On College Students' Integrity and Network Development
Zhang Shijie
As the orthodox in the feudal ideology in my country, Confucianism has experienced more than 2,000 feudal society. Confucian thinking has been deeply rooted in our brains in China. The vast majority of Confucianism also became a modern social moral value standard. Although there are also some unreasonable or unaffirmation of the idea of current development in Confucianism, the overall affirmation of Confucian thinking is still unlocked. Such as integrity, credit thinking is to have great positive significance for today's social development. Under the social conditions of honesty, integrity is not only a virtue, but also a wealth and resources. At the same time, the construction of integrity and credit is also a spiritual guarantee for social progress and social stability. Integrity, by Confucius, was neglected by Mencius, and then it was repaired by Dong Zhongshu into the Confucian German. Confucius is very paying attention to, and always takes the viewing angle of the world. There are four education: "Wen, Lang, Zhong, Letter". ("The Analects of Confucius") and Mencius took out the benevolence, righteousness, courtesy, Zhi Dude, and rooted in the hearts, but ignored the letter proposed by Confucius. Under Dong Zhongshu's inheritance, Dong Zhongshu puts it back to Confucius, constitutes "benevolence, righteousness, ritual, wise, letter" five often. Thus, "Letter" began to root root in human heart. Letter, as a spiritual link to address interpersonal relationships, is a very important factor in the harmony of interpersonal relationship. Letter, after the Han Dynasty is listed in five, it becomes the most basic moral specification. The letter from the person, this refers, the promise of the person, the promise, vows, so often with the loyalty, honesty language is faithful, integrity. As a moral category, its core connotation is true, that is, loyalty to some kind of belief, principles and languages. Letter and non-faith have become the basic issue of interpersonal exchanges and their harmony.
What kind of role will be played with an emerging network? Then let's take a look at the network. my country's computer network is built in the 1970s, officially accessible to the Internet in 1994. Since the establishment of the Internet Info, China has been in 1995, after several years of development, computer networks have already entered thousands of households, widely used in various fields such as production, service, and life. According to the statistics of China Internet Information Center (CNNIC). The number of online Internet users, the increase in the number of users in the Internet is ranked in the forefront of the world. The network is borrowed by the microcomputer, relying on certain communication technology support, thereby communicating communication and information interaction with text and language. As a traditional communication method such as emerging things, there is a huge advantage over traditional communication methods such as telephone, telegraph, and information exchange, and the most prominent point is in low communication costs, large information, information and communication. The network is used as an interactive communication platform that is convenient and cost is low. The network relative to the phone, the long distance on the network is particularly international long distance, and the communication fee of ordinary phones is quite high, and the cost of communication is quite low. At the same time, network communications is also extremely convenient, as long as there is a microcomputer, after accessing the Internet, you can communicate with the communication. For the network, not only the cost of the letter communications is low, but also in time, this is the biggest advantage of network communication. Network, as an information platform, its amount of information is huge. In relatively traditional information platform, traditional information platform is mainly limited to books, board newspapers, broadcasts, etc., and information is limited. And the network, the amount of information is based on the user's needs, it can be exaggerated, as long as you need any information, you can find it elsewhere, you can find it on the network. In addition, the information of the network is disclosed, which can be resource shared, so the amount of large information can avoid repeated publications, which also enables a certain extent to increase the amount of information of the network. Network, as an information platform, the resources such as information are shared. This makes the network more popular users with information resources. For them, the information resources are a wealth, which can get such a large amount of resources for free or in a small amount of funds, which is very convenient and very practical. At the same time, the sharing of networks makes resources more optimized and more reasonable, which will promote the common advancement of society and the comprehensive improvement of society. Due to the low cost of the network, the amount of information and the sharing of information resources, the timely and convenient communication is timely, the network is popular in just a few years. But because the network is still emerging things, there is still a lot of problems. If the network legal system is not sound enough, the network cannot launch business network mode, and network communication still has unsafe, network spoofing and a certain range of network crimes, these are all short-time popularization of networks. The main problem between the network is mainly reflected in the following:
1. Network virtuality. The virtual network may be the network and other biggest differences. I used to use "You will not know that the other party is not a dog" to describe the Internet. On the Internet, you don't know the identity of the other party, you can only find the other party's IP address, but for a variety of reasons, the IP address cannot detect the specific identity of the other party. The virtuality of the network brings another world, but it also brought certain hazards, and the Internet's virtuality makes many criminals organically multiplied. According to China Police Report Website Information, in a short half year, the police sent to the station in the case of the station, the rape, robbery, fraud and other cases were more than 40. The virtuality of the network allows people to communicate only by text, pictures, etc., which also makes criminals to deceive the network virtuality, so further crime. According to the survey, the computer illegal criminal cases of the public security organs were only more than 400, and the 2000 drama increased by more than 2,700, and more than 4,500 in 2001 (more than 90% of the computer illegal crimes involved network). The virtuality of the network makes the business network unable to start. Since 1994, the network is accepted in each life and work field, and all businesses have used the new platform for commercial activities. In just a few years, various merchants have built online shopping websites. "Online shopping is also a" new fashion "that is optimistic by the merchants. But the result is not optimistic," online shopping "not only has no development, but instead Some illegal individuals and units use the virtuality of the network to establish fraudulent similar purchases. This further makes some online consumers to contradict the psychology. This leads to direct abortion of business networks, except for several very credible websites, There is also good security technology, such as 8848, etc., can continue to exist online, other basically into an introductory website and publicity website. 2. The low-telecommunications fee of the network, high equipment investment. Network needs customers to connect Telephone line or communication cable, fiber optic can only be used. The communication fee is lower than other communication methods, but the equipment is a big investment. This is also a new service site of "Internet cafe". Network access time communication equipment Invested. The equipment here includes the most important microcomputer (computer) and other Internet access auxiliary equipment (such as regulators, network cables, etc.). Such a price will be a relatively large investment for ordinary users. Secondly, the network communication The fee is also a burden. After receiving the network in 1994, it was basically dial-up, and the communication fee was 4.5-5.5 yuan per hour. Since 2000, the access to the broadband and optical fibers makes the Internet from the time flow meter. The fee turns to the month, but this still needs a major part of the communication fee. This makes the network impossible to enter each household.
3. Unreasonability of Internet cafes operating. Internet cafes, with the development of internet access and equipment for online venues and equipment. Internet cafes generally use broadband or fiber optic connections, fast speed, and resource sharing technology is used to achieve interconnection, so that all computers of Internet cafes are present as the same IP while reducing the cost of communication, thereby gaining profits. Internet cafes provide Internet venues for consumers who cannot configure computer and communication networks. However, the high profits of Internet cafes make Internet cafes illegally operate and unlicensed operations. Because Internet cafes only use a broadband or fiber, there is only one IP, which makes the Internet's users makes a mysterious, and increases network virtuality, making network fraud and network crime more likely.
4. The security technology of the network is not. As a network information platform, information provider and information demand will communicate on the network platform, while communicating, the smoothness and security of the network are most important. The presence of hackers makes the network are not safe. Hacker's meaning, that is, a computer network user who specializes in attacking the network in the case of concealing its own identity and address. Hackers often use the network's vulnerability, avoiding or directly attacking the firewall, reaching the computer that enters other network users, thus performing consultation, deletion, etc. Therefore, the presence of hackers will always threaten the safety of computer networks. 5. Network communication technology service providers and software developers ignore the construction of security network construction. Network communication technology service providers are mainly responsible for the security of network communications, and software developers mainly develop software that guarantee network security. However, in today's online users, playing games and chatting, users who verify the information only account for only a few. According to the data in December 2003, the public security department found that there were more than 1,200 Internet cafes in Kunming City, nearly half of them were illegal Internet cafe; there were more than 1 million primary and secondary school students, there were more than half of the Internet. Internet student has been online, 100,000 students often chat online, play games. For such a ratio, the merchant has to consider their economic benefits, thereby developing mainly to the security construction and games of games, chat services, and chat software. In short, it has already started relatively late, the technology is not high, but also because the existence of online hackers, the network service provider's economic interests, so that the network is more unsafe, unreliable. Because the network is virtual, the security of the network construction is limited, the security of the network exists, and the construction of the network needs integrity. Only integrity, the network can go out, only integrity, the network will go to health, only integrity can play the advantage of the network, in order to make the network's resources can share in whole society to promote common progress. The construction of the integrity network will make the network "reality". Network, due to the floating of IP, the existence of Internet cafe public IP, making the network platform unable to detect the specific identity of the user. This makes virtual networks more virtual. At the same time, users have the possibility of landing online platforms with non-real information, making the network fraud and network crime. Therefore, the honesty of the network users is very important, and the user's integrity will make the network no longer virtual. The integrity of ordinary users, in the network login, the number of people using information is mostly. Here, ordinary users refer to users with the most information. Ordinary users use most of the use of the Internet to use various information, chat, games, etc., they have more time to get information on the Internet or entertainment. Although they only use communication platforms and information platform functions, they are the main body of the network, and their integrity is directly related to the network to "reality".
6. Integrity with shared information resources. The integrity of ordinary users in the use of various information is mainly reflected in the truth of feedback information and login information. In order to better provide quality service and practical information resources for ordinary users, network resource providers often conduct investigations and propaganda on the Internet. Ordinary users' unhabilitation makes the resource provider unable to operate, which in turn leads to the loss of confidence in the network, causing the network as dummy.
7. Integrity when using the communication platform. Ordinary users seem very false during communication. In reality, interpersonal communication is greatly limited due to face-to-face interactions and various regulations. In the network world, before the law is not used, as a virtual space, only the text and pictures are communicated, some users have changed casual communication, and even ask the other party's true information into a jealous. In this case, integrity is very scarce. Integrity will make the inter-user interaction. The same is true for integrity on the Internet, or it can also promote the improvement of interpersonal relationships. The construction of the integrity network will inevitably let the network instead of telephone and other communication tools. At the same time, the construction of integrity networks, using the network of communication platforms, convenient communication methods, cheap communication fees, which will inevitably make people communicate more, interpersonal relationship will be more harmonious. At the same time, the construction of online integrity will make online fraud, online crimes, and network crimes will be free to keep online towards the way of healthy development. Integrity of information resource providers. Information resource providers mainly refer to the unit and individuals of various information and services to the network platform. Not only includes free information and paid information, but also formal information and fictional information, including individuals and company units. The integrity of providing information resource is also directly related to the size of the integrity of ordinary users. The integrity of the information resource provider includes the true and reliable information, and it will be timely. 8. Authenticity. The information provider provides information first to be true. This is the first step in integrity. The real uncertainty of information, accurate and error will achieve the trust of ordinary users, and only the trust of ordinary users can make ordinary users to achieve real integrity. Of course, the authenticity here also includes the unmirminability of the information. It is also only to provide real and accurate, not misleading information, can also establish a communication bridge between users.
9. Timely sex of information. The timely time of information is also a kind of integrity scale. Timely announcement and provision of information will make the information resources you should work. Information will make ordinary users to trust psychology. The timely better information is not late, this is not only a respect for others, but also a possibility of trusting others.
10. Health, legitimacy. When providing information, although the information is true and timely, if it is not legal, it cannot be accepted. In the information provided, the yellow obscene information of the network is now more than cultural, and the information provided by these information is difficult to let users accept other real and useful information, so legal, health is also very important. Only when you provide integrity in the information resources, you will have integrity to create integrity, build integrity networks, use good networks, communicate and transaction, and achieve optimal use of resources. Have to honest. Hackers' integrity is also very important to development. Hackers' honesty should be expressed in the transformation of identity and attack objects and purposes of the purpose. As long as the hacker is no longer attacking the network, the network will be safer. When hackers have established integrity, began to transform to build security networks, transform the attack website to test website vulnerabilities, this kind of integrity is established, the network will be more secure, more affected Other users trusts to better promote the development of the network. All in all, the integrity of the network is critical to the development of the network. This not only involves the security and health of the network, but also an important issue for more effective use of the network. The integrity construction of the network will make people's interpersonal relationships, and the utilization of integrity network will also reduce social costs. , Create intangible wealth for the society. At the same time, the sharing of other resources can be further enacted to achieve social development and achieve social development. The integrity of the network is so important, but how can we build an integrity of the network? This is another problem with the network. The development of the network, the scarce of integrity, will now establish a honest network to promote the further development of the network. With the construction of integrity network, on December 19, 2002, the Kunming Municipal Cultural Bureau hosted the "China's First Computer Festival" under the support of the National Network Civilization Engineering Commission and the Kunming Municipal People's Government. It can be seen that the integrity of the network has attracted general attention and is paying attention to the integrity of the network. For the integrity of the network, it is mainly to start from the user of the network providers and networks and the legal regulations. In socialist countries, the legal system is still very important, but credit education is also very important. Effective combination of legal system and credit thinking will make more stable social order, making the society to the road to healthy development. Network providers, network providers mainly refer to construction networks, allowing users to enjoy services, including hardware and communication technology. Network hardware providers and communications technology service providers must first try their best to reduce costs, provide better services, and ensure the smoothness and security of the network. 11. Hardware provider. Hardware includes computer, network cable, etc., hardware investment limits a large number of user development. Improve technology, reduce costs, improve product quality, which will drive increases in household users and enterprise users, thereby reducing the number of Internet cafes to ensure the legality of Internet cafes. At the same time, after reaching an IP, one person is one machine, the network can measure the user's specific identity according to the user's IP. This greatly improves people's integrity. It also facilitates the development of network regulations.
12. Communication technology service providers. This mainly refers to providing network technology and ensuring a network usual service provider. Communication technology service providers should vigorously improve technology, reducing costs again, strengthen the construction of safety networks, smooth networks, and real networks. This will help users increase, and it is also conducive to the user's trust in the network. In the construction of the integrity network, communication technology service providers play an irreversible role, which not only guarantees the smooth communication, and has promoted network integrity construction. If there is no security role of communication technology service providers, all network problems have not been talked, and they don't need to talk about online integrity.
13. Network users. Network users include ordinary users, information resource providers, and hackers used by the network. For the use of groups in three, first improve the overall quality, establish a view of everyone's honesty. Second therefore also strengthen the construction of the network legal system, thus constraining network behavior of network users. 12. Improve overall quality and establish honesty. To build integrity on the Internet, we must establish integrity in all areas and all people to establish credit in all nationals, depending on the intensiveness of quality education and credit, integrity concept. For credit instill, you should get started from the school and put online integrity into the hearts. Only in all the fields have strong build integrity, integrity can be transferred from other fields to the network. Integrity, as a scarce resource, government, school, etc. of my country, should be vigorously promoted. 14. Develop relevant network regulations. The network is a new developing thing, and there are many conflicts of conflicts to a certain extent, and traditional thinking has not been integrated. For integrity, the idea of active role in today's society is worth promoting. However, there is no relevant laws and regulations to constrain people's behavior, and integrity is difficult to establish, so we must improve relevant regulations on the promotion of integrity and integrity education. The legal construction of the network is not the integrity of the network, but the contrary, the network legal system is to ensure online integrity. Honesty can be better in the interpersonal relationship only under the constraints of the legal system. Only the legal system is used to constrain the non-credit behavior, in order to make integrity more effective but existence. The online integrity must not only be constrained, but the online integrity must not only propagate, education, and the network's integrity construction will also be guided. Of course, there are many means to promote the integrity of the network, and the network only has integrity construction to ensure the health and orderly development of the network. The construction of the integrity network will promote the development of the network, will make the network to the road to healthy development; the construction of integrity networks, more playing more network advantages, achieving resources more favorable sharing; integrity network construction, will make the network Become a new low-cost, most important communication platform, can also make the network into the distance of people, thus establish a good interpersonal atmosphere; the construction of integrity network will fully promote the resources of society, promote the progress of society, It has achieved common prosperity as soon as possible.