• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

In today’s world where technology is constantly developing and changing there are bound to be flaws in what we create, or people who disagree with carrying out what our technology is capable of doing.

Extracts from this document...


In today's world where technology is constantly developing and changing there are bound to be flaws in what we create, or people who disagree with carrying out what our technology is capable of doing. Such as CCTV, this provides a great services for capturing criminals and monitoring our safety but can also be taken to the extreme and can violate someone's privacy such as in the 1999 film Eye of the Beholder starring Ewan McGregor and Ashley Judd, or in an everyday instance where a security guard sets his cameras on you in a shop. Now that we have cameras that can zoom in so close, work in the dark and are tiny we have no way of detecting their presence or escaping their lens, this may be exactly what we need for vandals or thieves but is this really the price we have to pay to be safe? We have to trust whoever is in charge of these surveillance devices and more often than not we won't know who that is or where their cameras are. ...read more.


These devious files often crash the software if removed so have to remain part of the package. Spyware, much like CCTV can keep us safe but also be a huge invasion of privacy. Most people would say that the only reason to dislike these files is that you are doing something wrong, such as downloading movies, games or explicit pictures but most spyware disguises itself in order to access what you are doing - and this is deceitful and dishonest. These programs include Gatorware that promises to remember all your passwords for you, Bonzi Buddy, which says it will making surfing the net 'easier, faster and a lot more fun!' and Common Name which adds itself onto your tool bar in Internet Explorer and searches using keywords only. Personally I think it is outrageous to get information in such a cunning manor but there is one time when I accept it: KaZaA uses its spyware to count how many times a particular word has been searched, so someone one who is searching for pornographic images of children and such can be easily tracked down. ...read more.


For most people mobiles are an easy way to keep in touch with their bosses or families whilst somewhere that would otherwise not permit this and it is all too easy to get caught up in 'the now' and how important it is that whoever you are phoning gets the information you are about to tell them and with new features being added all the time mobiles seem very tempting - almost essential some might say. Another reason people persist to use mobile phones is that the damage that mobiles can cause is not widely known like that of drink driving or smoking. There is always the ability for people with the required equipment may be able to tap in and listen to your conversations. Obviously this is an invasion of privacy and is unnecessary for the general public but very handy for those in the FBI and other such secret services. ?? ?? ?? ?? Advantages and Disadvantages of Using Electronic Systems Katie Bancroft 02/05/2007 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. ICT Systems in Everyday Life: Your Local Community

    * Security: The security chapter provides requirements and fundamental specifications for persistent content protection and controlled access in open security architecture. These objectives are achieved with high security in a multi-user environment via the application of well respected security and encryption standards in primarily three: 1.

  2. Information Security.

    Email Is Superior To The Traditional Office Memo Because It Uses No Paper (Save The Trees!!) And It Can Be Sent To A Whole List Of People Instantly. Purpose: Transmitting Messages Between Computer Users Major Advantage: Speed For Communication And The Lower Cost .

  1. OCR GCSE Business & Communication Task 7 Report

    graph which is also able to be accustomed according to my liking. For example, I was able to change the graphs colours to my companies corporate image and colours to show a professional and consist look throughout my company's work.

  2. Two major drivers of greater globalization have been the decline in trade barriers and ...

    The second part is related to performing a major part of the core business function of the company online. This means that transactions and interactions, including market communications, customer service, contractual and purchasing procedures, payment, logistics and shipping may be performed online.

  1. Information Technology - Creating a Web Site

    Detail what works well (e.g. no need to scroll down to find info; navigation always available; good use of colour to highlight key points, fast download; interesting features (feedback/ordering form, counter, site map, site search) etc. and be critical about what is poor (in your opinion): font difficult to read

  2. ICT Final Project (complete)

    The backup with be stored separately to the system on the hard drive. There will also be a macro that allows a manual backup that is not written to unless the user specifically wants to - every hour or at the end of the day etc (for the event of the original and backup getting corrupted)

  1. Ict and an adult with disability

    It contains a mounted right arm joystick which he uses to control his wheel chair. His wheel chair enables him to go out socially to meet friends but most importantly to meet people for his business. Vauxhall Meriva - he uses his cars mainly for mobility.

  2. ICT Final Project (Complete)

    - It is not a program designed specifically for storing data in a data base. What is the best way to solve the problem and why? I have chosen to Use Microsoft Excel as the program software I will use to create my system for Mrs Williams.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work