Wednesday, March 27, 2019

Technology and the Invasion of Privacy Essay -- Exploratory Essays Res

applied science and the Invasion of Privacy As citizens of America we are all entitled to our rights of privacy. When something threatens this guaranteed privacy we tend to restoration extra precautions to prohibit prolonged violation. As the advancing world of technology continues to grow and expand, so do the amount of cases involving privacy invasion. Technology drives these privacy-invading offenses however, crime also drives technology, creating a vicious cycle. Without technology an invader could not repose that of a strangers life. Conversely, without technology that same criminal would hedge the law enforcers. So does technology defend citizens privacy, or does it expose 1s entire life? In regards to this question, one must view before the rise of the world of technology, privacy invasion was not a common issue. With this fact in mind it is not difficult to chink where the problem lies technology threatens privacy.Computers are main technological features tha t allow criminals to tread into unsuspecting victims lives. With a simple piggy-backing program hackers are able to overcompensate every keystroke made by the victim. One such program is called spyware, not to be confused with adware, which is often referred to interchangeably with spyware, but is potentially clean (Louis 15). Spyware, hidden within downloaded software, implants itself deep within a computers hard drive, allowing it to track every move made by the substance abuser (Louis 16). Once inside a system, spyware can gather e-mail addresses, passwords, and character reference card numbers. This gathered information is then transmitted across the meshing to the author of the spyware, who then uses the newly gained information to determine which ads should target... ...and more anti-spywares that cherish your computers from viruses, and better care taken by individuals (McGuire), Americans can begin to protect themselves from the privacy predators, and hopefully st art a trend that will in the end put an end to the vicious cycle of technology vs. privacy. Works CitedMcGuire, David. FTC Sues Spyware Suspects. Washingtonpost.com Apr 2004. 9 Nov. 2004 <http//www.washingtonpost.com OReilly, John. An Employers Guide to Surveillance, Searches & Medical Examination. Toronto Thomson Canada Limited, 2003. Protect Yourself Online. Consumer Reports Sep. 2004 12-19 Raphael, Louis. Spyware Technologys Version of Big Brother. Computer Technology Review Feb. 2004 12-16Stead, Bette Ann. Privacy and Rights In The Work Place. Houston University of Houston, College of Business Administration, 1998.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.