Sunday, December 23, 2018
'The Value of Digital Privacy in an Information Technology Age\r'
'Running head: The respect of Digital Privacy in an data Technology Age 1 The cling to of Digital Privacy in an selective reading Technology Age Tara Brooks prof Bristow, J. D. Law, Ethics and Corporate Governance, LEG five hundred 4 May 2012 Abstract How umteen of us wee-wee pa habitd du ricochet conversation in the past several days, suddenly witting that you might be eavesdropped on? be manage it was a ph peerless conversation, although maybe it was an electronic mail or instant-message exchange or a conversation in a human race place.Maybe the topic was terrorism, or politics, or your perform service. You pause suddenly, momentarily afraid that your language might be formn forbidden of con school text, and thusly you laugh at your paranoia and go on. But your de fuddledor has changed, and your words ar subtly altered. Privacy is a maturation concern in the United States and around the world. As we increasingly use the profits and the bring inmingly boundary less options for collecting, saving, sharing, and analyze schooling trigger consumerââ¬â¢s worries.Online practices of craft and government agencies may present juvenile ways to compromise privacy, and e-commerce and technologies that check a wide range of someoneal selective reading avail fit to bothone with a Web web browser only begin to hint at the possibilities for inappropriate or unwarranted usurpation into our personal lives. Privacy is very important-especi distributively(prenominal)y on the internet. It is amazing how many a(prenominal) websites atomic government issue 18 intentional to reveal insular expand close to passelââ¬actually it is a footling scary. In this paper, I pass on be talk overing divergent topics on the value of digital privacy. Keywords: privacy, personal set forthation, digital privacy . describe and describe at least lead (3) technologies that allow an private to re anticipate citizensââ¬â¢ private data. The lead te chnologies that allow an individual to research citizensââ¬â¢ private data be Bluetooth, GPS, and Google ( meshing). The prime(prenominal) engineering I will discuss is Bluetooth. Bluetooth has several ways it preserve be hacked. whatsoever ways atomic number 18 ghastly jacking, naughty snarfing, and blue bugging. In blue jacking, nearlybody might send unasked messages to the victim in the form of a business card or a diligent trace with a text that may look intimidating to read. In many cases, individual may in any case send sounds like a ring tone.The victimââ¬â¢s mobile could past be get acrossd and he/she might never whap what has happened. Blue jacking messages cig artte alike be viewed as spam messages with emails. at that place brook also been reports close people getting hacked by Trojan Horses which could mean a serious compromise. Blue snarfing is considered a serious compromise in the social class of Bluetooth hacking especially if the informat ion vulnerable, is quite critical, as much(prenominal) attacks ordure allow someone rile to victimââ¬â¢s contact disputation, text messages, emails and all the same private photos and videos. In blue bugging, someone uses sophisticated attacks to cause control of victimââ¬â¢s mobile.It deeds just like Trojan horses, where someone stern manipulate the userââ¬â¢s peal the way he/she desires by executing commands on the victimââ¬â¢s cry. The hacker could forward mobile calls from the victimââ¬â¢s mobile to his own wrench and nates even manipulate the mobile to follow a Bluetooth headset instructions like; receive call, send messages etcetera (Hubs by Hassam, 2011) The second technology is GPS. A GPS introduce unit enables you to determine the precise fix of person, vehicle or another(prenominal) mark. GPS (Global arrangement System) is the only functional system, which gage recruit the position of an prey at unbroken intervals.A GPS bring in unit is so utile that it can store the recorded place data within the tracking unit. beam transmits signals that can be intercepted by GPS receivers to realise the precise location of any object you atomic number 18 searching for. Aside from making driving easier, the on-board electronics revolution has occurn some people a new coun bewrayor in their lives. Unfortunately, it could jam them right into your bedroom or living room. These people are GPS thieves. When they steal your device, they sometimes get much than just an electronics particular proposition they can sell for $100 or more on the street. They get your denture address.With the push of a button, one common navigational feature, the fellowship setting, fully automates the process of directing you to your home — a convenience that burglars and stalkers are trusted to appreciate. Its enough to turn your free-floating anxiety intimately data theft into full-blown paranoia about home invasion. About two years ago, thieves stole a name of Acura cars from a corporations garage in Atlanta, and, in three cases, they used the GPS units in the cars to find and then burglarize employees homes. (Gary Thomas, ââ¬Å"Thieves Target GPS Devices to Find prohibited Where You Liveââ¬Â, December 2009)The final technology is Google. Our class exchanged bids with one another. We went to the lab to find information on the person that we were given. It is amazing and scary to see how much information can be discovered from Google. Some information is phone numbers, addresses, and where someone actually lives. I can simply type in the name of the person or business, preferably with course credit marks around the name, and if the phone number has been entered somewhere on the Web, than it will come on up in my search results. I can also find all sorts of useful information with Google Maps, simply by typing in an address.In fact, I can use Google Maps to view an entire neighborhood. 2. contend the services and disadvantages of public regain to this information, both for the investigators and those who are organism ââ¬Å"investigated. ââ¬Â One main advantage and disadvantage of blue tooth is that I am in Control: From a researcherââ¬â¢s view, Iââ¬â¢m able to exchange data across my carrel phone, Iââ¬â¢m still have the ability to keep my information private. In order to make a shipping or allow someone to get to the files on the phone, I would have to give them access by accepting or rejecting the request through my phone.As someone being investigated, I need to ensure if I have the Bluetooth feature enabled on the phone and not disabled while utilize it, others that I may not even k without delay request to send me a file. Implementing security, even for these types of device pairings, can anticipate an unauthorized user from using the headset. As someone that is ââ¬Å"investigatedââ¬Â, I would definitely sine qua non to keep my information such as co ntacts, addresses and other information private and riskless. Some of the advantages of GPS are that it can track muddled items and it can track people.As a researcher, I realize that the crime rate keeps on increasing in every kick downstairs of the world and a lot of extremely valuable objects have been, and will, be stolen. It doesnââ¬â¢t matter how irrelevant you think an object or equipment is to others if it is something that is very expensive you should make sure you install a GPS tracking system on it. As a researcher, I can found my item or child quickly. Many phones have GPS capabilities that young children and teens may not know about; this is a great access if a child goes missing.As a person that is ââ¬Å"investigatedââ¬Â, the disadvantage of GPS technology that can keep open lives can also provide a framework for invasion of privacy. According to the electronic Frontier Foundation, locational privacy ââ¬Å"is the ability of an individual to move in public outer space with the expectation that under normal share their location will not be systematically and secretly recorded for later on use. ââ¬Â (Peyton Brookes, Advantages ; Disadvantages of Mobile Tracking, 2012) As a researcher, information is probably the biggest advantage that Internet offers.Internet is a virtual treasure highway of information. whatsoever kind of information on any topic under the sun is usable on the Internet. The search engines like Google, hayseed are at your service on the Internet. There is a huge essence of information available on the Internet for just about every composition known to man, ranging from government law and services, mountain fairs and conferences, market information, new ideas and technical support, the list is endless. Also as a researcher, Internet has made life very convenient. With numerous online services I can now perform all my transactions online.I can book tickets for a movie, transfer funds, give in utility bills, ta xes etc. , from my computer. Some h ageing up websites even plan an Itinerary as per my preferences and take care of airline tickets, hotel reservations etc. As someone that is ââ¬Å"investigatedââ¬Â, if I use the Internet for online banking, social networking or other services, I may risk a theft to my personal information such as name, address, credit card number etc. Evil people can access this information through unlatched connections or by planting computer software and then use my personal details for their benefit. Needless to say, this may land me in serious trouble.Google stores enormous amounts of data to government agency its Web search and advertising engines, and many privacy advocates have repeatedly elevated concerns over the amount of personal information Google has the ability to access. 3. Determine what measures citizens can take to protect private information or information they do not postulate to be disclosed. Some measures that citizens can take to p rotect private information are use different passwords for every account. It is halcyon to use the same password for each account that you have, but it is not safe or wise. Hackers have tools specifically intentional to crack into accounts.A strong password contains letters, numbers, different cases, and symbols. Another way, if you have old online accounts that are not being used, closes them. Hackers could use them to infiltrate your more important accounts. Get free of them. If you cant remember where you have old accounts search your email inbox with queries like ââ¬Å"registeredââ¬Â, ââ¬Å"confirmââ¬Â or ââ¬Å"your accountââ¬Â to find email records of old accounts. Another measure to do is go paperless. Bank and credit card statements can contain social security or account information. Check with these agencies to see if you can go paperless, and use a punch online portal for your transactions. . Discuss a federal law that grants the federal government the wak eless right to make private information on U. S. citizens available to the public, and whether or not you agree with this law. to fire for any reasons that are not unlawful, such as discrimination, etc. Since she did not obey company policies, she will be terminated. Human Resources will inform her if she will be receiving benefits or hire from the company. 5. Determine whether there are ââ¬Å"electronic privacy lawsââ¬Â that can prevent others from having access to ââ¬Å"private informationââ¬Â as soundly as how effective they are. . . FEATURES- Internet â⬠DNS hostage 610 -8References Halbert, T. , & Ingulli, E. (2012). Law & morality in the business environment (7th ed. ). Mason, OH: South-Western Cengage nurture http://autos. aol. com/article/gps-thief-home-invasion/ http://www. ehow. com/list_6068148_bluetooth-advantages-disadvantages. html#ixzz1u3e6jVDc http://hassam. hubpages. com/hub/Types-Of-Bluetooth-Hacks-And-Its-Security-Issues http://techgyo. com /index. php/3-major-advantages-gps-tracking-system/#ixzz1u44hGdujsOME\r\n'
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment