• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  • Level: GCSE
  • Subject: ICT
  • Word count: 2881

Does the Internet Protect or Affect Privacy.

Extracts from this document...

Introduction

DOES THE INTERNET PROTECT OR AFFECT PRIVACY? 1The Internet is a global network of millions of smaller computer networks linked by terrestrial and extra terrestrial communications channels. The most common use of the Internet is for sending and receiving international electronic mail (E-mail). Hence, the Internet can be referred to as the largest network of networks; it is a concept, which continues to grow beyond known boundaries thus bringing about extensive information from across the globe. It has successfully breach communication gaps, which benefits individuals as well as organisations alike. 2"The Internet (the net) is a rapidly growing global web of thousands of business, educational and research networks connecting millions of computers and their users in more than 100 countries to each other". The Internet technology possess a great deal of capabilities which facilitates the usage of internet in achieving set tasks efficiently and effectively to a required level, hence it is now more or less part of everyday business operations as well as enhancing individuals' needs. 3Major Internet capabilities such as: * E-Mail - Refers to messaging from one person to another and also sharing of documents. * Usenet Newsgroups - Discussion groups via electronic bulletin boards where people share information and ideas on set topics. * LISTSERV's - Discussion groups with the aid of e-mail mailing list servers. * Chatting - Basically refers to interactive conversations. * Telnet - Concept of logging on to one computer and working on another. ...read more.

Middle

This raises questions such as should people have say on data kept on their behalf and how it is used? To what extent does information kept affect or benefit individuals? For example, Database America and Yahoo Inc included unlisted phone numbers and addresses for people such as police officers, judges and prosecutors who feared their lives would be in danger if malefactors found out where they lived. Ref: "Web on Privacy Alert" Computer World, April 29, 1996 By Mitch Wagner. This situation shows the implication of misusing data, also the fact that a person can find out a lot about you with very little effort seems scary, hence it is deemed vital that people are informed about how information held about them is to be used. This issue raises concerns and fear that people without the authority to use the information could use private information for purposes other than for which it was intended. 6"Information is said to be equated to power and influence, therefore any society should have a number of legal and statutory checks and balances in place to prevent the misuse of information". Computer Security along with privacy issues have become big news, in the courtroom, the boardroom with policy makers and lawmakers. Buying On The Internet The idea of purchasing goods over the Internet seems like an easy and efficient way to obtain required goods, however due to the vulnerability of the Internet Technology it can also lead to unnecessary headache in that, privacy can be easily violated. ...read more.

Conclusion

8"Terrorism poses a serious threat, requiring a serious government response. However, all too often the terrorism issue has been used as the justification for eroding civil liberties. In recent years, communications technologies and the Internet have become the increasing focus of proposals - introduced in the name of fighting terrorism - that really ends up only diminishing privacy". Although Internet crime is on the increase, 9the potential for government to help seems limited, in that, there is a risk of the government doing more harm through design mandates or further intrusion on privacy. Carnivore - this is a computer program designed by the FBI to intercept Internet communication. Although the idea behind Carnivore seems ideal i.e. it is designed to aid investigation of criminal offence via scanning all incoming and outgoing emails - including sender and recipient addresses of a suspect. However, the introduction of Carnivore creates a new threat to the privacy and security of Internet communications, for instance, everywhere we go on the Internet we leave digital fingerprints, which can be tracked, by marketers and government agencies alike. On the whole, the issue of privacy on the Internet is very important that is, policing the Internet is virtually impossible due to the ever changing world of technology hence, laws tend to follow technology and not the other way round. Monitoring of the Internet may be argued as vital in dealing with wrong doers however, 10"the desire to translate every current offline surveillance capability into online world - regardless of consequences - should not be allowed to create a new technical surveillance architecture with huge privacy and security risks". ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. ICT Systems in Everyday Life: Your Local Community

    From magnetic tape to VHS tapes, storage could become quite a problem. Many of the units on the market today make use of CDR technology, making it possible to store more hours of surveillance on a single disk. This can be crucial for law enforcement officials, as well as persons

  2. OCR GCSE Business & Communication Task 7 Report

    I also wanted to have knowledge of how to achieve this and to be able to do it efficiently and effectively. Moral Issues: Moral issues related to my selective printout may include wasting paper on unnecessary information incorporated into the piece being printed.

  1. SK-II has already established as a leading brand within its' skin-care industry. By empowering ...

    * Spiller V. Anderson, President, Hometown Marketplace Inc. The real secret is in making money with a tested, proven process that can build your business for the long run without risking your earnings, time or sanity. Affiliate marketing is performance-based advertising. You pay on results when you made a profit.

  2. Information Security.

    Of the three operations carried out in information systems, storage, processing and transmission, it is undoubtedly data transmission that carries the greatest of security risks. A communication network consists of numbers of cables, radio links, switches and multiplexers in a variety of locations, all of these parts of the system being potential targets for 'line taps' or 'bugs'.

  1. This report gives the clear idea about current statistical situation in e-learning trends.Task 2 ...

    * Advanced technology will change the way classroom instruction and library services are delivered. * Non-educational organizations will begin to deliver higher education via distance learning. * Computing will become increasingly less dependent on location. * Computer applications will become more user-friendly.

  2. Impact of ITC on society.

    or the work is made available to the public, (by authorised performance, broadcast, exhibition, etc.) Sound Recordings and broadcasts; 50 years from the end of the calendar year in which the last remaining author of the work dies, or the work is made available to the public, (by authorised release, performance, broadcast, etc.)

  1. Development of a set of marketing recommendations, marketing mix campaign and customer care initiatives.

    It is predicted in the Internet news web site (2002) that by the year 2005 7% of all UK grocery sales will be web based. At the current time Tesco is the leading e-commerce grocer, this is also a prime opportunity for Safeway, to follow the footstep of Tesco and become in the forefront in e-commerce trading.

  2. Powerpoint technical Report

    Once my footer was in place I clicked on "Close Master View," to return back to my original screen, so that I could work on my slides, to create my slide show. Step 5 After I had inserted a footer in slide master view, I then decided to impose a

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work