Internet Vulnerability In Today's Fast Term Paper

Some programs are even able to track keystrokes and take snapshots of computer screens, allowing criminals even more information, such as credit card numbers and usernames (Bahl, 219). While the obtaining of information through fraud is a problem related to Internet activity, there are other concerns with privacy that are still considered legal. For example, a company can obtain your personal information from transactions, and legally sell that information to the highest bidder (Sinrod, 17). While information traded between companies can increase competition, when the information is purchased by unscrupulous buyers, such transactions can threaten the security, privacy, and identity of consumers.

In addition, while restrictions exist on the government's collection of private and personal information from the Internet, loopholes exist that allow the government to obtain information without the knowledge of consumers. An example is the FBI's "Carnivore" system, developed to conduct surveillance of electronic communications by intercepting and collecting email and Internet searches (Dunham, 452). A portable device much like a phone tap, "Carnivore" was designed for court-ordered surveillance, but since the FBI controls the software, there is little civil regulation.

In addition to this form of privacy invasion, corporations are using employee tracking services more often in the workplace, as well. Numerous courts around the country have ruled that activities employees engage in on company Internets do not fall under the Constitutional protection of privacy. Companies are allowed the monitor phone calls, view all email messages, track online activities, including those believed deleted, and even track the number of keystrokes per day (Brin, 56).

While these clear vulnerabilities to identity theft, invasion of privacy, and fraud, are reasons for concern, consumers can protect themselves against such actions. The Center for Democracy and Technology lists several ways consumers can increase their online privacy. First, when using an Internet commerce site, consumers should view and read privacy policies to ensure the company preserves the integrity on online data. Additionally, the CDT suggests obtaining a separate, secure email account for online transactions and for children within the household. Third, clearing the computers temporary internet files and memory cache after browsing can protect consumers...

...

Finally, consumers can opt-out of any third party selling of information requested by websites or companies (Bahl, 225).
While the Internet has certainly made lives more convenient, communications faster, and information more readily accessible, there is a price to pay for these conveniences. As Howard Rheingold points out in "Disinformocracy," consumers need to look closely at technology, and examine not only how advancements such as the Internet can improve lives, but also the risks associated with that improvement (Rheingold, 188). Once risks are identified, such as the risk of responding to emails, online transactions, online communication, and web surfing, consumers need to protect themselves by performing a few simple, quick steps to keep both their own computers and their information stored online secure. While the Internet certainly introduces several privacy and identity theft issues, informed consumers can protect themselves against such losses, and the Internet can remain a safe, protected, vital piece of technology in the modern world.

Sources Used in Documents:

References

Bahl, Shalini. "Consumers' Protection of Online Privacy and Identity." Journal of Consumer Affairs 38.2 (2004): 217-235.

Bielski, Lauren. "Security Breaches Hitting Home: Phishing, Information Leaks Keep Security Concerns at Red Alert." ABA Banking Journal 97.6 (2005): 7-18.

Brin, David. "Privacy Under Siege." The Transparent Society: Will Technology Force Us to Choose between Privacy and Freedom? Reading, MA: Perseus Books, 1998: 54-89.

Dunham, Griffin S. "Carnivore, the FBI's E-Mail Surveillance System: Devouring Criminals." Federal Communications Law Journal 54 (2002): 543-566.
U.S. Dept of Justice. "Identity Theft and Fraud." U.S. Dept of Justice. 2005. 8 Dec 2006. http://www.usdoj.gov/criminal/fraud/idtheft.html#What%20Are%20Identity%20Theft%20and%20Identity.


Cite this Document:

"Internet Vulnerability In Today's Fast" (2006, December 08) Retrieved May 8, 2024, from
https://www.paperdue.com/essay/internet-vulnerability-in-today-fast-41114

"Internet Vulnerability In Today's Fast" 08 December 2006. Web.8 May. 2024. <
https://www.paperdue.com/essay/internet-vulnerability-in-today-fast-41114>

"Internet Vulnerability In Today's Fast", 08 December 2006, Accessed.8 May. 2024,
https://www.paperdue.com/essay/internet-vulnerability-in-today-fast-41114

Related Documents

Internet Security Measures- An Assessment The world of the Internet is truly an amazing and wonderful place where any information on any topic is available, right at your fingertips, with the mere click of a button. The Internet is very much like a huge city where high rises filled with honest people and slums filled with the lower classes coexist side by side; where there are both good people as well

If the parent will not sign a permission slip stating that they and the child have reviewed the rules, the school should not allow that student internet access. Other precautions include not allowing children to register at any website from school computers. Since one tool predators can use to break down a child's sense of caution is knowledge of the child's real name, parents should pay careful attention to their

Internet is arguably the greatest revolution in Human History. In considerably less than a century, information-gathering and communication have skyrocketed with no apparent end in sight. Google and Wikipedia are merely two examples of Internet developments that were probably unimaginable even 20 years ago but are widely-used realities today. Searching for information on Google IS and IS NOT like trying to find a needle in a haystack. Was the library

Deviance Internet Crimes
PAGES 5 WORDS 1676

Internet Crimes Deviance: Internet Crimes The Internet has revolutionized everything, from communication and entertainment to business. By one estimate, the Internet contains approximately 487 billion gigabytes (i.e., 487 Exabyte's) of data, and by the end of 2010, there were more than two billion Internet users. Nearly one-quarter of these users are members of social networking sites such as Facebook. There are many reasons for the Internet's extraordinary growth, including its vast applications,

Internet Encryption The growing sophistication of internet, along with advancing abilities of individuals to hack into electronic systems is creating a growing need for improved encryption technology. The internet is becoming a domain all to itself, with its own rules, and requirements. The internet is creating new opportunities for the business and communication industries. It is also creating new demands. The internet is now facing a period in its evolution similar

Internet Voting in the U.S. At least in the last decade, the use of the internet has become a part of the daily schedule of the 90% majority who go online at least daily, 2/3 at least 10 hours a week and 1/3 at least 20 hours a week (Davis 2000), most of them below 25 years old. There has been dramatic growth in the amount of information available online and