Posted on 06. Mar, 2012 by editor in ANALYSIS, ARCHIVE, SCIENCE & TECHNOLOGY, STRATEGY
COMPUTERS | MARCH 6, 2012
Computer Economics A Great Dependence with Explicit Consequences
Josephine Bell
Post University
Abstract
We are becoming overwhelmingly dependent on computers. Is this dependence on computers a good thing or should we be more suspicious of their benefits?
Despite the vast research of computer science, many welcome the advantages of technology. The innovation of change brings greater fortunes to our economy. There are many controversial view points with computer technology that brings rewards with explicit consequences. This study shows my analysis of the intention, purpose, and economic changes with computer technology advancement using quantitive research methods. This study brings many questions to thought with rhetorical answers showing my biggest concern with computer technology. Computer crimes are rising steadily creating a great demand for homeland security for terrorist?s threat via the World Wide Web. Computer hacking has many techniques that needs to be acknowledged often.; Concluding with the laws enacted by congress to aide in the defense of computer crimes, identity theft, embezzlement, and fraud on all accounts. Computers are a great improvement to economic development but the risk of criminal deviancy should be an even greater issue for a call of action.
With the advent of computer technology we could expect a good Gross Domestic Product (GDP) and economic rate in the coming days?(http://www.socyberty.com),?but as a society we need to be more suspicious. Many cultures around the globe are becoming frequent shoppers of the online community e-commerce. But as many are wholesale shopping online, we are losing equity in our country. Employment rates are unstable due to technological advances and outsourcing of labor to foreign lands for cheaper pay. Survival in the workforce is limited to the economic value of your town and your cognitive capabilities for advancement.
Industrialization started in the 1800?s to bring a new society to the cultural front. Large groups of workers were united with central supervision that replaced hand tools with power driven machinery. Samuel Slater built a power driven jenny which became the key invention of the early industrial revolution. The key fact to development in this revolution was the lacking of a strong internal market. The reason behind the development was the opposition of the slave holding class to industrial development.?(Foner, 2010)?Just as then we didn?t question the consequences but openly welcomed the change but before we could grow financially stronger we were hit with the biggest recession of our time known as the Great Depression. The inventors of the industrial revolution began the transition in America?s previously manual labor and slave based economy towards machine based manufacturing with Globalization the process of increasing the connectivity and interdependence of the?world?smarkets?and?businesses. (http://www.investorwords.com)/.
??????????? As globalization has speeded up dramatically in the last two decades as technological?advances?make it easier for?people?to travel, communicate, and do?business?internationally. Two?major?recent driving forces are advances in telecommunications?infrastructure?and the?rise?of the internet.?(http://www.investorwords.com)??At the dawn of the computer age, we were told the machines would revolutionize our lives. They would steal our jobs, said the pessimists. They would give us unending leisure time, said the optimists. Computers were going to revolutionize industry. They were going to become an instrument of totalitarian tyranny as envisaged in George Orwell?s novel 1984. They were going to be able to reproduce.?(BBC, 2002)
The key word reproduce is to technology as innovation is to survival in our present economy.?(http://www.merriam?webster.com)?The computer was invented to store, retrieve, and process massive information but now it has grown to perform the most complex tasks that a human being cannot perform. Computers technology is a wonderful invention that has many eager for more advances but we have to ask what are the risks involved and compare the research wisely.??
The advent of computer technology leads to the hypothesis of a computerized future. The performance of the computer is essentially better and faster than any person. The computer directly and indirectly affects our economy because of the complicity of their tasks. The computer has become the key essential in our lifestyle as we know today.(http://www.smallbusiness.com)The Business world acknowledges the computer as a multifunction machine with extraordinary talents. These talents cannot be performed without an operating system. The software is the operating system of the computer that helps with the performance of the complex tasks, but even the software raises suspicion.
Computer crime also known as Cyber crime is becoming a much larger problem than anyone could have guessed. With identity theft, hacking, viruses, embezzlement and fraud on the rise we need to think more critically about the benefits we assume to gain. I know that technology brings a greater ease to living luxuriously but with all the increasing information technology educational courses, computer crime has risen to the ranks of homeland security.
??????????? The criminal deviants aren?t just bored teenagers anymore; they are skilled computer experts who know how to manipulate the computer.?(http://www.wiki.answers.com)?And the worst part is your entire life is stolen from you without you ever knowing what had happened. Computer fraud varies from minor to explicit techniques with the aid of software such as(http://www.quizlet.com):
Adware?-Type of spyware that collects information about a user?s Web browsing habits. Adware often is used by Internet advertising firms
Blue bugging?-?Taking control of someone else?s phone to make calls or send text messages, or to monitor communications. ?
Bluesnarfing?-stealing contact lists, images, other data by using Bluetooth
Botnet / Bot herders?-network of zombie compute that can be remotely controlled by a hacker
Chipping?-planting a small chip in a legit credit card reader. Chip records transaction data
Dictionary attack?- (aka direct harvesting attacks) use special software to guess addresses at a particular company and send blank email messages. Those that don?t come back are valid
Evil twin?-when a hacker sets up a wireless network with the same name (SSID) as the wireless access point at a local hot spot
Key logger?-software records computer activity, user?s keystrokes, emails sent/received?
Logic / Time bombs?-Software that sits idle until a specified circumstance or time triggers it, destroying programs, data
Malware?-malicious software
Packet sniffing?-find confidential information using a computer while it travels the internet and other networks
Pharming?- redirecting a web site?s traffic to a fake web site to gain confidential information
Phishing?- a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail
Phreaking?- attacking phone systems to obtain free phone line access; send viruses; access, steal and destroy data
Piggybacking?- 3 meanings: (1) clandestine use of a neighbor?s wifi (2) tapping into telecom line and electronically latching on to a legitimate user and go with them into the system (3) unauthorized person passing through secure door when authorized person opens it
Posing?-creating a seemingly legitimate business, collecting personal information to make a sale and never delivering a product
Pretexting?-Acting under false pretenses to gain confidential information.
Rootkit?-?Software that conceals processes, files, network connections, memory addresses, systems utility programs, and system data from the operating system.?
Salami technique?-stealing tiny slices of money over time
Skimming?-double swiping a credit card in a legit terminal or on a side card reader to keep the information
Spamming?-unsolicited commercial e-mailing
Splog?-spam blogs; promote affiliated websites to increase Google Page Rank (how often a web page is referenced by other web pages)
Spoofing?-making an email message look as if someone else sent it
Spyware?-computer software that is designed to collect personal info about users without their informed consent
Steganography?-A method of hiding data within another media type, such as graphic, WAV file, or document
Super zapping?-using special software to get past system controls and do illegal things
Trap door?-a way into a system that bypasses normal system controls.
Trojan horse?-Unauthorized code in an authorized and properly functioning program
Vishing?-voice phishing
War dialing?-hackers search for dial-up modem lines by programming computers to dial thousands of phone lines
War driving?-driving around looking for unprotected wireless networks
Worm?-a software program capable of reproducing itself that can spread from one computer to the next over a network
Zero-day attack?-An attack between the time a new software vulnerability is discovered and a software patch that fixes the problem is released
All of these techniques are why we need to reconsider revamping our economy to full technological advancement. The Government is working diligently to enact laws that can help protect you from the repercussions of cyber crime. These crimes are hard to prove due to the World Wide Web because the attacker does not have to be local or nationwide. Attackers can cause havoc from anywhere in the world. Some attackers have gone beyond the internet to using telecommunications and staging as a false business, company, and organization to gain the vital information to jeopardize your assets.? As the economy advances so does the criminal intelligence and capabilities.? According to Cornell University Law School ?USC???Title 18???Part I??Chapter 47?? ? 1030?- Fraud and? Related Activity in Connection with Computers?gives the victim the power to seek justice from a cyber crime, Prosecuting the attacker to the fullest extent of the law. Although computers have its advantages the disadvantage is the clandestine risk of fraud and losing your fortune to the new technology.
References
Works Cited
BBC. (2002, September 17).?Computers Upset the Workplace.?Retrieved from BBC News World Edition:?http://news.bbc.co.uk/2/hi/technology/2263916.stm
bellis, m. (n.d.).?The History of Computers. Retrieved from About.com:?http://inventors.about.com/library/blcoindex.htm
computer economics. (2012, february 25).?web e-commerce staffing ratios 2012. Retrieved from Computer Economics:?http://www.computereconomics.com/
Foner. (2010).?Give Me Liberty?(3 ed., Vol. 1). W. W. Norton & Company Limited, 2010.
KRAUSS, L. I., & MACGAHAN, A. (1979). COMPUTER FRAUD AND COUNTERMEASURES.?national criminal justice reference service #57129(NCJ Number: 57129), p. 524. Retrieved from?https://www.ncjrs.gov/App/abstractdb/AbstractDBDetails.aspx?id=57129
Lee, G., Espinosa, J. A., & Delone, W. H. (2009). THE EFFECT OF PROCESS AMBIDEXTERITY ON THE SUCCESS OF DISTRIBUTED INFORMATION SYSTEMS DEVELOPMENT. (A. U.-8. KOGOD SCHOOL OF BUSINESS, Ed.)?Academy of Management Annual Meeting Proceedings, 1-6. doi:10.5465/AMBPP.2009.44265097
Macy, A., Terry, N., & Walker, J. (2011). FINANCIAL PERFORMANCE OF COMPUTER NETWORK AND INFORMATION TECHNOLOGY SERVICES COMPANIES IN BULL AND BEAR MARKETS. (W. T. University, Ed.)?Academy of Accounting & Financial Studies Journal, 15(4), 83-97. Retrieved September 2011
via Computer Economics A Great Dependence with Explicit Consequences ? St. Louis Relationships | Examiner.com.
Source: http://turkishcentralnews.com/archives/10256
the notebook duke basketball miranda july joe paterno near death joepa sc primary bill moyers
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.