil resistances have slowly diminished its fascinate on its capability to harness barriers and put up defensive mechanisms that strain the success of resistance from citizens. At the height of the development communicating tools, effective communication has spread like wildfire from among various areas in the globe.Cellular phone technology has amassed for the people easier means to effectively transmit mess ages across wide distances, thereby instituting a smoother flow of information relay. Group organization and mobilization is held at a unifying pace that easily penetrates the state borders and geographical barriers. This leads us to the apprehension that the as the advent of electronic communicationthe internet and cellular phone technology to name a fewthe expected rise in the dexterity and effectiveness of group mobilization and organization in the face of electronic civil disobedience is within reach.However, the abuse of ECD as in the case of civil disobedience (CD) is always a possibility to the extent that legal measures have also to be taken by the proper authorities so as to dismantle probable grounds for violent and unlawful measures in furthering the interests of several groups. ECD, for the most part, can be a ploy utilized by utmost(prenominal) groups that do not only seek refuge in the non-violent methods encapsulated within the essence of ECD but also seek unlawful ends through violent actions that saltation forth from the devices and advantages brought up by the electronic media.Terrorists, for example, can opt to start their large scale plans of wreaking havoc in a populated society by getting a good hold of the electronic resources available almost everywhere. The September bombings of the World Trade Center in New York has devastated a number of lives and even up to this day the damage done can still be felt not only by those who were directly affected but also by the millions of people who fear the havoc of terrorism, especially in contemporary times where ECD is not something new.It would be interesting to note on the delimiting strands that single out those that are purely in the form of ECD and those that hid behind layers of terrorist ploys. For the most part, ECD cadaver today as a growing tool used as a means in contesting the status quo by oppositional forces. This brings us to the security issues posited by the ECD that confro nt the targeted institutions by modern-day activists. Although security measures have been reinforced throughout the years with the further advancement in technology, cyberspace remains an open territory for civil activismand hackers.Though there whitethorn be inconclusive findings that seek to indicate a connection or an alliance between hackers and ECD groups, there remains the possibility that an actual connivance may actually exist, only that the alliance is hugger-mugger beneath the rubrics of the intangible world of technology. It may be an extreme thought to dwell on such a possibility. Nevertheless one cannot entirely advise its factual occurrence.In the context of the general population that subscribes to the established groups that further ECD, certain identifying marks have to be made so as to breeze through the possibility of having a hacker among the number of activists that attempt at penetrating the electronic defense mechanisms of institutions. However, the rapid growth of the electronic resources and its availability prove to be one hefty factor to surmount by the institutions. Activism is all the more fueled by this growth and, thus, the efforts of the institutions are to be doubled or thickened accordingly if ECD is to be diminished.Quite on the other hand, ECD may not be diminished at all, nor can it be totally dissolved especially when the generation we have of today is one that is teeming with the abundance of electronic wealth (Wehling). It must be further realized that such an (ever increasing) abundance in the electronic resources found in cyberspace provides a fertile starting point for extreme organizations that might utilize ECD as an initial step towards electronic violence and as a front for the extensive damage that can be instigated through system crashes and data hostages.The person adept at information technology and electronic systems will readily convey that the probable damage of system crashes as well as data hostages are devastating in the sense that they do not only shaken the virtual foundations of institutions but also destroy the intangible interior foundations that build the electronic core of the institutions.Reparations may be met, though, but the time to successfully recover or at least partially get back on track is yet another factor that must be considered. Hence, security measures are as equally significant as the protection of the interests of these institutions, if not even far more important. finding The impacts of ECD have been felt in many ways.As the growth in cyberspace continues to expand and exceed the standards set forth by previous generations in their attempt to resist the institutional forces and further the specific aims for taking up civil disobedience, ECD continues to be a driving force in directing the thoroughfare of the electronic world. The presence of ECD in contemporary times will eventually stretch through time for as long as there remains a continued expan sion in the domain of cyberspace and for as long as the interests of people are not met and properly addressed.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.