.

Friday, December 28, 2018

Negative Effects of Technology on the Society’s Security and Privacy

Continuous studies on possible technological developments be universe done bothday as initiated by common soldier companies and the government war machine. Needless to say, these technologies, situationly those funded by private companies build been veritable aside from making huge profits, to eudaimonia the society in almost every aspect in their lives especi altogethery in terms of making their lives easier and more comfortable. Similarly, those substantial by the government may make up been initi each(prenominal)y done mostly for military and government purposes, tho almost forever and a day such technology comes to be marketed to the mass later on. Examples of which admit the online technologies such as cellular sh proscribeds, the calculator and the cyberspace.Cellular phones, computers and the internet start been for many years flat, widely available for commercial white plague. Undeniably, such technologies have made casual life more productive in terms of the induce in which work stub instanter be done. Cellular phones furnish cordless communication in almost all places, all stations in the instauration computers allow speedier processing of transactions, calculations and many otherwise tasks and the internet allows not only spherical communication but alike burst and more widely available databases of discipline which almost everyone with internet access can utilize.Attached with such array of commercial benefits however, are possibilities of misuse and thus hurts that could not only affect one single(a) but similarly huge numbers racket of populations at one time in general. With these, technologies come more ship canal of infraction of individual privacy as hygienic as security. These stem from such technologies spirit of mass connection.The number of cellular phone users has been increasing. From 1997 to 2002, there has been 10-fold improver in world(prenominal) usage reaching 787 million (GSM to arrive On e- one thousand thousand Mark This Year). This may esteem better connection for these raft but this may also mean an incr go in the number of people verisimilar of being violated of privacy. It is true that it is proscribe to access account data from private companies, but since the use of airwaves in this particular technology allows the ain tracking of the posture of an individual, privacy cannot always be ensured. in that localization are still people who have unlimited access to such in haveation and are capable of such violation, that is, location tracking without the consent of the concerned individual. This is particularly true with the number of plugs, both experimenting and professional, out practicing. Individual breeding from private companies could also be tapped indiscriminately in particular by government officials for their specific purposes. This may be beneficial (but may still be unethical) if the person concerned is a corporeal crook, but for innocent individuals, the violation of privacy would be unwarranted.The rise of the computers and the internet creates a new breed of crime. information processing systems are an efficacious way of storing important and more or lesstimes caller-up critical files. This computer function allows unions easier management and access to their files which are in many ways beneficial. only these benefits are not limited to the companies as the storage of selective information in the computer also allows professionals, particularly hackers, access to the information. fairish recently, 12 December 2006, it was identifyed by CNN that a number of names and personal information were exposed when a hacker attacked the database of the computer system of the University of California, Los Angeles ( ward-heeler contend at UCLA Affect 800,000 people). combat injuryonize to the same report, a subject released in October of this year showed that around a hundred colleges experienced a similar inci dent during the previous 12 months.The information stolen in such cases usually include names, nascency dates, medical records, social security numbers, stead addresses and other personal information (Hacker Attack at UCLA Affect 800,000 people). Clearly, the computers and the internet allow newer and more skillful way of thieving, the most controversial of which is individuation thievery.The use of the internet has now evolved to allow scour the purchase of items from objects as open books to even loans and transactions can now be done conveniently finished the internet using the character card. It is this character of internet transactions that allows identity theft through the internet. According to a report done by the federal transaction Commission in 2003, the reported form of identity theft has been limited to those involving credit card transactions.According to the same report, about 13% of the victims reported that their personal information was obtained during t ransactions during credit card purchases. Among those purchases include those done through the internet. Such information can be used by the thief in many ways such as obtaining government documents, acquire online, obtaining loans, housing transactions, employment and filing of revenue returns (Federal Trade Commission).These are just some examples of how technology, particularly phones, the computer and the internet disadvantage individuals. There could be a crowd more other ways. Phones and computers have also been used in propagating pornography especially with the increase in use of characterization cameras, file sharing and websites that support such.Computer viruses had been and can still be substantially distributed to corrupt several participation and even government files, causing significant losings both in the concerned company as well as in the society in general. Freund cited a survey of the FBI that about 500 U.S. companies suffered significant fiscal losses amo unting to $455.8 million in 2002. applied science is a strong tool and is undeniably beneficial to the society especially with the ease in living it contributes to every individual. exactly as much as it is powerful and beneficial, it can also do harm because everything with advantages can always be ill-used to bring otherwise. The results that technology brings just all depend on how the user chooses to use it.Works CitedFreund, G. Perspective Hacking 2003, The New Agenda. Cnet News.Com. Cnet Networks, Inc. 2006. <http//news.com.com/2010-1071_3-1001016.html>Federal Trade Commission. Identity Theft come after Report. Sep 2003. Synovate. <http//www.consumer.gov/idtheft/pdf/synovate_report.pdf>GSM to Pass One Billion Mark This Year. 2003. Cellular.co.za. <http//www.cellular.co.za/news_2003/011603-gsm_to_pass_one_billion_mark_wit.htm>Hacker Attack at UCLA Affect 800,000 People. CNN.com. 12 December 2006. telephone circuit News Network LLP.<http//www.cnn.com/2006/TECH /ptech/12/12/ucla.data.theft.ap/index.html>  

No comments:

Post a Comment