Professional Documents
Culture Documents
Cyber Space
Cyber Space
1.
2.
3.
4.
TITLE OF CONTENTS
INTRODUCTION
DISCRIPTION..
MECHANISM OF CYBERSPACE
ADVANTAGES AND DISADVANTAGES OF CYBER SPACE....
3
4
5
6
SUBMITTED TO
MAM ZAIB KAWAL
CYBER
SPACE AND
ITS
ADVANTAGE
S
DISADVANTA
GES
SUBMITTED BY
TALHA AZIZ (39)
Introduction
The term cyberspace is "cybernetics", derived from the Ancient Greek "kybernetes". The "term" cyber has
been used to describe almost anything that has to do with networks and computers, especially in the security
field. Cyberspace is a new universe, a parallel universe created and sustained by the worlds computers and
communication lines. A metaphor for describing the non-physical terrain created by computer systems. A
world in which the global trafc of knowledge, secrets, measurements, indicators, entertainments, and alterhuman agency takes on form: sights, sounds, presences never seen on the surface of the earth blossoming in
a vast electronic night. The key characteristic of cyberspace is that it offers an environment that consists of
many participants with the ability to affect and influence each other. In the present world we can say that
each person is surrounded by cyberspace. Cyberspace represents the new medium of communication,
electronic communication, which is fast outmoding, or even replacing, more traditional methods of
communication. Cyberspace is a global artificial reality environment based on a global mesh of
interconnected computer networks allowing and making it possible for anyone using a point of entry device
like a computer, smartphone, or any other Internet enabled electronic device to reach anyone else, with the
potential to access the mesh, through a one-on-one, one-to-many, and many-to-one communication
capabilities or through broadcasting via the World Wide Web. Some programs, particularly computer games,
are designed to create a special cyberspace, one that resembles physical reality in some ways but defies it in
others. In its extreme form, called virtual reality. Cyberspace could thus be understood as a place capable of
controlling information, as a way that enables people to control certain devices through computers that give
them a feeling of some kind of feedback.
Origin of the Term Cyberspace and Definition
The term "cyberspace" first appeared in the visual arts in the late 1960, when Danish artist Susanne
Ussing (1940-1998) and her partner architect Carsten Hoff (b. 1934) constituted themselves as Atelier
Cyberspace. According to both of them cyberspace was simply about managing spaces. There was nothing
esoteric about it. Nothing digital, either. It was just a tool. The space was concrete, physical. The word
"cyberspace" is credited to William Gibson, who used it in his book, Neuromancer, written in 1984. Gibson
defines cyberspace as "a consensual hallucination experienced daily by billions of legitimate operators, in
every nation, by children being taught mathematical concepts. A graphical representation of data abstracted
from the banks of every computer in the human system, Unthinkable complexity, Lines of light ranged in the
non-space of the mind, clusters and constellations of data". He was describing the vision of a threedimensional space of pure information consisting of networks of computers linking people, machines, and
other objects as information sources and sinks. The term "Cyberspace" started to become an in fact
synonym for the Internet, and later the World Wide Web, during the 1990s, especially in academic
circles and activist communities.
We can define cyberspace as Cyberspace is a domain characterized by the use of electronics and the
electromagnetic spectrum to store, modify, and exchange data via networked systems and associated
physical infrastructures. In effect, cyberspace can be thought of as the interconnection of human beings
through computers and telecommunication, without regard to physical geography.
Cyberspace and telepresence. Anyone who is in the presence of cyberspace is also surrounded by
the state of telepresence. Telepresence is a sophisticated form of robotic remote control in which a human
operator has a sense of being on location so that the experience resembles virtual reality. The remotelycontrolled robot and the human operator can be located at a great distance from each other. Telepresence is
simply a feeling one gets of being present at a place other than their true location.
Description
Cyber is most useful as part of the compound word cyberspace and cyberspace is simply the man-made
domain created when we connect all of the computers, switches, routers, fibres optic cables, wireless
devices, satellites and other components that allow us to move large amounts of data at very fast speeds. As
with the physical domains land, maritime, air, space we conduct a variety of activities in cyberspace to
benefit individuals, commercial entities and governments. The key difference between cyberspace and the
physical domains is that cyberspace is man-made and constantly changing. That characteristic offers both
opportunities and risk.
Cyberspace should be classified as a dimension of the global commons. Viewing cyberspace as part
of the global commons sets the stage for a number of useful analogies that facilitate the development of
policy, domestic and international law, safe operating procedures, individual rights, commercial use, national
interests and myriad other issues that we have worked through for the maritime and air domains.
Establishing and enforcing accepted norms for operating on the high seas and in domestic and international
airspace is a process that never ends. Technology changes, political interests evolve and competition for
resources is continuous. Territorial rights in the South China Sea and debate on the use of remotely piloted
aircraft for personal, commercial and government use are examples of how governance of the legacy
global commons requires constant attention. Cyberspace requires an analogous governance mechanism to
define and protect individual, business and nation-states rights. Some of the challenges to creating an
accepted governance structure are the ubiquitous nature of cyberspace, the fact that access to cyberspace for
good or evil can be cheap and non-attributable and, as opposed to the static nature of water and air, the
cyberspace domain itself is in a perpetual state of change. We do not need to start from scratch with this
work. In the maritime and air domains we have defined roles and responsibilities for all of the users and at
times they intersect. The electronics, including all information and communications systems, are the
infrastructure in this domain. And there we agree the infrastructure of the Cyberspace domain is more
malleable and easier to change than infrastructure in the other physical domains. According to some scholars
Cyberspace is a geophysical operational warfighting domain whose unique physical characteristics are
defined by the use of the electromagnetic spectrum as its physical terrain. This make it Geophysical Domain
by defining its physical borders in the form of electromagnetic spectrum.
Mechanism of Cyberspace
Cyberspace as universally understood as the metaphor of computers, devices or networks which gives access
to a human being to enter into an environment that seek to be the virtual environment. We can say that most
complex form of internet has developed the cyberspace. The boundaries of cyberspace are extended where
electromagnetic waves of internet are present. This space is an environment just like a real environment but
difference is that it is integration of both concrete and abstract things. The cyber environment is similar to
the air and space environments, in that a vehicle has to traverse the medium. Naturally, the context is
different, but in all cases items such as location, speed, and path to traverse the medium, and surrounding
terrain have to be taken into account. Cyberspace is also said to be the communication over network on large
scale of billions of computers anywhere in the universe. We can also say that most complex form of internet
becomes cyberspace. Four later model can completely explain the mechanism of the cyberspace working.
A Four Layer Model
It is an attempt to capture the character of cyberspace using a model with four layers. From the top
down, the important layers are:
The people who participate in the cyber-experiencewho communicate, work with information,
make decisions and carry out plans, and who themselves transform the nature of cyberspace by
strategies to make a plan dysfunctional. We should be thankful to the hackers who made a way to the
development of so quality antivirus software that now we are safe in the terrain of cyberspace.
Unlimited Communication. The cyber has made it easy for people to communicate
with others because it is cheap and convenient. The only costs incurred are those paid
to the Internet service provider. If you want to talk to someone who is in another part
of the globe, you can just fire up Skype or any other communication app and hold a
video chat. Services such as Skype have helped people from geographically
segmented countries to interact and share ideas. As such, people are able to share
their thoughts and views on matters affecting the globe. The cyberspace acts as
common global platform where people explore ideologies and cultures without
limitation. In short cyberspace has make this world a cyber family.
Disadvantages
Benefits provided by cyberspace may be accounted but it has too many disadvantages which wash
out its benefits. Now its disadvantages will be accounted.
Hacking non beneficial. Hacking caused an international problem when the United States
government thought about using it as a weapon to derail Yugoslav war forces. No international solution can
be proposed because the nations of the world do not have the same ideas, laws and punishments governing
hacking. Hacking has the potential to disrupt the economy, create international tension and ruin the lives of
ordinary citizens worldwide. As soon as you enter in the cyberspace all of your data can be viewed and
accessed everywhere in the world. The fact that the Internet has become a market place has also seen a rise
in fraud cases. Credit card details are particularly vulnerable. This calls for extreme caution when transacting
online.
Virus, Trojan & Other Malware. These are malicious programs in cyberspace which are very
common. They attack a computer with the sole intent of causing harm. They can make the computer
malfunction or even this can be very costly especially if you lose important data. Worse yet is the fact that
you can easily fall victim to malicious software by clicking on a link on the Internet that appears genuine.
Internet viruses can be categorized to three types - those that harm your executable boot files and system,
those that affect a specific file by destroying it and those that keep changing things in your computer like
Word files. You can protect yourself by installing a reliable anti-virus program on your computer before
accessing the Internet.
Addiction and loneliness. People also get addicted to this virtual world. This may sound bizarre, but
some people spend more than their fair amount of time on the Internet. This affects their social interactions a
great deal. This addiction has been known to be a major cause of obesity and has, in some cases, led to some
diseases like carpal tunnel syndrome. But some people disagree with addiction, John M. Grohol, claims that
it is simply people trying to escape their problems in an online world and cannot be classified as an
addiction. Jennifer R. Ferris, believe that Internet addiction is a true psychological disorder with definable
symptoms. The symptoms are comparable to any addiction, withdrawal, loss of relationships or job and
significant time consumption.
Inappropriate age content. The fact that Internet has all information you could ever need is both a
good thing and a bad things. This is because it contains age-inappropriate content like pornography.
Unfortunately, such content can be accessed by children as young as ten. All guardians and parents can do
about it is lock out harmful sites to keep their children safe. Nevertheless, this is not a full proof strategy as
children can still access the Internet from other devices. Formation of proxies to access the blocked content
have snatched the innocence of children.
Cyber blackmailing. Cyber-blackmail is the act of threatening to share information about a person
to the public, their friends or family, unless a demand is met or money is paid. So before sharing or starting
friendship in cyber boundaries keep in mind you are always in a virtual world where no one knows what is
actually going on. So keep secret contact numbers, address, family photos, and important documents. It is a
virtual world that not leaves any evidence.
Cyber
bullying.
Cyberbullying is
the
act
of
harming
or
harassing
via information
technology networks in a repeated and deliberate manner. Cyber-bullying could be limited to posting
rumours or gossips about a person in the internet bringing about hatred in others minds; or it may go to the
extent of personally identifying victims and publishing materials severely defaming and humiliating them.
With the increased use of communication technology, cyberbullying has become increasingly common,
especially among teenagers.
References
Christensson, P. (2006). Cyberspace Definition. Retrieved from http://techterms.com
Clark, D. (2010). Characterizing Cyberspace. Retrieved from https://projects.csail.mit.edu
Fanton, J.F. (2008). Rights and Responsibilities. Retrieved from
Gippson, W. (1984). Neuromancer. New York: Berkley Publishing Group
http://sperriam-net393.wikidot.com/how-has-the-internet-changed-entertainment
Levy, S. (1999). Cyber Culture. Retrieved from http://www.redem.org
Rouse, M. (2008). Retrieved from http://searchsoa.techtarget.com