Verified Document

How Computers Have Affected The Discipline Essay

Science and Technology sounds promising as more and more unprecedented advances in computing, artificial intelligences robotics, genetics, biotechnology and neurosciences are unraveling. The commonly held belief is that technology goes on to make our lives better. Keeping this in mind, many people also believe that it has a positive impact on our aspects of our society. Because of the advents in technologies, there are present significant improvements in the standard of education, transport, and medical care as well. Similar impacts are also noticed in the security and safety arena as well. Even though the computer and science technology has had a positive impact on safety and technology, it has a negative impact as well. How computers have affected the discipline

Information security is a very crucial operational technique. Before computers were invented, the main mode of security was through manual means. Everything had to be taken care of using the conventional ways of security which include the main principle of lock and key. While business are concerned, all the documents and relevant information present had to be written down physically. Along with maintaining these items, they had to be organized in proper way as well. Furthermore, they were kept guard in a safe place so that no one else has access to it. This was in terms of security in the business realm. Coming to maintenance of safety and security in the city, the police technology evolved from the use of horses to motor bikes and to vehicles now. Similarly, for weapons sake, the safety starting off with sticks and spears evolved into the use of guns and bombs. In the modern era, chemical, nuclear and bio0lgical warfare has made nations feel both protected and vulnerable due to the adversity of these weapons.

It should be known that the addition of computers and technology into this discipline has made it quite complicated. It has resulted in the availability of many different pathways for criminals...

The department of crime control and prevention has gone to divide this into two different categories. Hard technology is technology like CCTV, street lights, and tasers and metal detectors (Byrne & Marx, 2011) All of these aforementioned things have made it easier to prevent crime. CCTV has markedly gone to reduce the incidence of theft and robbery because many places can be guarded without the presence of a guard or a watchman there. Seeing how CCTV also brings about proof of the incident. Therefore, not only have CCTVs prevented crime, they have also made conviction and arrests easier.
Other technologies that have had positive effects include enhanced weapons and data tracking devices. Computers in the squad cars and hands free patrol cars have made it easier for the law enforcement. With the introduction of computer, computer security technology also became very common. As mentioned earlier, bundles and bundles of important information can be saved on computers. Organizations and companies can keep their information safe by keeping passwords on their machines. This is a highly efficient and cost effective way of protecting corporate information because it does not require any manual labor as such. The top officials of the company should only be aware of the passwords and this will therefore ensure proper security for the organization. With increased technological advancement, many companies have installed tracking devices. If there is any deviation in the workplace, they can be detected by tracking and monitoring devices installed on the machines in the workplace. Furthermore, things like finger print sensitive technologies only ensure that certain personnel have access to the high security areas within an…

Sources used in this document:
References

Byrne, J., & Marx, G. (2011). Technological innovations in crime prevention and policing. A review of the research on implementation and impact. Journal Of Police Studies, 20(3), 17 -- 40.

European Union,. (2012). Health effects of security scanners for passenger screening (based on X-ray technology) (1st ed.). Brussels: European Union. Retrieved from http://ec.europa.eu/health/scientific_committees/emerging/docs/scenihr_o_036.pdf

Goodman, M. (2012). How technology makes us vulnerable. CNN. Retrieved 5 July 2014, from http://edition.cnn.com/2012/07/29/opinion/goodman-ted-crime/
Cite this Document:
Copy Bibliography Citation

Related Documents

Released by the FBI and
Words: 17274 Length: 65 Document Type: Research Proposal

" Human development- behavioral shifts in human being that tae place during the course of an entire lifespan ("Human Behavior"). Risk Analysis- the activity of determining and analyzing the dangerous natural and human caused negative events. This analysis takes into consideration the risks these event pose to businesses individuals and governments. Within the domain of information technology risk analysis reports are utilized to tailor technology-related objectives with a an organization's business objectives.

Open Source Social Science
Words: 3536 Length: 13 Document Type: Term Paper

Open source software has recently emerged as the frontrunner for many industries as the primary method of code production, as it is widely predicted to provide more options for its users in a quicker, quality improved, and cost effective format than the more traditional proprietary software. Linux, the dominant player in the market, is a considerable threat to the Microsoft operating system, which has successfully established itself in the global

History of Personal Computer Ceruzzi, P.E. 2010 .
Words: 1387 Length: 4 Document Type: Essay

History Of Personal Computer Ceruzzi, P.E. (2010). "Ready or not, computers are coming to the people": Inventing the PC. OAH Magazine of History 24(3), pp. 25-28. Retrieved from MasterFILE Premier database. In late 1974, a young Boston-based electronics engineer read an article in Popular Electronics about small personal computers. He showed the article to a friend, Harvard undergrad William "Bill" Gates III, and the two soon formed a company to write software

Media Artifact in American Culture Twitter: An
Words: 2998 Length: 9 Document Type: Essay

Media Artifact in American Culture Twitter: An Arising Media Artifact in American Culture In the course of an average year in viewing mainstream American culture, an innumerable amount of fads come and go, gaining their respective fifteen minutes of fame on the stage that is set by the American media industry. After spending what is often a brief time in the spotlight, these media trends tend to fade out nearly as abruptly

Internet and Society 1976 Present
Words: 2665 Length: 8 Document Type: Research Paper

Internet and Society The Internet and American Society In the history of humankind there have been very few inventions which have completely transformed human society. Inventions like the wheel, agriculture, astronomy and geometry have all transformed humankind from uncivilized barbarians into a creatures of culture and society. The invention of science, discovery of electricity, the atom, and other inventions have then propelled the human race forward into a more technologically society, one

Global, Ethical, and Professional Issues
Words: 2788 Length: 10 Document Type: Research Paper

" (Johnson, 2005) the notion of ruling against the defendant in all identity theft or related cases may establish the wrong precedent for future cases. "On the other hand, if liability is too readily assessed, it will have the power to bankrupt valuable enterprises because of the often vast numbers of potential plaintiffs and consequent extensive resulting damages." (Johnson, 2005) Internet security and identity theft is a very pervasive problem globally.

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now