Situational Tracking

Improved Essays
The Chapter 5 Issues article talks about tracking and the benefits and issues that it entails. In the fictional world of Harry Potter the ability to track people and see where they are at all times is a magical, pun intended, and foreign concept. However, for us it is a scary reality. People with the right technology can track unexpecting citizens to monitor what they do. There are two different types of tracking: behavioral and locational. Behavioral tracking monitors what you do on the internet from what you look at and buy to who you talk to. Locational tracking monitors who you interact with and what you do and buy in person. Most people have tracking features enabled on their mobile devices without knowing the risks of it. In order to get the cool Snapchat filters on your phone you are …show more content…
This was discovered by Pete Warden and Alasdair Allan and it sparked a lot of protests on the internet which resulted in an Apple Press Release. The PR said that it is necessary in order to have certain features available on your phone. However, people are really scared that the NSA and other governments will use this technology in a bad way. And the governments do say that it is essential for the public safety but people seem to rather have their privacy than their lives. Chapter 5, in short, is about networks. It starts by talking about the building blocks of a Network and how they are classified: PAN, LAN and WAN. The chapter also talks about how everything in your house is connected via your network. Furthermore, WiFi and Bluetooth are also covered in the chapter which is useful because it is something most of us use in everyday life. Networks can be used to do a variety of things from allowing you to access one device while using another and sharing files between devices in a network. It is because of these technologies that you can control your home from work or

Related Documents

  • Improved Essays

    List the classification of network in detail according to the area covered. Also explain each classification of network in detail with its application. LAN – (Local Area Network) A LAN is a network that covers a relatively small area. It is a network that mostly links computers within a single building.…

    • 546 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Itc431 Unit 1 Assignment

    • 1697 Words
    • 7 Pages

    Assignment 2 ITC431 - Networks and Communications Sidharth Arangadan House Jayarajan 11538368 1 1. Define and explain the following terminologies:  Computer networks: A computer network is a group of computer systems or other hardware computing devices which are linked together through a channel called communication channel to establishing communication between wide number of users and also for resource sharing between them.  Personal area networks (PANs): A personal area system - PAN - is a machine system sorted out around a distinctive individual.…

    • 1697 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    Pros And Cons Of Hacking

    • 434 Words
    • 2 Pages

    I am going to take about how apple had wanted to refuse to unlock a app phone. But the FBI says that they need to unlock the phos so that they can know of there is going to be a fucher attack. But App says they will not because they had already unlock about nine phone. But the FbI had say “that there can be a fucher russon attack”.…

    • 434 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    to use. These are designed for the typical users to complete normal work, normally in the school’s network they will have limitations on student accounts, for example, there are many sites that they cannot access, and their computer will only hold the essential applications (software), etc. It is very common to see Windows operating system installed in these workstations however they might not be up to date as it can be costly, hence they would use older versions of windows operating system. • Interconnection devices are a physical piece of hardware used to connect the users to a network they are connected to, some examples of these interconnection devices are: o Routers – These devices uses protocols such as ICMP (Internet Control Message) Protocols, using these protocols, routers will search and determine the best path between the two hosts to send data packets back and forth. o Switches – While routers send data packets, switches filter these data packets and then send the data packet to its destination, however it has very limited functions, it is more advanced than a hub, however it is less compared to a router.…

    • 2216 Words
    • 9 Pages
    Improved Essays
  • Improved Essays

    In Alexandra Alter’s expository editorial the subject of privacy, and especially its relation to data collection is a controversial topic that has the power to polarize people. This article highlights how a previously solitary act of reading is evolving into something that can be tracked and analysed. The author’s thesis focuses on reading, when done electronically, has become an invasion of privacy. This article also presents the idea that reader-user data and it’s analysis is very profitable for publishers and e-book companies.…

    • 94 Words
    • 1 Pages
    Improved Essays
  • Decent Essays

    Analysis: Blown To Bits

    • 312 Words
    • 2 Pages

    Chapter two of Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis was about how technology affects our privacy. In this chapter, the authors discussed how our privacy is being stripped away, the willingness with which we give this privacy away, and privacy policies. As experts in technology, Abelson, Ledeen, and Lewis discuss how technology has aided this progression of human ideologies to lead increasingly more public lives. Our privacy is constantly being stripped away from us thanks to the technological innovations. As technology becomes more and more widely used, more and more personal information is being stored through technological means.…

    • 312 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Essay On 1984 Technology

    • 501 Words
    • 3 Pages

    “Let’s stop calling them cellphones, call them trackers” (that’s no phone). With cellphones everywhere you go you can get tracked. If you get lost it can tell you exactly where you are at. Also if you leave your phone somewhere you can track your lost phone and find it where ever it’s at. This states how technology can track you…

    • 501 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Trackers Book Report

    • 376 Words
    • 2 Pages

    Being tracked or followed can be very terrifying, especially when you are hiding from the government. After reading Trackers by Patrick Carman, the phrase "you can't trust your own shadow," comes to mind because this book will make you want to your surroundings to make sure you aren't being followed. This book starts off with a boy named Adam and his dad working in an electronic store where it is constantly filled with customers. Adam's dad decided to give him a small room in the back of the store, for anything he wanted.…

    • 376 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Police officers have needed the information on electronic devices. They need this data for finding missing citizens and suspects. But have been stopped in their tracks countless times. They have been stopped by the owners and others that believe the 4th Amendment enables them to decline the seizing and search of their devices. They want officers to have a warrant.…

    • 424 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    In Defense Of Distraction

    • 1246 Words
    • 5 Pages

    Authors Anderson, Goldberger, and Franzen address the audience about concerns within societies and the effect technology has disconnected the reality and everyday social lives of one another and how these distractions have invaded our privacy and the idea of it. They accomplish this argument by using sources with a variety of experts and interviews that give expertise to persuade the argument of technology and the distractions it creates among society’s ultimate connections and ideas of privacy. In this way Anderson, Goldberger, and Franzen convince the audience of the ultimate distraction technology creates in the attention society seems to diminish and invade the privacy we once had. In the essay “In Defense of Distraction” in Writing Analytically…

    • 1246 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    With the advancement of technology comes a startling decrease in privacy. Nothing is considered ‘personal’ by the internet, or private, or kept a secret. Anything put on the internet is forever immortalized. Technology like cellphones, laptops, and drones have invaded the sense of personal privacy and eliminated the prospects of privacy returning to those who possess technology.…

    • 382 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Technology and media play a significant role in most people 's lives in today 's society. Digital devices are starting to rule over people 's lives. In Fahrenheit 451, Ray Bradbury illustrates a fictional society that revolves around electronics. The people living in Bradbury 's creation are brainwashed by the government, almost programmed to be the same, with a world in which reading books is illegal. The novel sends a clear warning to the real world showing how electronics can destroy freedom and independence.…

    • 1601 Words
    • 7 Pages
    Improved Essays
  • Great Essays

    Apples’ Corporate Responsibility and Marketing Strategies Mouad Nouidei Strayer University Corporate Responsibility Some of the main levels in business for consumers are corporate social responsibilities and business ethics. A lot of businesses now a days come across different questions from patrons and stockholders regarding the company’s ethical and social responsibility (Munson, 2014). Business ethics can include anything from the way the company hires or how a company can make their claims in advertising (Munson, 2014). Businesses depend on their employees who represent the business in public and on their customers, to represent a trustworthy image that is joined together with the goals and objectives in the company (Munson, 2014).…

    • 1616 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Surveillance has presented numerous challenges to the right of privacy. There is a need to develop a high technology surveillance system that will come with great benefits without intrusion. With new advances in technology each day, it is becoming easier to communicate with each other. Yet with all these new forms of communication there have been unpleasant side effects, since this new advanced technology is not only for harmless interactions between one another it is also used to plot against governments and countries. Governments have found themselves under attack a countless number of times and have had no other choice but to resort to monitoring their citizen’s online and phone activities.…

    • 729 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    “If the police officer who shot and killed Michael Brown had been wearing a camera, the nation might already know who’s telling the truth about what happened that tragic day in Ferguson” ( “When Cops Wear Cameras” A.6 ). These are cases where technology should be regulated because it ensures people 's safety, and their justice. Research shows that technology is not being regulated. Since it hasn’t been regulated, people have lost their lives during tragic events. Therefore technology should be regulated to ensure our nation 's safety and privacy.…

    • 1264 Words
    • 6 Pages
    Superior Essays