Verified Document

Internet Vulnerability In Today's Fast Term Paper

Some programs are even able to track keystrokes and take snapshots of computer screens, allowing criminals even more information, such as credit card numbers and usernames (Bahl, 219). While the obtaining of information through fraud is a problem related to Internet activity, there are other concerns with privacy that are still considered legal. For example, a company can obtain your personal information from transactions, and legally sell that information to the highest bidder (Sinrod, 17). While information traded between companies can increase competition, when the information is purchased by unscrupulous buyers, such transactions can threaten the security, privacy, and identity of consumers.

In addition, while restrictions exist on the government's collection of private and personal information from the Internet, loopholes exist that allow the government to obtain information without the knowledge of consumers. An example is the FBI's "Carnivore" system, developed to conduct surveillance of electronic communications by intercepting and collecting email and Internet searches (Dunham, 452). A portable device much like a phone tap, "Carnivore" was designed for court-ordered surveillance, but since the FBI controls the software, there is little civil regulation.

In addition to this form of privacy invasion, corporations are using employee tracking services more often in the workplace, as well. Numerous courts around the country have ruled that activities employees engage in on company Internets do not fall under the Constitutional protection of privacy. Companies are allowed the monitor phone calls, view all email messages, track online activities, including those believed deleted, and even track the number of keystrokes per day (Brin, 56).

While these clear vulnerabilities to identity theft, invasion of privacy, and fraud, are reasons for concern, consumers can protect themselves against such actions. The Center for Democracy and Technology lists several ways consumers can increase their online privacy. First, when using an Internet commerce site, consumers should view and read privacy policies to ensure the company preserves the integrity on online data. Additionally, the CDT suggests obtaining a separate, secure email account for online transactions and for children within the household. Third, clearing the computers temporary internet files and memory cache after browsing can protect consumers...

Finally, consumers can opt-out of any third party selling of information requested by websites or companies (Bahl, 225).
While the Internet has certainly made lives more convenient, communications faster, and information more readily accessible, there is a price to pay for these conveniences. As Howard Rheingold points out in "Disinformocracy," consumers need to look closely at technology, and examine not only how advancements such as the Internet can improve lives, but also the risks associated with that improvement (Rheingold, 188). Once risks are identified, such as the risk of responding to emails, online transactions, online communication, and web surfing, consumers need to protect themselves by performing a few simple, quick steps to keep both their own computers and their information stored online secure. While the Internet certainly introduces several privacy and identity theft issues, informed consumers can protect themselves against such losses, and the Internet can remain a safe, protected, vital piece of technology in the modern world.

References

Bahl, Shalini. "Consumers' Protection of Online Privacy and Identity." Journal of Consumer Affairs 38.2 (2004): 217-235.

Bielski, Lauren. "Security Breaches Hitting Home: Phishing, Information Leaks Keep Security Concerns at Red Alert." ABA Banking Journal 97.6 (2005): 7-18.

Brin, David. "Privacy Under Siege." The Transparent Society: Will Technology Force Us to Choose between Privacy and Freedom? Reading, MA: Perseus Books, 1998: 54-89.

Dunham, Griffin S. "Carnivore, the FBI's E-Mail Surveillance System: Devouring Criminals." Federal Communications Law Journal 54 (2002): 543-566.

Rheingold, Howard. "Disinformocracy." Challenging Perspectives. Ed. Deborah Holdstein. New York: Houghton Mifflin, 2005: 182-192.

Sinrod, Eric J. And Reilly William P. "Cyber Crimes: A Practical Approach to the Application of Federal Computer Crime Laws." Computer & High Tech 16.210 (2000): 16-20.

U.S. Dept of Justice. "Identity Theft and Fraud." U.S. Dept of Justice. 2005. 8 Dec 2006. http://www.usdoj.gov/criminal/fraud/idtheft.html#What%20Are%20Identity%20Theft%20and%20Identity.

Sources used in this document:
References

Bahl, Shalini. "Consumers' Protection of Online Privacy and Identity." Journal of Consumer Affairs 38.2 (2004): 217-235.

Bielski, Lauren. "Security Breaches Hitting Home: Phishing, Information Leaks Keep Security Concerns at Red Alert." ABA Banking Journal 97.6 (2005): 7-18.

Brin, David. "Privacy Under Siege." The Transparent Society: Will Technology Force Us to Choose between Privacy and Freedom? Reading, MA: Perseus Books, 1998: 54-89.

Dunham, Griffin S. "Carnivore, the FBI's E-Mail Surveillance System: Devouring Criminals." Federal Communications Law Journal 54 (2002): 543-566.
U.S. Dept of Justice. "Identity Theft and Fraud." U.S. Dept of Justice. 2005. 8 Dec 2006. http://www.usdoj.gov/criminal/fraud/idtheft.html#What%20Are%20Identity%20Theft%20and%20Identity.
Cite this Document:
Copy Bibliography Citation

Related Documents

Internet Security Measures an Assessment
Words: 3999 Length: 10 Document Type: Term Paper

Internet Security Measures- An Assessment The world of the Internet is truly an amazing and wonderful place where any information on any topic is available, right at your fingertips, with the mere click of a button. The Internet is very much like a huge city where high rises filled with honest people and slums filled with the lower classes coexist side by side; where there are both good people as well

Internet Safety and Youth Developing
Words: 1165 Length: 4 Document Type: Term Paper

If the parent will not sign a permission slip stating that they and the child have reviewed the rules, the school should not allow that student internet access. Other precautions include not allowing children to register at any website from school computers. Since one tool predators can use to break down a child's sense of caution is knowledge of the child's real name, parents should pay careful attention to their

Deviance Internet Crimes
Words: 1676 Length: 5 Document Type: Research Paper

Internet Crimes Deviance: Internet Crimes The Internet has revolutionized everything, from communication and entertainment to business. By one estimate, the Internet contains approximately 487 billion gigabytes (i.e., 487 Exabyte's) of data, and by the end of 2010, there were more than two billion Internet users. Nearly one-quarter of these users are members of social networking sites such as Facebook. There are many reasons for the Internet's extraordinary growth, including its vast applications,

Privacy for High School Students
Words: 12892 Length: 40 Document Type: Term Paper

Internet: Privacy for High School Students An Analysis of Privacy Issues and High School Students in the United States Today In the Age of Information, the issue of invasion of privacy continues to dominate the headlines. More and more people, it seems, are becoming victims of identity theft, one of the major forms of privacy invasion, and personal information on just about everyone in the world is available at the click of

Privacy in Social Networks Regarding Machine Learning
Words: 2537 Length: 8 Document Type: Research Paper

Abstract This paper discusses the issue of privacy in social networks with respect to advances in machine learning. It shows how machine learning protocols have been developed both to enhance and secure privacy as well as to invade privacy and collect, analyze, predict data based on users’ information and experience online. The conflict between these two directions in machine learning is likely to lead to a system wherein machine learning algorithms

Wireless Broadband Technology
Words: 20344 Length: 50 Document Type: Term Paper

Wireless Broadband Technology Overview of Wireless technology Presently it is quite evident to come across functioning of a sort of wireless technology in the form of mobile phone, a Palm pilot, a smart phone etc. With the inception of fast connectivity in the sphere of commerce it is customary and useful to operate from central locations communicating with the remote branches, conducting conferences in remote places, discussing with every body at every

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now