Security And Consumer Protection In The Information Age

3706 words - 15 pages

Abstract:

At this point in time the ubiquity of personal and sensitive information of businesses and individuals who participate in the world economy is greater than ever. As in the past, your information could be found on an old credit card statement inside your garbage can at the end of your driveway; just waiting to be plucked by the next crafty criminal who can get his hands on it. Now your sensitive personal information is inside not only in your garbage can but as a result of the last couple of decades, information technology now has the ability to send your personal information in packets of data and over telephone wires. Extensive research has come up with empirical evidence that Internet Identity theft is on the rise in the United States and shows little sign of slowing (Federal Trade Commission 2003).

As the inertia of human interconnectivity we know as globalization pushes us closer and closer to one another as we soar into information age, we must realize that as fantasmo as is the conception of cyberspace we must also realize that with any great invention when combined with perversions of human thought, can be much more harmful than beneficial (i.e. planes and terrorists). An as awesome a tool as the Internet is, it could quite possibly provide more opportunity for crime than anything we've seen since in a very long time. But thanks to the hard work, good will and a whole lot of people trying to make some money we have come up with ways to defend ourselves from those individuals attempting to use the Internet as a channel to prey on your personal information from afar. Within the research, analysis and implementation of a system of defense from these "criminerds" lays the very heart of information technology policy as it applies to security and consumer protection in the globalizing information universe.

There are several key points and underlying themes that I have hinted to already but I will take the chance to further elucidate the main objectives for the rest of the paper:

The progressive compression of space and time as a result of the globalization phenomenon has had significant implications on businesses and individuals and has brought together in ways they never thought possible (Stromquist 2000).
Globalization has led to innovation in information technology, more specifically, with the invention of the Internet, information can be sent around the world at lightning fast speeds.
Within the new international data transmission infrastructure money can be exchanged in the form of data, giving birth to what is now the booming industry E-commerce.
The data required by E-commerce not only attracts businesses and consumers globally, but because of the profitable nature of the data used to exchange money, Internet criminals known as "hackers" electronically probe and loiter networked pathways with the intention of intercepting this valuable information.
The nature of newer, wireless technology has...

Find Another Essay On Security and Consumer Protection in the Information Age

Living in the Information Age Essay

597 words - 3 pages the majority. America’s Effort in Thwarting Cyber-attacks Homeland Security (2014) reveals that the Secret Service has an Electronic Crimes Task Force, which focuses on locating and identifying Cyber criminals. This commission contributed to the arrest of international cyber criminals who are responsible for the loss of $600 million. The Secret service also controls the National Computer Forensic institute. This organization has an obligation

Privacy in the Information Age Essay

1007 words - 4 pages Notes: Watch for spelling and grammar errors. Privacy is something that is being lost today because of modern technological advancements. Too many individuals have access to other individuals' information. In today's technologically advancing world of information, employers are having a never-ending battle with their employees on how much privacy employees have and how much of that privacy the employers should have access to

Online Commerce and Consumer Protection

2746 words - 11 pages these rules, consumers have the right to request a copy of the information that is held about them and this information can only be withheld in specific situations including national security and the prevention or investigation of crime. The Data Protection Act 1998 was passed to give legal rights to people who have information stored about them, and to regulate how the information is handled and stored once collected. In 2008 the Data Protection Act

The Food Allergen Labeling and Consumer Protection Act

1106 words - 4 pages consumers and there seems to be hope of passage, but there is also much controversy because some of the mandates that the bill would require seem outlandish and trivial due to the amount of work that it would take for the manufactures to acquire and display certain ingredient information verses the importance that it will have in the eyes of the everyday consumer. In contrast, while food labeling is very important for consumer health, there are

Information Technology and Open Source Marketing in the Participation Age

6126 words - 25 pages Grenoble Graduate School of Business: MBA Marketing AssignmentInformation Technology and Open Source Marketing in the Participation AgePatrick PetitNovember 2007Executive SummaryThe social and economical evolutions under way, known as the participation age, reflectfundamental changes in consumer behaviors. Although people are still interested in brands andproducts, they are finding the old-school advertising techniques out-of-sync with their

Legislation and Standards of Information Protection in South Africa

1993 words - 8 pages governance. Legislation is not the answer.International guidelines such as COBIT or ITIL may be used as a check or audit for theadequacy of the company's information security, but it is not possible to have 'one sizefits all'.3.2 Litigations related to Protection of Information for South African CompaniesThere are currently many laws requiring the protection of information in South Africa. In this section we explore the Electronic Communications and

Information Security in America and Sweden

1583 words - 6 pages additionally write a method on how they plan to proceed on with protecting their clients (Zhang, 2010). In other words, the Bureau of Consumer protection states that, “The GLB Act requires financial institutions to explain their information-sharing practices to their customers and to safeguard sensitive data” (Bureau of Consumer Protection, 2002). In order to understand how this Act affects the practice of information security it is essential to

Living in the Age of Information Explosion

1811 words - 8 pages Today is an era of information explosion. In the past few years, many newly invented technological devices and software are now tightly integrated with our everyday lives. Today, people can look up almost any kind of information, make friends, communicate with others, and express ourselves with the simple touch of a button on a device we usually keep within arm’s reach. “Widespread use of technology is changing the way we work, learn, and

Becoming Information Literate in the Digital Age

749 words - 3 pages so many professors are surprised to see how much information their students used is from biased, inaccurate, and commercial websites. This essay aims to provide a holistic view of online information and how students can improve their search ability in the digital age. To understand how information is communicated online, students need to understand the basics of the global network. The Internet, as it sounds, is a connection of

Deliberate Democracy In The Information Age

845 words - 3 pages Jason Cordero November 13, 2001 Ethics in the Information Age Deliberative Democracy in the Information Age The Internet today could help or deter democratic participation. By using the net I could promote hate groups and negative consequences as such. The Internet can also be very helpful and important. Ideas and views that would never have been viewed by such a wide range of people. Exposing the population to new ideas and responsibilities.The

Ethics and Information Security

1074 words - 4 pages several means of downloading and using this information although it does not belong to the website owner. Moreover, the website owners do not have the legal right to sell the information in order to make a profit. This behavior is unethical, but it doesn’t change the fact that it happens. Federal regulations ensure protection from these types of incidents in the future and I support the initiatives in progress which were drafted to ensure that the

Similar Essays

Protection Of Information: One Of The Internet Security Topics

1656 words - 7 pages , working in the sphere of industrial espionage. So, many security specialists advise employers to pay special attention to engaged workers-specialists in computer technologies, programming and information protection spheres.There are many causes, when "hackers" get a job with a goal of personal enrichment. But the most danger can represent such specialists, who are in collusion with managers of commercial structures and organized criminal groups

Image And Sound In The Information Age

602 words - 2 pages Image And Sound In The Information AgeMinimalistic Glass, The Silk Road Project, Video art pieces by Paik and Viola, and the global paradigms of Chris Ofili, Andreas Gursky, and Cai Guo-Qiang, this variety may seem to have been impossible decades ago. Back then, Expressionism was a movement that proved to be an enduring force in 20th century art, exercising a strong influence on New York painters of the 1940s and 1950s. This period also promoted

The Security And Protection Of The State

1072 words - 4 pages the present in terms of security challenges and issues faced by states when investigating the fine details of documents and actions but when retrospective on overall effect and our current global situation there are significant similarities can be found. Structure: Part One: Introduction and definition of key terms (e.g. New World Order) The security and protection of the state has fundamental always been a priority of importance for any

Network Security And Protection Essay

1544 words - 7 pages Intoduction Network security is a set of different measures which are designed to protect networks from attacks and unauthorised access. Network protection is provided in two type software and hardware. Treats to huge corporation networks nowadays are constantly growing, they spreading in increasing speed, and their destructive capabilities are increasing every day. If we look on the list of threads what may harm the corporate network, it
Capítulo Anterior | The Tiberium Wars Chronicles | Mononoke Hime