The is so rich that no one
The advent of the Internet has been one of the most exciting major events in the second half of the 20th century. The ancient dream of “a scholar knows all things happening in the world without venturing outdoors” has finally become a reality. Since 1993, the Internet started to take off.
At present, the Internet has spread to more than 180 countries and regions, connecting more than 600,000 domestic networks of various types, hooking up more than 20 million computers available to 120 million users (2% of the entire global population).Within the Internet are the information treasures shared by all human civilizations. The reason why the Internet seems all-powerful is because it has two characteristics no other mechanisms possess: first, the Internet contains the biggest resource of information in the entire world; second, it enables people to obtain an interactive mechanism to instantly communicate with each other. Once connected with the Internet, everyone can enjoy the unparalleled richness of global information resources including textual, audio, graphic information.The information on the Internet is so rich that no one can tell what is really out there. Furthermore, the Internet information resources are constantly expanding at a great speed—one can only make a rough estimate. The types of information on the Internet are also wide-ranging, from scientific research, education, public policy, legal regulations to commerce, arts, entertainment etc.
to include everything. For all those connected with the Internet, they can quickly put onto the Internet all they want announced or all they think others should know about.The Internet not only has an inexhaustible amount of information as vast as the ocean, but also has its interactive mechanisms—net to net, net to people, and people to people communications—that makes the Internet seem able to take on any task: entertainment, interpersonal exchanges, education, health and medicine, information gathering, securities and investment, trade and settlement of commercial goods, even online voting, etc. All these seemed ever so remote and unrealistic only yesterday. The xchange and sharing of information among all peoples has ushered in an omnipotent status in Internet applications. As long as people develop certain desires, the information to satisfy such desires will quickly and continuously appear on the Internet. And such information will gradually satisfy people’s desires for their material as well as spiritual demands.
With the knowledge economy gradually ascending to a dominant status and the gradual formation of an information society, to characterize the Internet as “omnipotent” may not be overstating.However, due to its innate transnational, decentralized, open and unregulated nature, the Internet as a free, open and anarchic device has brought various countries great risks as well as opportunities. While it provides enormous convenience and stimulates the economy to further develop, the Internet has also brought us negative impact that cannot be ignored. The Negative Impact of the Internet Cultural Invasion a. The Internet advocates western life-styles. These websites display various aspects of western society and life, and the overwhelming majority of them have positive portrayals of the western life-style.
It makes people believe that the West seems to be countries of absolute freedom and paradise for individual achievement where private life is without obstacles and external inferences. Partial information such as this is particularly appealing to our youths whose life philosophy and worldview have yet to mature. Many of these youths aspire with great diligence to go abroad just to “change a way of living. ” b. The Internet helps dominant cultures impact and homogenize cultures in an inferior position.
Because the Internet overwhelmingly is a culture of the English language, it further strengthens throughout the globe the culture based upon the English language. In comparison, cultures based upon the local languages have been weakened. Because of the introduction of the Internet, some under-developed countries have made themselves vulnerable to foreign dominant cultures, busy defending themselves. This situation has become so bad that scholars in some developing countries are concerned about their indigenous cultures being homogenized and have provided proposals to counter “cultural invasion” on different fronts. . The Internet corrupts people’s minds, influences and changes people’s moral perspectives and ethical values. Driven by the profits in the numbers of hundreds of millions of dollars, the pornography merchants in Western countries have opened pornographic websites, massively producing various kinds of sex information.
Nude males and females are everywhere, performances by “computer prostitutes” have also openly entered the Internet. This development has led the Commerce Committee of the U. S. Senate to propose the “1995 Communications Act for Good Behavior” to prohibit sex crimes committed on the Internet.Solutions Leading to the Reduction of the Internet’s Negative Impact Solution 1: Strengthen our educational programs on patriotism, socialism and communism; keep up our mental firmness on ideological correctness. Because one can get in contact with all sorts of information through the Internet, some positive, some negative, we must avoid arbitrariness in our efforts of political education.
We must start with placing ourselves in the position of a student, gradually and patiently provide guidance to them.We the educators must establish a dialogue with the educated to discuss and explore the level of truthfulness of the information from the Internet, telling them the truth from the fakery, and point out to them the negative and positive impact of certain information. To do this, the educators are required to possess solid grounding in theories, in our Party’s policies on current events, and the latest conditions in the Internet and our personnel’s thought development. To accomplish such an educational task, we must rely upon constant work on people’s thoughts at the basic work unit level.As long as these people are solid in their political convictions, there won’t be major problems resulting from the Internet, and the young cadres won’t be seduced by promises and invitations to visit abroad, to study abroad and other activities, thus making it impossible for them to surrender to the enemy forces.
Solution 2: Strengthen moral construction, resist the penetration and influence of corrupt thoughts and culture, and keep the purity of our thoughts and morality. There are two “many’s” on the Internet.The first is there are many mythologies about individualistic endeavors leading to personal successes. The second is there is much pornographic information.
We must pay attention to these mythologies that exaggerate individualistic will to succeed, thus separating individuals from reality, from the collective groups. We should strengthen our ability to identify and resist the seductions through intensified education on moral values and collectivism. Solution 3: Educate our personnel and enhance our personnel management, enact strict rules and regulations on the Internet to prohibit leaking and selling secrets.We should regularly conduct the appropriate amount of education on keeping secrets through the measures that have been proven effective in the past.
We should make various regulations to keep secrets on the Internet, requiring all personnel to strictly implement the necessary working and operating procedures so that we can to a large degree prevent loss of secrets through negligence. We can also discover problems by checking the websites the target individual under investigation has visited and the email messages the individual has sent and received, so that we can prevent the “I may get lucky and no one will ever know” psychology.Solution 4: We should launch counter-invasion and counter-propaganda campaigns online against the views and actions in violation of our sovereignty and interfering in our internal affairs. Although the Internet is not like physical media with black characters clearly written down on a blank sheet, it has a much larger radioactive range with unimaginable influence. Any views and actions harmful to our country are not acceptable to us.
Besides taking diplomatic approaches, we can also adopt various Internet technologies to wipe out the pernicious influences, or use counter measures to force it to rectify.As far as those views and actions expressed or taken in the guise of caring for our country’s human rights and thus violating our country’s internal affairs, we can counter attack online with rationality, tactics and evidence. By so doing, we can add an invisible battlefront online in the defense of our sovereignty.
Solution 5: Actively study how to counter-attack online intrusion for military purposes, and be prepared for future information warfare. Because Internet development in our country came relatively late, we are in a relatively backward situation.Yet precisely because we started late, we have an advantage in selecting the newer technologies, better deployment plans, and equipment with superior specifications and functions. Because we obtain our network software and hardware equipment, especially the network security products that are out of our own security control, mostly through import, we run great risks. Among the equipment we import, there may be pre-inserted viruses, hidden information channels, even recoverable keys to transmit passwords. These risks will bring great harm to us and make us controlled by others.
Therefore, we must first solve the problem of obtaining control and sovereignty over the security mechanisms of Internet-related equipment so that we can establish our independent network security product system as soon as possible. To get ready for the challenge of future information warfare, we may consider formulating a cross-the-board information defense strategy and building an elite, efficient corps of information warfare analysts in the course of constructing our country’s national information infrastructure.Solution 6: Scientifically make laws, complete the legal system; strengthen law enforcement, and strike hard against Internet crimes. At present, our country has the following laws that are concerned with computer and the Internet: “Regulations of the People’s Republic of China to Safeguard Computer Information Systems, “ Provisional Rules of the People’s Republic of China on Managing The Computer Information Networks and the Internet,” “Regulations of China to Manage Public Multi-media Communications,” “Rules of Managing the Internet Security,” and the newly enacted clauses in the Criminal Codes with regard to punishing computer crimes.But, with the rapid development of the computer networks, many new situations and problems are confronting us. The fragmented nature of our laws and regulations are thus thoroughly exposed as a result.
Especially for our military, we lack a complete set of measures and regulations that are compatible with the military network’s development and applications. Therefore, we must keep these new situations in mind and quickly amend, revise the related laws and regulations so that we can gradually establish a complete system of law in this area.The Internet system is a fragile one, in order to guarantee its healthy development and the wide application of the electronic commerce, we must strengthen the power with which to deal with the Internet crimes, to enhance the protection of the networks. In addition, it is also imperative for us to stop the spread of Internet viruses, participate in international cooperation to identify and weed out the sources of viruses, and to punish the virus originators.Solution 7: Further develop our country’s information industry, expand the influence of our country on the Internet, and increase the percentage of information resources from our country on the Internet.
We should greatly generate information in Chinese to utilize the superior quality of our nation’s culture, to resist the negative impact upon us caused by the unhealthy elements in the imposing foreign cultures.To prevent bad information from entering and polluting our country, the State Council’s Office of Information and the specific agencies in charge of our national security have all adopted various measures from the perspectives of management, education, legislation and technical operations, and the concerned agencies are also using certain methods and facilities to monitor obviously harmful websites. Yet, there are simply way too many websites out there, with some of them hiding their web names, highly unpredictable and hard to catch.Therefore, to fundamentally change the current situation of our culture being the object of foreign impact, of our nation’s culture being placed in the danger of being homogenized by foreign cultures, we must greatly propagate the main stream of our nation’s culture to make it an important step to develop our socialist spiritual civilization through massive Chinese information influx into the Internet. Solution 8: For specific purposes, we should develop various information search software to reduce the waste of resources and time caused by the increasingly saturated information.
The information on the Internet is infinite. Up to the end of last year, there had been more than one million information sources that were providing services. The information on the Internet is increasing exponentially. Nobody and no organization can browse and read all the information on the Internet. Therefore, how to “find information by specific need” has become a major task.
The current search software and websites categorize information only in a very simple way.Right now, the concerned agencies of many countries are using various technical approaches to study and develop “smart search software. ” If our country can first make highly intelligent search software, we can not only quickly, accurately find the information the users seek, but also avoid the harassment caused by Internet junk. If necessary, we can even to a certain extent prevent users from contacting harmful information.
Solution 9: We should take various technical actions to reduce loss and leak of secrets, and quarantine harmful websites.First, we must protect the areas where sensitive data resides. We must place in safe locations the network servers and databases that contain secret contents, and use various kinds of conventional classified information protection methods to make sure that unrelated personnel couldn’t reach them. Secondly, we must place in safe areas the information delivery facilities. Currently, fiber optic material is recognized by all as the ideal information delivery material, because it can prevent most of the known methods of eavesdropping.Thirdly, we must protect the information in circulation, either by adding security levels to the software or by adopting methods of our own design to compress the data. Fourthly, we must prevent our internal networks from intrusion.
One method is to set up many “firewalls;” another method is to use jamming devices to disguise electronic radiation; the third method is to make sure, when the computer is dealing with a leak, to physically separate the computer from the Internet connection, and to reconnect the computer with the Internet only when it is absolutely sure that the leaked information has been effectively deleted.We can use various kinds of preventive methods to strictly restrict the spread of classified information online, stop the silent entrance of espionage information, and effectively quarantine the pornographic websites and other obviously harmful websites. In conclusion, it’s impossible not to open up the computer networks and there is only one way to be totally risk free—closing the networks.
Once the Internet is open, the benefit of people using it to the Internet resources will be accompanied by its negative impact. Therefore, at a time when the Internet applications have penetrated to all the aspects of our nation, to our military forces, we must control and to our best ability destroy its negative impact, making sure that while we can fully enjoy the power of the Internet in our nation and our military, we can also destroy the problem at its root, before it even begins to germinate.