Free Essay

21st Privacy

In: Computers and Technology

Submitted By michaelz850
Words 673
Pages 3
Input/output Devices I will be Using in the Next Three Years

The input devices I will be using in the next few years will be my MacBook Air lap top and a Logitech wireless trackball mouse. The output devices I will be using are my wireless HP laser jet printer and my Bose mini laptop speakers. I know there are so many other input/output devices out there but for me this is simple and all I need to complete my daily tasks for work and school. Technology has made life a lot more simple and smaller when it comes to computing devices. I used to have the big bulky laptops when they first came out, but now that I own a MacBook Air this will be my choice of computing for the years to come. They are lightweight, small, and lightning fast for everyday use in the office or doing schoolwork as I do. I love apple products so much that I have purchased an iPhone, iPad, iPod, and now my MacBook laptop over the past few years.

Features, Components, and Form Factors Prominent and Why

Features and components for computing that are prominent to me are size, portability, and speed of a computer. I prefer the smaller laptops because I travel al lot for work and I am always on the run. Being mobile and efficient in today’s society is what makes our world go around. Everywhere you look currently like coffee shops or even Mc Donald's you will see free Wi-Fi signs and along with that you will see people eating while surfing the web on there laptops.

Features, Components, and Form Factors Important to Me and Why

The flash drive installed in my Apple devices are what make computing lightweight and fast. For on the go computing and running off of battery power it is nice to have a flash memory. As described in chapter 2 talking about flash memory when you lose the charge after the battery runs down all your information doesn’t just disappear. I cant tell you how many times I was in the middle of a bid proposal while out in the field and the battery died and I lost all my work because I didn't hit the save button while using a PC without flash memory. I could be wrong on this technology but I know on my Mac if the battery dies it always has my documents and web pages saved right where I left them once I connect it back to AC power and recharge the battery. This to me is one of the most important factors in my choice for owning a Mac with flash memory technology.

Applications I Will be Using on These Devices

The applications I will be using on these devices will be Microsoft Office 2011, Safari, Google Chrome, and Google Drive. They are all compatible, user friendly and not to mention some of them are required in order to complete this course.

How These Devices changed my Life In Terms of Benefits and Risks

These devices have changed my life tremendously. The risks of paying the higher price for Apple products was a major risk factor for me, but after purchasing them and owning these products for a couple of years now I will gladly pay the price again. Apple products are expensive but you get what you pay for. I have owned traditional laptops from many manufactures and have always had problems of the computer freezing up or just plain freaking out within six months to a year of owning them. Granted they all got fixed after hours of being on the phone with tech support. Now that I have owned Apple products I do not have hardly any problems with them freezing up or slowing down like my other devices. Many people will argue the differences of Mac versus PC are just prices but I beg to differ. It may be a personal preference but to me I know what works and this

Similar Documents

Premium Essay

Privacy in the 21st Century

...Privacy in the 21st Century Eng 122 Mrs. Samaniego 10 June, 2013 In today’s society cameras are watching every step you take and every move you make. How do you feel about that? Someone is watching you, whether it is the surveillance cameras at a gas station or it’s the security guard in a shopping mall. Does this make you feel uncomfortable? You post something on Facebook and decide to delete it 5 minutes later, but did you know that it will always be on the internet although you deleted it? You may not see it but others will. In today’s society, personal privacy rarely exists. There are certain devices and tools that people use when trying to invade someone’s privacy including hidden cameras and satellites. Privacy no longer exists due to all of the new technologies and programs enabling the invasion of someone’s privacy. What is privacy? Do people today really understand what privacy is? Have they had the opportunity to experience privacy? The definition of privacy is “allowing an individual or group to seclude themselves or information about themselves and thereby reveal them selectively.” When something is private it is usually something personal or valuable to someone. Everyone likes privacy but...

Words: 1903 - Pages: 8

Free Essay

Privacy in the 21st Century

...For my research paper, I have decided to write on whether or not the use of military force is the only way to prevent terrorism. The topic also asks about the possible alternatives and what strategies would be best for American policy makers. I am going to argue that the use of military force is not the only to prevent terrorism. Although using the military for counterterrorism is effective, it is not the only way to prevent terrorism. I will argue that there are other counterterrorism methods that do not include military force. There are many keywords I used to help find scholarly sources in the Ashford University Library. Some of the words include, but are not limited to, terrorism, counterterrorism, finance, sanction, drugs, trafficking, civilian, and prevent(ion). I chose terrorism because that is the basis of the topic and counterterrorism because it is the opposite of terrorism. Counterterrorism pulled multiple techniques to fight terrorism. Also, I chose the words finance and sanction. Both words helped me find documents that provide effective methods for preventing terrorism on a government level. I needed supporting research to back up the use of foreign aid as a counterterrorism incentive. I also wanted to present the negative effects of country to country sanctions. Next, I searched for sources using civilian as an extra search criteria. Since my argument is that military force isn’t the only way to prevent terrorism, I wanted to find counterterrorism tools for...

Words: 370 - Pages: 2

Premium Essay

Privacy in the 21st Century

...Privacy in the 21st Century Bradley Harding Eng 122 Mrs. Samaniego 20 May, 2013 Outline I. Introduction: In today’s world with the identity theft and fraudulent accounts being created on a daily basis, a person might ask there self if privacy in the 21st century might be possible. People put their privacy in jeopardy without even realizing it by using social networking websites. Social networking is a good tool as long as you use it responsibly by protecting yourself and maintaining security. II. Identity theft defined Ways that thieves steal identity a. Dumpster diving b. Phishing c. ATM Skimmers II. Dangers of social networking a. Stalking/cyber stalking b. Impersonation c. cyber bullying III. Ways to prevent identity theft and maintain security a. Monitor credit report with fraud alert b. Do not share personal information c. Shop on websites with secure seal d. Use privacy settings on social network cites IIII Conclusion In today’s world with the identity theft and fraudulent accounts being created on...

Words: 650 - Pages: 3

Premium Essay

Is Using Social Media for Marketing a Form of Infringement of Personal Privacy?

...Is using social media for marketing a form of infringement of personal privacy? We are now in the 21st century and social media has become a very big hit. So the topic here is, is it an invasion of personal privacy when marketers use social media in marketing? First let me explain what personal privacy is. It is personal freedom from unwanted disturbance in someone’s private life meaning that we have the freedom to be not constantly disturbed. However, the internet is a public library, when you add something on the internet it is already public even if it wasn’t meant to be, and to be honest there are many people out there who just like to cause disturbance, but you have the choice to post it privately or publicly. It is not eavesdropping if you posted something publicly and a stranger saw it. There are also possibilities that the marketers collect personal data like workplace or home address so that he can personally meet face to face with the customer or consumer to conduct his survey. If the marketer constantly visits your workplace or home it is an invasion of privacy, but I find this very rare because it doesn’t benefit him, in fact it is a waste of time for him if he keeps getting rejected, in anyways so it is not practical. The reasons why marketers have started using social media for marketing is because the users are massive, like Facebook it has more than 1 billion users. Because of this massive amount of users’ marketers will use this advantage to gain knowledge...

Words: 883 - Pages: 4

Premium Essay

Privacy

...Running Head: THE EXISTENCE OF PRIVACY WITH TECHNOLOGY THE EXISTENCE OF PRIVACY WITH TECHNOLOGY Obediah Howard Bellevue University   THE EXISTENCE OF PRIVACY WITH TECHNOLOGY Abstract This research paper will discuss the relationship between privacy and technology. It will attempt to ascertain if technology and privacy can share the same plane of existence. Benefits and deficiencies of a particular technology are not hereditary to that technology, but are depend on their application. The public insists on accountability of technological innovation and assurance that privacy will remain intact. Striking a balance between enabling technology to enrich lives and restricting it from invading privacy has to be addressed. Implementing controls to protect private data is imperative. Technological advances over the years have challenged the public’s perception and expectation of privacy. Technology and one of its preeminent by-products, convenience, will continue to grow exponentially for the foreseeable future; there is no evidence to suggest otherwise. Privacy finds itself in a precarious position in the face of evolving technology. The collective concept of privacy has to be revisited. With the advent of technological innovations and the accessibilities they bring, privacy in its purest form does not exist. From an anthropological perspective, privacy is a relatively modern development. Ancient cultures practiced communal...

Words: 1783 - Pages: 8

Premium Essay

Is Privacy Possible in the Digital Age?

...Privacy and security (Initial essay) Introduction When I think back one of firsts times I thought knowingly about privacy and security in my life at category of every data being stored and maybe later analyzed it was back my previous student days when one of my friend refused to pay with bank card in Alco-store. At that time it seemed to me really paranoiac and weird, but now I get his idea behind it. If one is a gambler for instance, it really isn’t very smart to pay with credit card in gambling-den. But at the other hand nobody can also blackmail you at basis of your sins which are known to everybody. Is privacy possible in the digital age? In current days one of the biggest and influential databases about private persons Facebook is launching a new profile type “Timeline” – it really brings users history in silver plate to everyone interested – unless he has taken precautions in privacy-settings. Many people say they’re not worried about the info reachable to everyone, “I’ve got nothing to hide,” they declare. Those advancing the nothing-to-hide argument have in mind a particular kind of appalling privacy harm, one in which privacy is violated only when something deeply embarrassing or discrediting is revealed, says Solove (2011). Privacy itself is a concept in disarray. Nobody can articulate what it means, claims Solove (2006). It isn’t seen everywhere same way as in Western countries, also understanding differs individually. Already in 1976 the secretary-general of...

Words: 1609 - Pages: 7

Free Essay

Ethics in Computing

...The concerns of ethics and computer is a constant balancing act. Technology will continue to advance and it’s our job to make sure that we always keep ourselves and our neighbors in mind when it comes to ethical behavior and computer technology. In this paper three article that touch on ethical concerns in computing in their own way. One will discuss how the concerns that we all may be very easily find ourselves in on a daily basis. One will look into more specific areas where ethics and computers intertwine, using cell phones to track pedestrians and home monitoring for the elderly. The other will hit on the risk and rewards of cloud computing and the ethics behind law firms and their move into the 21st century. Ethics surrounding computer technology are currently an ever evolving conversation. As technology advance so must the ethics and rules of how we handle our personal information and how others can and cannot used that information. With this evolution in technology there are many topics of concern that raise red flags and force people to reevaluate what needs to change in order to make sure that the very principals we hold as a country are not bent to meet the demands of changing technologies. Concerns over personal and private data who can see what and at what point is personal data no longer private. Identity theft is another issue as people become more and more willing to use computers to bank and pay bills they are more at risk of another person electronically stealing...

Words: 1690 - Pages: 7

Premium Essay

Edward Snowden Research Paper

...Following Edward Snowden’s leak about the NSA, or the National Security Agency, there have been questions after questions regarding the privacy of the things people do online. People are fearing that the government and their respective agencies are overreaching in their collection of citizens’ data. The whole topic on its own, raises quandaries; and at times even resentment due to America’s belief in securing their personal data from the government. In today’s highly technological society, surveillance and monitoring do not encroach upon privacy, but rather aid in promoting civil liberties and public security. The NSA’s actions do not infringe on the 4th amendment and stand to be legal in the eyes of the constitution and that of the judiciary....

Words: 959 - Pages: 4

Premium Essay

The Importance Of Internet Privacy

...In the modern world, our privacy is constantly being violated without our consent. This is due to information that is easily available. Whether you’re walking down the street, taking the subway, purchasing online items or in a store, chatting online, we are constantly under someone’s watch. Hacking, picture leaks and theft of private information are becoming recurrent issues in the 21st century. Some believe this may not be an issue but others are concerned with the impact it could have on our lives. The twentieth century was particularly marked by the growth of the Internet and the rise of social media programs. This has raised the population’s awareness about their privacy rights. A lot of information can be found online including credit...

Words: 1336 - Pages: 6

Premium Essay

Glenn Greenwald's Arguments For The Publicization Of Drones

...Drones throughout the 21st century have been used to spy on civilians. However, many people prefer to keep their lives as private as possible. In Glenn Greenwald’s article addressing NPR’s domestic drone commercial, he states that drones should not be publicized in the use of a commercial. He expresses his concerns for the publication of drones and what effects drones would have on our privacy. I agree with Greenwald’s accusations that NPR should not have used the commercial to promote drones because it creates bias, does not explain the overall effects drones have on civilization and how it goes against our personal privacy. In NPR’s commercial they express nothing but positive aspects of the drone. Within the five-minute commercial, four...

Words: 849 - Pages: 4

Free Essay

Essay

...IFSM 304 – Ethics in the Information Age Learning Portfolio Assignment Descriptions Here are the detailed Assignment Requirements and Summary (Reflection Paper) that comprise activities for a Learning Portfolio for IFSM 304. These activities, along with class discussion and any other assignments your professor may require will enable you to achieve the course objectives and demonstrate knowledge of key concepts and apply this understanding to real-world digital ethics topics and situations. Understand that your work will comprise a Learning Portfolio for the course and these assignments are linked! You will be faced with work that advances with a progression from a general basic framework for decision making to more specific analysis and critical thinking about more complex ethical issues. Current Events 5% Conference Posting of articles on IT-related Ethical Global issues (multi-national corporation) The purpose of this assignment is to analyze a current event article on global ethical issues from a multi-national corporation perspective. This assignment is designed to increase your knowledge from a corporate viewpoint and enable you to analyze ethical issues from a current GLOBAL situation or event. This will also enhance your research and writing skills and your critical-thinking abilities. Select a current topic (2010 source or later) and find an appropriate article on the topic. Provide the persistent URL (one that anyone can click on to read the...

Words: 3771 - Pages: 16

Free Essay

Broadway Cafe

...B Broadway Cafe | Networks, Telecommunications, and Wireless Computing/ Customer Relationship Management/ Systems Development | | The following report provides a comprehensive analysis of Networks, Telecommunications, and Wireless Computing/ Customer Relationship Management/ Systems Development regarding the Broadway Café. | | | | Contents: 1. Introduction – p3 2. E-coupons vs. Paper coupons – p4 3. Risks involved with m-coupons – p5 4. Privacy Issues – p6 5. Benefit of tracking response rates of m-coupons and forwarding by customers – p7 6. Virtual world business in the real world – p9 7. Customer relationships in a virtual world – p10 8. Virtual Customer Service Strategy – p10 9. Difference in Supporting Second Life Customers vs. Real and Web Customers – p11 10. Security and Ethical Issues Regarding Second Life – p12 11. Pros and Cons of Using an Employee to Build you a Custom System – p13 12. Pros and cons of using of purchasing a COTS – p14 13. A Smooth Transition with Older Employees and the New System – p15 14. Conclusion – p16 15. References – p17 1. Introduction: Recently I have inherited a coffee shop from my late grandfather, the Broadway Café. The café is located in downtown Charleston, WV and offers many different kinds of specialized coffees, teas, a full service bakery, and homemade sandwiches, soups, and salads. Opened in 1952, the Broadway Café has enjoyed the benefit...

Words: 4198 - Pages: 17

Free Essay

The Extinction of Privacy

...The Extinction of Privacy Sara Castro EN122 May 21, 2013 Most people believe that privacy is being totally alone, away from everything. Simson Garfinkel author of Database Nation: The Death of Privacy in the 21st Century writes “The problem with this word “privacy” is that it falls short of conveying the really big picture. Privacy isn’t just about hiding things. It’s about self-possession, autonomy, and integrity.” (Garfinkel, 2001) Every day we give away information. It may be a post about what you had for lunch on Facebook or a thought you wanted to share with your followers on twitter. It may be something not so obvious like being asked for your telephone number to partake in a drawing for free groceries at your local supermarket. Shockingly is the amount of far too personal information we share on a regular basis. Sometimes our most intimate thoughts in detail. (mbaylor, 2013) In an online survey done by MSNBC, when asked if they are worried about losing their privacy, 60% of Americans were concerned that they were losing their privacy. Yet, other studies show that although they seem concerned, they do the exact opposite of safeguarding that information. (Sullivan, 2006) Today, privacy is an endangered species bordering on extinction. Privacy in the 21st century is rapidly becoming a thing of the past. Unless we take more precautions and make our privacy a more valuable asset to our lives, we will cease to have any. Social Medias offer us a convenient...

Words: 1722 - Pages: 7

Free Essay

21st Century

...Privacy in the 21st Century Sandra Bland ENG 122 Jason Romero March 25, 2013 How do you feel walking around knowing that you are being monitored at all times by cameras? Somebody is watching every step you take. Doesn’t that creep you out a little? You post something on Facebook and decide to delete it later on; did you know it will always be there no matter how many times you have deleted it. You may not see it, but others can. In today’s society, privacy rarely exists anymore. There are certain tools and gadgets people use when trying to invade somebody’s privacy including hidden cameras and satellites. Privacy no longer exists in my eyes because of all the new technologies and programs allowing the invasion. What is privacy? Do people today really understand what privacy is? Or have they really got to experience some privacy? The definition of privacy is allowing and individual or group to “seclude them or information about themselves and thereby reveal them selectively.” When something is private, it is usually something personal or valuable to someone. Everyone likes privacy, but it is no longer “available.” Everything people hope is private is no longer private. An example is, before data bases were even created a patient’s information was recorded and put into files in a filing cabinet. There were no security precautions preventing another doctor from exploring somebody’s files. A doctor could do anything with the files without anybody knowing because there is...

Words: 1807 - Pages: 8

Premium Essay

Should Individuals Be Allowed Privacy When Using the Internet

...Should individuals be allowed privacy when using the internet? Jesse Johnson GE 117 Sept Quarter 2012 Privacy is a term that we have come to understand based on the culture in which we are raised. According to Merriam-Webster the definition of privacy is “the quality or state of being apart from company or observation” ("Merriam-webster.com"). Utilizing privacy within technology is a relatively modern concept Prior to the rise of democracy privacy merely denoted a man's right to be left alone, free from physical harm. The internet, also known to all as the World Wide Web, is a gateway to a vast collection of resources or public and private information. Whether, it’s for educational or recreational use the average American now utilizes the internet just as much or more than their television set. The question is, Should browsing the web be regulated by each country that provides or is it infringing on internet users privacy? Google CEO and Chairman Eric Schmidt once said, “If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it (online) in the first place.” (Hash) Most of us have brought into our lives Facebook , Twitter, MySpace, Flickr and LinkedIn as an easy means of keeping in touch with friends and family and of making business contacts and finding others with shared interests...

Words: 1096 - Pages: 5