Policy Formulation In A World Term Paper

PAGES
12
WORDS
5010
Cite

This balkanization is partially driven by the lack of integration between various segments of itself, and this is primarily a technological limitation. Yet the far broader and more difficult challenge in this regard is the segregating of knowledge not just for profit, but for lasting competitive advantage between nations. On the one hand there is the need for competitive differentiation in company's offerings, yet in others including the sharing of primary research in medicine and biomedical fields and stem cell research there is the ethical responsibility to share these insights gained to foster solutions to the world's most pressing medical problems. M. Van Alstyne and E. Brynjolfsson, researchers on the growth patterns and threat of Internet balkanization from MIT, remark in their conference paper from a 1996 conference that the balkanization of science is a significant threat. The two MIT researchers cite the studies they have completed showing how despite the lowering costs of technology, many scientific professionals choose to focus only on sharing their results locally, and resist publishing the data to other professionals in other companies and cultures due to fear of duplication and also fear their financial bonuses for discovery will be negated and taken away. Corporations funding scientific research need to be held to a specific level of accountability to share the results if they are going to benefit mankind and in turn strengthen the collective assumption base that could lead to medical cures. This balkanization of the Internet when it comes to scientific discoveries could be holding back cures for some of the worlds' most troubling diseases and medical problems. While the balkanization of the Internet is unnecessarily slowing down the adoption of scientific discoveries that could lead to the eradication of the world's most dreaded diseases, there are also the societal implications of an increasingly segregated and balkanized Internet. These societal implications are shown in online ethnocentric behavior that actually robs many of the world's developing nations with the potential of finding a voice in the world's democratic voice. This societal balkanization of the Internet is exemplified for example in the access costs for the typical family in Zimbabwe to gain access to the Internet. It is on average $500 for six months of access, and that must be purchased through neighboring country South Africa. The fact that many Internet Access Providers will not route broadband service into entire nations in Africa shows the growing digital divide occurring globally. This is clearly robbing millions of individuals with a chance to have their voice heard, gain education through online universities, and in general become members of the global community. The economics of gaining access to the Internet continues to be a major contributing factor to its balkanization as well.

The balkanization of the Internet has already made the vision of intellectual sharing, democracy and communitarianism unattainable unfortunately. As can be seen from the lack of research sharing and focus on collectively finding cures to the world's medical challenges, massive digital divide internationally, and the focus on many societal factors including segregation and ethnocentric practices of nations, the utopian vision of the Internet revolutionizing global society will not be achieved as quickly and transparently as had once been hoped.

Despite this lack of development, there is the fact that more people than ever are getting their educations online through distance learning. In defining distance learning its' best to look at what industry experts have to share in terms of insight. Sloan Consortium (2005) in its landmark report, Growing By Degrees: Online Education in the United States, 2005 explored the definition of distance learning from the standpoint of participation. Of their many key findings, a critical one is that distance learning today is reaching parity in terms of participation with in-person programs, which is turn making this alternative to gaining an education more accessible to other nations that may have fallen between countries caught in the balkanization of the Internet.

Quantification of trust

While the balkanization of the Internet at times showing signs of being unified through the many efforts of both organizations and nations looking to provide access and educational opportunities to everyone, the rise in scepticism of peoples' motives on the Internet continues to bring greater and greater levels of authentication or validation of proving someone is who they say they are. This validation or quantification of trust has actually hastened the balkanization of the Internet as well. The rise in the corporate use of the Internet as a selling medium...

...

There has been a parallel in the combating of terrorism as well and the two combined market dynamics of validating a person's identity both for selling to them and ensuring they are not a national threat has created a more balkanized and virtually re-defined the role of this medium as more of a transaction hub for global businesses and less of an instrument for social change. The evolving role of the Internet in China and the recent crackdown on Google's and Yahoo's records by the Chinese government show that even the world's most powerful corporations from a market capitalization perspective are still held hostage to governments' aims and intents with the Internet, and in the case of China their focus on restricting the freedoms inherent in this powerful medium, chilling to realize. China clearly is showing what the balkanization of the Internet looks like on a daily basis.
Orwellian Monitoring Strategies in the 21st Century

George Orwell, author of Nineteen Eighty-Four (1949) a political novel set in that year defines a totalitarian state that is dominated by excessive monitoring and control of its citizens, has been often referred to in the last three years of Internet monitoring, both by employers, governments, and by marketers who unethically look at search histories and cookies or small files that define where a person using the Internet has accessed files and used information. Taken together, these invasions of privacy are in many cases violating the civil rights of online citizens worldwide in the name of defense. Yet the workplace and government monitoring is troublesome in that revelations of how the data is being used and mined come out periodically through either press leaks from inside governments or the data is inadvertently lost or worse, stolen. This monitoring issue speaks to the fundamental role of government and corporations who capture this data; they must become the trusted advisors, the servants if you will, to the people they sell and serve. To violate this trust repeatedly is to test the ethics of any nation. To play with peoples' trust is to play with the future of any administration or corporation; the future of any institution is marked by the trust it earns and keeps with those it serves.

Government and Workplace Monitoring

Many researchers are tackling the issues of workplace and government monitoring head-on, and finding some fascinating results. Foremost of these researchers is the Pew Internet & American Life Project, headquartered in Washington, D.C. Their insights into Internet social trends specifically around privacy and its recent invasions by government, completed the report, The Future of the Internet (2005) which polled the world's experts, totalling 1,286 individuals who are considered experts in this field globally on Internet privacy trends, and their results are startling. Their findings include the following key points:

59% of the Internet privacy experts predict that more government and corporate surveillance in homes, automobiles, mass transit, and in offices as hand-held electronic devices proliferate.

The majority feel that the ability of governments to parse through Internet traffic including e-mails, chat rooms, and websites to find terrorists will be accentuated through the use of sophisticated technologies. The tagging of paedophiles is also seen as a major benefit of this increased surveillance.

The strengths of these surveillance strategies on the part of governments and corporations will correspondingly have a negative effect on society as anyone "different" enough to be found through these search and eavesdropping technologies could potentially be tagged as a threat. The result could be imprisoning innocent citizens who have not violated any crime and are not terrorists.

The fact that surveillance of terrorists is a critical government function to alleviate the loss of innocent life, there are many civil rights associated with these activities, and the need for retaining the rights of individuals is critical. Protecting citizens and preserving their privacy is a delicate balancing act from the U.S. And Great Britain especially today.

Corporations' monitoring their employees are sending the signal that the personal use of telephones, cell phones, PDAs, and e-mails is fair game to be monitored and reviewed. The fact that Google has even dismissed employees for blogging is a case in point; even the most progressive of corporations are faced with the task of monitoring and evaluating their employees' use of electronic tools. Industry experts say that if employees sense they are being monitored, they typically are. According…

Sources Used in Documents:

References

ESRI (2006). Environmental Systems Research Institute. Retrieved from the Internet on July 14, 2006. (www.esri.com)

Gates Technology Foundation (2005). Interviews and on-site visits with GIS planners and network technicians while donating servers, laptops, and desktop computers for a major PC manufacturer. Onsite interviews in Seattle, Washington. April, 2005.

HHS (2006). Federal Register Data on Poverty Line Statistics by size of household. January 24, 2006. See table 1 of this document.

Pew Center for Internet Research (2006). Key statistics downloaded from the Internet on February 14, 2006. http://people-press.org/
World Bank (2005). Global statistics on poverty. Retrieved from the Internet July 25, 2006 http://www.worldbank.org


Cite this Document:

"Policy Formulation In A World" (2006, July 25) Retrieved April 18, 2024, from
https://www.paperdue.com/essay/policy-formulation-in-a-world-71121

"Policy Formulation In A World" 25 July 2006. Web.18 April. 2024. <
https://www.paperdue.com/essay/policy-formulation-in-a-world-71121>

"Policy Formulation In A World", 25 July 2006, Accessed.18 April. 2024,
https://www.paperdue.com/essay/policy-formulation-in-a-world-71121

Related Documents

Retrieved September 28, 2009, doi:10.1080/014428700114008 McClain, P. (1990, Winter 1990). Agenda Setting, Public Policy and Minority Group Influences: An Introduction. Policy Studies Review, 9(2), 263-272. Retrieved September 28, 2009, from Academic Source Complete database. Nakamura, R. (1987, August). The Textbook Policy Process and Implementation Research. Policy Studies Review, 7(1), 142-154. Retrieved September 28, 2009, from Academic Source Complete database. Weimer, D. (2008, November). Theories of and in the Policy Process. Policy Studies

Policy Studies The study of public policy gained significant importance in the late fifties and sixties. However, policy science did not come into existence all of a sudden. It started to emerge when social scientists started researches on a wide range of sociopolitical problems. After the World War II, significant developments were made in the areas of operations research, economics and social psychology. These developments proved to be helpful in formulating

Policy Analysis Critique Rationale for the chosen policy Avian influenza is a virus causing lethal infection in human beings (Sims et al., 2003). It can be transmitted from patients to other human beings. It is a deadly virus with track record of 6 deaths in Hong Kong in 1997. That incident was just the start of this health issue. The virus spread enormously and caused H5N1 infection numerous times in Hong Kong.

Furthermore it was a challenge for the government to provide computers and other equipments at large level (Thaichayapong, 1997) Similarly Russell Pipe who was the Deputy Director of Global Informaiton Infrastructure Commission also criticized the policy saying that there were many risks involved in spreading IT facility and also that the expectations are high. He also stated that IT policy 2000 aims to provide TI facilities all through the country

World Religion in Homeland Security The relation between national security and religion has existed for quite some time now with a clear manifestation on how religious persecution and national security threats correlate. According to Inboden (2012), predicting what security threats the United States would face from the beginning of the 21st century would require consideration of a congressional testimony from a State Department official who could barely be understood. When we

World War I Tactics and Weaponry In many ways, the "War to End All Wars" was fought with a wide range of increasingly modernized weaponry that was matched with obsolete tactics that resulted in millions of deaths and casualties on both sides of the conflict. Indeed, during the period between 1914 and 1918, the full brunt of early 20th century technology was brought to bear on the battlefields of Europe and