SlideShare una empresa de Scribd logo
1 de 4
European University of Lefke
Faculty of Economics &Administrative
   Computer Information Systems




             MIS 404

Management Information Systems



            Prepared by

        Merve KAVLAK
            285019




            14.03.2012




     2011-2012 Spring Semester




                                       1
Assigment 2: Research What laws affect the use of computers in your home country and Who
controls the internet?

Prohibitions Internet in Turkey
Amazing world in the late 1980s on the internet is a rapidly growing is based on, new
problems began to emerge on the Internet. By this time the Internet into our daily lives,
inevitably, the Internet culture, habits and affected our works on a regular basis. This
situation has an impact alter the source of the concept. In other words, the understanding of
the resource center, although some exceptions, the road parallel to the floor as though the
world of internet has changed radically. Resource center of books from the past, the
mind,encyclopedias, libraries, schools or departments of education would be, but the
introduction of the internet many aspects of life passed into the hands of another dimension
control. This change became more apparent in nearly thirty years, have led to the virtual
world and its people have changed the structure of people's thinking, so that any computer
literate person has become itself a source of information.

Some sites on the Internet the owner / designer of an item in any context by is extremely
easy to install and there is a unit responsible for oversight of them, the number and type of
these resources has been greatly expanded in recent years. New applications in the virtual
world, have contributed to the process mentioned. Over the Internet to share with other
people or to explain what they think a person is not required to have a web site, private or
commercial. For this, a door opening and makes it easy for membership websites. In fact,
some internet sites allow members to create personal pages with their own names. In
addition to any charge, BlogSpot, Webnode, while allowing for the Webs installations they
want users to sites like YouTube, Myspace and some as not only gives the right to
membership.

Since the emergence of Internet commerce, entertainment, arts, communications, including
serves many areas, but this short period the "virtual noise" increases. In this direction with
the negative effects of a virtual society, away from pollution and harmful content and
inappropriate content to keep the virtual pollution cleanup sites to take some precautions
against the authorities has become a current issue. But the real problem has been the
implementation of this initiative. Because the values and beliefs of this website are
inappropriate and unacceptable by the authorities to prevent their access to the main
action. There are definitely some of the reasons for resorting to the authorities and the
implementation of this road and some features may vary by country. The details of the issue
to better understand the world in general, take a look internet bans necessary.

Prohibitions in the world Internet
Seen as harmful to block access to these sites sites and take control of the authorities in
different countries, to be valid within the borders of their countries, refers to blocking and


                                                                                                 2
censorship. This practice is not only unique to underdeveloped or developing countries and
developed countries can be seen. Reasons for such an application the countries political,
religious, cultural or moral values and beliefs vary according to (Noman, 2008). Sites
containing items of this type of work and the country's economic, social, political and
religious values, örtüşmüyorsa, blocking or censorship can take the circuit. For example, the
People's Republic of China, Islamic Republic of Iran, South Korea, Tunisia, Denmark, Italy,
Austria, the United Arab Emirates, Finland, Norway, Israel, Netherlands, United Kingdom,
United States (U.S.), France, blocking or censorship in countries like Canada are among the
applicant countries for the implementation of Samples can be seen that both developing
blocking or censorship, but also available in developed countries, but the reasons vary from
country to country. In order to understand these differences in both developed and
developing countries is necessary to look at a few examples.

Prohibitions Internet in Turkey
From the internet prohibitions in Turkey, for some reason so far
number of Web site shut down, it is possible to say that the people accept this situation, the
usual. Opened nearly a thousand pages of the site's decision to blockdarkened, and the
history there and the corresponding number of the decision taken by the courts, as well
as visitors to the sentence meets the red block.

Legal Justification for the Application
May 4, 2007 adopted the legal rationale for the prohibitions of the Internet in
Turkey5651 Regulation of Internet Publications and Combating Crimes Committed
Through this Publications Law. This law, the scope of the prohibitions on the internet and to
prevent the possible causes are identified by references to relevant laws are: according to
the law to prevent such situations are subject to the criminal.

1. Directing suicide (Article 84),

2. Sexual abuse of children (Article 130, first paragraph),

3. Facilitating the use of narcotic or psychotropic substances (Article 190),

4. Supply of dangerous substances for health (Article 194), 173

WORLD DATA Internet Prohibitions Turkey, 2009, 10 (2)

5. Obscenity (Article 226),

6. Prostitution (Article 227),

7. And providing opportunity for gambling (Article 228),

8. No. 5816 dated 07/25/1951 on Crimes against Ataturk Crimes mentioned in the law
(Carpenter, 2008)

                                                                                                3
Internet Prohibitions Of 22 August
Information Technologies and Communication Council (BTK) drafted "Principles and
Procedures for the safe use of the Internet" will enter into force on August 22, 2011. With
this application, users have to choose one of ICTA's determined to leave 4 internet filter.
Circumvent the filter considered a crime. Filter criteria are completely determined by the
ICTA to enjoy. This application in the world of the Internet as China, Cuba, Iran "arrested" in
countries where being used. What is the basis?

4th and 50th articles of the Law No. 6 of 5809 dated 28.07.2010 with 27 655 in the Official
Gazette under the provisions of article 10 of the Electronic Communications Sector
Consumer Rights Ordinance prepared by BTK "Safe Use of Internet Draft Principles and
Procedures "was approved by decision No. 2011/DK-10/91 on February 22, 2011," Principles
and Procedures for the safe use of the Internet, "the decision was made to enter into force
on August 22 in 2011.

More precisely, the state will be launched on August 22 in the system to the Internet "BTK"
accessible by selecting one of the four filter types. Be considered a crime to work to
overcome or circumvent the filter. Internet service providers are also blamed for the filters
to prevent users from exceeding the expected heavy fines on them otherwise.

According to the regulation will be four types of filters. Family child at home and the
standard package. Internet subscribers will have to select each one of them. This type of
filter applied to Internet cafes, "Websense" filter to imitate. In other words, sites can
determine not only be able to enter the internet cafe. Even without this kind of problem
with content filtering systems are known by many site users filter is installed.




                                                                                                  4

Más contenido relacionado

La actualidad más candente

Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislationTgarmon34
 
Getting out of the fast lane
Getting out of the fast laneGetting out of the fast lane
Getting out of the fast laneAngelo Lerro
 
How to Protect End Users‘ Personal Data and Enforce Copyright on the Internet...
How to Protect End Users‘ Personal Data and Enforce Copyright on the Internet...How to Protect End Users‘ Personal Data and Enforce Copyright on the Internet...
How to Protect End Users‘ Personal Data and Enforce Copyright on the Internet...ovento
 
Network Neutrality: Potential impact on free speech and the right to information
Network Neutrality: Potential impact on free speech and the right to informationNetwork Neutrality: Potential impact on free speech and the right to information
Network Neutrality: Potential impact on free speech and the right to informationŚrodkowoeuropejskie Studia Polityczne
 
Internet and Education - a Future (Delivered Sep 2008)
Internet and Education - a Future (Delivered Sep 2008)Internet and Education - a Future (Delivered Sep 2008)
Internet and Education - a Future (Delivered Sep 2008)Senthilkumar Rajappan
 
Internet
InternetInternet
InternetMax Rev
 
Wingate copyright critique portfolio
Wingate copyright critique portfolioWingate copyright critique portfolio
Wingate copyright critique portfolioNicole Wingate
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentationChande Kasita
 
Best invention ever
Best invention everBest invention ever
Best invention everJahid Hasan
 
Communication through internet.ppt
Communication through internet.pptCommunication through internet.ppt
Communication through internet.pptgasumova
 
E-Democracy Meets E-Journalism (Transparency, Engagement)
E-Democracy Meets E-Journalism (Transparency, Engagement)E-Democracy Meets E-Journalism (Transparency, Engagement)
E-Democracy Meets E-Journalism (Transparency, Engagement)Steven Clift
 
Internet and Education
Internet and EducationInternet and Education
Internet and EducationKath Kuting
 
Visitors and Residents: What motivates engagement with the digital informati...
Visitors and Residents: What motivates engagement with the digital informati...Visitors and Residents: What motivates engagement with the digital informati...
Visitors and Residents: What motivates engagement with the digital informati...Ben Showers
 
Future is Now - Online Engagement for Democracy and Community
Future is Now - Online Engagement for Democracy and CommunityFuture is Now - Online Engagement for Democracy and Community
Future is Now - Online Engagement for Democracy and CommunitySteven Clift
 

La actualidad más candente (20)

Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislation
 
Getting out of the fast lane
Getting out of the fast laneGetting out of the fast lane
Getting out of the fast lane
 
How to Protect End Users‘ Personal Data and Enforce Copyright on the Internet...
How to Protect End Users‘ Personal Data and Enforce Copyright on the Internet...How to Protect End Users‘ Personal Data and Enforce Copyright on the Internet...
How to Protect End Users‘ Personal Data and Enforce Copyright on the Internet...
 
Acceptable use policy__ecomp_6204
Acceptable use policy__ecomp_6204Acceptable use policy__ecomp_6204
Acceptable use policy__ecomp_6204
 
110 koenig
110 koenig110 koenig
110 koenig
 
Network Neutrality: Potential impact on free speech and the right to information
Network Neutrality: Potential impact on free speech and the right to informationNetwork Neutrality: Potential impact on free speech and the right to information
Network Neutrality: Potential impact on free speech and the right to information
 
Internet Law Primer
Internet Law PrimerInternet Law Primer
Internet Law Primer
 
Internet and Education - a Future (Delivered Sep 2008)
Internet and Education - a Future (Delivered Sep 2008)Internet and Education - a Future (Delivered Sep 2008)
Internet and Education - a Future (Delivered Sep 2008)
 
Internet
InternetInternet
Internet
 
Wingate copyright critique portfolio
Wingate copyright critique portfolioWingate copyright critique portfolio
Wingate copyright critique portfolio
 
Digital divide
Digital divideDigital divide
Digital divide
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
Wingate Policy Paper
Wingate Policy PaperWingate Policy Paper
Wingate Policy Paper
 
Best invention ever
Best invention everBest invention ever
Best invention ever
 
Communication through internet.ppt
Communication through internet.pptCommunication through internet.ppt
Communication through internet.ppt
 
Internet and Education
Internet and EducationInternet and Education
Internet and Education
 
E-Democracy Meets E-Journalism (Transparency, Engagement)
E-Democracy Meets E-Journalism (Transparency, Engagement)E-Democracy Meets E-Journalism (Transparency, Engagement)
E-Democracy Meets E-Journalism (Transparency, Engagement)
 
Internet and Education
Internet and EducationInternet and Education
Internet and Education
 
Visitors and Residents: What motivates engagement with the digital informati...
Visitors and Residents: What motivates engagement with the digital informati...Visitors and Residents: What motivates engagement with the digital informati...
Visitors and Residents: What motivates engagement with the digital informati...
 
Future is Now - Online Engagement for Democracy and Community
Future is Now - Online Engagement for Democracy and CommunityFuture is Now - Online Engagement for Democracy and Community
Future is Now - Online Engagement for Democracy and Community
 

Similar a Assigment 2

The internet economy towards a better future oecd 2008
The internet economy towards a better future oecd 2008The internet economy towards a better future oecd 2008
The internet economy towards a better future oecd 2008HubBOG Accelerator
 
Research proposal
Research proposalResearch proposal
Research proposalSaba Afaq
 
A Proposal For Ethics Training In Internet Cafes
A Proposal For Ethics Training In Internet CafesA Proposal For Ethics Training In Internet Cafes
A Proposal For Ethics Training In Internet CafesJanelle Martinez
 
CASE STUDY -1 BA 633 Information Systems Inf.docx
    CASE STUDY -1                BA 633 Information Systems Inf.docx    CASE STUDY -1                BA 633 Information Systems Inf.docx
CASE STUDY -1 BA 633 Information Systems Inf.docxhallettfaustina
 
Internet nature
Internet natureInternet nature
Internet natureaabb321
 
Web 2.0 Presentation
Web 2.0 PresentationWeb 2.0 Presentation
Web 2.0 PresentationPeteyface
 
seoul-declaration
seoul-declarationseoul-declaration
seoul-declarationmaolins
 
Taking A Look At Net Neutrality
Taking A Look At Net NeutralityTaking A Look At Net Neutrality
Taking A Look At Net NeutralityRochelle Schear
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
Net Neutrality in Education
Net Neutrality in EducationNet Neutrality in Education
Net Neutrality in EducationCraig Geffre
 
A proposed architecture for continuous web monitoring through online crawling...
A proposed architecture for continuous web monitoring through online crawling...A proposed architecture for continuous web monitoring through online crawling...
A proposed architecture for continuous web monitoring through online crawling...ijujournal
 
E Commerce Platform Data Ownership and Legal Protection
E Commerce Platform Data Ownership and Legal ProtectionE Commerce Platform Data Ownership and Legal Protection
E Commerce Platform Data Ownership and Legal Protectionijtsrd
 
Research on Legal Protection of Personal Data Privacy of E Commerce Platform ...
Research on Legal Protection of Personal Data Privacy of E Commerce Platform ...Research on Legal Protection of Personal Data Privacy of E Commerce Platform ...
Research on Legal Protection of Personal Data Privacy of E Commerce Platform ...YogeshIJTSRD
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation guest9e3d59
 
The Internet Presentation
The Internet PresentationThe Internet Presentation
The Internet Presentationguest3d7966
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation guestc2627d
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation guestc2627d
 

Similar a Assigment 2 (20)

The internet economy towards a better future oecd 2008
The internet economy towards a better future oecd 2008The internet economy towards a better future oecd 2008
The internet economy towards a better future oecd 2008
 
Research proposal
Research proposalResearch proposal
Research proposal
 
A Proposal For Ethics Training In Internet Cafes
A Proposal For Ethics Training In Internet CafesA Proposal For Ethics Training In Internet Cafes
A Proposal For Ethics Training In Internet Cafes
 
CASE STUDY -1 BA 633 Information Systems Inf.docx
    CASE STUDY -1                BA 633 Information Systems Inf.docx    CASE STUDY -1                BA 633 Information Systems Inf.docx
CASE STUDY -1 BA 633 Information Systems Inf.docx
 
Internet nature
Internet natureInternet nature
Internet nature
 
Essays About Internet
Essays About InternetEssays About Internet
Essays About Internet
 
Web 2.0 Presentation
Web 2.0 PresentationWeb 2.0 Presentation
Web 2.0 Presentation
 
seoul-declaration
seoul-declarationseoul-declaration
seoul-declaration
 
Taking A Look At Net Neutrality
Taking A Look At Net NeutralityTaking A Look At Net Neutrality
Taking A Look At Net Neutrality
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Whitepaper
WhitepaperWhitepaper
Whitepaper
 
The Internet Essay
The Internet EssayThe Internet Essay
The Internet Essay
 
Net Neutrality in Education
Net Neutrality in EducationNet Neutrality in Education
Net Neutrality in Education
 
A proposed architecture for continuous web monitoring through online crawling...
A proposed architecture for continuous web monitoring through online crawling...A proposed architecture for continuous web monitoring through online crawling...
A proposed architecture for continuous web monitoring through online crawling...
 
E Commerce Platform Data Ownership and Legal Protection
E Commerce Platform Data Ownership and Legal ProtectionE Commerce Platform Data Ownership and Legal Protection
E Commerce Platform Data Ownership and Legal Protection
 
Research on Legal Protection of Personal Data Privacy of E Commerce Platform ...
Research on Legal Protection of Personal Data Privacy of E Commerce Platform ...Research on Legal Protection of Personal Data Privacy of E Commerce Platform ...
Research on Legal Protection of Personal Data Privacy of E Commerce Platform ...
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation
 
The Internet Presentation
The Internet PresentationThe Internet Presentation
The Internet Presentation
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation
 

Último

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Último (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Assigment 2

  • 1. European University of Lefke Faculty of Economics &Administrative Computer Information Systems MIS 404 Management Information Systems Prepared by Merve KAVLAK 285019 14.03.2012 2011-2012 Spring Semester 1
  • 2. Assigment 2: Research What laws affect the use of computers in your home country and Who controls the internet? Prohibitions Internet in Turkey Amazing world in the late 1980s on the internet is a rapidly growing is based on, new problems began to emerge on the Internet. By this time the Internet into our daily lives, inevitably, the Internet culture, habits and affected our works on a regular basis. This situation has an impact alter the source of the concept. In other words, the understanding of the resource center, although some exceptions, the road parallel to the floor as though the world of internet has changed radically. Resource center of books from the past, the mind,encyclopedias, libraries, schools or departments of education would be, but the introduction of the internet many aspects of life passed into the hands of another dimension control. This change became more apparent in nearly thirty years, have led to the virtual world and its people have changed the structure of people's thinking, so that any computer literate person has become itself a source of information. Some sites on the Internet the owner / designer of an item in any context by is extremely easy to install and there is a unit responsible for oversight of them, the number and type of these resources has been greatly expanded in recent years. New applications in the virtual world, have contributed to the process mentioned. Over the Internet to share with other people or to explain what they think a person is not required to have a web site, private or commercial. For this, a door opening and makes it easy for membership websites. In fact, some internet sites allow members to create personal pages with their own names. In addition to any charge, BlogSpot, Webnode, while allowing for the Webs installations they want users to sites like YouTube, Myspace and some as not only gives the right to membership. Since the emergence of Internet commerce, entertainment, arts, communications, including serves many areas, but this short period the "virtual noise" increases. In this direction with the negative effects of a virtual society, away from pollution and harmful content and inappropriate content to keep the virtual pollution cleanup sites to take some precautions against the authorities has become a current issue. But the real problem has been the implementation of this initiative. Because the values and beliefs of this website are inappropriate and unacceptable by the authorities to prevent their access to the main action. There are definitely some of the reasons for resorting to the authorities and the implementation of this road and some features may vary by country. The details of the issue to better understand the world in general, take a look internet bans necessary. Prohibitions in the world Internet Seen as harmful to block access to these sites sites and take control of the authorities in different countries, to be valid within the borders of their countries, refers to blocking and 2
  • 3. censorship. This practice is not only unique to underdeveloped or developing countries and developed countries can be seen. Reasons for such an application the countries political, religious, cultural or moral values and beliefs vary according to (Noman, 2008). Sites containing items of this type of work and the country's economic, social, political and religious values, örtüşmüyorsa, blocking or censorship can take the circuit. For example, the People's Republic of China, Islamic Republic of Iran, South Korea, Tunisia, Denmark, Italy, Austria, the United Arab Emirates, Finland, Norway, Israel, Netherlands, United Kingdom, United States (U.S.), France, blocking or censorship in countries like Canada are among the applicant countries for the implementation of Samples can be seen that both developing blocking or censorship, but also available in developed countries, but the reasons vary from country to country. In order to understand these differences in both developed and developing countries is necessary to look at a few examples. Prohibitions Internet in Turkey From the internet prohibitions in Turkey, for some reason so far number of Web site shut down, it is possible to say that the people accept this situation, the usual. Opened nearly a thousand pages of the site's decision to blockdarkened, and the history there and the corresponding number of the decision taken by the courts, as well as visitors to the sentence meets the red block. Legal Justification for the Application May 4, 2007 adopted the legal rationale for the prohibitions of the Internet in Turkey5651 Regulation of Internet Publications and Combating Crimes Committed Through this Publications Law. This law, the scope of the prohibitions on the internet and to prevent the possible causes are identified by references to relevant laws are: according to the law to prevent such situations are subject to the criminal. 1. Directing suicide (Article 84), 2. Sexual abuse of children (Article 130, first paragraph), 3. Facilitating the use of narcotic or psychotropic substances (Article 190), 4. Supply of dangerous substances for health (Article 194), 173 WORLD DATA Internet Prohibitions Turkey, 2009, 10 (2) 5. Obscenity (Article 226), 6. Prostitution (Article 227), 7. And providing opportunity for gambling (Article 228), 8. No. 5816 dated 07/25/1951 on Crimes against Ataturk Crimes mentioned in the law (Carpenter, 2008) 3
  • 4. Internet Prohibitions Of 22 August Information Technologies and Communication Council (BTK) drafted "Principles and Procedures for the safe use of the Internet" will enter into force on August 22, 2011. With this application, users have to choose one of ICTA's determined to leave 4 internet filter. Circumvent the filter considered a crime. Filter criteria are completely determined by the ICTA to enjoy. This application in the world of the Internet as China, Cuba, Iran "arrested" in countries where being used. What is the basis? 4th and 50th articles of the Law No. 6 of 5809 dated 28.07.2010 with 27 655 in the Official Gazette under the provisions of article 10 of the Electronic Communications Sector Consumer Rights Ordinance prepared by BTK "Safe Use of Internet Draft Principles and Procedures "was approved by decision No. 2011/DK-10/91 on February 22, 2011," Principles and Procedures for the safe use of the Internet, "the decision was made to enter into force on August 22 in 2011. More precisely, the state will be launched on August 22 in the system to the Internet "BTK" accessible by selecting one of the four filter types. Be considered a crime to work to overcome or circumvent the filter. Internet service providers are also blamed for the filters to prevent users from exceeding the expected heavy fines on them otherwise. According to the regulation will be four types of filters. Family child at home and the standard package. Internet subscribers will have to select each one of them. This type of filter applied to Internet cafes, "Websense" filter to imitate. In other words, sites can determine not only be able to enter the internet cafe. Even without this kind of problem with content filtering systems are known by many site users filter is installed. 4