Term Paper on "Computer Surveillance"

Term Paper 19 pages (4976 words) Sources: 1

[EXCERPT] . . . .

Computer Surveillance: Qualitative Attempt to Conceptualize Crime in the 21st Century

Purpose/Objectives/Theoretical Framework

Summary of Remaining Chapters

Computer Crime in a Digital Age

The Impact of the Net on Computer Surveillance

Networked Surveillance

Electronic Surveillance in the Workplace

Deterring Crime

Deterrance and Encryption Technology

Survey Population/Description of the Subject

Hypothesis Evaluation

The primary focus of this study is a qualitative exploration of the changing nature of crime related to computer surveillance. Specifically the aim of the study is to examine how advances in technology have facilitated computer crimes affecting both consumers and corporations. The extent to which computer surveillance crimes are becoming more insidious is explored, as well as any methods currently in use for deterring crime.

The author explores the nature of computer crime and surveillance in a comprehensive literature review, and combines the results of this examination with the information gained from surveying populations affected by computer surveillance. The conclusion of the study finds that the nature of crime is in fact changing in the face of technological advances. The author concludes that though criminal activity is becoming more prevalent and problematic thanks to advances in surveillance, there still exist few solutions and statistical reports with regard to deterring criminal activity.

IntroductionContinue scrolling to

download full paper
/>

Computer crime is on the rise thanks to the advent of modern technology. As technology becomes increasingly sophisticated criminals are more able to facilitate devastating actions at the press of a button.

The aim of this research paper is to examine the changing nature of crime and discover the impact consumer surveillance has on consumers and businesses alike. The qualitative study proposed will also examine the extent to which advanced technologies are being exploited and used by criminals to facilitate illicit activity.

In addition to this, it will examine the extent to which businesses and consumers must increasingly face and be weary of illicit computer activities, and describe the impact such criminal activity has on privacy and personal interests.

Background of the Problem

Research suggests that the problem of computer surveillance is rapidly growing and should be considered a primary concern among governments internationally in the next several years (Shelley, 1998; Lyon, 2002; Campbell & Carson, 2002; Wibler, 2003). Despite the rise in criminal activity directly associated with computer surveillance, little progress has been made in the way of protecting consumers and businesses from crime resulting from computer surveillance.

Rationale

Trends have developed that go hand in hand with the advent of modern technology. As technology has afforded consumers and businesses the luxury of conducting business over the web, so too has it afforded criminals the opportunity to use computer surveillance to conduct more insidious and impacting crimes. Despite this, relatively few studies have actually been conducted that examine computer surveillance from a point of the changing nature of crime, with the intent of examining what if any methods can be developed to halt this pattern and invasion of privacy. This study will in part fill a void in relation to the research that has been conducted in this area.

Purpose/Objectives/Theoretical Framework

Better access to and control of access to communications technology is a growing trend in modern society, and with the advent of technological advances comes the need to discover better methods for protecting consumer and business privacy and information.

The aim of this thesis is a consideration of current theoretical approaches to computer surveillance in an attempt to understand the nature and extent of computer surveillance both in the workplace and in business (Shelley, 1998).

Computer surveillance will also be examined from the perspective of criminal activity and privacy rights.

A primary objective of the paper will be to assess changes in the nature of monitoring in recent years in addition to the impact computer surveillance has had vs. traditional surveillance methods. A qualitative study will be conducted in order to uncover trends and the implications of advanced technological incentives on computer surveillance activity. A qualitative study is most appropriate with regard to this subject, as an empirical or experimental examination would be impossible given the few available resources allocated to conducting a project of this scope. In addition, at this time there is limited information with regard to computer surveillance and statistics, due in part to a lack of cooperation between law enforcement agencies and technology firms who are consistently in competition to outperform one another (Shelley, 1998).

Research Hypothesis

The argument presented is that electronic surveillance has become more insidious in recent years, and the nature of crime is changing as a result.

Second to this, the researcher hypothesizes that as time progresses, the results of surveillance without appropriate checks and balances will be negative and severely impacting, both for individuals and corporations alike.

The study will seek to prove the point that a need currently exists for additional studies focusing on the impact of electronic surveillance on individual outcomes and productivity. Both workplace and consumer monitoring will be examined to determine complementary factors that might exist between the two.

Several forms of computer monitoring are common, including keystroke monitoring, electronic mail monitoring, entry and exit into buildings using smart cards and even product scanning systems which provide information about consumer purchases and merchandise (Bryant, 1995). For purposes of this study, a broad survey of computer surveillance techniques will be utilized.

Limitations

The author acknowledges that this study is limited in scope because of its qualitative nature and the current lack of information and statistics available with regard to computer surveillance. The author will attempt to overcome these limitations by surveying as broad a selection of research material available with regard to computer surveillance, and not limiting the study to one form or another of computer surveillance. This will help the researcher gather as much information as possible regarding the changing nature of computer surveillance crimes.

Summary of Remaining Chapters

Following this section, the paper will explore the research available with regard to computer surveillance, then discourse on the methodology used to collect additional information for purposes of this study, and subsequently draw conclusions from and discuss the data collected.

Literature Review

Overview

Whereas crime was once a local and regional matter, today crime and corruption are no longer "limited by geographic boundaries" and technology has in essence "redefined the nature of crime" (Shelley, 1998, p. 605). Crime exists in the form of computer surveillance, where access is controlled "by corporations that serve computer and telecommunications networks" and criminals that invade privacy pose "grave threats to the integrity of the world financial system, undermine the ability of states to protect their citizens, and are themselves a major threat to human rights" (Shelley, 1998, p. 605).

One of the problems of computer crime is that jurisdiction can't be exercised if the individual committing the crime has "no identity other than a computer network, which thanks to technologically innovation in the 21st century is not feasible" (Shelley, 1998, p. 605). Legal and law enforcement agencies have few effective and efficient methods for deterring cyber-criminals (Shelley, 1998).

Computer Crime in a Digital Age

The capacity of computer criminals to corrupt and undermine the quality of life of "millions of the world's citizens" through technology is virtually limitless (Shelley, 1998, p. 605). In fact, many citizens have gone as far as rendering themselves defenseless in the age of technology (Shelley, 1998). Facilitating interest in computer crimes are wire transfer, faxes and internet connections that move money (Shelley, 1998). Crime via computer can victimize virtually anyone. The primary form of criminal activity engaged in via computers is surveillance. Surveillance can be used to monitor keystrokes actions, record personal data and deter financials and other capital (Lyon, 2002; Shelley, 1998).

According to officials from the U.S. Department of Justice, "sophisticated computer techniques permit thieves to steal $10 billion annually from financial institutions" (Shelley, 1998, p. 605). International financial fraud is perpetuated through computer crime (Shelley, 1998).

How do computer criminals achieve such devastation? They often pose as legitimate businesses in search of large profits in highly competitive global markets (Shelley, 1998).

Prior to the advent of computer technology capital "had to be physically moved and valuables weren't easily traceable" (Shelley, 1998, p. 605). Now money flows through banks via wire transfers in minutes, thus larger amounts of transactions are occurring daily and increasing the risk for problematic encounters (Shelley, 1998). Criminal groups can use a variety of techniques "including transferring wires through several different countries" in order to cause difficulty for clients attempting to trace funds (Shelley, 1998, p. 605).

The Impact of the Net on Computer Surveillance

Thanks to modern technology and new advances on the web, each and every time a user logs onto the Internet an opportunity arises for computer surveillance. The use of the internet as a form of information exchange has rapidly expanded in recent years. According to Lyon (2002) using surveillance technology, anyone can track each and every click of the mouse, survey the web sites consumers visit and read personal email messages (p. 345). Surveillance technology also allows hackers and criminals… READ MORE

Quoted Instructions for "Computer Surveillance" Assignment:

TITLE PAGE

COPYRIGHT PAGE

ABSTRACT

TABLE OF CONTENTS

I Chapter 1 Introduction

A. Background of Study

B. Problem Statement

C. Purpose of Objective

D. Rationale

E. Definition of terms

F. Limitations

G. Theoretical Framework

H. Research Hypothesis

I. Summary of Remaining Chapters

II. Chapter II Literature Review

1. Subtopic vary by subject

2. Definitions-Categories

3. Previous research that relates to the topic or

similar topics: start broadley and narrow focus, do not include data you will use in chapter 4

III. Chapter III- Methodology

A. Setting

B. Description of Subject

C. Description of the Research Instrument(s)

D. Procedures

IV. Chapter IV

Hypothesis 1

1. All data related to Hyothesis 1

2. Analysis data



Hypothesis 2

1. All data related to Hypothesis 2

2. Analysis of data

V. Chapter V- Discussion, Conclusion, and recommendations

A. Discussion

B. Conclusion

C. Recommendations

Include how computer criminals can spy on the average person, busnesses ect. through a computer and have them under surveillance.

How to Reference "Computer Surveillance" Term Paper in a Bibliography

Computer Surveillance.” A1-TermPaper.com, 2004, https://www.a1-termpaper.com/topics/essay/computer-surveillance-qualitative/44771. Accessed 8 Jul 2024.

Computer Surveillance (2004). Retrieved from https://www.a1-termpaper.com/topics/essay/computer-surveillance-qualitative/44771
A1-TermPaper.com. (2004). Computer Surveillance. [online] Available at: https://www.a1-termpaper.com/topics/essay/computer-surveillance-qualitative/44771 [Accessed 8 Jul, 2024].
”Computer Surveillance” 2004. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/computer-surveillance-qualitative/44771.
”Computer Surveillance” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/computer-surveillance-qualitative/44771.
[1] ”Computer Surveillance”, A1-TermPaper.com, 2004. [Online]. Available: https://www.a1-termpaper.com/topics/essay/computer-surveillance-qualitative/44771. [Accessed: 8-Jul-2024].
1. Computer Surveillance [Internet]. A1-TermPaper.com. 2004 [cited 8 July 2024]. Available from: https://www.a1-termpaper.com/topics/essay/computer-surveillance-qualitative/44771
1. Computer Surveillance. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/computer-surveillance-qualitative/44771. Published 2004. Accessed July 8, 2024.

Related Term Papers:

Computer Viruses: A Quantitative Analysis of User Term Paper

Paper Icon

Computer Viruses: A Quantitative Analysis of User Profiles and Risk Factors for Contracting Computer Viruses

The purpose of this study is a quantitative descriptive analysis of computer viruses. Specifically the… read more

Term Paper 10 pages (2542 words) Sources: 1+ Topic: Computers / IT / Internet


Computer Ethics Term Paper

Paper Icon

Computer Ethics

The Internet's rapid evolution as a publishing and commerce platform further extends its ability to serve as another marketing, selling, and service channel for companies globally, yet with… read more

Term Paper 10 pages (3784 words) Sources: 30 Style: Harvard Topic: Computers / IT / Internet


Computers Have Revolutionized the 21st Century Research Paper

Paper Icon

Computers have revolutionized the 21st century in that manual activities have become automated. Activities such as reading books have changed with the production of e-books which have reduced the physical… read more

Research Paper 3 pages (995 words) Sources: 3 Topic: Management / Organizations


Computer Ethics: Internet Privacy Essay

Paper Icon

Computer Ethics: Internet Privacy

One of the more interesting aspects of privacy in general is how people from different countries view the need. In the highly individualized United States, many… read more

Essay 3 pages (1058 words) Sources: 3 Topic: Computers / IT / Internet


Computers Internet Computer Technology Term Paper

Paper Icon

Internet

Business

Proposal & Implementation Plan

For Refurbishment of Former Factory Building

Proposal & Implementation Plan

For Refurbishment of Former Factory Building

As part of the proposed refurbishment of the… read more

Term Paper 15 pages (5406 words) Sources: 1+ Topic: Computers / IT / Internet


Mon, Jul 8, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!