Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Electronic surveillance and privacy
Privacy in the 21st century
Electronic surveillance and privacy
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Electronic surveillance and privacy
As this century's influx of new technology continues, the potential harm towards a computer user's personal information and unauthorized access grows along with it. These days, certain criminals can now commit crimes from the comfort of their own home, specifically through the use of their computer. Two types of crimes that are occurring at exponential rates are computer crimes and cybercrimes. Computer crimes are “illegal acts involving a computer” and cybercrime refers to “online or Internet-based illegal acts” (Shelly and Vemaat 382) both are done by individuals who have advanced computer skills and are known as hackers. These hackers have a variety of goals that range from personal gain of assets (or commissioned gain from a third-party), spying on others, or simply for the challenge. Computer users are concerned about their bank account information, Social Security number, social media accounts, and personal information but a newer security breach that many of us should be concerned about is the possibility of our webcams being hacked into, also known as camfecting or camjacking. Camfecting is “the fraudulent process of hacking into a person's webcam and activating it without the webcam owner's permission, the remotely activated webcam can then be used to watch anything within the webcam's field of vision” (Anticamfecting Co). Numerous instances of camfecting happen to individuals whether they are directly targeted and sought after or are part of a bulk camjacking. Victims of camfecting include Miss Teen USA 2013, “1.8 million yahoo users” around the globe(Osborne and Whittaker), and maybe even myself.
Cassidy Wolf was a teen the first time a hacker camfected her computer through an e-mail message containing a link she may...
... middle of paper ...
...Values Clear Vision. N.p.: National Security Agency/Central Secutity Service, 2012. NSA.gov. NSA Office of Public Affairs, 2012. Web. 31 Apr. 2014.
Osborne, Charlie, and Zack Whittaker. "The NSA May Not Be Listening to Your Private Phone Calls, but It Has Been Watching Your Private Parts." ZDNet. CBS Interactive, 27 Feb. 2014. Web. 30 Apr. 2014.
Shelly, Gary B., and Misty Vermaat. "Computer Security and Safety, Ethics, and Privacy." Discovering Computers: Fundamentals: Your Interactive Guide To The Digital World. Boston, MA: Course Technology, 2012. N. pag. Print.
United States. Census Bureau. Economics and Statistics Administration. Measuring America: Computer and Internet Trends In America. By US Department of Commerce. N.p.: n.p., 2014. Print.
Wolf, Cassidy. "Miss Teen USA Lived Through Your Worst Hacking Nightmare." Teen Vouge, Nov. 2013. Web. 30 Apr. 2014.
The people’s apprehensiveness does not come from the government’s ability to monitor their phone calls. It is the idea that they are listening to their individual conversations. The government needs to communicate to its citizens on the capabilities of the program. Most of the information on the limits of PRISM has come from the data leaks of Edward Snowden. The common consensus is that the government is able to access information by merely advising a meeting with a judge that is not withheld to the public. However, contrary to the popular belief that they are listening to phone calls, they are merely collecting the date and length of each phone call (Stray).
"NSA Surveillance Programs." Issues & Controversies. Facts On File News Services, 14 Oct. 2013. Web. 20 Nov. 2013. .
"Internet Privacy." Congressional Quarterly Researcher 8.41 ( Nov. 6, 1998 ). Busse Library, Cedar Rapids . 6 July 2003 <http://library.cqpress.com/cqresearcher>
Throughout our class this semester we have learned about different types of ways that cyber criminals can invade someone’s privacy such as, hacking, phishing, and spamming. In addition we have also briefly discussed some major cyber-attacks. Moore’s work looks more closely at these features. Some of the important cybercrime topics that Moore covers are digital child pornography and the abuse of children in cyber space, online harassment and cyber stalking, and identity theft. In addition to these, it is important to also look at the strategies law enforcement must take to stop cyber criminals. Furthermore, some important law enforcement topics throughout the tex...
5 Dec. 2013. Gorman, Siobhan, and Jennifer Valentino-Deveries. New Details Show Broader NSA Surveillance Reach. " The Wall Street Journal. N.p., 20 Aug. 2013.
Whitman, M., & Mattord, H. (2011). Reading & cases in information security: law & ethics. (2011 custom ed., p. 264). Boston, MA: Cengage Learning.
Computers; they are a part of or in millions of homes; they are an intricate part of just about every if not all successful businesses, the government, and the military. Computers have become common place in today’s society and the lives of the people who live in it. They have crossed every national, racial, cultural, educational, and financial barrier, which consequently ushered in the information age. A computer is a programmable electronic device that can store, retrieve and process data, and they come in all shapes, and sizes. They can be used for and in just about anything. As stated before, they are used in just about every aspect of modern society. They are so fundamental to modern society that it would be disastrous to society without them. As stated before, there are many areas in modern society that are run by computers. They play an intricate part of millions of homes in the world. Office workers in business, government and the military may use them to write letters, keep rosters, create budgets, find information, manage projects, communicate with workers, and so on. They are used in education, medicine, music, law enforcement, and unfortunately crime. Because computers have become such a part of the world and how it operates, there is a tremendous responsibility for those who are in control of these computers and the vital information that they carry, to manage and protect them properly. This is management and protection is vital because any loss or damage could be disastrous for the affected entity. For example, a mistake or intentional alteration of a personal credit file could affect ones ability to buy a car or home, or can lead to legal actions against the affected person until the mistake or intentional alteration has been corrected. Therefore, with the advent of computers in the information age, and all of the intentional and unintentional violations against them, comes the need to safeguard them and the information they carry with strong systems and policies of computer security.
LeRoux, Yves. "Privacy concerns in the digital world." 03 Oct 2013. Computer Weekly. 24 April 2014 .
Richmond, Riva. "12 Ways Technology Threatens Your Privacy (and How to Protect Yourself)." Switched. N.p., 14 May 2009. Web. 11 Mar. 2014. .
In today’s society technology is used for everything. With the invention of computers and the internet this open doors to the cyber world. Today you can do almost anything without having to leave your home. The internet gives us the opportunity of shopping online, ordering food online, working from home and video chatting with friends and family across the world. Everyone has a computer and internet access in their homes. While the internet is really convenient it also opens doors for cybercrimes, loss of privacy and the need for computer security.
Cyber exploitation is defined as the non-consensual distribution and publication of intimate photos or videos. The materials are usually stolen by ex-lovers, ex-spouses, associates, or complete strangers through hacking, theft of a cell phone or computer, mostly during a computer repair, a false personal ad, or other means (Fritsch et al, 2015). The stolen photos or videos are then posted on websites or sold for profit to humiliate, damage, harass, physically endanger, or extort the victim. Also, the perpetrators usually post other identifying information with the videos and images, including the victim’s name, links to social
In the early years of computers and computerized technology, computer engineers had to believe that their contribution to the development of computer technology would produce positive impacts on the people that would use it. During the infancy of computer technology, ethical issues concerning computer technology were almost nonexistent because computers back then were not as multifaceted as they are today. However, ethical issues relating to computer technology and cyber technology is undeniable in today’s society. Computer technology plays a crucial role in all aspects of our daily lives. Different forms of computer technology provide unique functionalities that allow people to perform daily activities effectively and efficiently. In modern society, we use computer and cyber technology to communicate with friends and family via social networking sites, participate in business transactions, and get current news. Different tasks require unique technological feature in computer technology to function properly. Although, unique technological features increase people’s proficiency in accomplishing various tasks, unique technological features in computer and cyber technology increase security vulnerabilities. In many cases, the security vulnerabilities in computer technology are exploited by cybercriminals to invade people’s privacy, and steal people’s identity. We know that computers have no moral compass; they cannot make moral decisions for themselves. Essentially, people make moral decisions that affect others positively or negatively depending on how they use computer technology. Some of the biggest ethical issues facing people in the computing environment include privacy concerns on the web and identity theft. Privacy concerns...
Privacy exist wherever personal information or other sensitive information is collected, stored, used, and finally destroyed or deleted – in digital form or otherwise. The challenge of data privacy is to use data while safe-guarding individual's privacy preferences and their personally identifiable information. The fields of computer security, data security, and information security design and utilize software, hardware, and human resources to address this issue.
Computer crime or Cyber Crime is defined as any type of crime that involves or regards a computer or computer network. Cyber Crime mainly means that the computer may be used as a tool in the commission of the crime or the computer may be the main target of the criminal’s crime. The rapid growth of technology and gadgets as well as the further de...
Cybercrime is a global issue plaguing the world. The dictionary defines cybercrime as “crime conducted via the Internet or some other computer network”(Merriam-Webster). The definition remains very broad because the word “cyber” is defined as “relating to the culture of computers, information technology, and virtual reality.” Due to the growing number of people gaining access to the internet, rapid development of technology, and the globalization of the world, more of the world population is becoming susceptible to involvement in cybercrime – whether it be as a victim or a criminal. Cybercrime involves different levels of the world on both the victim and criminal side from an individual citizen, to small groups, businesses, and the government, to the countries of the world. There are different groups from law enforcement agencies to the U.S. Secret Service, that are attempting to combat the problem through cooperation and preemptive efforts. If these groups combined with the public to protect themselves and the country from criminals that commit cybercrime, the nation’s network and technology servers would be much safer for technology users. Clearly, cybercrime is a problem because it puts internet users at risk of being taken advantage of or harmed.