• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

In today’s world where technology is constantly developing and changing there are bound to be flaws in what we create, or people who disagree with carrying out what our technology is capable of doing.

Extracts from this document...


In today's world where technology is constantly developing and changing there are bound to be flaws in what we create, or people who disagree with carrying out what our technology is capable of doing. Such as CCTV, this provides a great services for capturing criminals and monitoring our safety but can also be taken to the extreme and can violate someone's privacy such as in the 1999 film Eye of the Beholder starring Ewan McGregor and Ashley Judd, or in an everyday instance where a security guard sets his cameras on you in a shop. Now that we have cameras that can zoom in so close, work in the dark and are tiny we have no way of detecting their presence or escaping their lens, this may be exactly what we need for vandals or thieves but is this really the price we have to pay to be safe? We have to trust whoever is in charge of these surveillance devices and more often than not we won't know who that is or where their cameras are. ...read more.


These devious files often crash the software if removed so have to remain part of the package. Spyware, much like CCTV can keep us safe but also be a huge invasion of privacy. Most people would say that the only reason to dislike these files is that you are doing something wrong, such as downloading movies, games or explicit pictures but most spyware disguises itself in order to access what you are doing - and this is deceitful and dishonest. These programs include Gatorware that promises to remember all your passwords for you, Bonzi Buddy, which says it will making surfing the net 'easier, faster and a lot more fun!' and Common Name which adds itself onto your tool bar in Internet Explorer and searches using keywords only. Personally I think it is outrageous to get information in such a cunning manor but there is one time when I accept it: KaZaA uses its spyware to count how many times a particular word has been searched, so someone one who is searching for pornographic images of children and such can be easily tracked down. ...read more.


For most people mobiles are an easy way to keep in touch with their bosses or families whilst somewhere that would otherwise not permit this and it is all too easy to get caught up in 'the now' and how important it is that whoever you are phoning gets the information you are about to tell them and with new features being added all the time mobiles seem very tempting - almost essential some might say. Another reason people persist to use mobile phones is that the damage that mobiles can cause is not widely known like that of drink driving or smoking. There is always the ability for people with the required equipment may be able to tap in and listen to your conversations. Obviously this is an invasion of privacy and is unnecessary for the general public but very handy for those in the FBI and other such secret services. ?? ?? ?? ?? Advantages and Disadvantages of Using Electronic Systems Katie Bancroft 02/05/2007 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. ICT Systems in Everyday Life: Your Local Community

    * Security: The security chapter provides requirements and fundamental specifications for persistent content protection and controlled access in open security architecture. These objectives are achieved with high security in a multi-user environment via the application of well respected security and encryption standards in primarily three: 1.

  2. Ict and an adult with disability

    to the delivery costs, and if he remembers something he needed after he has placed the order, he has to place another order for it which will cost more money. Aside from this, if he did go down to the local supermarket he could pick the best of the products

  1. ICT Final Project (Complete)

    I feel this makes them stand out. I also used a formula to turn the total profit red if it is a negative figure. I did this by using conditional formatting which is shown below ......... This is the final image of the profits and loss worksheet......

  2. ICT Final Project (complete)

    Data converted manually: A conversion of �3,000.00 into Euros should give the results �75.00 profit, �3075.00 total price, and should come to � 3,949.83 The spreadsheet automatically applies the correct conversion rate to the currency selected and then applies the exchange fee.

  1. Free essay

    Impact of ICT in Community

    The OWASYS 22c Mobile Phone is easy to use. There is a dedicated key to access the phonebook, an information key that verbalizes your position within the phone's menu system and a key to easily switch to hands-free mode. The phone has an ergonomic design with tactile keys, embedded antenna, vibrating alarm and a choice of 56 ring tones.

  2. I am writing about an employer using PC Technology, Entertainment and Mobile Technology in ...

    Nowadays, she never misses any appointments since she has a mobile phone to remind her. However, she usually wants to keep in contact with her clients at all times. A mobile phone gives her more time to communicate. An important conversation can take place anywhere for example on the train which puts less restriction on time.

  1. Information Security.

    Of the three operations carried out in information systems, storage, processing and transmission, it is undoubtedly data transmission that carries the greatest of security risks. A communication network consists of numbers of cables, radio links, switches and multiplexers in a variety of locations, all of these parts of the system being potential targets for 'line taps' or 'bugs'.

  2. Two major drivers of greater globalization have been the decline in trade barriers and ...

    the firm is international already from inception. The first part is linked to the products and/or services being related to the Internet. This means that the company may have a new way of doing business, or an innovative product as a result of the possibilities with Internet technologies.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work