Sunday, June 2, 2019
Technology and the Invasion of Privacy Essay -- Exploratory Essays Res
Technology and the Invasion of Privacy As citizens of America we are all entitled to our rights of privacy. When something threatens this guaranteed privacy we t sack to grapple extra precautions to prohibit prolonged violation. As the advancing creation of technology continues to grow and expand, so do the amount of cases involving privacy invasion. Technology drives these privacy-invading crimes however, crime also drives technology, creating a vicious cycle. Without technology an invader could not enter that of a strangers life. Conversely, without technology that same criminal would evade the law enforcers. So does technology protect citizens privacy, or does it expose ones entire life? In regards to this question, one must consider before the rise of the world of technology, privacy invasion was not a common issue. With this fact in mind it is not difficult to determine where the problem lies technology threatens privacy.Computers are chief(prenominal) technological features that allow criminals to step into unsuspecting victims lives. With a simple piggy-backing program hackers are able to track every keystroke made by the victim. One such(prenominal) program is called spyware, not to be confused with adware, which is often referred to interchangeably with spyware, but is potentially harmless (Louis 15). Spyware, hidden within downloaded software, implants itself deep within a computing devices hard drive, allowing it to track every move made by the user (Louis 16). Once inside a system, spyware can gather e-mail addresses, passwords, and ascribe card numbers. This gathered information is then transmitted across the internet to the author of the spyware, who then uses the newly gained information to determine which ads should target... ...and more anti-spywares that protect your computers from viruses, and damp care taken by individuals (McGuire), Americans can begin to protect themselves from the privacy predators, and hopefully star t a trend that will eventually put an end to the vicious cycle of technology vs. privacy. Works CitedMcGuire, David. FTC Sues Spyware Suspects. Washingtonpost.com Apr 2004. 9 Nov. 2004 <http//www.washingtonpost.com OReilly, John. An Employers Guide to Surveillance, Searches & Medical Examination. Toronto Thomson Canada Limited, 2003. Protect Yourself Online. Consumer Reports Sep. 2004 12-19 Raphael, Louis. Spyware Technologys Version of Big Brother. Computer Technology Review Feb. 2004 12-16Stead, Bette Ann. Privacy and Rights In The Work Place. Houston University of Houston, College of Business Administration, 1998.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.