StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Emerging Technologies - Essay Example

Cite this document
Summary
This essay describes that in the past few years, the field of information technology has experienced an amazing pace of advancement.These developments and advancements of computer technology have caused a considerable transformation in the understanding, thoughts and ways of thinking of the people…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.6% of users find it useful
Emerging Technologies
Read Text Preview

Extract of sample "Emerging Technologies"

Emerging Technologies In the past few years, the field of information technology has experienced an amazing pace of advancement. In fact, these developments and advancements of computer technology have caused a considerable transformation in the understanding, thoughts and ways of thinking of the people. It is an admitted fact that computer technology has affected many parts of our life by playing a vital role. In addition, these advancements of information technology have made it essential for business organizations to make effective use of this technology with the intention of surviving in this ever-increasing competitive world. On the other hand, these information technologies are not capable of bringing perfection in the organizational performance if they are not effectively utilized and implemented (Ellahi & Manarvi, 2010). In addition, the use of computer technology for crime investigation and computer forensics are always growing with the intention that they are exaggerated by a wide variety of external aspects and causes for instance continuous developments and improvements in technology (especially information technology, public issues, and lawful issues). In this scenario, it is essential for the computer security practitioners that they are well aware of the countless legal and technological issues that have an effect on systems and people, comprising issues dealing with investigations and enforcement. In the past few years, the events of computer-related crime and telecommunications fraud have augmented at a very high speed. In addition, due to the intangible environment of these crimes, we could be able to see very few prosecutions and even fewer convictions. In many cases, the computer technology that has been accepted for automation and advancement of a wide variety of business operations has also brought a lot of new kinds of computer violence and crime. Though, some of these system attacks only use up to date techniques to hand over older, a lot of well-known types of abuse, while remaining engaged the utilization of absolutely new kinds of against the law action that has developed together with the technology (Moreilly, 1997). Basically, the computer technology is used in law enforcement in an attempt to support police work in different forms for instance computer technology offers a wide variety of software tools and applications that can be used for examining data like that geographic information systems and entering information regarding crimes in databases. At the present, the advancements and developments in information technologies have required from law enforcement agencies to make use of the most excellent technology obtainable to carry out data analysis, respond to crises, protect people and stop crimes. In addition, a lot of researches have shown that computer technology can be used to increase the efficiency of police work; however it needs to be integrated with definite organizational activities which are implemented to take advantage of data availability. In this scenario, computer technology works as a wonderful tool for police to help them achieve their wider and more and more complicated tasks. Additionally, the research has also shown that computer technology has significant effect on performance of police work. In other words, it can be said that if police department makes effective use of information technology, it can improve their performance and importance. In view of that, it is vital to gain knowledge of that how much information technology is useful for a police force (Ellahi & Manarvi, 2010). Moreover, before the implementation of information technology into the police stations, crime related data and information was stored by hand. However, at the present, the arrival of information technology offers wonderful techniques and technologies to store huge volumes of data which are not station specific; to a certain extent it can be used by all of the police officers. In other words, it can be said that after the implementation of information technology the amount of data collected and stored is augmented. Additionally, computer technology in the scenario of police can be seen in a wide variety of aspects. For instance, police department can use it for keeping the record of crimes and many analytical tools can be utilized to distribute the information from storage location like geographic information systems (GIS). Furthermore, a lot of researches demonstrate the use of computers and databases in criminal investigation and detective work. As well, more than 85% of detectives verify that computers have offered an excellent support for getting information and saving their time (Ellahi & Manarvi, 2010). Additionally, there are two main aspects government and law enforcement need to combat the plague of cybercrime are better information sharing and better information to share. On the other hand, law enforcement agencies usually do not possess the required technical skills that are available to cybercriminals. Thus, sometimes it makes complicated for the investigative parties to get a satisfactory return on the effort and time spent in investigators of computer crime. Hence, there is a need for more research and training for investigators (Jackson, 2007; SUJAY, 2006). At the present, computer technology and DNA analysis is extensively used to solve old and previous unsolved criminal cases. In fact, biological samples which until that time were considered too small, too old, or too degraded to produce a satisfactory DNA report, can be used to investigate crime. In addition, high quality databases encompassing improved reports and data utilize present biological proof as well as proof collected many years ago. In this scenario, CODIS (Combined DNA Index System) is a database that is designed to serve this purpose (Zucker, 2007). (Zetter, 2010) discuss a case of a TJX hacker Albert Gonzalez, who was given the punishment of 20 years for leading a bunch of criminals of cyber thieves. They collectively stole approximately 90 million debit and credit card numbers from TJX and other retailers. In fact, “this punishment for the largest computer-crime case ever prosecuted is the lengthiest ever forced in the USA for identity theft or hacking” (Zetter, 2010). In the same way, (NCSI-Net, 2012) outline different cases where the use of the computer was beneficial to the prosecution in a criminal case. “On February 28, 2000, Jay Cohen was convicted in Manhattan federal court of running a sports betting company that unlawfully received bets and wagers on sporting activities from US Citizens using the telephones and the Internet. In addition, Cohen is the first defendant to stand trial in a series of Internet offshore sports gambling cases that were the first prosecutions brought under the federal Wire Wager Act.” (NCSI-Net, 2012). In conclusion, computer technology like other technologies is just a technology which can be used in both positive and negative senses. However, it depends on people how use it. If it is used positively it can offer numerous advantages. In addition, investigators must be trained and skilled enough in order to make its effective use for the investigation purpose. References Ellahi, A., & Manarvi, I. (2010). Understanding Attitudes Towards Computer Use In The Police Department Of Pakistan. The Electronic Journal on Information Systems in Developing Countries, Volume 42 Issue 1 , 1-26. Garfinkel, S., & Spafford, G. (1996). Practical UNIX & Internet Security. Retrieved April 19, 2012, from http://www.diablotin.com/librairie/networking/puis/index.htm Jackson, W. (2007, October 22). Law enforcement at disadvantage in war on cybercrime. Retrieved April 18, 2012, from http://gcn.com/articles/2007/10/22/law-enforcement-at-disadvantage-in-war-on-cybercrime.aspx Moreilly. (1997). Computer Crime Investigation And Computer Forensics. Retrieved April 17, 2012, from http://www.moreilly.com/CISSP/DomA-2-Computer_Crime_investigation.pdf NCSI-Net. (2012). Computer Crime and Intellectual Property Section (CCIPS): Prosecuting Crimes Facilitated by Computers and by the Internet. Retrieved April 19, 2012, from http://ncsi-net.ncsi.iisc.ernet.in/cyberspace/law/responsibility/cybercrime/www.usdoj.gov/criminal/cybercrime/crimes.htm SUJAY, P. (2006). A seminar report on “Computer Forensics”. Retrieved April 12, 2012, from http://sdmcse2006.pbworks.com/f/2SD06CS110.pdf Zetter, K. (2010, March 25). TJX Hacker Gets 20 Years in Prison. Retrieved April 18, 2012, from http://www.wired.com/threatlevel/2010/03/tjx-sentencing/ Zucker, S. (2007, April). Using Computer Technology to Solve Cold Cases. Retrieved April 17, 2012, from http://www.ncstl.org/evident/ZuckerApril07 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Emerging Technologies Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1397717-emerging-technologies
(Emerging Technologies Essay Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/information-technology/1397717-emerging-technologies.
“Emerging Technologies Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1397717-emerging-technologies.
  • Cited: 0 times

CHECK THESE SAMPLES OF Emerging Technologies

The Modern Times in Technological Sphere

Research Methodologies and Emerging Technologies: Project Glass: The modern times in technological sphere have introduced us to new inventions and innovations that were only part of human imagination until yesterday.... While the wireless handset phones were only a fantasy till the mid 1980s, the last two to three decades have shown us what technology can achieve....
4 Pages (1000 words) Assignment

Emerging technologies- Nanotechnology

Emerging Technologies: Nanotechnology Name: Institution: Emerging Technologies: NANOTECHNOLOGY Nanotechnology is the engineering of systems that function at a molecular scale (Suri, 2012).... Nanotechnology is one of the world's hope for the solution to dirty and crude technologies that harm the earth's biosphere.... What technologies does it build upon and/or rely on?...
3 Pages (750 words) Research Paper

Case Study - Emerging Technologies

Case Study - Emerging Technologies Name Institution Case Study - Emerging Technologies Article Review: Cloud Computing is a Contribution The article trends and issues in crime and criminal justice that addresses challenges and future directions of cloud computing is a contribution of Kim-Kwang Raymond Choo....
3 Pages (750 words) Case Study

Emerging Technologies Trends

The three most important technologies that will be the core concentration in 2008 are: The name defines the functionality of this technology.... Thus turning into one of the favorite technologies it draws huge amount f attention from the users.... This concept of wireless technology is considered to wipe out the limitations of existing technologies by providing wireless connectivity to numerous computing systems spread over a large volume of area....
4 Pages (1000 words) Essay

Emerging technologies proposal

The Technology Review, the publication from the Massachusetts Institute of Technology, has identified Metamaterials as one of the top ten Emerging Technologies in a special review.... A quantum computer makes use of quantum mechanical phenomenon to perform the various operations like data storage, computation, transmission, etc....
4 Pages (1000 words) Essay

Emerging Technologies in Accounting

The present essay under the title "Emerging Technologies in Accounting" dwells on the technological developments meant to deals with accounts.... As the author puts it, there are some details which need to be available in the common database before the event, which will be used for reference....
8 Pages (2000 words) Essay

Emerging Technologies in Business Communication

As the paper outlines, social media enhances the dissemination of business information in product promotion.... It uses various tools that include Search Engine Optimization (SEO).... Optimizing indexing of the content of the brand allows easy access to the information that is relevant to the clients....
1 Pages (250 words) Essay

Emerging Technologies in Healthcare

This work called "Emerging Technologies in Healthcare" describes the impact of new medical technology, innovation in healthcare.... The author outlines that one of the primary reasons for adopting Emerging Technologies in healthcare systems is the belief that advanced systems can improve the quality of patient care.... On the other hand, advanced technologies are breaking traditional barriers between drugs, devices, and tissues....
6 Pages (1500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us