Term Paper on "Computer Surveillance"
Term Paper 19 pages (4976 words) Sources: 1
[EXCERPT] . . . .
Computer Surveillance: Qualitative Attempt to Conceptualize Crime in the 21st CenturyPurpose/Objectives/Theoretical Framework
Summary of Remaining Chapters
Computer Crime in a Digital Age
The Impact of the Net on Computer Surveillance
Networked Surveillance
Electronic Surveillance in the Workplace
Deterring Crime
Deterrance and Encryption Technology
Survey Population/Description of the Subject
Hypothesis Evaluation
The primary focus of this study is a qualitative exploration of the changing nature of crime related to computer surveillance. Specifically the aim of the study is to examine how advances in technology have facilitated computer crimes affecting both consumers and corporations. The extent to which computer surveillance crimes are becoming more insidious is explored, as well as any methods currently in use for deterring crime.
The author explores the nature of computer crime and surveillance in a comprehensive literature review, and combines the results of this examination with the information gained from surveying populations affected by computer surveillance. The conclusion of the study finds that the nature of crime is in fact changing in the face of technological advances. The author concludes that though criminal activity is becoming more prevalent and problematic thanks to advances in surveillance, there still exist few solutions and statistical reports with regard to deterring criminal activity.
Introduction
Continue scrolling to
download full paper ⤓
Computer crime is on the rise thanks to the advent of modern technology. As technology becomes increasingly sophisticated criminals are more able to facilitate devastating actions at the press of a button.
The aim of this research paper is to examine the changing nature of crime and discover the impact consumer surveillance has on consumers and businesses alike. The qualitative study proposed will also examine the extent to which advanced technologies are being exploited and used by criminals to facilitate illicit activity.
In addition to this, it will examine the extent to which businesses and consumers must increasingly face and be weary of illicit computer activities, and describe the impact such criminal activity has on privacy and personal interests.
Background of the Problem
Research suggests that the problem of computer surveillance is rapidly growing and should be considered a primary concern among governments internationally in the next several years (Shelley, 1998; Lyon, 2002; Campbell & Carson, 2002; Wibler, 2003). Despite the rise in criminal activity directly associated with computer surveillance, little progress has been made in the way of protecting consumers and businesses from crime resulting from computer surveillance.
Rationale
Trends have developed that go hand in hand with the advent of modern technology. As technology has afforded consumers and businesses the luxury of conducting business over the web, so too has it afforded criminals the opportunity to use computer surveillance to conduct more insidious and impacting crimes. Despite this, relatively few studies have actually been conducted that examine computer surveillance from a point of the changing nature of crime, with the intent of examining what if any methods can be developed to halt this pattern and invasion of privacy. This study will in part fill a void in relation to the research that has been conducted in this area.
Purpose/Objectives/Theoretical Framework
Better access to and control of access to communications technology is a growing trend in modern society, and with the advent of technological advances comes the need to discover better methods for protecting consumer and business privacy and information.
The aim of this thesis is a consideration of current theoretical approaches to computer surveillance in an attempt to understand the nature and extent of computer surveillance both in the workplace and in business (Shelley, 1998).
Computer surveillance will also be examined from the perspective of criminal activity and privacy rights.
A primary objective of the paper will be to assess changes in the nature of monitoring in recent years in addition to the impact computer surveillance has had vs. traditional surveillance methods. A qualitative study will be conducted in order to uncover trends and the implications of advanced technological incentives on computer surveillance activity. A qualitative study is most appropriate with regard to this subject, as an empirical or experimental examination would be impossible given the few available resources allocated to conducting a project of this scope. In addition, at this time there is limited information with regard to computer surveillance and statistics, due in part to a lack of cooperation between law enforcement agencies and technology firms who are consistently in competition to outperform one another (Shelley, 1998).
Research Hypothesis
The argument presented is that electronic surveillance has become more insidious in recent years, and the nature of crime is changing as a result.
Second to this, the researcher hypothesizes that as time progresses, the results of surveillance without appropriate checks and balances will be negative and severely impacting, both for individuals and corporations alike.
The study will seek to prove the point that a need currently exists for additional studies focusing on the impact of electronic surveillance on individual outcomes and productivity. Both workplace and consumer monitoring will be examined to determine complementary factors that might exist between the two.
Several forms of computer monitoring are common, including keystroke monitoring, electronic mail monitoring, entry and exit into buildings using smart cards and even product scanning systems which provide information about consumer purchases and merchandise (Bryant, 1995). For purposes of this study, a broad survey of computer surveillance techniques will be utilized.
Limitations
The author acknowledges that this study is limited in scope because of its qualitative nature and the current lack of information and statistics available with regard to computer surveillance. The author will attempt to overcome these limitations by surveying as broad a selection of research material available with regard to computer surveillance, and not limiting the study to one form or another of computer surveillance. This will help the researcher gather as much information as possible regarding the changing nature of computer surveillance crimes.
Summary of Remaining Chapters
Following this section, the paper will explore the research available with regard to computer surveillance, then discourse on the methodology used to collect additional information for purposes of this study, and subsequently draw conclusions from and discuss the data collected.
Literature Review
Overview
Whereas crime was once a local and regional matter, today crime and corruption are no longer "limited by geographic boundaries" and technology has in essence "redefined the nature of crime" (Shelley, 1998, p. 605). Crime exists in the form of computer surveillance, where access is controlled "by corporations that serve computer and telecommunications networks" and criminals that invade privacy pose "grave threats to the integrity of the world financial system, undermine the ability of states to protect their citizens, and are themselves a major threat to human rights" (Shelley, 1998, p. 605).
One of the problems of computer crime is that jurisdiction can't be exercised if the individual committing the crime has "no identity other than a computer network, which thanks to technologically innovation in the 21st century is not feasible" (Shelley, 1998, p. 605). Legal and law enforcement agencies have few effective and efficient methods for deterring cyber-criminals (Shelley, 1998).
Computer Crime in a Digital Age
The capacity of computer criminals to corrupt and undermine the quality of life of "millions of the world's citizens" through technology is virtually limitless (Shelley, 1998, p. 605). In fact, many citizens have gone as far as rendering themselves defenseless in the age of technology (Shelley, 1998). Facilitating interest in computer crimes are wire transfer, faxes and internet connections that move money (Shelley, 1998). Crime via computer can victimize virtually anyone. The primary form of criminal activity engaged in via computers is surveillance. Surveillance can be used to monitor keystrokes actions, record personal data and deter financials and other capital (Lyon, 2002; Shelley, 1998).
According to officials from the U.S. Department of Justice, "sophisticated computer techniques permit thieves to steal $10 billion annually from financial institutions" (Shelley, 1998, p. 605). International financial fraud is perpetuated through computer crime (Shelley, 1998).
How do computer criminals achieve such devastation? They often pose as legitimate businesses in search of large profits in highly competitive global markets (Shelley, 1998).
Prior to the advent of computer technology capital "had to be physically moved and valuables weren't easily traceable" (Shelley, 1998, p. 605). Now money flows through banks via wire transfers in minutes, thus larger amounts of transactions are occurring daily and increasing the risk for problematic encounters (Shelley, 1998). Criminal groups can use a variety of techniques "including transferring wires through several different countries" in order to cause difficulty for clients attempting to trace funds (Shelley, 1998, p. 605).
The Impact of the Net on Computer Surveillance
Thanks to modern technology and new advances on the web, each and every time a user logs onto the Internet an opportunity arises for computer surveillance. The use of the internet as a form of information exchange has rapidly expanded in recent years. According to Lyon (2002) using surveillance technology, anyone can track each and every click of the mouse, survey the web sites consumers visit and read personal email messages (p. 345). Surveillance technology also allows hackers and criminals… READ MORE
Quoted Instructions for "Computer Surveillance" Assignment:
TITLE PAGE
COPYRIGHT PAGE
ABSTRACT
TABLE OF CONTENTS
I Chapter 1 Introduction
A. Background of Study
B. Problem Statement
C. Purpose of Objective
D. Rationale
E. Definition of terms
F. Limitations
G. Theoretical Framework
H. Research Hypothesis
I. Summary of Remaining Chapters
II. Chapter II Literature Review
1. Subtopic vary by subject
2. Definitions-Categories
3. Previous research that relates to the topic or
similar topics: start broadley and narrow focus, do not include data you will use in chapter 4
III. Chapter III- Methodology
A. Setting
B. Description of Subject
C. Description of the Research Instrument(s)
D. Procedures
IV. Chapter IV
Hypothesis 1
1. All data related to Hyothesis 1
2. Analysis data
Hypothesis 2
1. All data related to Hypothesis 2
2. Analysis of data
V. Chapter V- Discussion, Conclusion, and recommendations
A. Discussion
B. Conclusion
C. Recommendations
Include how computer criminals can spy on the average person, busnesses ect. through a computer and have them under surveillance.
How to Reference "Computer Surveillance" Term Paper in a Bibliography
“Computer Surveillance.” A1-TermPaper.com, 2004, https://www.a1-termpaper.com/topics/essay/computer-surveillance-qualitative/44771. Accessed 8 Jul 2024.
Related Term Papers:
Computer Viruses: A Quantitative Analysis of User Term Paper
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Computer Viruses: A Quantitative Analysis of User Profiles and Risk Factors for Contracting Computer Viruses
The purpose of this study is a quantitative descriptive analysis of computer viruses. Specifically the… read more
Term Paper 10 pages (2542 words) Sources: 1+ Topic: Computers / IT / Internet
Computer Ethics Term Paper
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Computer Ethics
The Internet's rapid evolution as a publishing and commerce platform further extends its ability to serve as another marketing, selling, and service channel for companies globally, yet with… read more
Term Paper 10 pages (3784 words) Sources: 30 Style: Harvard Topic: Computers / IT / Internet
Computers Have Revolutionized the 21st Century Research Paper
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Computers have revolutionized the 21st century in that manual activities have become automated. Activities such as reading books have changed with the production of e-books which have reduced the physical… read more
Research Paper 3 pages (995 words) Sources: 3 Topic: Management / Organizations
Computer Ethics: Internet Privacy Essay
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Computer Ethics: Internet Privacy
One of the more interesting aspects of privacy in general is how people from different countries view the need. In the highly individualized United States, many… read more
Essay 3 pages (1058 words) Sources: 3 Topic: Computers / IT / Internet
Computers Internet Computer Technology Term Paper
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Internet
Business
Proposal & Implementation Plan
For Refurbishment of Former Factory Building
Proposal & Implementation Plan
For Refurbishment of Former Factory Building
As part of the proposed refurbishment of the… read more
Term Paper 15 pages (5406 words) Sources: 1+ Topic: Computers / IT / Internet
Mon, Jul 8, 2024
If you don't see the paper you need, we will write it for you!
We can write a new, 100% unique paper!