Free Essay

Policing Information Technology

In: Computers and Technology

Submitted By michigan97
Words 529
Pages 3
Policing Information Technology
Bill Smith
BIS/220
July 11, 2012
Alisha Johnson

Abstract

Policing Information Technology
Over the past 30 years technology has advanced at an alarming rate. Since the inception of personal computers and the World Wide Web a need for individual protection occurred. Government reform was needed. In the 1980s two Acts of Congress were passed, the Computer Fraud and Abuse Act of 1986 and the Electronic Communications Privacy Act of 1986. Initially we will examine the advances in technology that caused each Act to be passed. Last we will determine what new ethical issues came about from this new technology. Although some may see these Acts as an invasion of one’s right to privacy, they are essential to protect stored information from being used in a negative way. “A survey by an ABA task force in 1984 estimated that businesses and government agencies lose as much as $730 million a year to computer crime” (Wolf, 1986). Two years after this survey was published the U.S. House of Representatives passed the Computer Fraud and Abuse Act of 1986. During this time computers are becoming widely used across the country. The major change is the type of information being stored. Financial institutions both in the private and government sectors are using computers to store valuable financial information. Computer hackers illegally could gain access to this information and sell it to individuals with the means to use it or vandalize the company’s system by inserting a virus. Basically a modern age criminal had been created because of advances in information technology. Instead of physically breaking into a building to steal, the modern criminal can accomplish this from his or her own computer. The Computer Fraud and Abuse Act defined these criminal activities and dished out severe penalties for breaking them.
It is not only important to protect big business and the government in regard to information technology, but also individuals as well. The Electronic Communications Privacy Act (ECPA) of 1986 was created to protect an individual’s privacy concerning e-mail, voicemail, and remote computing services. The previous law did not cover any of these new technologies. This made gaining access to information electronically much easier. Currently in order for this information to be viewed law-enforcement agencies must use the courts. “It was believed that strengthening privacy through ECPA would create a principle that privacy is beneficial for both consumers and businesses” (Electronic Communications Privacy Act, 2002).
When it comes to enforcing information technology there is a fine line between protection and invading one’s privacy. Both the Computer Fraud and Abuse Act and the Electronic Communications Privacy Act were put into place due to the many advances of information technology. It was also important for these Acts to identify clearly the issues concerning the new technology and offer strict punishment to those who go against them. Information technology is constantly changing and so to must our laws.

References
Electronic Communications Privacy Act. (2002). Encyclopedia of New Media: An Essential Reference Guide to Communication and Technology. Retrieved from http://www.credoreference.com.exproxy.apollolibrary.com/entry/sageeonm/electronic_communications_privacy_act
Wolf, N. (1986, September). Hackers Beware. ABA Journal, 72(9), 32.

Similar Documents

Free Essay

Comstat

...Abstract This paper will compare and contrast the application of information technology (IT) to optimize police departments’ performance to reduce crime versus random patrols of the streets. It will describe how COMSTAT as an information system (IS) implements the four (4) basic (IS) functions; and it will discuss the fashion is which IT systems have made police departments more efficient in preventing and responding to crime. We will also explore the strengths, weaknesses, and SWOT analysis. This is essential for police departments that intend to use the implementation of the new predictive policing. 
 1. Compare and contrast the application of information technology (IT) to optimize police departments’ performance to reduce crime versus random patrols of the streets. Information Technology (IT) has become a staple of current business, services, and life in around the world. It is used in almost every business organization one can think of. Information Technology makes life easier for us today in our daily operations. The ability it provides for us to communicate worldwide, store as well as retrieve data, and expand or reduce a footprint, and track things beyond measure has catapulted it to the forefront of business assets. In an effort to take advantage of this ability, public services have adopted technology as well. From Fire Departments, to government agencies, and police departments have applied IT with aspirations of optimizing......

Words: 793 - Pages: 4

Free Essay

Information Ethics

...Name Course Date The importance of adherence, to information ethics in provision of legal information services and resources in Kenya. Introduction  Information ethics in Kenya is a young academic field. Less information get published on the role that Kenya can play in thinking about the challenges arising from the impact of Information Communication Technology on African societies and cultures. Most research on Information Communication Technology from an ethical perspective takes its departure from Western philosophy. When publishing data in Kenya, it is vital to consider the rights and responsibilities an individual has with regard to issues of confidentiality (Moore 107). Ethical principles in Kenya help to create pleasant mutual relationships. Compliance or adherence to ethical principles on a voluntary and cooperative basis creates harmony and teamwork in a work environment that can result in high productivity. Information ethics in Kenya is based on respect for human dignity, freedom of expression, freedom of access to information as envisaged in the Kenya Constitution 2010 on Chapter IV on Bill of Rights, information wrongdoings, information corruption, information injustice (Moore 200). Discussion Importance of code of ethics It Prevents unjust treatment since wrongdoing is common in all societies. In Kenya for example, since free education got dispensed, funds to provide education and information facilities got mismanaged, however, with the right......

Words: 961 - Pages: 4

Premium Essay

Essay Handin

...globalisation. Since the early 90’s it has increased rapidly. Information communication technologies (ICT’s) have given new opportunities in businesses, governments& personal use. Most industries nowadays these day rely on ICT’s and even governments use them in warfare and surveillances. There has been a revolution in computers and communications over the last few decades. All indications of this has pointed to it continuing at a very fast pace. They present many opportunities but also challenges. These are having large effects on many aspects of society, with policy makers tackling issues which involve economic productivity, intellectual property rights, protection of privacy and the costs of access to information. The policies which are implemented now must be considered carefully as the social and economic impacts of these choices will be long-lasting.(Konsbruck,R) Technology cannot solve social problems, but the use of information technology and communication technologies are vital for the economic and social development of the modern world. They can be considered as the functional equivalent of what electricity was in the industrial age. The 1990’s saw the world become organised around computer networks which is at the heart of information and communication processes.(Castells, M, 1999) Since the PTT days (Push to talk), ICT (Information and communication technologies has become the foundation of all sectors of......

Words: 1709 - Pages: 7

Premium Essay

Drones Technology

...Drones Technology: An Emerging Wireless Communication Trend at Workplace Allison Maestas BIS/221 March 14th, 2016 Lisa Ricks Introduction Emerging Technologies: Emerging technologies are type of new era technology which is currently developing or will be developed over next five to ten years. Emerging technologies have potential to alter business and social environment. These include IT, Wireless data communication, robotics, and bio-technologies. Drone is best example of emerging IT and wireless data transfer technology. It helps humans in many ways despite fact it has many drawbacks also. Drone technology is a type of emerging technology in which we feed commands in a flying object controlled by wireless controller. It helps us plenty of ways like Policing, delivery, entertainment, surveillance & surveying, agriculture, journalism, arts, firefighting, and nonmilitary security work (Byman, 2013). The reason for using these drones is that they are cheaper and more durable than helicopters due to their mechanical simplicity. Delivery drones are type of drones which is used to send medicines or other necessary stuff at faraway places where presence of human is hazardous for his life for example RQ-7 Shadow is capable of delivering a 20 lb (09.1 kg) “Quick MEDS” canister to front line troops. Professional Usage of Drone Technology at Workplace: The development of Unmanned Aerial Automobiles permitted the world to consider of innovative techniques to implement......

Words: 1156 - Pages: 5

Free Essay

Information Technology in India

...Information Technology in India 1 Information Technology in India: A look into how the Information Technology in India has come about over the Years Jessica Majeski, Lindsey Pavilonis, Mantsane Rantekoa, Long Nguyen, Miriam Moore DeVry University Online February 13, 2011 Information Technology in India 2 Contents Introduction to Information Technology in India………………………………………………...4 The Culture of India….....................................................................................................................5 Government……………………………………………………………………………….....5 Political Structure Government structure Economy……………………………………………………………………………………..6 Economic situation post Independence Economic crisis and impact of introduced reforms Education and Religious System of India……………………………………………….......7 History of Information Technology In India and it’s Development….........................................7 Four Periods of Information Technology…...........................................................................7-9 Pre-mechanical Mechanical Electromechanical Electronic Information Technology history in India..............................................................................9-10 No separate IT industry in 60’s and 70’s Tata Consulting Services (TCS) Indian IT professionals in U.S. Corporations sourcing IT services to India IT companies Leading growth engine for India The Specific Impact That Technology Has Had Upon the Culture of India…………………...10...

Words: 6995 - Pages: 28

Free Essay

Cisco

...Annually, two senior officers with highly successful operational command and staff backgrounds from each Service are selected to receive their senior service college credit by training with Corporate America. The program’s intent is to allow officers to spend a year outside their traditional career paths to glean the best of change, innovation, and leading-edge business practices that could potentially transform DoD business and operational practices. To date, 65 corporate fellows have gone on to form a cadre of Service leaders, knowledgeable in the organizational and operational opportunities made possible by revolutionary changes in information and other technologies. To prepare for the fellowship, the fellows spend four weeks in training. Specifically, participating in lectures on current political and military topics such as strategies, technologies, and process improvement methodologies; meeting with senior DoD officials, Congressional delegates, business executives, etc; as well as taking part in a one-week graduate-level business overview provided by the University of Virginia’s Darden Graduate School of Business Administration. Following the fellows’ corporate assignment, formal outbriefs are provided to approximately forty senior leaders across OSD and the Services regarding their observations and recommendations. Traditionally, these outbriefs include sessions with the Secretary, Deputy Secretary, Service Secretaries and Chiefs, as well as other senior......

Words: 13774 - Pages: 56

Premium Essay

Tech vs Men

...Essay June 2013 Technology and Social behavior. When human beings are supposed to be free by nature, the truth is that we possess an obvious tendency to live under certain regimes that mark us and define us throughout our lives. We are creating in our own environment some features that enslave us but we are curiously interested to maintain. The essay is to support the idea that men,from birth, is victim of a consecutive series of technological regimes that has as a result an impact on society. It is a fact that technology has contributed tremendously to the development of society until this days. From the creation of devices, to detect several illness and other medical conditions, to products that will simplify our life at work and home. Two important questions to ask ourselves are: how are we being shaped by technology in society? And, how we are influencing technology? When analyzing the impacts on both sides we find many factors that influence are being influenced by its progress. Some of them are science, communication, information, education, medicine, in to others. When analyzing technological impact, a major contributor is ICT (Information and communications technology). According to Britanica Encyclopedia ICT are provided by computational tools and computer that process, store, synthesize, and present information retrieved represented in the most varied forms. It is a set of tools, supports and channels for the treatment and access to information. Constitute......

Words: 1207 - Pages: 5

Premium Essay

Strategic Initiative

...significant technological role in shaping the world in interconnection, intelligence, and new instruments. The information technology industry is highly competitive and the need for strategic initiative planning is an essential element for the organization to continue to prosper and remain an industry leader. According to IBM’s annual report one of the strategic plans is Smarter Computing designed for Big Data (IBM, 2012). IBM has committed to reshape their investments and lead the market in strategies to accomplish this strategic initiative. IBM states in their annual report that “Every two days, as much data is now generated as in all of human history up to 2003” (IBM, 2012, p. 5). Smarter Computing encompasses software-defined environments to handle the vast amounts of information housed through data centers. The infrastructure will be programmable and have individual systems capabilities as the first round of this strategic plan. This portion of IBM’s strategic plan will transform businesses and civilization giving the precise technology and correct capabilities to all aspects of organizational operations. IBM has a commitment to financial planning, sales examination, cost analysis, funding options, and has weighted the risks and the potential impact to the company in Smarter Computing strategic planning. IBM is an organization leading in technology and strategies. Implementing initiatives takes money and appropriate planning. New programs are of the......

Words: 1413 - Pages: 6

Premium Essay

Basel

...Technology in Restaurants Technology is impacting the restaurant industry because dependency on computers is the remarkable key to run the business. Computers in restaurants are the key to create the experience that experts want to introduce to guests, to support the changes of a modern society and the information technology that is constantly changing; we are the consumers of a competitive world of technology. The technology that is being used in the business has become innovative and to take a look back on how restaurants ran before technology hit the industry is remarkable. Computers The biggest change in the restaurant business since the creation and introduction of the stove controlled by gas and the electric refrigerator is the implementation of computers (Mandabach, Blanch, Van Leeuwen, & Waters, 2006) “The restaurant industry is no longer a business of cigar boxes and order pads. In most cases restaurant managers use more technology than we used to send men to the moon” (Hamilton, 2004). The transcendental innovation of technology has created a competitive system between experts in the field and the philosophy to avoid looking back in time when restaurants used to run with just a kitchen and a few tables. Comparing the experience of a visit to a modern eating establishment with the same basic hospitality atmosphere versus a more typical restaurant, the chances are that thanks to the technology, the expectations are going to be higher as whole for the current......

Words: 303 - Pages: 2

Free Essay

It Management

...problems are people, technology and organization. Each of these can provide a business with difficult problems that it cannot overcome quickly or easily. Examples of organizational problems include poorly orchestrated business processes that have usually been inherited from the past, an unsupportive culture, big changes to the organization’s surrounding environment and political in-fighting an example of people problems are usually quite straightforward, including inadequate employee training, encountering difficulties when it comes to evaluating performances or the evaluations not being strong enough, ergonomics and poor equipment, regulatory and legal compliance, poor or weak management lead by indecisive people and poor employee support. Technology problems, like people problems, are usually self-explanatory. Technology problems that a business could encounter are computers or hardware that are aged and therefore do not work correctly, outdated software that needs replacing, a shortage of database capacity that creates problems for everyone, insufficient telecommunications and the possibility of old equipment not working well with newer hardware. Although many of these problems can be rectified quite easily, the cost of doing so can soon mount up. An Information Systems (IS) is a professional and academic discipline concerned with the strategic, managerial and operational activities involved in the gathering, processing, storing, distributing and use of information, and......

Words: 344 - Pages: 2

Free Essay

Social Engineering Attacks and Counterintelligence

...Table of Contents Ethical and Social Issues In Information System 1 Chapter one 3 Introduction to the Study 3 Context of the Problem 4 Statement of the Problem 5 Research Questions 6 Introduction 6 Research Question 6 Research Question 7 Research Question 7 Significance of the Study 8 Research Design and Methodology 9 Organization of the study 9 Literature Review 10 Introduction 10 References 14 Chapter one Introduction to the Study Ethical and social issues in information system is a combination of the benefits and disadvantages of using computer and computer related devices, social networks versus our ethics, morals and beliefs. The importance and reliability of computer in our day to day running of human life cannot be over emphasized. Social networking platforms may allow organizations to improve communication and productivity by disseminating information among different groups of employees in a more efficient manner, resulting in increased productivity. While it is not meant to be all-inclusive, there are a lot of problems faced by its usage in younger generations, businesses use, and the even medical field. The social media comes with risks as it opens up the possibility for hackers to commit fraud, launch spam and virus attacks, and also increases the......

Words: 3249 - Pages: 13

Premium Essay

Merp

...Chapter 1 Business Information Systems in Your Career Computers continue to change every aspect of our lives from entertainment to shopping, from the work we do and where we do it, to how we communicate with friends, relatives, and business associates. As you can see from the opening vignette in the text, many businesses are remodeling their products and services to take advantage of expanded channel outlets such as the Internet, cell phones, and iPad and tablet devices. This chapter gives you an overview of many of the subjects we’ll touch on in this course. It will help you understand how information technology is being used by many businesses worldwide to increase efficiency, save money, and create better relationships with suppliers and customers. 1.1 The Role of Information Systems in Business Today Ask managers to describe their most important resources and they’ll list money, equipment, materials, and people—not necessarily in that order. It’s very unusual for managers to consider information an important resource, and yet it is. As electronic business and electronic commerce grow in popularity and more firms digitize their operations, having useful information is becoming even more important to the global business community. This chapter will begin to explain why you need to manage your information resources as closely as any other in your organization. How Information Systems Are Transforming Business The next time you’re in your workplace or on...

Words: 4484 - Pages: 18

Free Essay

Gartners Hype Cycle

...for 2005 Jackie Fenn, Alexander Linden This year, we celebrate the 10th anniversary of Gartner's Hype Cycles. More than 1,600 information technologies and trends across 68 markets, regions and industries are evaluated in the most comprehensive assessment of technology maturity in the IT industry. © 2005 Gartner, Inc. and/or its Affiliates. All Rights Reserved. Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner's research may discuss legal issues related to the information technology business, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice. ANALYSIS Gartner's Hype Cycles highlight the relative maturity of technologies across a wide range of IT domains, targeting different IT roles and responsibilities. Each Hype Cycle provides a snapshot of the position of technologies relative to a market, region or industry, identifying which technologies are hyped, which are suffering the inevitable disillusionment and which are stable enough to allow for a reasonable......

Words: 1983 - Pages: 8

Free Essay

Ethics

...Ethics When the term “ethics “is brought up, lots of things come up in mind. In brief, ethics can be comprised of a set of moral issues that should always be respected. In addition, they are concerned with rules that one could not either feel or see in an abstract manner. They revolve around issues that are either good or bad. In fact, ethics are a set of principles that should be highly respected by all members of the society. Consequently, ethics should be instilled at an early age rather than learnt at an older age simply because it will be much harder at a later age. Moreover, I should also mention that our community teaches us a great deal about ethics. An example of this would be telling the truth. In other words, when a child is raised and taught to tell the truth, it can be said that they have ethics. Other examples may include, but are not limited to, the following: treating others nicely, abstaining from unaccepted behavior, domesticating animals, loving one’s family, and so on and so forth. Based on these examples, ethics should be treated as a form of human awareness based on control. Additionally, ethics regulate all types of behaviors in all spheres of social life with no exceptions as far as politics, work, science, etc. As far as the source of my personal ethics, I should humbly mention that it is a direct result of my religious background. To explain, my religion teaches me a great deal about ethics. For example, my religion teaches me to treat others......

Words: 702 - Pages: 3

Premium Essay

It Doesn't Matter

...Information Systems Management Joe Jelenek / K00121194 Information Systems Management Joe Jelenek / K00121194 Why it does not matter Why it does not matter Discuss the following statement using arguments for and against the point of view stated: Technology does not create a competitive advantage. Instead, it is the appropriate management of technology that creates a competitive advantage. Why IT does not matter The whole world of e-commerce and using IT within businesses started by inventing the personal computer and connecting the world and business with theirs customers via internet. The spending of the resources on IT by businesses was increasing more and more towards the end of the century. In the last decade it was nearly 50% of the capital expenditures. Carr (2003) says that any business has equal access to the computer technology because it is affordable and as the technology evolves and innovates, the price goes down more rapidly. That means the IT does not gives the advantage to the organization, but it’s the way organization manages the IT, how it aligns the IT with the organizations business goals that gives it the competitive edge against the competition. IT becomes just a commodity and cost of doing business. What makes it truly strategic is tis scarcity. Another area that has to be looked at when adopting IT technologies is if to use proprietary or infrastructural (open standard) technology. The proprietary technology is......

Words: 1306 - Pages: 6