ISBN 1-59345-303-5.Robert Moore Moore, Robert (2006). Cybercrime: Investigating High-Technology Computer Crime (1st ed.). Cincinnati, Ohio: Anderson Publishing. ISBN 978-1-59345-303-9. Andress, Mandy; Cox, Phil; Tittel, Ed (2001).
It is government that creates monopoly power by erecting and maintaining barriers to market entry. In the most recent dispute between Microsoft and the Department of Justice (DOJ), Microsoft is accused of "tying-in" an Internet browser into Windows. Microsoft's "tie-in" of its browser (Internet Explorer) with its operating system (Windows 95) is a tie-in that shows no greater threat to competition than the packaging of tires with cars, cream with coffee, laces with shoes, even left gloves with right gloves. In actuality, tying arrangements is pro-competitive. Consumers will buy the product that is more appealing to their needs.
Currently the Bush Administration objects this renewed idea, however due to the intense emotion from the recent terrorist attacks the nation is closer to the idea than ever before. The idea of a national identity (ID) card seems simple enough. Take the photographic and alpha-numerical information on our birth certificates, Social Security cards, driver s licenses, and voter registration card; add a bar code, fingerprint, microchip, or other biometric identifier; and display all that information on a neat plastic card no bigger than a credit card. But beneath this smooth surface hides a complex issues and perhaps the greatest threat to personal freedom Americans have ever confronted. A national ID system will Require Americans to obtain federal government authorization to travel, work, rent or buy housing, obtain medical care, use financial services, and make many purchases.
John Borland and Rachel Konrad, “PC Invaders Camp Out in Hard Drives,” Cnet News, 18 April 2002, <http://msnbc-cnet.com.com/2009-1023-885144.html> (4 March 2003). 10. Ed Foster, “Sneakwrapping a Virus,” Infoworld, 4 November 2002, 64. 11. Staff Writer, “Sen.
The issue on privacy is extremely controversial in today’s world. As the United States’ use of the internet, a global web of interconnected computer networks, expands, so does its problem with privacy invasion. With the U.S. pushing for new laws governing internet use, citizens are finding their privacy being pulled right from underneath them. Web users are buying and selling personal information online as well as hacking users for more information. One may argue that there is no such thing as privacy on the internet, but privacy is a right among Americans, and should be treated as such.
Weber, P. (2013, June 12). 6 reasons you should, and shouldn't, freak out about the NSA data-mining. The Week. Retrieved from http://theweek.com/article/index/245461/6-reasons-you-should-and-shouldnt-freak-out-about-the-nsa-data-mining on 11/29/2014. how we should balance national security with civil liberties.
http://www.aclu.org/Cyber-Liberties/Cyber-Liberties.cfm?ID=9958&c=58 John Leyden. Zimmermann defends strong crypto against govt assault. 10 Mar. 2001. http://www.theregister.co.uk/content/archive/22014.html Declan McCullagh, Lantern' Backdoor Flap Rages. 27 Nov. 2001. http://www.wired.com/news/conflict/0,2100,48648,00.html
Airport security will face many changes in the coming years and the government will use new technologies, such as biometrics, for identification. These actions taken by the government has raised many concerns dealing with them abridging our civil liberties. Many foreigners, especially people of Middle Eastern decent have faced a lot of criticism from the American public and the government. Attorney General John Ashcroft ordered the detention of more than 1,000 foreigners suspected of posing a security threat or believed to have information about the hijackers. Information about the detainees has been kept from the public.