Saturday, May 18, 2019
The Value of Digital Privacy in an Information Technology Age
Running head The Value of Digital Privacy in an Information Technology come on 1 The Value of Digital Privacy in an Information Technology Age Tara Brooks professor Bristow, J. D. Law, Ethics and Corporate Governance, LEG 500 4 May 2012 Abstract How many of us convey paused during conversation in the past several years, suddenly awargon that you might be eavesdropped on? likely it was a ph nonp aril conversation, although maybe it was an e-mail or instant-message exchange or a conversation in a public place.Maybe the topic was terrorism, or politics, or your church service. You pause suddenly, momentarily afraid that your course might be coachn out of context, and then you laugh at your paranoia and go on. But your behavior has changed, and your words are subtly altered. Privacy is a growing concern in the United States and almost the world. As we increasingly use the Internet and the seemingly boundary less options for collecting, saving, sharing, and comparing randomness aerate consumers worries.Online practices of business and government agencies may present new ship fag endal to compromise privacy, and e-commerce and technologies that work on a wide range of personal information procurable to anyone with a Web browser only originate to hint at the possibilities for inappropriate or unwarranted intrusion into our personal lives. Privacy is very important-especially on the Internet. It is amazing how many websites are designed to reveal private details about people in reality it is a little scary. In this paper, I will be discussing different topics on the value of digital privacy. Keywords privacy, personal information, digital privacy . List and describe at least three (3) technologies that allow an item-by-item to research citizens private data. The three technologies that allow an individual to research citizens private data are Bluetooth, GPS, and Google (Internet). The offset technology I will discuss is Bluetooth. Bluetooth has sever al guidances it laughingstock be hacked. virtually ways are blue jacking, blue snarfing, and blue bugging. In blue jacking, someone might send unsolicited messages to the dupe in the form of a business card or a mobile tactile sensation with a text that may look intimidating to read. In many cases, someone may overly send sounds like a ring tone.The victims mobile could then be infiltrated and he/she might never spang what has happened. Blue jacking messages behind also be viewed as spam messages with emails. in that location collect also been reports about people getting hacked by Trojan Horses which could mean a solid compromise. Blue snarfing is considered a serious compromise in the category of Bluetooth hacking especially if the information vulnerable, is quite critical, as such attacks can allow someone access to victims contact list, text messages, emails and correct private photos and videos. In blue bugging, someone uses sophisticated attacks to gain control of victims mobile.It whole kit and boodle just like Trojan horses, where someone can manipulate the users phone the way he/she desires by executing commands on the victims phone. The hacker could forward mobile calls from the victims mobile to his own turn and can even manipulate the mobile to follow a Bluetooth headset instructions like receive call, send messages etcetera (Hubs by Hassam, 2011) The second technology is GPS. A GPS track unit enables you to determine the precise location of person, vehicle or other object. GPS (Global Positioning System) is the only operative system, which can record the position of an object at regular intervals.A GPS tracking unit is so right-hand that it can store the recorded location data within the tracking unit. Satellite transmits signals that can be intercepted by GPS receivers to find the precise location of any object you are searching for. Aside from qualification driving easier, the on-board electronics revolution has bumpn some peo ple a new direction in their lives. Unfortunately, it could publication them right into your bedroom or living room. These people are GPS thieves. When they steal your device, they sometimes get to a greater extent than just an electronics item they can sell for $100 or more on the street. They get your shell address.With the push of a button, one common navigational feature, the substructure setting, fully automates the process of directing you to your home a convenience that burglars and stalkers are sure to appreciate. Its enough to turn your free-floating anxiety about data stealing into full-blown paranoia about home invasion. About two years ago, thieves stole a fare of Acura cars from a corporations garage in Atlanta, and, in three cases, they used the GPS units in the cars to find and then burglarize employees homes. (Gary Thomas, Thieves betoken GPS Devices to Find Out Where You Live, December 2009)The final technology is Google. Our class exchanged names with one an other. We went to the lab to find information on the person that we were given. It is amazing and scary to see how much information can be discovered from Google. Some information is phone numbers, addresses, and where someone actually lives. I can simply type in the name of the person or business, preferably with quotation marks nearly the name, and if the phone number has been entered somewhere on the Web, than it will come up in my search results. I can also find all sorts of useful information with Google Maps, simply by typing in an address.In fact, I can use Google Maps to view an entire neighborhood. 2. Discuss the advantages and disadvantages of public access to this information, both for the researchers and those who are being investigated. One main advantage and disadvantage of blue tooth is that I am in look at From a researchers view, Im able to exchange data across my carrel phone, Im still progress to the ability to keep my information private. In order to safe a transfer or allow someone to access the files on the phone, I would take on to give them access by accepting or rejecting the request through my phone.As someone being investigated, I h old to ensure if I have the Bluetooth feature enabled on the phone and not disabled while employ it, others that I may not even k straight request to send me a file. Implementing security, even for these types of device pairings, can prevent an unauthorized user from using the headset. As someone that is investigated, I would definitely urgency to keep my information such as contacts, addresses and other information private and safe. Some of the advantages of GPS are that it can track lost items and it can track people.As a researcher, I realize that the crime rate keeps on increasing in every part of the world and a lot of highly valuable objects have been, and will, be stolen. It doesnt matter how irrelevant you think an object or equipment is to others if it is something that is very expens ive you should exculpate sure you install a GPS tracking system on it. As a researcher, I can found my item or child quickly. Many phones have GPS capabilities that young children and teens may not know about this is a great access if a child goes missing.As a person that is investigated, the disadvantage of GPS technology that can save lives can also provide a framework for invasion of privacy. According to the electronic Frontier Foundation, locational privacy is the ability of an individual to move in public space with the expectation that low normal circumstances their location will not be systematically and secretly recorded for by and by use. (Peyton Brookes, Advantages Disadvantages of Mobile Tracking, 2012) As a researcher, information is probably the biggest advantage that Internet offers.Internet is a virtual pry highway of information. Any kind of information on any topic under the sun is available on the Internet. The search engines like Google, Yahoo are at your s ervice on the Internet. There is a huge amount of information available on the Internet for just about every conquer known to man, ranging from government law and services, trade fairs and conferences, market information, new ideas and technical support, the list is endless. Also as a researcher, Internet has made life very convenient. With numerous online services I can now perform all my transactions online.I can book tickets for a movie, transfer funds, pay utility bills, taxes etc. , from my computer. Some travel websites even plan an Itinerary as per my preferences and take care of airline tickets, hotel reservations etc. As someone that is investigated, if I use the Internet for online banking, sociable networking or other services, I may risk a theft to my personal information such as name, address, credit card number etc. Evil people can access this information through unsecured connections or by planting software and then use my personal details for their benefit. Needless to say, this may land me in serious trouble.Google stores enormous amounts of data to power its Web search and advertising engines, and many privacy advocates have repeatedly raised concerns over the amount of personal information Google has the ability to access. 3. Determine what measures citizens can take to protect private information or information they do not want to be disclosed. Some measures that citizens can take to protect private information are use different passwords for every account. It is unprovoked to use the same password for each account that you have, but it is not safe or wise. Hackers have tools specifically designed to crack into accounts.A strong password contains letters, numbers, different cases, and symbols. Another way, if you have old online accounts that are not being used, closes them. Hackers could use them to infiltrate your more important accounts. Get rid of them. If you cant remember where you have old accounts search your email inbox with quer ies like registered, confirm or your account to find email records of old accounts. Another measure to do is go paperless. Bank and credit card statements can contain social security or account information. Check with these agencies to see if you can go paperless, and use a secure online portal for your transactions. . Discuss a federal law that grants the federal government the legal right to make private information on U. S. citizens available to the public, and whether or not you agree with this law. to fire for any reasons that are not unlawful, such as discrimination, etc. Since she did not obey company policies, she will be terminated. charitable Resources will inform her if she will be receiving benefits or compensation from the company. 5. Determine whether there are electronic privacy laws that can prevent others from having access to private information as well as how impressive they are. . . FEATURES- Internet DNS Security 610 -8References Halbert, T. , & Ingulli, E. ( 2012). Law & ethics in the business environment (7th ed. ). Mason, OH South-Western Cengage Learning http//autos. aol. com/article/gps-thief-home-invasion/ http//www. ehow. com/list_6068148_bluetooth-advantages-disadvantages. hypertext markup languageixzz1u3e6jVDc http//hassam. hubpages. com/hub/Types-Of-Bluetooth-Hacks-And-Its-Security-Issues http//techgyo. com/index. php/3-major-advantages-gps-tracking-system/ixzz1u44hGdujsOME
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.