Saturday, October 19, 2019
The Value of Digital Privacy in an Information Technology Article
The Value of Digital Privacy in an Information Technology - Article Example And finally, the paper will discuss the electronic privacy laws. The VeriChip: An Implantable Chip: this is a simple technology that involves implanting an electronic chip under the skin of an individual. This chip has the capacity of storing up to six lines of text, and can function as a personal ID number. This chip emits a 125-kilohert radio signal that is received by a special receiver that reads the text signal (Hodge, 2003). The chip once implanted, can track the individual from everywhere he/she goes. The wOzNet: A wearable chip: unlike the VeriChip which is an implantable identification device, the wOzNet is a wearable chip which acts as a commercial identification device (Fortt, 2003). The wOzNet is responsible for tracking a group of inexpensive electronic tags from a central station using Global Positioning Satellite information. In this regard, the transmission of location of information from the chip to the base station is via the same 900-megahertz radio spectrum equivalent to the one used by portable phones (Fortt, 2003). In the event the wOzNet user sets the parameter for notification, the later will generate alerts via phone or e-mail that lets the owner know the position of the one being tracked. Networked Computing: Spyware and Adware: Networked computers together with networking computer programs link different millions of users through the internet. Spyware and adware are controversial computer applications that run on networked computers. Spyware for instance is a program that installs itself without the computer userââ¬â¢s permission, and uses the computer resources without your permission. Spyware are responsible for collecting both non-personal and personal information from networked PCs and delivering adware to specific individuals surfing the Web. Compensated Telemarketing: Listening for Dollars: This technology also allows commercialization of personal information (Foley, 2004). The proposal by Funk and Ayres enables
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.