Saturday, July 20, 2019

Technology and the Invasion of Privacy Essay -- Exploratory Essays Res

Technology and the Invasion of Privacy As citizens of America we are all entitled to our rights of privacy. When something threatens this guaranteed privacy we tend to take extra precautions to prohibit prolonged violation. As the advancing world of technology continues to grow and expand, so do the amount of cases involving privacy invasion. Technology drives these privacy-invading crimes; however, crime also drives technology, creating a vicious cycle. Without technology an invader could not enter that of a stranger’s life. Conversely, without technology that same criminal would evade the law enforcers. So does technology protect citizens’ privacy, or does it expose one’s entire life? In regards to this question, one must consider: before the rise of the world of technology, privacy invasion was not a common issue. With this fact in mind it is not difficult to determine where the problem lies: technology threatens privacy. Computers are main technological features that allow criminals to step into unsuspecting victims lives. With a simple piggy-backing program hackers are able to track every keystroke made by the victim. One such program is called spyware, not to be confused with adware, which is often referred to interchangeably with spyware, but is potentially harmless (Louis 15). Spyware, hidden within downloaded software, implants itself deep within a computer’s hard drive, allowing it to track every move made by the user (Louis 16). Once inside a system, spyware can gather e-mail addresses, passwords, and credit card numbers. This gathered information is then transmitted across the internet to the author of the spyware, who then uses the newly gained information to determine which ads should target... ...and more anti-spywares that protect your computers from viruses, and better care taken by individuals (McGuire), Americans can begin to protect themselves from the privacy predators, and hopefully start a trend that will eventually put an end to the vicious cycle of technology vs. privacy.    Works Cited    McGuire, David.   "FTC Sues Spyware Suspects."   Washingtonpost.com Apr 2004. 9 Nov. 2004 <http://www.washingtonpost.com O'Reilly, John.   An Employer's Guide to Surveillance, Searches & Medical Examination.   Toronto: Thomson Canada Limited, 2003. "Protect Yourself Online."   Consumer Reports Sep. 2004:   12-19 Raphael, Louis.   "Spyware: Technology's Version of Big Brother." Computer Technology Review Feb. 2004: 12-16 Stead, Bette Ann.   Privacy and Rights In The Work Place.   Houston: University of Houston, College of Business Administration, 1998.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.