A. On the discussion forum, please describe the reasons for having a totally anonymous means of accessing the internet. Please also discuss the dangers of that same internet. Minimum 250 words.
B. Respond to two classmates’ postings. Minimum 100 words per posting
Response#1(Saketh)
In the business world, there are some activities which are carried out and are seen as being legal even though they are unethical. In such instances, the law is said to have failed to control such activities and also to come up with measures of regulating ethics as it is also an important aspect in society. Plagiarism forms part of unethical practices. It primarily refers to someone stealing someone else’s intellectual right to his or her work and referring it to as being his or her original work. This is ethically not right. Any person who is involved in plagiarism is said to have copied someone else’s original work (Lose, 2011).
Alex Haley, a writer and also a winner of Pulitzer Prize, is well-known for his award-winning book- Roots. After writing his book, it was later on turned into several miniseries which were very famous. It later dawned into the world that Alex Haley had taken some parts of Harold Courlander’s book The African and used them in writing Roots. In 1978 Haley was sued, and he admitted that he stole the information (Saussure, 2018).
Plagiarism is the main cause of the absence of intellectual growth to those who take part in plagiarism. Persons who steal other people’s intellectual rights end up cheating themselves and also lose their ability to having faith with their judgement. This is because plagiarism leads to the deprivation of one’s chances of having his or her intellectual growth. Plagiarism also leads to individuals failing to utilize their capabilities. Once one decides to copy someone else’s work instead of being creative and coming up with their work, such individual limits his or her capabilities and consequently not bringing any change in the society.
On the other hand, if one avoids plagiarizing on another person’s work, he or she can be fast in carrying out his work. Such an individual is also able to carry out his work easily and without much effort, unlike an individual who only depends wholly on other people’s work. By avoiding plagiarizing other people’s work, one portrays his or her skills and ability in doing so.
References
De Saussure, A. (2018). Jarrod Hayes. Queer Roots for the Diaspora: Ghosts in the Family Tree. Ann Arbor: U of Michigan P, 2016. Studies in 20th & 21st Century Literature, 42(2), 29.
Lose, G. (2011). Plagiarism.
Response#2(Pavan)
The idea of secrecy has turned out to be pertinent from the previous two decades where web clients have turned out to be increasingly mindful of web following and the dishonest robbery of one’s character. Remaining unknown over the web gives a conviction that all is good and protection for some. This aides in ensuring that individual subtleties are not effectively available to culprits who take login accreditations for their and individual advantages. Information honesty and security are fundamental for any client who utilizes the web. The utilization of safe sites and the use of staggered validation help clients in covering their personality.
Another real motivation behind why many stay mysterious online is to get away from the ceaseless stream of web based promoting. Online commercials have turned into a torment to many. Outsider associations buy the online exercises from organizations that source such information of a huge number of clients to furnish them with applicable items and administrations. This can be seen in numerous sites that we use today where commercials of items and administrations that we looked for are being publicized. Remaining mysterious aides in destroying this issue and makes we feel more secure without perusing and the associations we have over the web.
Genuine obscurity over the web is a legend. The web, at its establishment, is made with an idea of confided in PCs in a system. Cracking anybody’s personality is henceforth relative to the measure of time and assets one is happy to allot to split into somebody’s movement. From a regular viewpoint, the possibility of basic burglary of accreditations can to be quit utilizing virtual products of encryption with the assumption that the low-level advanced cheats probably won’t have the information and assets available to them to split one’s character.
Reference:
Brett, G. (1992). Accessing Information on the Internet. Internet Research, 2(1), 10-12. doi: 10.1108/eb047248