The Value of Digital Privacy in an Information Technology Age

Only available on StudyMode
  • Download(s) : 83
  • Published : November 1, 2012
Open Document
Text Preview
Running head: The Value of Digital Privacy in an Information Technology Age 1

The Value of Digital Privacy in an Information Technology Age

Tara Brooks

Professor Bristow, J.D.

Law, Ethics and Corporate Governance, LEG 500

4 May 2012

How many of us have paused during conversation in the past several years, suddenly aware that you might be eavesdropped on? Probably it was a phone conversation, although maybe it was an e-mail or instant-message exchange or a conversation in a public place. Maybe the topic was terrorism, or politics, or your church service. You pause suddenly, momentarily afraid that your words might be taken out of context, and then you laugh at your paranoia and go on. But your demeanor has changed, and your words are subtly altered. Privacy is a growing concern in the United States and around the world. As we increasingly use the Internet and the seemingly boundary less options for collecting, saving, sharing, and comparing information trigger consumer’s worries. Online practices of business and government agencies may present new ways to compromise privacy, and e-commerce and technologies that make a wide range of personal information available to anyone with a Web browser only begin to hint at the possibilities for inappropriate or unwarranted intrusion into our personal lives. Privacy is very important-especially on the Internet. It is amazing how many websites are designed to reveal private details about people—actually it is a little scary. In this paper, I will be discussing different topics on the value of digital privacy. Keywords: privacy, personal information, digital privacy

1. List and describe at least three (3) technologies that allow an individual to research citizens’ private data.

The three technologies that allow an individual to research citizens’ private data are Bluetooth, GPS, and Google (Internet). The first technology I will discuss is Bluetooth. Bluetooth has several ways it can be hacked. Some ways are blue jacking, blue snarfing, and blue bugging. In blue jacking, someone might send unsolicited messages to the victim in the form of a business card or a mobile contact with a text that may look intimidating to read. In many cases, someone may also send sounds like a ring tone. The victim’s mobile could then be infiltrated and he/she might never know what has happened. Blue jacking messages can also be viewed as spam messages with emails. There have also been reports about people getting hacked by Trojan Horses which could mean a serious compromise.

Blue snarfing is considered a serious compromise in the category of Bluetooth hacking especially if the information vulnerable, is quite critical, as such attacks can allow someone access to victim’s contact list, text messages, emails and even private photos and videos. In blue bugging, someone uses sophisticated attacks to gain control of victim’s mobile. It works just like Trojan horses, where someone can manipulate the user’s phone the way he/she desires by executing commands on the victim’s phone. The hacker could forward mobile calls from the victim’s mobile to his own device and can even manipulate the mobile to follow a Bluetooth headset instructions like; receive call, send messages etc. (Hubs by Hassam, 2011)

The second technology is GPS. A GPS tracking unit enables you to determine the precise location of person, vehicle or other object. GPS (Global Positioning System) is the only functional system, which can record the position of an object at regular intervals. A GPS tracking unit is so helpful that it can store the recorded location data within the tracking unit. Satellite transmits signals that can be intercepted by GPS receivers to find the precise location of any object you are searching for. Aside from making driving easier, the on-board electronics revolution has...
tracking img