• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

In today’s world where technology is constantly developing and changing there are bound to be flaws in what we create, or people who disagree with carrying out what our technology is capable of doing.

Extracts from this document...

Introduction

In today's world where technology is constantly developing and changing there are bound to be flaws in what we create, or people who disagree with carrying out what our technology is capable of doing. Such as CCTV, this provides a great services for capturing criminals and monitoring our safety but can also be taken to the extreme and can violate someone's privacy such as in the 1999 film Eye of the Beholder starring Ewan McGregor and Ashley Judd, or in an everyday instance where a security guard sets his cameras on you in a shop. Now that we have cameras that can zoom in so close, work in the dark and are tiny we have no way of detecting their presence or escaping their lens, this may be exactly what we need for vandals or thieves but is this really the price we have to pay to be safe? We have to trust whoever is in charge of these surveillance devices and more often than not we won't know who that is or where their cameras are. ...read more.

Middle

These devious files often crash the software if removed so have to remain part of the package. Spyware, much like CCTV can keep us safe but also be a huge invasion of privacy. Most people would say that the only reason to dislike these files is that you are doing something wrong, such as downloading movies, games or explicit pictures but most spyware disguises itself in order to access what you are doing - and this is deceitful and dishonest. These programs include Gatorware that promises to remember all your passwords for you, Bonzi Buddy, which says it will making surfing the net 'easier, faster and a lot more fun!' and Common Name which adds itself onto your tool bar in Internet Explorer and searches using keywords only. Personally I think it is outrageous to get information in such a cunning manor but there is one time when I accept it: KaZaA uses its spyware to count how many times a particular word has been searched, so someone one who is searching for pornographic images of children and such can be easily tracked down. ...read more.

Conclusion

For most people mobiles are an easy way to keep in touch with their bosses or families whilst somewhere that would otherwise not permit this and it is all too easy to get caught up in 'the now' and how important it is that whoever you are phoning gets the information you are about to tell them and with new features being added all the time mobiles seem very tempting - almost essential some might say. Another reason people persist to use mobile phones is that the damage that mobiles can cause is not widely known like that of drink driving or smoking. There is always the ability for people with the required equipment may be able to tap in and listen to your conversations. Obviously this is an invasion of privacy and is unnecessary for the general public but very handy for those in the FBI and other such secret services. ?? ?? ?? ?? Advantages and Disadvantages of Using Electronic Systems Katie Bancroft 02/05/2007 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. ICT Systems in Everyday Life: Your Local Community

    In the United Kingdom alone, there are approximately 2.5 million CCTV installations watching everything - cash machines, public transport, town centres, retailers, schools and the workplace to name but few and not to mention private installations to protect an individual's property and possessions.

  2. ICT Final Project (Complete)

    I will firstly make the buttons that navigate u around the system. This is a simple macro to record as it just involves clicking on the appropriate sheet. I will then assign the macro to a button, and edit the text on the button.

  1. ICT Final Project (complete)

    Exchanged price will be calculated when tested. The spreadsheet automatically applies the correct conversion rate to the currency selected and then applies the exchange fee. 12 The system must produce an invoice. Test customer data Invoice produced Implementation I will now create the live data import from the web, so I can build the user interface fully.

  2. I am writing about an employer using PC Technology, Entertainment and Mobile Technology in ...

    Nowadays, she never misses any appointments since she has a mobile phone to remind her. However, she usually wants to keep in contact with her clients at all times. A mobile phone gives her more time to communicate. An important conversation can take place anywhere for example on the train which puts less restriction on time.

  1. Information Security.

    It is impossible to make a widespread network physically secure, therefore security measures depend on information Techniques such as cryptography. No data can be made secure without physical protection of some sort, of the equipment The effect of good design is to concentrate the need for physical security not to circumvent it entirely.

  2. Two major drivers of greater globalization have been the decline in trade barriers and ...

    the firm is international already from inception. The first part is linked to the products and/or services being related to the Internet. This means that the company may have a new way of doing business, or an innovative product as a result of the possibilities with Internet technologies.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work