StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Technology: An Aid for Security or Stalking - Essay Example

Cite this document
Summary
From the paper "Technology: An Aid for Security or Stalking" it is clear that there should be a place where a person would feel safe. That place is home. Let it stay that way. Let us respect that place. There would be more and more discoveries that are yet to be introduced in the field of science…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.8% of users find it useful
Technology: An Aid for Security or Stalking
Read Text Preview

Extract of sample "Technology: An Aid for Security or Stalking"

Technology: An Aid for Security or Stalking? People are living in the era where everything seems to be possible, technology advancements being made daily. A useful yet a dangerous technology invention when it gets into the wrong hands are the surveillance devices. These devices are being developed for the past 3 decades from the analog closed circuit television (CCTV) to the digital Internet Protocol (IP) Video. These devices were used primarily for security at homes and establishments. People can also be tracked and monitored through their very own mobile phones. As technology continues to produce more devices, the lesser privacy a person can have (Cabasso 1). In offices or establishments, CCTVs are often used for security. Establishment officials use them to track down hourly activities. This makes the lives of security personnel easier. It is also used at homes especially during night time to secure the premises for family members to have their good night sleep. Also at home, these devices are often tapped when the family goes for a vacation and nobody is left at their home. The Marauder’s Map was designed so that James Potter, Sirius Black, Remus Lupin and Peter Pettigrew can do mischievous things towards other students and wizards at the Hogwarts School of Magic. It was designed so that they would not be caught when doing such acts. They would know the exactly location of all the wizards and students at the school (Rowling, 193). The idea of the Marauder’s Map became the location-awareness device of a group of students from Massachusetts Institute of Technology (InfoWeb.Com). As technology makes its advancements, security protocols continue to improve. Mobile phones can now be used to track down family members especially when it is really late and their not yet at home. Locations of children can be monitored by parents through their mobiles or desktop PCs. Global Positioning System (GPS) devices which are used by travelers’ and drivers as a guide through their journeys are now used to monitor people in the location-awareness device. Even cellular networks are used by these devices. A then-helpful device is now being used as a way to monitor people, maybe in a positive way or a negative way. People are paying phone network providers so that communication will be made easier and more accessible. They are not paying for those systems to be used against them through the invasion of their privacy. Can network providers do anything to hinder such activity? Such circumstances are not included in the terms and conditions subscribers sign and agree upon in the contract with the service network providers. The 3rd thing the group of students used to form their device is the radio frequency identification (RFID) where it is like branding every person a barcode and not needing a scanner to identify who is who. RFID is a unique and automated way of identifying not just objects but also of persons (Juels 1). These location-awareness devices can be used though for suspects on trial or for those who are on legal probation. These students would be given kudos for such advancement. Their device can also be used to track down criminally wanted people who are in hiding. Before, an innovation in technology seems cool and very impressive but through the years of application, discovery of negative effects is inevitable. Dthat advanced, and it is just still all in the mind, having that gut feel that somebody is following you is scary. You are scared because there is no more security and that person is already invading your personal life and privacy. When the CCTV was born, it created a blanket of security for people who have those. Thank you to technology. We can also give thanks to technology for the GPS that our pilots, ship captains and drivers use to take people to the location they need and want to be. No more asking questions to strangers, just a few clicks in the system then viola! A tour guide in an instant. Store owners should thank the RFID as it tracks their products. It reduced the number of products being shoplifted. It is the one possible for the beeping sound when a product leaves the store illegally, meaning the product was stolen. Kudos to technology. Every person can benefit from technology, from the simplest as mobile phones to the trackers being put on our packages. However, once it is used by the wrong people, troubles and problems arise. Technology is used to make lives easier and also for communication more accessible to more people worldwide. Its uses should not be abused and used to be beneficial for just a person or group of persons. Technology was developed for everybody to use it and not to destroy enemies. GPSs are being used by the army for counter terrorist’s attacks. Can’t we think of other ways where we can use technology for peace talks so that nobody needs to sacrifice their lives anymore? Army officials have access to mobile phones already even if they are stationed who knows where in the world with the aid of cellular network providers. Can’t the government think of other ways where we do not need to put men in places where anytime war will start? In that case, network providers’ lines can bridge more families together without any doubts if that conversation would be the last for family members. Certain questions are needed to be answered. Should users of location-enabled devices be informed when location tracking is in use, it would just be right to say yes. Every person has the right to know and the right of privacy. When location-enabled devices are used without the knowledge of the person involved, it is not just his right to know that was violated. It is also his right to privacy. Even public officials do have their right to privacy that should not be violated. Such technologies should not be used in invading one’s private life. In this age, people are very demanding of our privacy for the fact that they do not have much. Do you think most people are aware of the privacy issues associated with location-enabled devices? The answer could go either way. There are certain people who would want to be monitored for the reason of their safety. There are also people who would not want to be monitored for the same reason. People can be tracked without those devices anyways. How? Through social networking sites such as FaceBook, Twitter and FourSquare. A person should be very cautious because even they themselves can put their own safety at risk. Should users of location-aware devices be permitted to enable and disable tracking features on their devices? It would be a case to case basis for this matter. We should take note first the purpose why that person has a location-aware device. If the reason is not related to any law-related matter, then the user should have control on when the device would be turned on or off. As what was previously stated, a person has his right to privacy and nobody do have the right to invade such unless he has broken the law. Humans are still the ones who developed technology therefore as humans; we are smarter than what we have created. We are still above it and still have control of it. Being the smarter ones, we also know when to say yes and no, when things are enough. As the developers of technology, let us not abuse the purpose of why a certain gadget or program was developed. Products of human knowledge should be used for humans and not against humans. It seems that there is only a very little space left to move freely. Will the word “FREEDOM” be crossed out by technology? Hopefully not. Maybe our lawmakers can make a stricter law that will protect one’s privacy and will make them feel safer even when they are outside the comfort of their own homes. There should always be a place where a person would feel safe. That place is their home. Let it stay that way. Let us respect that place. There would be more and more discoveries that are yet to be introduced in the field of science. But let us keep one thing in mind when making those innovations; technologies are made to help people’s lives better and not miserable. When a certain program is being conducted, let us keep in mind if this will be productive and not destructive. Works Cited: Cabasso, Jack. Analog Vs. IP Cameras. Aventura Technologies, Inc.: Hauppauge, New York. 2009. Educause Learning Initiative. 7 things you should know about Location-Aware Applications. www.educause.edu/eli. 2009. InfoWebLinks.Com. Issue: Are You Being Tracked? www.infoweblinks.com/np2012/ch01. Juels, Ari. RFID Security and Privacy: A Research Survey. RSA Laboratories. September 28, 2005. Minch, Robert. Privacy Issues in Location-Aware Mobile Devices. Boise, Idaho. 2004. Rheingold, Howard. Location-aware Devices, Privacy, and UI Design. http://thefeaturearchives.com/topic/Privacy/Location-aware_Devices__Privacy__and_UI_Design.html. December 09, 2003. Rowling, JK. Harry Potter and the Prisoner of Azkaban. Bloomsbury: United Kingdom. 1999. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Technology: An Aid for Security or Stalking Essay”, n.d.)
Technology: An Aid for Security or Stalking Essay. Retrieved from https://studentshare.org/information-technology/1435303-the-increasing-use-of-digital-devices-that-can
(Technology: An Aid for Security or Stalking Essay)
Technology: An Aid for Security or Stalking Essay. https://studentshare.org/information-technology/1435303-the-increasing-use-of-digital-devices-that-can.
“Technology: An Aid for Security or Stalking Essay”, n.d. https://studentshare.org/information-technology/1435303-the-increasing-use-of-digital-devices-that-can.
  • Cited: 0 times

CHECK THESE SAMPLES OF Technology: An Aid for Security or Stalking

Information Technology Security

Knowledge, teamwork, and management, if studied carefully can provide aid for effective project management.... The case study 'Information Technology security' demonstrates that computers came in and finally the Internet.... The problem is IT security.... Manufacturing and construction industries took hold of the opportunity and recognized the many benefits of technology.... In the 1970s, there was an increase in the usage of information technology....
8 Pages (2000 words) Case Study

Technology and Ethics

First of all, the center for human improvement top management and the government intends to put a large experimental ICT intelligent system called Fair choice to aid in making decisions on certain medical tasks (Herman, 2004).... This paper ''technology and Ethics'' tells that The scenario presents a situation where two issues come out clearly.... First, there is the issue of embracing technology in the center for human improvement by proposing to use a large experimental ICT project funded by the National Health Service....
6 Pages (1500 words) Case Study

International Relations and the World of Trade

(words: 302)Within the broader precinct of security, the national and international policies that address the factors which are a threat to people and climate, have emerged as vital issues in international relations.... Climate security is intrinsically linked to human security (IPCC, 2008).... The unprecedented population growth has further jeopardized the security of people as it not only increases the burden on natural resources but is also a key constituent of climate change....
7 Pages (1750 words) Essay

Quadrennial Homeland Security

The Department of Homeland security is mandated with securing the united states of American on so many levels and grounds, starting from the borders to the cyberspace.... he private sector through firms in various sector has a fundamental impact on the way the homeland security department is able to accomplish this mission.... Technology firm in the private sector can also be very important in helping the department of homeland security to achieve this area....
5 Pages (1250 words) Assignment

Leadership Performance for Public Safety and Homeland Security

In the essay 'Leadership Performance for Public Safety and Homeland security,' the author analyzes ways to protect human rights.... How do all these translate to leadership in home-based security and public safety?... Home-based security includes job security in order to keep families alive, educated, and capable of living in freedom....
14 Pages (3500 words) Term Paper

Network Infrastructure and Security

"Network Infrastructure and security" paper states that virtualization and cloud computing are used in an immense manner with the aim of ascertaining that resources are used appropriately.... The development of virtualization and cloud technology has also raised different security risks in virtual machines (VMs).... security risks in visualization network infrastructure include inter-VM attacks, mixed trust level VMs, and communication blind spots....
5 Pages (1250 words) Essay

Securing Data Using IPSEC VPN over Satellite Communication

This reseaerch paper ''Securing Data Using IPSEC VPN over Satellite Communication'' intents how internet protocol security virtual private network (IPSEC VPN) secures the procedure of data transmission over other methods like satellite communication systems; and discusses the various significant.... Based on the research study, it can be stated that internet protocol security is a set of secure networking protocol through which sensitive information can be shared more securely....
18 Pages (4500 words) Research Paper

Information Technology Security

This coursework "Information Technology security" describes different types of attacks and the main aspects of security.... The discussion that follows will outline some of the challenges of information technology security.... Criminal justice has had to catch up and develop crimes and sanctions based on the usage of information communication technology.... ifferent attack methodologies can be employed by a cracker to attack an organization whose information technology is not secure....
7 Pages (1750 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us