Internet Censorship: Blocking and Filtering Essay

Exclusively available on Available only on IvyPanda®
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

Introduction

After the development of the internet, it became quite easy for people to access information through technology. As more users started using computers and the internet, the platform became a viable avenue for people to do business, express their opinion, and upload data for public access. This development has led to the development of some websites containing undesirable content; thus, the necessity for internet censorship.

Internet censorship entails the development of firewalls that hinder access to websites with undesirable content. Internet censorship may also entail prohibiting people from uploading selected information to the internet. Internet censorship is a common phenomenon in the current world, and it is inspired by governments, organizations, and community efforts to ensure that people do not have access to sensitive or explicit information.

Internet censorship may also be applied by individuals for self-regulation to evade some issues inspired by religion and culture. Many governments across the world have implemented internet censorship over the past decade to eliminate the access of specific web content by citizens.

While some people show their support for internet censorship, others have condemned it, claiming the denial of their rights to access the targeted information. There are different types of internet censorship, and they are categorized according to the technicality of the process. This paper looks into internet censorship with a close focus on technical censorship, which comprises of blocking and filtering.

Blocking

Internet blocking is one of the technical measures used by the government, organizations, and computer owners to restrict access to specific information. Restricted information is normally against the laws and values of society.

Internet blocking operated based on denying access to certain websites for specific internet protocols (IP). Websites of specific shared hosting servers are blocked by the government and organizations, and the citizens have no access to the websites hosted by the blocked servers (Bee Think IP Blocker: Block Unwanted IP addresses based on IP blocklist, 2014).

The blocking process entails the use of software that identifies the IP address of the clients trying to view the prohibited websites, and it blocks their access. Internet blocking may also be used to hinder some internet users from uploading data and information to specific websites. This process also uses IP addresses to identify users, and it only allows specific IP addresses to upload data and information. This approach is used by most companies on their websites to enhance security (Frew & Sessano, 2009).

Internet censorship through blocking is subject to over-blocking and under-blocking. Over-blocking occurs when the government or organizations block more websites than intended in their quest to limit access to some websites. Most internet blocking software does not have the option of selecting specific domain names for websites. They just block every domain name from the hosting server, and this may result in blocking some harmless sites.

It is also possible for some blocking software to block websites with explicit content (How to, 2014). This selective blocking leads to easy access to unwanted information, which should be blocked. Some countries have embraced over-blocking the internet as a measure to ensure the people have no access to obscene content.

Internet censorship through blocking is used in the United States to ensure children do not have access to websites with obscene content. This internet censorship is a provision of the Children’s Internet Protection Act (Children’s Internet Protection Act, 2014). The Act compels the authorities to ensure that internet surfing for children is limited to access to educational content exclusively. It is the obligation of the government to protect the innocence of the children through internet censorship.

Filtering

Filtering is also a technical method of internet censorship. The most common method of filtering is the uniform resource locator (URL) filtering process. The process entails scanning the URLs for specific words and blocking the ones containing specific words. This method is not secure for internet censorship because internet users can easily bypass it through a virtual private network (VPN) (Tyson & Crawford, 2014).

Packet filtering is also a common method of internet censorship, and it entails blocking TCP packets containing a given number of restricted words (PF, 2014). This approach is a realistic and practical internet censorship method because it avoids the restriction of harmless websites.

Filtering is a softer approach to internet blocking. Internet censorship through filtering is the best method of ensuring the public enjoys the freedom of access to information while restricting the nature of the content people can access. The internet is currently filled with explicit content, and it is the obligation of the government to protect people from it (Cho & Feldman, 2001).

Issues with blocking and filtering

While many people believe that blocking and filtering websites containing explicit and obscene content is appropriate, critics believe that internet censorship is inappropriate (Qazi, 2014). Critics of internet censorship claim that the process of blocking or filtering websites through hosting servers leads to the blockage and filtering of some helpful websites (Deibert, 2008). It is also apparent that the government may use internet censorship to gag certain news websites as the case is in China.

Internet censorship is a sensitive area that needs to be addressed through laws that do not offend the fundamental right of liberty and access to information (Wagner, 2010). In some nations, the government uses internet blocking and filtering as a method to hide information from the people.

Internet censorship can be used as a weapon to keep the truth hidden from people in a society. China actively censors the internet for civilians to block their access to different websites. Accessing selected websites is illegal in the country, and some people are even compelled to conduct self-censorship.

Conclusion

Internet censorship is implemented by the government, organizations, and respective internet users on their personal computers. The process of internet censorship can be conducted through a technical approach based on blocking and filtering. Internet blocking is an effective way of ensuring everyone in a selected society does not have access to websites with undesirable content. Filtering is a technical method of internet censorship, which is based on TCP packets.

The software used for filtering evaluates the contents of the URLs and decides whether to block the website or to provide access. There are many issues associated with internet censorship, mainly because it can be used to hide relevant information from people. For instance, the situation in China reveals that the government is concerned about the amount of political information available for the people. In such a case, the government uses internet censorship as a weapon to block the society from accessing helpful information.

References

Bee Think IP Blocker: Block Unwanted IP addresses based on IP blocklist. (2014). Web.

. (2014). Web.

Cho, C., & Feldman, A. (2001). Internet Filters. Massachusets: Marjorie Heins.

Deibert, R. (2008). Access Denied: The Practice and Policy of Global Internet Filtering. Massachussets: MIT Press.

Frew, R. M., & Sessano, N. A. (2009). Survival-Enhanced 6th Edition: A Sequential Program for College Writing. Michigan: T.H Peek Publisher.

How to: Restrict Site Access by IP Address or Domain Name. (2014). Web.

. (2014). Web.

Qazi, U. (2014). The Internet Censorship Controversy. Web.

Tyson, J., & Crawford, S. (2014). . Web.

Wagner, M. (2010). . Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2020, March 26). Internet Censorship: Blocking and Filtering. https://ivypanda.com/essays/computer-science-internet-censorship/

Work Cited

"Internet Censorship: Blocking and Filtering." IvyPanda, 26 Mar. 2020, ivypanda.com/essays/computer-science-internet-censorship/.

References

IvyPanda. (2020) 'Internet Censorship: Blocking and Filtering'. 26 March.

References

IvyPanda. 2020. "Internet Censorship: Blocking and Filtering." March 26, 2020. https://ivypanda.com/essays/computer-science-internet-censorship/.

1. IvyPanda. "Internet Censorship: Blocking and Filtering." March 26, 2020. https://ivypanda.com/essays/computer-science-internet-censorship/.


Bibliography


IvyPanda. "Internet Censorship: Blocking and Filtering." March 26, 2020. https://ivypanda.com/essays/computer-science-internet-censorship/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1