• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

In today’s world where technology is constantly developing and changing there are bound to be flaws in what we create, or people who disagree with carrying out what our technology is capable of doing.

Extracts from this document...


In today's world where technology is constantly developing and changing there are bound to be flaws in what we create, or people who disagree with carrying out what our technology is capable of doing. Such as CCTV, this provides a great services for capturing criminals and monitoring our safety but can also be taken to the extreme and can violate someone's privacy such as in the 1999 film Eye of the Beholder starring Ewan McGregor and Ashley Judd, or in an everyday instance where a security guard sets his cameras on you in a shop. Now that we have cameras that can zoom in so close, work in the dark and are tiny we have no way of detecting their presence or escaping their lens, this may be exactly what we need for vandals or thieves but is this really the price we have to pay to be safe? We have to trust whoever is in charge of these surveillance devices and more often than not we won't know who that is or where their cameras are. ...read more.


These devious files often crash the software if removed so have to remain part of the package. Spyware, much like CCTV can keep us safe but also be a huge invasion of privacy. Most people would say that the only reason to dislike these files is that you are doing something wrong, such as downloading movies, games or explicit pictures but most spyware disguises itself in order to access what you are doing - and this is deceitful and dishonest. These programs include Gatorware that promises to remember all your passwords for you, Bonzi Buddy, which says it will making surfing the net 'easier, faster and a lot more fun!' and Common Name which adds itself onto your tool bar in Internet Explorer and searches using keywords only. Personally I think it is outrageous to get information in such a cunning manor but there is one time when I accept it: KaZaA uses its spyware to count how many times a particular word has been searched, so someone one who is searching for pornographic images of children and such can be easily tracked down. ...read more.


For most people mobiles are an easy way to keep in touch with their bosses or families whilst somewhere that would otherwise not permit this and it is all too easy to get caught up in 'the now' and how important it is that whoever you are phoning gets the information you are about to tell them and with new features being added all the time mobiles seem very tempting - almost essential some might say. Another reason people persist to use mobile phones is that the damage that mobiles can cause is not widely known like that of drink driving or smoking. There is always the ability for people with the required equipment may be able to tap in and listen to your conversations. Obviously this is an invasion of privacy and is unnecessary for the general public but very handy for those in the FBI and other such secret services. ?? ?? ?? ?? Advantages and Disadvantages of Using Electronic Systems Katie Bancroft 02/05/2007 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Ict and an adult with disability

    During the party if he decides to take a photo to remember the experience. Once he has taken the photos he can upload them from his computer and send them to his printer. This suites him because he doesn't have to get into his wheel chair get into his car

  2. OCR GCSE Business & Communication Task 7 Report

    However, this report can help to establish a connection between viewers and the companies image. By including my corporate into my report I am able to promote my companies image and logo which can then ensure the viewer/client will remember and possibly reuse the company as they can easily relate the colours to the company.

  1. ICT Systems in Everyday Life: Your Local Community

    The technology is already being used in hospitals to support covert surveillance of parents suspected of abusing their children. CCTV is very quickly becoming an integral part of crime control policy, social control theory and 'Community consciousness'. It is promoted by police and politicians as primary solution for urban dysfunction.

  2. ICT Final Project (Complete)

    - Design for profits and loss spreadsheet. My designs will show colour and annotation. I will then present these designs to Mrs Williams. I will see what she thinks of them and will make changes accordingly. Design Specification - the function of each worksheet I plan to create my system with four sheets in total, three work sheets and a user interface or front end.

  1. ICT Final Project (complete)

    The backup with be stored separately to the system on the hard drive. There will also be a macro that allows a manual backup that is not written to unless the user specifically wants to - every hour or at the end of the day etc (for the event of the original and backup getting corrupted)

  2. Free essay

    Impact of ICT in Community

    To some extent it doesn't meet her needs as some assistance may be required when changing the batteries. 6. Evaluate the technology - good and bad features? Advantages/disadvantages The advantage of Chrome talking watch is the watch is extremely Easy-to-use function buttons announces the procedure for setting the time.

  1. I am writing about an employer using PC Technology, Entertainment and Mobile Technology in ...

    Juan was missing a lot of her meetings with the employers she was intending to meet because; she didn't have anything to remind her. Sometimes when she was going to a meeting there was a tendency to forget her piece of work and she would be stuck in the meeting without it.

  2. Information Security.

    If we think of privacy as the legal concept, then security of data is one of the means by which the privacy can be obtained. The implementation of these new laws is likely to produce applications for data security techniques.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work