• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Discuss the functions and ethics of identification and tracking computing technology embedded in everyday products.

Extracts from this document...

Introduction

Comp1017 Digital Technology's Assignment 1 Question Discuss the functions and ethics of identification and tracking computing technology embedded in everyday products. The major functions of the identification and tracking computing technology is to increase efficiency, reduce data loss and free up staff positions. The technology will also be able to track certain products for there life time. So a good example of this type of technology would be Auto - ID technology, so with this type of technology each particular object will be embedded with a chip, which will be able to communicate with either the customer or the manufacturer. Other products that come under the term Auto - ID technology would be barcode scanners, smart cards and voice recognisers. Also radio frequency identification would also come under the term Auto - ID technology and this is the product which I am going to talk about in this essay. When a manufacture is producing his products on all of his products he would add a Radio frequency Identification tag, which will contain product codes, each tag should also contain a radio antenna, the chip itself is about as big as a grain of sand and costs less then a penny, so the cost of this technology would not cost the company that much. ...read more.

Middle

then go home, because there are tags inserted in the products and when the customer leaves the shop the sensors will pick up the products and send a bill to the house of the customers. Another example of a electronic tracking system would be an electric tagging system for criminals. This works by the criminal having an electric tag on his ankle, and certain boundaries will also be tagged and if the criminal was to move out of that area, then a message would be sent to a signal monitoring station. Also using a global positioning satellite, people would be able to view certain criminals at any time, and if they were to get to close to a potential victim then a message could be sent to the police, so they could make the address before the crime took place. When talking about the ethics of the technology used, you must look at both sides of the story their will be both good and bad points, the first points I am going to talk about are the bad points. Customers may be put off the technology, if a tag stays alive for up to 10 years then a manufacture could find out were a particular customer lives by tracing a particular tag, and then the customer might be very cautious with everything that he buys in the future, and is this morally correct for a company to know were you live whether you want them are not. ...read more.

Conclusion

The public may also see the introduction of human electronic tagging bad idea because it gives a second chance to criminals, so they can come out earlier of prison and be let back into society. So in my concussion to the argument I would agree with the arguments against the tagging process, I think that the public are being miss lead into the process. The public need to know about the tagging for it to be justified, maybe if the company were to change the way they manufactured their chips, it would make them better if they had a limited life. Also if the company were to advertise their chips, letting the public now about them, as they might not be as cautious about using there products, But with respect to the shopping technology which lets you walk out of the shop with out paying and you get sent a bill to your home address, I am completely agree with this type of technology because I think it would revolutionise the way in which we shop to this date. I agree with the process of the human electronic tagging and the ethics behind that type of technology, depending on which crime has been committed, and if it was a smaller crime then these criminals would be allowed to be moved out of the jails and put on this electronic tagging system, which would free up jail space for the bigger criminals. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our University Degree Electronic Media Studies section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Electronic Media Studies essays

  1. Computer Technology: the Good and the Bad.

    This sort of addiction is stamping out some peoples Social Lives, as through a Computer people are more at ease than in real life. But, these Virtual Friendships, which blossom on-line, cannot compensate for real one on one interaction. And so comes the second of the dangers.

  2. 'We are all cyborgs now.' Discuss with regard to sexual identity and practise.

    Hammans essay proposes that without one of these elements a person is not whole. Those who use AOL chatrooms for sex find it extremely hard to make contact with others in the 'real world' therefore without the chatrooms their sex lives are greatly inhibited.

  1. Research Proposal on Database Usability Issues

    But according to (Preece, J. Rogers, Y. Sharp, H. Benyon, D. Holland, S. & Carey, T. 1994) "A decade ago, when our understanding of HCI was more limited, many systems developers might have felt that good intentions were the major requirement for producing an effective HCI design."

  2. Internet Security and Privacy ThreatsIntroductionIn this day and age technology plays a part in ...

    Phishing is based on long-established forms of social engineering. Most phishing schemes use messages delivered in e-mail documents that look like they come from real companies or from valid electronic addresses. Some phishing attacks use malicious Web sites to solicit personal, often financial, information.

  1. "The Real World of Technology" by: Ursula Franklin

    As we become more attached to television, we become more alienated from society. In "Technology and Human freedom" Bereano points out that technology affects us accordingly. The wealthy in society is more affected by technology than those who are not.

  2. Information Technology New and Old: James Patrick Kelly's Big Guy and E. M. Forster's ...

    He carries twice the normal workload and does so seven days a week. Aided by drugs he cuts down on sleep as much as possible to have more time either to work or to spend in cyberspace, but the government rules that he has to sleep two hours a day

  1. Cyber Ethics @ Computer Ethics

    Finally, consider power. At a particular university, if a professor wants a computer account, all she or he need do is request one but a student must obtain faculty sponsorship in order to receive an account. An absolutist (because of a proclivity for hierarchical thinking)

  2. Information technology and its impact on Portugese society

    of how technology relates to human purpose", and identifies three philosophies of technology: Instrumentalist, Social Determinism and Technological Determinism. These concepts, as presented by Norman Vig, will be here superficially referred. Instrumentalism According to Vig, Instrumentalism holds that a technology is simply an instrument - a means to an end

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work