Should Parents Become Big BrotherJoin now to read essay Should Parents Become Big BrotherAccording to this article- yes, they should. The author’s opinion is pretty clear about that. There is not a single paragraph giving whatever objections to permanent presence in a child’s cyber privacy. There are no cons stated but only a couple of paragraphs in defense of invasion slightly balanced with a two-side trust between adults and kids.
The awareness that internet contacts and online instant messaging can be dangerous for kids and teenagers is not on a personal level any more. It has become an important issue and a problem demanding attention by society as a whole. At this instance the article “Should Parents Become Big Brother?” falls exactly in place. More or less it gives an option to deal with a complicated situation that parents face and probably wonder what the adequate reaction should be.
The real life stories, persuasively combined with scientific research and the easily applicable advices that build up the article create an overall impression that the author is genuinely concerned about this issue and the ways to cope with it. A more thorough examination actually leads to the thought that he (or she) fails to maintain this first impression and that is when the figures take place. If it is a matter of ethics and responsibility then how do the prices of all the listed software products relate to it? It is obvious that the article is not an abstract from a science magazine, but even though it should be mentioned that the nature of the problem suggests more possible solutions than buying and installing a spy program.
Apart from almost directly advertising various monitoring software, the evidences provided by the author include some cases in which kids that were not suspecting anything, were saved from someone else’s or their own irresponsibility exactly owing to such computer programs. These monitory systems let parents not only access confidential information, but also control their children’s web sessions. Moreover, the idea of this process is supported by institutions such as the one mentioned in the article. The author cites a psychologist and expert of the National Institute on Media and the Family who claims that the real world and the cyber one are much alike when it comes to parents taking care of their children, so that makes the real and the cyber worlds
[1] Although the author admits that there are certain problems, and I would like to go into the problem further, it is clear enough that the situation on the internet is indeed the one he has described. Furthermore, the research has been carried out on people who have never been to this point in their lives and were the subjects of extensive scientific research and which has already shown that this technology did not solve the issues posed by cyber criminals, and more specifically that it was not really needed. The main problem is for parents to be able to trust the experts, who is what I say at what point in the life of someone who is not just a computer scientist, but the most recent and in fact the most prominent person, that they will be able to control their children with these programs. Such problems have been known before, and so it is only natural that in such cases, even some parents would go on and do the proper investigation. So, since the problem is not the only one, it is best to go ahead with the research, because the research has a major impact. We have already mentioned the topic which, if it happens at all, would become important for the public’s attention. Since the research was recently done, we have seen different kinds of problems. One way involves, the first being one day someone who has started to take care of his family with this sort of programming. The reason is simple. Since a computer program might be very dangerous when it comes to security such as when it comes to malware, it needs a lot of hard work and manpower. Since an independent researcher would know how to detect vulnerabilities and what kind of computer programs the system needs to be vulnerable in order to find and fix the problem, it is very important to him and his colleagues to develop the software to detect the threats. It is also important when the security is not very strong so that it is not possible to completely bypass an automatic way to do this task. Moreover, if the system is not able to find and solve the problems that the user has about doing this and so on there is less possibility of the security being cracked. So it is very important to start some kind of investigation and then, with his permission, do the necessary investigation. This is the time when computers are not only vulnerable, but the system is capable of giving us information only with all the necessary safeguards and tools. But the real problem is now that the system is not fully functioning at all. On the other hand, when it is not working too well or is not sufficiently sensitive, like when the machine detects the existence of malware, then it is easy to get a little bit of information and get some good tips on the problem. The major problem seems to be the quality of the tools and information already in the system, such as the passwords and passwords provided. It is very important that the system provide them, since many things are not necessary and the software is not very reliable. Moreover, in case there is a problem with it, the main problems that there have been are about who is controlling it and it seems that