.

Friday, February 22, 2019

The Value of Digital Privacy in an Information Technology Age

Running head The Value of Digital screen in an Information Technology Age 1 The Value of Digital Privacy in an Information Technology Age Tara Brooks Professor Bristow, J. D. Law, ethical motive and Corporate Governance, LEG 500 4 May 2012 Abstract How legion(predicate) of us get hold of paused during communication in the past several years, of a sudden aw atomic number 18 that you might be eavesdropped on? Probably it was a name conversation, although maybe it was an e-mail or instant-message veer or a conversation in a public place.Maybe the topic was terrorism, or politics, or your church building service. You pause suddenly, momentarily afraid that your words might be interpreted out of context, and then you laugh at your paranoia and go on. But your carriage has changed, and your words are subtly altered. Privacy is a growing reach in the United States and around the world. As we change magnitudely use the profit and the datemingly boundary less options for collecting, saving, sharing, and comparing breeding trigger consumers worries.Online practices of business and government agencies may present new ways to agree privacy, and e-commerce and technologies that make a wide range of personal reading useable to any mavin with a Web browser only begin to hint at the possibilities for inappropriate or unwarranted intrusion into our personal lives. Privacy is very(prenominal) important-especially on the profits. It is amazing how many websites are designed to reveal nonpublic details astir(predicate) tribeactually it is a little chilling. In this paper, I go forth be discussing different topics on the value of digital privacy. Keywords privacy, personal knowledge, digital privacy . List and describe at to the lowest degree three (3) technologies that throw in the towel an soul to research citizens orphic data. The three technologies that allow an individual to research citizens private data are gentletooth, GPS, and Google (Internet). T he first engineering science I will discuss is Bluetooth. Bluetooth has several ways it finish be hacked. round ways are blue jacking, blue snarfing, and blue bugging. In blue jacking, soulfulness might vent unsolicited messages to the dupe in the form of a business card or a peregrine contact with a text that may look intimidating to read. In many cases, someone may withal send sounds akin a ring tone.The victims mobile could then be infiltrated and he/she might never know what has happened. Blue jacking messages clear also be viewed as spam messages with emails. There prepare also been reports about passel getting hacked by Trojan Horses which could mean a serious compromise. Blue snarfing is considered a serious compromise in the category of Bluetooth hacking especially if the information vulnerable, is quite critical, as such attacks can allow someone entree to victims contact list, text messages, emails and even private photos and videos. In blue bugging, someone u ses sophisticated attacks to gain control of victims mobile.It works just like Trojan horses, where someone can hold the users phone the way he/she desires by put to death commands on the victims phone. The hacker could forward mobile calls from the victims mobile to his own device and can even pull wires the mobile to follow a Bluetooth headset instructions like receive call, send messages etc. (Hubs by Hassam, 2011) The second engineering is GPS. A GPS undercuting whole enables you to determine the precise location of person, vehicle or other tendency. GPS (Global lieu System) is the only functional system, which can record the position of an object at regular intervals.A GPS tracking unit is so helpful that it can hive away the recorded location data within the tracking unit. Satellite transmits signals that can be intercepted by GPS receivers to find the precise location of any object you are searching for. Aside from making driving easier, the on-board electronics revolu tion has addicted some people a new direction in their lives. Unfortunately, it could assimilate them just into your bedroom or living room. These people are GPS thieves. When they mis agree your device, they sometimes get more than just an electronics item they can give for $100 or more on the street. They get your home address.With the pushing of a besideston, one common navigational feature, the home setting, fully automates the fulfill of directing you to your home a convenience that burglars and stalkers are sure to appreciate. Its complete to turn your free-floating anxiety about data theft into full-blown paranoia about home invasion. About two years ago, thieves stole a reckon of Acura cars from a corporations garage in Atlanta, and, in three cases, they used the GPS units in the cars to find and then burglarize employees homes. (Gary Thomas, Thieves Target GPS Devices to Find Out Where You cash in ones chips, December 2009)The final technology is Google. Our clas s exchanged names with one another. We went to the lab to find information on the person that we were given. It is amazing and scary to see how much information can be discovered from Google. Some information is phone numbers, addresses, and where someone actually lives. I can scarcely type in the name of the person or business, preferably with quote marks around the name, and if the phone number has been entered somewhere on the Web, than it will come up in my search results. I can also find all sorts of useful information with Google Maps, simply by type in an address.In fact, I can use Google Maps to view an entire neighborhood. 2. talk about the advantages and disadvantages of public gravel to this information, both for the researchers and those who are being investigated. One primary(prenominal) advantage and disadvantage of blue tooth is that I am in take care From a researchers view, Im able to exchange data across my cell phone, Im still have the ability to keep my i nformation private. In order to make a transfer or allow someone to access the files on the phone, I would have to give them access by accepting or rejecting the put across through my phone.As someone being investigated, I need to ensure if I have the Bluetooth feature enabled on the phone and not disabled musical composition using it, others that I may not even know necessitate to send me a file. Implementing security, even for these types of device pairings, can prevent an wildcat user from using the headset. As someone that is investigated, I would definitely fatality to keep my information such as contacts, addresses and other information private and safe. Some of the advantages of GPS are that it can track lost items and it can track people.As a researcher, I realize that the crime rate keeps on increasing in any part of the world and a lot of super valuable objects have been, and will, be stolen. It doesnt matter how irrelevant you view an object or equipment is to oth ers if it is something that is very expensive you should make sure you put together a GPS tracking system on it. As a researcher, I can found my item or child quickly. Many phones have GPS capabilities that young children and teens may not know about this is a great access if a child goes missing.As a person that is investigated, the disadvantage of GPS technology that can save lives can also provide a framework for invasion of privacy. According to the Electronic Frontier Foundation, locational privacy is the ability of an individual to move in public space with the expectation that under rule circumstances their location will not be systematically and secretly recorded for later use. (Peyton Brookes, Advantages Disadvantages of Mobile Tracking, 2012) As a researcher, information is plausibly the biggest advantage that Internet offers.Internet is a virtual treasure highway of information. any(prenominal) kind of information on any topic under the solarise is available on t he Internet. The search engines like Google, Yahoo are at your service on the Internet. There is a huge amount of information available on the Internet for just about every sacrificeoff known to man, ranging from government law and services, trade fairs and conferences, market information, new ideas and proficient support, the list is endless. Also as a researcher, Internet has made purport very convenient. With numerous online services I can now behave all my transactions online.I can book tickets for a movie, transfer funds, pay utility bills, taxes etc. , from my computer. Some travel websites even plan an way as per my preferences and take care of airline tickets, hotel reservations etc. As someone that is investigated, if I use the Internet for online banking, social networking or other services, I may risk a theft to my personal information such as name, address, credit card number etc. Evil people can access this information through unsecured connections or by planting software and then use my personal details for their benefit. uncalled-for to say, this may land me in serious trouble.Google stores enormous amounts of data to actor its Web search and advertising engines, and many privacy advocates have repeatedly raised concerns over the amount of personal information Google has the ability to access. 3. fit what measures citizens can take to protect private information or information they do not want to be disclosed. Some measures that citizens can take to protect private information are use different passwords for every account. It is easy to use the same password for each account that you have, but it is not safe or wise. Hackers have tools specifically designed to breach into accounts.A strong password contains letters, numbers, different cases, and symbols. another(prenominal) way, if you have old online accounts that are not being used, closes them. Hackers could use them to infiltrate your more important accounts. take hold of rid of t hem. If you cant remember where you have old accounts search your email inbox with queries like registered, confirm or your account to find email records of old accounts. Another measure to do is go paperless. Bank and credit card statements can contain social security or account information. Check with these agencies to see if you can go paperless, and use a secure online portal for your transactions. . talk about a federal law that grants the federal government the legal right to make private information on U. S. citizens available to the public, and whether or not you agree with this law. to fire for any reasons that are not unlawful, such as discrimination, etc. Since she did not obey company policies, she will be terminated. military man Resources will inform her if she will be receiving benefits or compensation from the company. 5. fall whether there are electronic privacy laws that can prevent others from having access to private information as well as how effective they a re. . . FEATURES- Internet DNS Security 610 -8References Halbert, T. , & Ingulli, E. (2012). Law & ethics in the business environment (7th ed. ). Mason, OH South-Western Cengage acquire http//autos. aol. com/article/gps-thief-home-invasion/ http//www. ehow. com/list_6068148_bluetooth-advantages-disadvantages. htmlixzz1u3e6jVDc http//hassam. hubpages. com/hub/Types-Of-Bluetooth-Hacks-And-Its-Security-Issues http//techgyo. com/index. php/3-major-advantages-gps-tracking-system/ixzz1u44hGdujsOME

No comments:

Post a Comment