Wednesday, November 27, 2019
The Future of Computer Crime in America Essay Example For Students
The Future of Computer Crime in America Essay The Future of Computer Crime in AmericaSociology Research PaperSociology per. #210/8/96Sociology Topics:Future SocietySocial ChangeSocial and Enviromental IssuesDeviant BehaviorCrime/CorrectionsName: Brandon RobinsonPeriod: # 2The proliferation of home computers, and of home computers equipped withmodems, has brought about a major transformation in the way American societycommunicates, interacts, and receives information. All of these changes beingpopularized by the media and the wide increased personal and private sector useof the Internet. All of these factors plus the fact of more and more businessand government institutions are jumping to make the use of these services hasput a much wider range of information at the finger tips of those, often selectand few individuals whom know how to access, understand and use theseinformation sources. Often times today this information is of a very sensitiveand private nature on anything from IRS Tax returns, to Top Secret NASA payloadlaunch i nformation. Piled on top of that many times the individuals accessingthese information sources are doing so by illegal means and are often motivatedby deviant and illegal means. It is said that at any given time the averageAmerican has his name on an active file in over 550 computer informationdatabases of which nearly 90% are online, and of the 550 databases the numbercomes no where close to how many time your personal information is listed insome database in an unactive file. The Average American could simply sit inhis/her home doing nearly nothing all day long and still have his/her name gothrough over 1,000 computers a day. We will write a custom essay on The Future of Computer Crime in America specifically for you for only $16.38 $13.9/page Order now All of these vast information files all hold the crucial ones and zerosof data that make up your life as you and all others know it. All of these databits, at the hands 100,000s of people. With little or NO central control orregulatory agency to oversee the safe handling of your precious little ones andzeros of information. As it would seem Arson Wells was little late with histitle of 1984 . BIG BROTHER is INDEED WATCHING, US ALL and as it would seemour BIG BROTHER is alot bigger then Mr. Wells could have ever imagined. And thatour BIG BROTHER is EVERYWHERE! The 100,000s of people that do have thisinformation make up our modern BIG BROTHER in the form of governmentinstitutions to private advertising companies, these people are all thetrusted ones who use our information everyday for legal and useful purposesbut what about the others who use their skills and and knowledge to gain theirown personal and illegal access to these vast depositories of information?These individuals populariz ed and demonized by the media are often referred toas Hackers or One who obtains unauthorized if not illegal, access to computerdata systems and or networks. or the media definition maladjusted losersforming high-tech street gangs that are dangerous to society (Chicago Tribune,1989) Which ever one is best fitted they are indeed becoming a very seriousissue and worry to some in our ever and constantly changing American TechnoSociety. Because of the serious delection by our elected representatives whomhave valiantly once again failed to keep up with the ever changing times, thereis if any major or clear and easy to understand CONSTITUTIONAL (The recent 3to 1 over turn of the not only controversial but deemed UNconstituional lawculled the Communications Decency Act) laws as to the governing of the vastlywild and uncharted realms of cyberspace. The flagrant and serious if notslightly laughable attempts of our technologically illiterate and ignorantmasses of elected officials. Sends a cl ear S.O.S. message to the futuregenerations of America to not only LOCK you PHYSICAL DOORS but also LOCK anddouble LOCK all or your COMPUTER DOORS as well. In order for this society toevolve efficiently with our ever changing technology rate. We as the masses aregoing to have to keep abreast with the current events that are lurking out inthe depths of cyberspace. Before we, as a result of our inability to adapt andour arrogance and ignorance, are all products of our own technological overindulgence. So to avoid the tragic and ending collision of our own selfmanufactured technological self-destruction and the break-down of our society,in every tangible aspect, as we know of it today. .u36d29efa58870e8be8b0875010f14784 , .u36d29efa58870e8be8b0875010f14784 .postImageUrl , .u36d29efa58870e8be8b0875010f14784 .centered-text-area { min-height: 80px; position: relative; } .u36d29efa58870e8be8b0875010f14784 , .u36d29efa58870e8be8b0875010f14784:hover , .u36d29efa58870e8be8b0875010f14784:visited , .u36d29efa58870e8be8b0875010f14784:active { border:0!important; } .u36d29efa58870e8be8b0875010f14784 .clearfix:after { content: ""; display: table; clear: both; } .u36d29efa58870e8be8b0875010f14784 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u36d29efa58870e8be8b0875010f14784:active , .u36d29efa58870e8be8b0875010f14784:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u36d29efa58870e8be8b0875010f14784 .centered-text-area { width: 100%; position: relative ; } .u36d29efa58870e8be8b0875010f14784 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u36d29efa58870e8be8b0875010f14784 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u36d29efa58870e8be8b0875010f14784 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u36d29efa58870e8be8b0875010f14784:hover .ctaButton { background-color: #34495E!important; } .u36d29efa58870e8be8b0875010f14784 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u36d29efa58870e8be8b0875010f14784 .u36d29efa58870e8be8b0875010f14784-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u36d29efa58870e8be8b0875010f14784:after { content: ""; display: block; clear: both; } READ: Critical Thinking EssayI believe that in the future we are headed towards you will see oursociety divided into Two major parts 1.) Those whom pose the knowledge andcapability to obtain the knowledge/information i.e.. the LITERATE and 2.)Those who dont pose the skills necessary to obtain that crucialknowledge/information, i.e.. the ROAD KILL Because in the future, the powerstructure will not be decided by who has the most guns or missiles or weaponsbut the powers structure will be made up of little tiny ones and zeros, bits ofdata giving to those whom ever poses the power of the knowledge and the power tomanipulate who has that knowledge. The rich and elitist will be thekno wledge posers and givers and the poor will be those with the lack ofknowledge. Knowledge will bring power and wealth and the lack of willbring..well the lack of power, wealth and knowledge. Sources1.Thesis by Gordon R. Meyer The Social Organization of the ComputerUnderground2.2600 Magazine The Hacker Quarterly3.The Codex Magazine Monthly Security and Technical Update. 4.Secrets of a Super Hacker by the Knightmare5.Personal Knowledge, Brandon Robinson
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment