"Cyber issues digital surveillance" Essays and Research Papers

Sort By:
Satisfactory Essays
Good Essays
Better Essays
Powerful Essays
Best Essays
Page 17 of 50 - About 500 Essays
  • Good Essays

    Cyber - Porn

    • 714 Words
    • 3 Pages

    father decides supporting the government’s regulation on Cyber-Pornography is appropriate. Many people are speaking about Cyber-Pornography because they do not find the subject important. However‚ Cyber-Pornography is a subject where a young child will find plenty of information on the Internet. Cyber-Pornography websites need to display a security feature where a young child cannot access the website. However‚ the better choice for Cyber-Pornography would be to ban all websites.

    Premium Internet Pornography Sexual intercourse

    • 714 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cyber Bullying

    • 392 Words
    • 2 Pages

    heads in the toilet with no wounds/bruises or bloody noses as evidence of abuse‚ cyber-bullying often doesn’t attract the attention of elderly until it’s too late. Cyber-bullying is the usage of internet and mobile gadgets such as web pages and discussion groups as well as instant messaging or SMS text messaging with the intention of harming another person. Websites like Twitter and “Facebook” are the common ways of cyber-bullying. It is being cruel to others by sending or posting harmful material

    Premium Instant messaging Text messaging Bullying

    • 392 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Privacy vs. Surveillance

    • 773 Words
    • 4 Pages

    NSA Surveillance Program: A Threat to Civilians Privacy Since the beginning of WWI‚ spying activity has become a very important part of national security to United States. To track the activity of people‚ U.S.A. has many spying agencies and National Security Agency (NSA) is one of them. NSA is the main producer and manager of signal intelligence for the United States. It collects‚ monitors‚ translates‚ and analyses global information‚ and data for intelligence purposes and performs

    Premium United States Constitution United States

    • 773 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cyber Crimes

    • 444 Words
    • 2 Pages

    Cyber Crimes Today Internet has become an integral part of everyone’s life. In fact Internet is a world of virtually unlimited possibilities for all of us. But sadly also for the criminals. Every day they attack our computers‚ steal personal and confidential information‚ or send false messages. So‚ being an Information security student I‚ Shweta gupta would like to tell everyone present here about what actually is a crime over the internet. Any crime that involves the use of computer‚ network‚ devices

    Premium Fraud Identity theft Crime

    • 444 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cyber Threats

    • 641 Words
    • 3 Pages

    Cyber Threats Roger Larew SEC 402 Informational Warfare February 16‚ 2011 Before we get into the major cyber terrorism threats that we all have to deal with I wanted to first define what cyber terrorism is. According to the U.S. Federal Bureau of Investigation‚ cyber terrorism is any premeditated‚ politically motivated attack against information‚ computer systems‚ computer programs‚ and data which results in violence against non-combatant targets by sub-national groups or clandestine agents

    Premium Terrorism Federal Bureau of Investigation Computer security

    • 641 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cyber Bullying

    • 465 Words
    • 2 Pages

    Nowadays‚ cyber bullying is ubiquity in everywhere. To Cyber bully is to use social networking technologies and deliberatly send out threats and hostile feeling or behavior by an individual or groups to harm people. That inlcudes to harass or intimidate people by using communication technologies‚ like sending of incessant messages through usage of Internet to post text or images to embarrass and hurt people. In most cases‚ cyber bullies may create fake account or impersonation to comment‚ post videos

    Premium Bullying Abuse

    • 465 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cyber Crimes

    • 689 Words
    • 3 Pages

    rights are the same as violating rights in person.  The Internet has laws.  That means that people need to be aware of cyber laws and illegal cyber activity.  Torts made on the Internet are referred to as cyber torts.  Torts are simply violated someone. To start‚ there are several instances where a person is violated on the Internet.  The primary example of being violated in cyber space is defamation.  Defamation is essentially any type of slander against someone on the Internet.  Whether it is through

    Premium E-mail Crimes Internet service provider

    • 689 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cyber Security

    • 635 Words
    • 3 Pages

    Checkpoint: Cyber Security Paper The Merriam-Webster’s Dictionary defines cyber security measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack Most people think that hackers are just people that want to mess up your computer‚ but real hackers break into systems because they want to see what they can do‚ then they might leave a message on the victims computer‚ but that’s it. So‚ the computer security people protect from those other hackers

    Premium Computer security Computer Password

    • 635 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cyber Attacks

    • 644 Words
    • 3 Pages

    unprecedented levels of security at Indian airports‚ railway stations‚ hotels‚ ports etc. But the government does not seem to see the bigger threat‚ which will not come from AK-47s‚ bombs and rifles. The next big attack will be come from terrorists in the cyber world. We live in a technologically interconnected world. Most of us cannot imagine even a single day without our cell phones‚ internet and ATMs. There is hardly any distinction between where our bodies end and technology begins. Would it be surprising

    Premium Security Police Computer security

    • 644 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Introduction: Defining the Digital Native and Digital Immigrant Though the terms themselves are fraught with colonialist and imperialist connotations‚ they will nonetheless serve as an entry point into a discussion defined by a radical shift in society brought about by the ever-pervasive and widespread use of digital technology and the societal and psychological implications of this digital technology. In 2001‚ Marc Prensky‚ an internationally acclaimed thought leader‚ speaker‚ writer‚ consultant

    Premium Internet Sociology World Wide Web

    • 593 Words
    • 3 Pages
    Good Essays
Page 1 14 15 16 17 18 19 20 21 50