Sunday 19 November 2006

ICT, law and policy

“…it is never the computer that errs, but the man who has given it its instructions”

-Isaac Asimov,

“The Computer Revolution”

Computers, even in their very first iterations, have always been viewed as tools for practically limitless possibilities. One such possibility is for the vast improvement of the handling and facilitating of information and communication. In truth, a considerable part of this possibility has already become a reality. This fact can be seen most prominently with the phenomenal virtual world of the internet.

In the internet, one is given access to varying, astonishing and sometimes confusing information. Since it is said and has been in fact proven that knowledge is power, the desire for more information has made the promise of the internet more and more attractive. But, as pointed out earlier, the internet is sometimes a confusing place. This is not only due to the sheer volume of the information made available to the net surfer, but also due to the fact that those who make such information available are not always being merely generous – some of them, one way or another, intend to benefit from their activities.

Often, the manner by which unscrupulous posters intend to benefit equate to some form of injury to those who have accessed their information. Sometimes, it is through the collection of information regarding an unwitting net surfer for the purpose of sending him targeted, specific ads tailored to the perceived preferences of such a person. The end goal is to make a sale of the product, which is by itself a legitimate aim. However, there is still an element of collecting information without the informed and express consent of an individual. Indeed, some entities operate only for the purpose of collecting as much information as possible regarding net surfers, such as credit and purchase histories, and ultimately purveying such information to companies touting products. One can only imagine the danger such information-stealing activities create.

Another danger is not the stealing of information, but the destruction of it. This often occurs with viruses propagated through the internet, such as the infamous “Melissa” and “I Love You” strains. The lost information caused by such viruses easily translate to considerable actual damages specially for those companies whose records were attacked. Not only that, since these and other harmful programs such as Trojans, worms and spammers often create massive amount of e-mails, communication through the internet become bogged down.

One might ask that given such dangers, is it still worth it to employ the internet and computers, said to be the pinnacle of technology, in handling and facilitating information and communication? The answer is yes. As perceived by Isaac Asimov, computers can only go wrong if the humans were wrong in the first place. It is here where policy becomes so important. By aiming for, designing and adopting a suitable policy with regards to information, communication and technology, the promised benefits can be maximized whereas any and all costs are minimized.

team fuzzylogical

Hi,

the owners of this blog are as follows;

1. Stanley Cabrera
2. Nestor Gadrinab
3. Bryan Tan

together, we are team fuzzylogical

we hope you'd like our blog ;)