Internet Vulnerability in Today's Fast Term Paper

Total Length: 1376 words ( 5 double-spaced pages)

Total Sources: 4

Page 1 of 5

Some programs are even able to track keystrokes and take snapshots of computer screens, allowing criminals even more information, such as credit card numbers and usernames (Bahl, 219).

While the obtaining of information through fraud is a problem related to Internet activity, there are other concerns with privacy that are still considered legal. For example, a company can obtain your personal information from transactions, and legally sell that information to the highest bidder (Sinrod, 17). While information traded between companies can increase competition, when the information is purchased by unscrupulous buyers, such transactions can threaten the security, privacy, and identity of consumers.

In addition, while restrictions exist on the government's collection of private and personal information from the Internet, loopholes exist that allow the government to obtain information without the knowledge of consumers. An example is the FBI's "Carnivore" system, developed to conduct surveillance of electronic communications by intercepting and collecting email and Internet searches (Dunham, 452). A portable device much like a phone tap, "Carnivore" was designed for court-ordered surveillance, but since the FBI controls the software, there is little civil regulation.

In addition to this form of privacy invasion, corporations are using employee tracking services more often in the workplace, as well. Numerous courts around the country have ruled that activities employees engage in on company Internets do not fall under the Constitutional protection of privacy. Companies are allowed the monitor phone calls, view all email messages, track online activities, including those believed deleted, and even track the number of keystrokes per day (Brin, 56).

While these clear vulnerabilities to identity theft, invasion of privacy, and fraud, are reasons for concern, consumers can protect themselves against such actions.

Stuck Writing Your "Internet Vulnerability in Today's Fast" Term Paper?

The Center for Democracy and Technology lists several ways consumers can increase their online privacy. First, when using an Internet commerce site, consumers should view and read privacy policies to ensure the company preserves the integrity on online data. Additionally, the CDT suggests obtaining a separate, secure email account for online transactions and for children within the household. Third, clearing the computers temporary internet files and memory cache after browsing can protect consumers from hackers that can use these files to obtain personal information.

Further, consumers need to verify any online forms are secure before entering information, and that all online transactions are encrypted. Finally, consumers can opt-out of any third party selling of information requested by websites or companies (Bahl, 225).

While the Internet has certainly made lives more convenient, communications faster, and information more readily accessible, there is a price to pay for these conveniences. As Howard Rheingold points out in "Disinformocracy," consumers need to look closely at technology, and examine not only how advancements such as the Internet can improve lives, but also the risks associated with that improvement (Rheingold, 188). Once risks are identified, such as the risk of responding to emails, online transactions, online communication, and web surfing, consumers need to protect themselves by performing a few simple, quick steps to keep both their own computers and their information stored online secure. While the Internet certainly introduces several privacy and identity theft issues, informed consumers can protect themselves against such losses, and the Internet can remain a safe, protected, vital piece of technology in the modern world......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Internet Vulnerability In Today's Fast" (2006, December 08) Retrieved May 21, 2024, from
https://www.aceyourpaper.com/essays/internet-vulnerability-today-fast-41114

Latest MLA Format (8th edition)

Copy Reference
"Internet Vulnerability In Today's Fast" 08 December 2006. Web.21 May. 2024. <
https://www.aceyourpaper.com/essays/internet-vulnerability-today-fast-41114>

Latest Chicago Format (16th edition)

Copy Reference
"Internet Vulnerability In Today's Fast", 08 December 2006, Accessed.21 May. 2024,
https://www.aceyourpaper.com/essays/internet-vulnerability-today-fast-41114