Government control of public documents entails putting into place rules and regulations that would determine the manner in which certain public documents are accessed and used. On the internet, the government mainly controls the access and use of public documents, which include public registers, land title deeds, court records, marriage records, divorce records, criminal records, and security agencies’ documents, among others.
Government control of public documents involves censorship that entails the government’s control, publication, and suppression of information over the internet based on the government policies and the rule of law. Dynamic and the blacklisted filtration of URLs is a common technique employed by the government in the control of online access of public documents. Search engines’ optimization, information pre-screening, encryption strategies, digital signatures, and the use of both private and public access keys are common methodologies employed by the government in regulating access to online documents.
Cyber crimes, cyber terrorism, lack of reliability and accountability of public online documents, and the need to enhance integrity of public documents are core reasons why government control of on online public documents is undertaken. Different fields of life in the society have continued to be influenced by the evolution and development of Internet technology. Through the use of the Internet, the society has continued to be more sensitive and critical of the policies, procedures, and operational standards undertaken by the government.
Enhancement of efficiency and effectiveness and streamlining of politics, educational sector, healthcare sector, the business sector, and research are areas that have greatly been influenced by the use of internet related technologies. Dominance of wireless access of public documents, customized online software applications, semantic web, video streaming, integration of artificial intelligence, and the use of attention economy techniques are the likely future changes to be expected in the manner in which government controls public documents on the internet and the Internet technology in general.
Introduction Government control of public documents entails putting in place restrictions and security mechanisms that offer limited access or no access at all to public information and data. The control of public documents on the internet by the government targets to protect the interest of both the public and the sovereignty and integrity of the nation (Brown and Duguid 5). On the Internet, public documents refer to the documents that are issued or published online for public knowledge.
The documents include public registers, land title deeds, public registers, court records, military documents, county documents, marriage records, divorce records, criminal records, birth related documents, population patterns records, security agencies documents, national financial records, and the statements made by the public officers in their official capacities are referred to public documents. Government Control Mechanisms of Internet Public Documents
Before Internet accessibility and use became a common phenomenon in the public arena, the public documents were commonly being placed on the electronic desk for public inspection before their publication in the federal register could be undertaken. John and Drahos (13-17) explains that government control of public documents involves censorship, which in most instances entails the government’s suppression or control of accessing or publishing of information over the internet based on its own policies.
The Internet Corporation for the Assigned Names and Numbers (ICANN) body is used by the government to control the accessibility and use of online public documents. Censorship is done by the government even on websites on which the government has no direct control over. This is normally done through dynamic or blacklist filtering of the URLs of websites that contain public documents. Secondly, portal censorship is done by the government in order ensure that websites with vital public documents are only accessed by people that have the knowledge of their location after authorization.
The sites would then be rendered invisible to people that do not know where to access them. The control mechanism employed by the government in controlling public documents involves contacting search engines and social sites’ managers and requesting that sites, which contain private information that need to be, removed from their index and the search results. Pre-screening of information published on the Internet is also done by government urgencies to ensure that public documents are safeguarded from unscrupulous and unauthorized individuals.
Encryptions standards and the use of passwords and other document access methodologies are employed to ensure authenticity and integrity of the public documents accessed over the internet (Brown and Duguid, 4-19). Digital signatures and anti spyware software applications are employed to control unpermitted access to public documents. However, pubic databases and data warehouses are utilized by the government in storing and limiting the extent to which public documents are utilized. Reasons for Government Control
Cyber terrorism, cyber crimes, and high levels of other fraudulent activities have been the major reasons why the governments has been compelled to initiate measures that would control access and usage of public documents on the Internet. Due to the high demand of internet services, the high traffic witnessed on most websites have made it hard for most information systems managers and website administrators to adequately monitor the access levels and browsing habits of internet users (Brown and Duguid 67). Government control enhances adequate and reliable access to public documents.
Government control of public documents on the internet is designed to facilitate lawful and easy exchange of the vital stored public information and data based on the stipulated public standards (Bert-Jaap, et al 67). The control of public documents on the internet is done through modification, creation and editing, collation, dissemination, annotation, use, and the deletion of unwanted and unlawful public records. How Internet Has Influenced Our Society The evolution of internet has had both positive and negative influences in the manner in which both the public and the government conduct business activities.
Despite the numerous benefits that are associated with the evolution and continued development of Internet and the general information technology world, numerous challenges have also been realized. Different fields of life have been influence by internet in a number of ways. To begin with, through the use of the Internet, the society has continued to be more critical of policies, procedures, and operational standards being undertaken by the government. Issues of public funds misappropriation have continued to be accessed by the public despite the government efforts to control information flow from its ministries to the public.
Politics has also shifted from the door to door campaigns to the use of video streaming and social networks to lure people into supporting ones ideologies. Accessibility to the public court records is viewed as a vital element of enhancing democracy in the modern world. Governance has, according to Glanville (2008) been streamlined through the services rendered to people by making them easily accessible to people through the internet. In the health care sector, Internet continues to be used as a source of crucial medical information and in emergency treatment.
Transformation of the medicine, synergistic discoveries, and scientific collaborations and researches on micro organisms and hereditary neurologic complications is currently happening thanks to continued development of Internet technology. The cost of healthcare services has also decreased thanks to medical internet services and technologies such as telemedicine and video conferencing. Patients and their families have therefore been empowered due to faster and cost effective access to information, research, and treatments. Furthermore, the manner in which the society conducts business activities has drastically changed.
Despite the constant assurance by the government, ISPs, and other internet security and regulatory bodies on the security of public documents, people have continued to be more cautious on the information given to the public domain on the internet due to lack of total trust on the security and use of such information. According to Brown and Duguid (4-15), internet has re-shaped the manner in which educational institutions and systems are governed and education conducted. This could best be illustrated through the now common e-learning systems and e-libraries in many learning institutions.
Online reading of educational articles, online books and research materials, learning journals, and sample and past essays has been enabled (Bert-Jaap, et al 27-81). Government control over public documents on the Internet should therefore be geared towards ensuring that all concerned persons adequately benefit from the numerous benefits associated with documents on the Internet. On the other hand, the internet has been utilized in causing harm and degrading the societal values and norms. Terrorisms and access to sensitive documents has easily been done through illegal access to private information that is of national importance.
Internet has therefore facilitated faster terrorisms attacks, spread of pornographic materials, and information that regards illegal fire arms. In fact internet has witnessed increased levels of identity theft in the modern societal life. Future Changes to Be Expected The future of Internet is likely to result into the use of customized, more efficient, and cost effective internet software applications that would automatically detect the access points of public documents and either deny or grant the access rights (Thorin and Sorkin 74-123).
There is also likely to be stringent rules and regulatory policies that relate to access to public documents through the use of online security numbers and the non Latin script web addresses due to the increased levels of insecurity and internet fraudulent activities. The future is likely to witness the dominance of wireless networks. Semantic web development that would enable internet networks works, websites and search engine platforms would result in meaningful interpretation of information and data.
Based on the argument of Brown and Duguid (18-19), semantic web would be developed to enable description of data that would enable the Internet and its infrastructure to process the actual meaning of instructions that would be done by equipping computers with semantics that can resolve semantic optimization that are complex. Additionally, artificial intelligence and the development of the virtual world would be integrated into the Internet technology. Artificial intelligence and virtual world would, however be used in entertainment and control of public documents on the web.
This would also witness mobile platforms being utilized to access both private and public documents rather than the use of computer machines. Lastly, attention economy through personalized news, personalized search, recommendations to buy, and alerts would dominate the future of internet technologies. To that regard, websites would mainly be regarded as web services through the future evolution of rich internet applications (Thorin and Sorkin 123-258). Conclusion Despite the many security challenges that have continued to hinder its free use, Internet’s future is expected to be much efficient, effective, and more trusted.
Due to the possible total private ownership of internet services, government control of public information would either be too costly or would be complicated due to the lack of direct rights and privileges required in the control of information. Though vital, the process of government control of public documents on the internet needs to be accorded in-depth attention in order to ensure that the control process do not cause a lot of complications and thus hinder the highly demanded efficiency and cost effectiveness in accessing such crucial documents.
Work Cited Bert-Jaap, Koops. , et al. , Starting Points for the ICT Regulations. “The deconstructing prevalence of the One-Liners policy – the government role,” Cambridge-University, Cambridge, 2006. 27-81. Brown, S and Duguid, P Universities and Documents in Digital Age. Changes, 1996, 4-19. Glanville, Jo. The Business of Censorship on the Internet. London. The-Guardian, 2008. <http://www. guardian. co. uk/commentisfree/2008/nov/17/censorship-internet>. John, Braithwaite and Drahos, Peter. Global Regulations of Business. Cambridge Uni. 2000. 13-70.