Internet Vulnerability in Today's Fast Term Paper

Total Length: 1376 words ( 5 double-spaced pages)

Total Sources: 4

Page 1 of 5

Some programs are even able to track keystrokes and take snapshots of computer screens, allowing criminals even more information, such as credit card numbers and usernames (Bahl, 219).

While the obtaining of information through fraud is a problem related to Internet activity, there are other concerns with privacy that are still considered legal. For example, a company can obtain your personal information from transactions, and legally sell that information to the highest bidder (Sinrod, 17). While information traded between companies can increase competition, when the information is purchased by unscrupulous buyers, such transactions can threaten the security, privacy, and identity of consumers.

In addition, while restrictions exist on the government's collection of private and personal information from the Internet, loopholes exist that allow the government to obtain information without the knowledge of consumers. An example is the FBI's "Carnivore" system, developed to conduct surveillance of electronic communications by intercepting and collecting email and Internet searches (Dunham, 452). A portable device much like a phone tap, "Carnivore" was designed for court-ordered surveillance, but since the FBI controls the software, there is little civil regulation.

In addition to this form of privacy invasion, corporations are using employee tracking services more often in the workplace, as well. Numerous courts around the country have ruled that activities employees engage in on company Internets do not fall under the Constitutional protection of privacy. Companies are allowed the monitor phone calls, view all email messages, track online activities, including those believed deleted, and even track the number of keystrokes per day (Brin, 56).

While these clear vulnerabilities to identity theft, invasion of privacy, and fraud, are reasons for concern, consumers can protect themselves against such actions. The Center for Democracy and Technology lists several ways consumers can increase their online privacy. First, when using an Internet commerce site, consumers should view and read privacy policies to ensure the company preserves the integrity on online data. Additionally, the CDT suggests obtaining a separate, secure email account for online transactions and for children within the household.
Third, clearing the computers temporary internet files and memory cache after browsing can protect consumers from hackers that can use these files to obtain personal information.

Further, consumers need to verify any online forms are secure before entering information, and that all online transactions are encrypted. Finally, consumers can opt-out of any third party selling of information requested by websites or companies (Bahl, 225).

While the Internet has certainly made lives more convenient, communications faster, and information more readily accessible, there is a price to pay for these conveniences. As Howard Rheingold points out in "Disinformocracy," consumers need to look closely at technology, and examine not only how advancements such as the Internet can improve lives, but also the risks associated with that improvement (Rheingold, 188). Once risks are identified, such as the risk of responding to emails, online transactions, online communication, and web surfing, consumers need to protect themselves by performing a few simple, quick steps to keep both their own computers and their information stored online secure. While the Internet certainly introduces several privacy and identity theft issues, informed consumers can protect themselves against such losses, and the Internet can remain a safe, protected, vital piece of technology in the modern world.

References

Bahl, Shalini. "Consumers' Protection of Online Privacy and Identity." Journal of Consumer Affairs 38.2 (2004): 217-235.

Bielski, Lauren. "Security Breaches Hitting Home: Phishing, Information Leaks Keep Security Concerns at Red Alert." ABA Banking Journal 97.6 (2005): 7-18.

Brin, David. "Privacy Under Siege." The Transparent Society: Will Technology Force Us to Choose between Privacy and Freedom? Reading, MA: Perseus Books, 1998: 54-89.

Dunham, Griffin S. "Carnivore, the FBI's E-Mail Surveillance System: Devouring Criminals." Federal Communications Law Journal 54 (2002): 543-566.

Rheingold, Howard. "Disinformocracy." Challenging Perspectives. Ed. Deborah Holdstein. New York: Houghton Mifflin, 2005: 182-192.

Sinrod, Eric J. And Reilly William P. "Cyber Crimes: A Practical Approach to the Application of Federal Computer Crime Laws." Computer & High Tech 16.210 (2000): 16-20.

U.S. Dept of.....

Need Help Writing Your Essay?