preview

Essay about The Impact of Computer Technology

Good Essays

The impact of computer technology 1

Running Head: The impact of computer technology

Life learning assignment for CIT 312

In partial fulfillment of the requirements
For the Bachelor of Business Administration Degree

By

Matthew Dotson

Professor: Daniel Mays

Cohort 19

July 22, 2008

The impact of computer technology 2 Has computer technology enhanced our society or has it crippled our ability to function ethically? Computer technology has affected the workplace and compromised our privacy leaving us exposed for unauthorized use of our personal identity. Our world has become less ethical and it has become very difficult to trust or determine what is authentic. …show more content…

Storing information in cookies is another procedure hackers use to gain personalized information about users by storing files for future references. Many companies use cookies to customize a frequent shopper habits in an attempt to make shopping easy and efficient. Initially this caused a major uproar because companies did not inform users this was taking place and users became extremely suspicious, not knowing what other information was exposed. This procedure increases the opportunities for an invasion to occur. Today everyone is looking for a good deal. Using the internet for shopping or auctions is very popular. The largest auction site today is ebay, in existence since 1995 with billions spent yearly however; large amounts of personal information is needed to register and still reported as one of the top areas of fraud according to the Federal Trade Commission. Inaccurate and misinterpreted information in data bases is also a major issue with technology and computers. Our
The impact of computer technology 6

government requires sex offenders to register with local municipalities to notify the public that they are residing in a particular neighborhood. There have been several cases where outdated information has caused people to be harassed and killed. According to (Baase, 2008)
A family was harassed, threatened, and physically attacked after its state posted an online list of

Get Access