Computer Surveillance: Qualitative Attempt To Term Paper

PAGES
19
WORDS
4976
Cite

Now cookies have transformed the shape of communication and have further advanced the ability of criminals to survey individual user functions on the web. The web is many things, an environment for "learning, conversing, coordinating and trading" but also "a means of trapping the unwary, of constraining the choices of the unsuspecting" (Lyon, 2002). From cookies web bugs developed, and increasingly other surveillance methods pop up daily. According to Lyons (2002) the web might be considered the "World Wide Web of Surveillance" (p. 345).

Lyons (2002) further defines surveillance as "processing personal data for the purposes of management and influence" and suggests that though ambiguous in nature, computer surveillance is constantly changing (p. 345).

Networked Surveillance

Networked surveillance or trading of names, email addresses and renting of lists that contain consumer information gathered from sites has in the past been considered relatively benign (Lyons, 2002). According to one leader at Sun Microsystems, most people "have zero privacy anyway, get over it" (Lyons, 2002, p. 345). But the problem has become more insidious.

Campbell & Carlson (2002) note that surveillance is often used as a "technique and technology of control" in a society best designed as focused on "information capitalism." (p. 586). In their study, Campbell & Carlson point out that surveillance technologies can be employed for such purposes as more effective and directed marketing and advertising online. Further they suggest that privacy has become a commodity that can be sold to anyone for any purpose at the right price (Campbell & Carlson, 2002).

According to Marx (2003), "the increased prominence of surveillance technologies is pulled by concerns over issues such as crime, terrorism, and economic competitiveness, and is pushed by newly perceived opportunities in electronics, computerization and artificial intelligence" (p. 369). Increased expectations of and protections for privacy have furthered interest in surveillance and even greater technological developments (Marx, 2003).

Marx (2003) also points out that there are many cultural beliefs that support "the legitimacy of surveillance" and notes phrases such as "I have nothing to hide" and "It's for my own good" as evidence to support this notion (p. 369). He goes on to conduct a study where he concludes that 11 forms of surveillance neutralization exist and that the majority of these are forms of 'resistance or noncompliance' (Marx, 2003, p. 369).

Electronic Surveillance in the Workplace

Another area where computer surveillance is increasingly a concern is in the workplace, though the implication for criminal activity in this regard is unclear according to the research available. More and more employees have reason to be concerned about surveillance and privacy issues as they find their employers have the ability to monitor their electronic activity more closely than before (Sinrod, 2001). Employers however argue that they have some valid reasons for monitoring.

According to statistics, a recent survey conducted by the American Management Association revealed that almost 80% of companies use some form of computer surveillance to monitor employee activities (Sinrod, 2001). Among the more common surveillance conducted includes surveillance of Internet use and email messages (Sinrod, 2001).

In certain states laws have been enacted that prevent employers from monitoring employee e-mail, as is the case in California (Sinrod, 2001). Employers however continue to rationalize their activity, noting that computer surveillance helps "combat personal use of the Internet during core business hours" (Sinrod, 2001).

Employers are also looking however to limit "defamatory statements" that employees may be making via electronic communications (Sinrod, 2001).

The issues of privacy rights violation however are legitimate. The primary legislative measure targeted toward electronic privacy in the workplace is the electronic communications privacy act, enacted in 1986, which bars the "intentional interception of any wire, oral or electronic communication, or the unauthorized access of stored communications" (Sinrod, 2001). This act is not without limitations however, and does allow monitoring under "appropriate circumstances" including allowing employers to monitor business calls and communications where employee consent has been acquired (Sinrod, 2001).

Other reasons cited for surveillance include an employee productivity issues, quality of work, employee theft, unlawful activity and other factors "potentially affecting productivity" (Johnson, 1995).

According to Bryant, there are some positions more likely to be monitored than others including: "word processors, data entry, telephone operators, customer service representatives, telemarketers, insurance clerks and bank proof clerks" (Bryant, 1995). Professional and technical workers are also monitored, and electronic mail surveillance of employee activities is common (Bryant, 1995). The exact number of employees affected by surveillance has not been recorded, but estimates suggests that as many as 20 million Americans...

...

At what point does computer surveillance in the workplace become cause for concern? Can it even be considered a legitimate crime? What is clear is simply that the answer to this question is yet unclear in the minds of law enforcement agents, employers and employees alike.
Deterring Crime

Can computer crime resulting from surveillance actually be deterred? Computer surveillance crimes can be "committed anonymously from anywhere in the world at anytime," and according to some the consequences are "unprecedented" (Wible, 2003). To deter crime Wible (2003) suggests that traditional law enforcement methods must be altered, because computer crime requires "a new approach to thinking about deterrence" (p. 1577). To what extent these methods must be altered however remains a question to be answered.

Wibler (2003) suggests that computer crime may come in many varieties, including: online theft and fraud, vandalism and politically motivated activities, whereas 'hackers' generally want to break codes, seek challenges and gain bragging rights (p. 1577).

One school of thought is that a form of hacking called "look and see" where the hacker only attempts to get in to break a code and look around should be de-criminalized (Wible, 2003). Yet another method suggests that contests can be created to provide incentives for "law-abiding hacking" acknowledging this subculture yet maintaining individual's privacy (Wibler, 2003).

Up until this far most legislative action geared toward eliminating computer crime has proven largely ineffective... despite criminal penalties hackers in particular continue to intrude private networks (Wibler, 2003). Wibler's (2003) study suggests that contests may steer behavior away from unwanted intrusions while encouraging the hacker to remain competitive and work within his/her culture. Though Wibler's suggestions for deterring crime are interesting and cause one to think that crime may be addressed in an alternative way, they do not suggest solutions for more serious criminal activity. Those hackers interested in participating in contests are likely to be the least malignant of criminals and the least likely to impact consumers and businesses severely in the long-term.

Deterrance and Encryption Technology

In response to increased concerns over illicit computer surveillance, there has surfaced a rise in encryption technologies (Shelley, 1998). Is this the answer to deterrence?

Financial services industries are already required to secure any computerized transactions (Shelley, 1998). More sophisticated and more widely available technologies are consistently developed, and a trend is now forming toward "integration of robust digital encryption technologies into commercial desktop applications and networks" (Shelley, 1998).

There are however still many tools that computer criminals can use to seal electronic material or conceal illicit activity, "including anonymous re-mailers, where electronic messages can be forwarded without divulging sources," and a tool called steganography, where secret and innocuous data can be concealed (Shelley, 1998, p. 605). Part of the problem is countermeasures to prevent criminal activity are often very costly and technologically complicated, and thus far encryption technologies are not quite strong enough to prevent crime groups from accessing this technology and abusing it (Shelley, 1998).

Encryption can actually be used by criminals to avoid tracing criminal activities on the web (Shelley, 1998). Organized crime consistently uses computer surveillance to monitor international financial activities, and there is much evidence that suggests that crime groups have used encryption techniques to gain access to law enforcement and other protected information (Shelley, 1998). However there is not at this time enough information to assess accurately the extent to which encryption is growing and masking illicit activity, merely evidence to suggest that it is an area of growth among criminals (Shelley, 1998).

According to the FBI, there are at least 5,000 computer forensics cases each year, up to 10,000 and generally 5% involve encryption (Shelley, 1998). Business personnel suggest that 29% of computer crimes are unsolvable because they use encryption, whereas technology experts suggest that figure may be as high as 50% (Shelley, 1998).

Clearly better steps and efforts must be directed at better safeguarding encryption technologies. On the same token, researchers and law enforcement officials must continue to develop better and more advanced encryption methods to help ensure the safety and privacy of consumers and businesses conducting financial and other personal transactions over the web.

Methodology

Setting

The setting for this…

Sources Used in Documents:

references and deter computer crime." Yale Law Journal, Vol. 112, Issue 6, p. 1577

Computer Surveillance


Cite this Document:

"Computer Surveillance Qualitative Attempt To" (2004, October 05) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/computer-surveillance-qualitative-attempt-58182

"Computer Surveillance Qualitative Attempt To" 05 October 2004. Web.19 April. 2024. <
https://www.paperdue.com/essay/computer-surveillance-qualitative-attempt-58182>

"Computer Surveillance Qualitative Attempt To", 05 October 2004, Accessed.19 April. 2024,
https://www.paperdue.com/essay/computer-surveillance-qualitative-attempt-58182

Related Documents

Benchmarking Keyloggers for Gathering Digital Evidence on Personal Computers Keyloggers refers to the hardware or software programs, which examine keyboard and mouse activity on a computer in a secretive manner so that the owner of the computer is not aware that their actions are monitored. The keyloggers accumulate the recorded keystrokes for later recovery or remotely convey it to the person employing them. Keyloggers aimed to serve as spyware and currently

data collection includes survey form, structured interviews using closed ended questions, and gathering information regarding a sample size appropriate to analyze and draw conclusion on the basis of the research results. The statistical techniques are used for data analysis to analyze collected data in quantitative research methods. The qualitative data is gathered through case study method and open ended question of an unstructured interview from notable sample. The qualitative

However, cursory studies that have been conducted are either biased because they seem to present a biased review of certain products or are insufficient because of their limitations and shallowness. Those studies that have been considered to be useful are mentioned below. Robert D. Boerner, Joanne Bourquard, Pam Greenberg (2000) comprehensively elaborates the legal aspect of spam. He provides an in-depth review of the present laws in actions and the

Internet has grown exponentially since its first introduction to the public. The precursor to the Internet was the ARPANET. The Advanced Research Projects Agency (ARPA) of the Department of Defense (Carlitz and Zinga, 1997) and the National Science Foundation (NSF) were the primary creators of the ARPANET. Subsequently however, efforts from private entities and universities have helped develop the network infrastructure, as it exists today. "The goals of ARPA's

This category can further be divided into six subgroups namely; short-range, medium range, long-range, close range, endurance, Medium Altitude Long Endurance (MALE) Unmanned Aerial Vehicles (UAVs). The long-range UAVs are technologically more advanced as they use satellites in order to overcome the communication problem between the UAVs and the ground stations. This communication problem is generally caused by the curvature of the earth. The medium, short and close range

66). Furthermore, social software will only increase in importance in helping organizations maintain and manage their domains of knowledge and information. When networks are enabled and flourish, their value to all users and to the organization increases as well. That increase in value is typically nonlinear, where some additions yield more than proportionate values to the organization (McCluskey and Korobow, 2009). Some of the key characteristics of social software applications